lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 31 Oct 2022 11:44:09 +0100 From: Casper Andersson <casper.casan@...il.com> To: Steen Hegelund <steen.hegelund@...rochip.com> Cc: "David S . Miller" <davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>, UNGLinuxDriver@...rochip.com, Randy Dunlap <rdunlap@...radead.org>, Russell King <rmk+kernel@...linux.org.uk>, Wan Jiabing <wanjiabing@...o.com>, Nathan Huckleberry <nhuck@...gle.com>, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, linux-arm-kernel@...ts.infradead.org, Daniel Machon <daniel.machon@...rochip.com>, Horatiu Vultur <horatiu.vultur@...rochip.com>, Lars Povlsen <lars.povlsen@...rochip.com> Subject: Re: [PATCH net-next v2 2/5] net: microchip: sparx5: Adding more tc flower keys for the IS2 VCAP Hi Steen, On 2022-10-28 16:45, Steen Hegelund wrote: > - IPv4 Addresses > tc filter add dev eth12 ingress chain 8000000 prio 12 handle 12 \ > protocol ip flower skip_sw dst_ip 1.0.1.1 src_ip 2.0.2.2 \ > action trap I'm not able to get this working on PCB135. I tested the VLAN tags and did not work either (did not test the rest). The example from the previous patch series doesn't work either after applying this series. tc qdisc add dev eth3 clsact tc filter add dev eth3 ingress chain 8000000 prio 10 handle 10 \ protocol all flower skip_sw \ dst_mac 0a:0b:0c:0d:0e:0f \ src_mac 2:0:0:0:0:1 \ action trap This example was provided in your last patch series and worked earlier. My setup is PC-eth0 -> PCB135-eth3 and I use the following EasyFrames command to send packets: ef tx eth0 rep 50 eth smac 02:00:00:00:00:01 dmac 0a:0b:0c:0d:0e:0f IPv4: tc qdisc add dev eth3 clsact tc filter add dev eth3 ingress chain 8000000 prio 12 handle 12 \ protocol ip flower skip_sw dst_ip 1.0.1.1 src_ip 2.0.2.2 \ action trap ef tx eth0 rep 50 eth smac 02:00:00:00:00:01 dmac 0a:0b:0c:0d:0e:0f ipv4 dip 1.0.1.1 sip 2.0.2.2 Same setup as above and I can't get this to work either. I'm using tcpdump to watch the interface to see if the packets are being trapped or not. Changing the packets' dmac to broadcast lets me see the packets so I don't have any issue with the setup. BR, Casper
Powered by blists - more mailing lists