lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1389187126.20074.YahooMailBasic@web125504.mail.ne1.yahoo.com>
Date:	Wed, 8 Jan 2014 05:18:46 -0800 (PST)
From:	François-Xavier Le Bail <fx.lebail@...oo.com>
To:	netdev@...r.kernel.org
Cc:	davem@...emloft.net
Subject: Re: IPv6: Bug in net-next

On Wed, 1/8/14, François-Xavier Le Bail <fx.lebail@...oo.com> wrote:

> Hello,
 
> I think there is a bug in actual net-next.
 
> When I execute this code and press Crtl-C, all the IPv6
> Link-Layer addresses are deleted.
 
> This happened between
> c1ddf295f5183a5189196a8035546842caa2055a and HEAD.
 
> #include <sys/types.h>
> #include <sys/socket.h>
> #include <netinet/in.h>
> #include <net/if.h>
> 
> int main (int argc, char **argv)  {
>   struct ipv6_mreq mreq = { 0 };
>   int sockfd1 = socket (AF_INET6, SOCK_DGRAM, 0);
> 
>   inet_pton (AF_INET6, "2a01:999::1", &mreq.ipv6mr_multiaddr);
>   mreq.ipv6mr_interface = if_nametoindex ("dummy0");
>   setsockopt (sockfd1, IPPROTO_IPV6, IPV6_JOIN_ANYCAST, &mreq, sizeof (mreq));
> 
>   pause ();
> }
 
Sorry, it is not linked to this code.
I'm looking for the reason ...

BR,
Francois-Xavier
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ