lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 08 Jan 2011 22:36:03 +0200 From: <denys@...p.net.lb> To: <denys@...p.net.lb> Cc: Stephen Hemminger <shemminger@...tta.com>, <netdev@...r.kernel.org> Subject: Re: iproute2 caching and batch mode On Sat, 08 Jan 2011 22:09:39 +0200, <denys@...p.net.lb> wrote: > Hi, > > noticed some issue a while ago, and because of recent patches decided to > post my thoughts: > > This issue can happen if ip or tc running in some kind of "daemon" batch > mode, or processing large batch file on computer where interfaces can > reappear with same name but different index (pppoe NAS for example). > > It is easy to reproduce the problem: > > centaur iproute2-2.6.37 # ip/ip -force -batch - > tunnel add test0 mode ipip remote 1.1.1.2 local 1.1.1.1 > link show dev test0 > 201: test0: <POINTOPOINT,NOARP> mtu 1480 qdisc noop state DOWN > link/ipip 1.1.1.1 peer 1.1.1.2 > tunnel del test0 > Unsupported family:17 > > Or: > > centaur iproute2-2.6.37 # ip/ip -force -batch - > tunnel del test0 > tunnel add test0 mode ipip remote 1.1.1.2 local 1.1.1.1 > link show dev test0 > 202: test0: <POINTOPOINT,NOARP> mtu 1480 qdisc noop state DOWN > link/ipip 1.1.1.1 peer 1.1.1.2 > (another console, delete and create again test0) > link show dev test0 > (nothing will appear) Sorry, just got mail sent before i finish it. Is it appropriate to implement some kind of "flush" command, to flush internal cache? I can try to do that, if this way is ok. Sure maybe best way to monitor interface updates over netlink, in batch mode, and update cache accordingly. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists