lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 17 Jun 2009 21:51:22 -0500
From:	John Dykstra <john.dykstra1@...il.com>
To:	Stephen Hemminger <shemminger@...tta.com>
Cc:	netdev@...r.kernel.org
Subject: Re: kernel dies if loopback device not intialized

On Tue, 2009-06-16 at 21:53 -0700, Stephen Hemminger wrote:
> The packets come from SNMP smux which opens a TCP socket over 127.1
> but the loopback interface is in admin down. 

Hmmm...the stack is doing the ARP because it doesn't have a valid route
for 127.0.0.1.  But I would expect it to be ARPing a default router, and
getting a response (modulo your network state).  What am I missing?

> I suspect the packet
> bouncing from ARP is the TCP SYN packet which does not have a
> mac_header()
> because it is going over the (down) loopback.

Loopback packets have a L2 header--it's just not very interesting.

Even if they never got an L2 header added, skb->mac_header shouldn't be
garbage.

  --  John

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ