lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250718172634.18261f54@kernel.org>
Date: Fri, 18 Jul 2025 17:26:34 -0700
From: Jakub Kicinski <kuba@...nel.org>
To: Florian Westphal <fw@...len.de>
Cc: <netdev@...r.kernel.org>, pablo@...filter.org, pabeni@...hat.com
Subject: Re: [PATCH net] selftests: netfilter: tone-down conntrack clash
 test

On Thu, 17 Jul 2025 17:09:37 +0200 Florian Westphal wrote:
> Stop this test from failing.
> 
> This is a stop-gap measure to not keep failing on NIPA CI.
> 
> The test is supposed to observe that clash_resolution stat counter
> incremented (code path was covered).  This path is only exercised
> when multiple packets race: depending on kernel config, number of CPUs,
> scheduling policy etc. this might not trigger at all.
> 
> Therefore, if the test program did not observe the expected number of
> replies, make a note of it but do not flip script retval to 1.
> 
> With this change the test should either SKIP or pass.
> Hard error can be restored later once its clear whats going on.

Hm, someone set this patch to Deferred and Archived in patchwork, 
which is rather unusual. If someone did that on purpose please reply
otherwise we'll apply the patch.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ