lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20221012221841.GA11818@breakpoint.cc> Date: Thu, 13 Oct 2022 00:18:41 +0200 From: Florian Westphal <fw@...len.de> To: Daniel Xu <dxu@...uu.xyz> Cc: Martin KaFai Lau <martin.lau@...ux.dev>, pablo@...filter.org, fw@...len.de, netfilter-devel@...r.kernel.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, andrii@...nel.org, daniel@...earbox.net, ast@...nel.org, bpf@...r.kernel.org, memxor@...il.com Subject: Re: [PATCH bpf-next v4 2/3] selftests/bpf: Add connmark read test Daniel Xu <dxu@...uu.xyz> wrote: > > Warning: Extension CONNMARK revision 0 not supported, missing kernel module? > > iptables v1.8.8 (nf_tables): Could not fetch rule set generation id: > > Invalid argument Martin, can you give result of modinfo xt_CONNMARK and modinfo nft_compat? I suspect your kernel lacks nf_tables support. > > iptables v1.8.8 (nf_tables): Could not fetch rule set generation id: > > Invalid argument Probably a kernel without nftables support? > So perhaps iptables/nftables suffered a regression somewhere. I'll take > a closer look tonight / tomorrow morning. Possible but unlikely, all those tests pass for me.
Powered by blists - more mailing lists