lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 23 Oct 2015 17:34:11 -0400
From:	Brian Rak <brak@...tr.com>
To:	netdev@...r.kernel.org
Subject: Missing IPv4 routes

I've got a weird situation here.  I have a route that the kernel knows 
about, but won't display via the general RTM_GETROUTE call, but will 
display if I query for that particular route:

# ip -4 route show | grep 108.61.171.x
# ip route get 108.61.171.x
108.61.171.x dev MYIF
     cache
# cat /proc/net/route | grep 108.61.171.x
#
# cat /proc/net/route  | grep -i 6c3dac
#
# ip route add 108.61.171.x dev MYIF
RTNETLINK answers: File exists
# ip route del 108.61.171.x  <---- it deletes successfully once
# ip route del 108.61.171.x
RTNETLINK answers: No such process


This is on a machine running 4.1.3, but I have seen it on earlier 
versions in the past.

I don't have great reproduction steps here, I've seen this 4-5 times in 
the past few months (on different hardware).  So far, I haven't really 
found any way of fixing it (deleting and readding the route has no 
effect).  I thought at first this might be related to 
e55ffaf457bcc8ec4e9d9f56f955971f834d65b3, but as far as I can tell that 
only relates to /proc/net/route.

Any suggestions on further troubleshooting here?  I'm all out of ideas 
(and since I can't easily reproduce it yet, I can't reboot to a newer 
kernel to see if it goes away)
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ