| Anonymous | Login | Signup for a new account | 11-10-2008 10:58 PST |
| Main | My View | View Issues | Change Log | Docs |
| Viewing Issue Simple Details [ Jump to Notes ] | [ View Advanced ] [ Issue History ] [ Print ] | ||||||||
| ID | Category | Severity | Reproducibility | Date Submitted | Last Update | ||||
| 0000751 | [BusyBox] Networking Support | minor | always | 02-20-06 20:11 | 02-21-06 18:10 | ||||
| Reporter | pochi | View Status | public | ||||||
| Assigned To | BusyBox | ||||||||
| Priority | normal | Resolution | fixed | ||||||
| Status | closed | Product Version | svn | ||||||
| Summary | 0000751: [patch] udhcp socket leaks | ||||||||
| Description |
From http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=336507 [^] : "While my ISP was playing up, udhcpc was getting 30 second leases from the cable modem. Somehow it managed to run out of file descriptors and /proc/nn/fd showed a large number of sockets. Using strace showed it was creating a UDP socket, setting SO_REUSEADDR and then attempting to bind it to a specific IP address. The bind failed and the socket was never closed. Examining kernel_packet() we can see that if the bind fails, the socket will remain open. There are a number of similar cases. See the patch below. -- Neil Turton" |
||||||||
| Additional Information | |||||||||
| Attached Files |
|
||||||||
|
|
|||||||||
| Copyright © 2000 - 2006 Mantis Group |