lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <d39c36500708021300l11f0141bj6885443e2c8b3cb2@mail.gmail.com>
Date:	Thu, 2 Aug 2007 23:00:55 +0300
From:	"nano bug" <linnewbye@...il.com>
To:	netdev@...r.kernel.org
Subject: Fwd: source interface ping bug ?

---------- Forwarded message ----------
From: nano bug <linnewbye@...il.com>
Date: Aug 2, 2007 10:56 PM
Subject: Re: source interface ping bug ?
To: Ben Greear <greearb@...delatech.com>


Hello,

Sorry for the late reply, I have atached the strace output of eth0 and
eth2 on kernel 2.6.20 and 2.6.22

On 7/30/07, Ben Greear <greearb@...delatech.com> wrote:
> nano bug wrote:
> > Can someone have a look a this and tell if it's kernel related or if I
> > posted this in the wrong place ? Thanks.
> >
> Last I checked, ping did not do an SO_BINDTODEVICE even if you did -i ethX.
> I think it just looked up the IP for that port and treated it as -i a.b.c.d.
>
> That said, I'm not sure why the behaviour changes for you between kernel
> releases.
>
> Maybe an 'strace' of your ping command on the different kernels would help
> figure out what the problem is?
>
> Ben
>
> --
> Ben Greear <greearb@...delatech.com>
> Candela Technologies Inc  http://www.candelatech.com
>
>
>

Download attachment "strace_eth0_2.6.20" of type "application/octet-stream" (13375 bytes)

Download attachment "strace_eth0_2.6.22" of type "application/octet-stream" (13336 bytes)

Download attachment "strace_eth2_2.6.20" of type "application/octet-stream" (13335 bytes)

Download attachment "strace_eth2_2.6.22" of type "application/octet-stream" (15575 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ