lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20100912.121713.189706279.davem@davemloft.net> Date: Sun, 12 Sep 2010 12:17:13 -0700 (PDT) From: David Miller <davem@...emloft.net> To: alex@...riz.org.uk Cc: netdev@...r.kernel.org Subject: Re: pimreg zombies From: Alexander Clouter <alex@...riz.org.uk> Date: Sat, 4 Sep 2010 22:12:34 +0100 > I am writing a multicast pim daemon and noticed that if I call > setsockopt(MRT_ADD_VIF), also occurs for IPv6 too, incorrectly on a > socket established with socket(AF_INET, SOCK_RAW, IPPROTO_PIM)[1] then > when the application quits I have zombie pimreg (and pimreg6) interfaces > that can only be disposed of with a reboot. pimreg interfaces can only be instantiated and removed from userspace by using the appropriate MRT_*. So you can get rid of these interfaces by using an appropriate MRT_DEL_VIF call on an IPPROTO_PIM socket. They are not automatically removed by the closing of that userland socket. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists