# HG changeset patch # User Roy Marples # Date 1603639813 0 # Node ID 357fddea93659cefdd23633dea8e90d711c5b3aa # Parent 75fdbbc9e1a5d9d7bca5aca95619458da0c8e085 privsep: Close BPF socket on ENXIO. This stops log spam if RTM_IFANNOUNCE is delayed for the departing interface. diff -r 75fdbbc9e1a5 -r 357fddea9365 src/privsep-bpf.c --- a/src/privsep-bpf.c Sun Oct 25 08:52:38 2020 +0000 +++ b/src/privsep-bpf.c Sun Oct 25 15:30:13 2020 +0000 @@ -70,9 +70,21 @@ * This mechanism allows us to read each packet from the buffer. */ while (!(bpf->bpf_flags & BPF_EOF)) { len = bpf_read(bpf, buf, sizeof(buf)); - if (len == -1) - logerr(__func__); - if (len == -1 || len == 0) + if (len == -1) { + int error = errno; + + logerr("%s: %s", psp->psp_ifname, __func__); + if (error != ENXIO) + break; + /* If the interface has departed, close the BPF + * socket. This stops log spam if RTM_IFANNOUNCE is + * delayed in announcing the departing interface. */ + eloop_event_delete(psp->psp_ctx->eloop, bpf->bpf_fd); + bpf_close(bpf); + psp->psp_bpf = NULL; + break; + } + if (len == 0) break; psm.ps_flags = bpf->bpf_flags; len = ps_sendpsmdata(psp->psp_ctx, psp->psp_ctx->ps_data_fd, @@ -107,6 +119,12 @@ return -1; } + /* We might have had an earlier ENXIO error. */ + if (psp->psp_bpf == NULL) { + errno = ENXIO; + return -1; + } + return bpf_send(psp->psp_bpf, psp->psp_proto, iov->iov_base, iov->iov_len); }