killall pulseaudio didn't fix it, but:
# chmod 0600 /usr/lib/pulse-10.0/modules/module-rtp-send.so
followed by killall pulseaudio again did and this will doubtless work until the
package is updated.
I have no idea why this issue popped up today. I haven't made any changes to my
sound settings for a while and the timestamp on
~/.gconf/system/pulseaudio/modules/rtp-send is July 2012.
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to pulseaudio in Ubuntu.
https://bugs.launchpad.net/bugs/411688
Title:
pulseaudio floods network with multicast packets
Status in PulseAudio:
Confirmed
Status in pulseaudio package in Ubuntu:
Confirmed
Status in pulseaudio package in Arch Linux:
Confirmed
Status in pulseaudio package in Debian:
Fix Released
Bug description:
Binary package hint: pulseaudio
Since a karmic update last week, when pulseaudio is running it floods
the network with multicast packets, to the point where the wireless
interface I'm using is so flooded that no other network traffic can be
transfered.
Here is a snippet of tcpdump -i wlan 0 -n:
---8<---
01:10:36.532748 IP (tos 0x10, ttl 1, id 23823, offset 0, flags [DF], proto
UDP (17), length 1320)
10.0.0.1.45232 > 224.0.0.56.46812: UDP, length 1292
0x: 4510 0528 5d0f 4000 0111 2d6d 0a00 0001
0x0010: e000 0038 b0b0 b6dc 0514 f9f6 800a ee8e
0x0020: 0071 a980 ed51 a42b
0x0030:
0x0040:
01:10:36.53 IP (tos 0x10, ttl 1, id 23824, offset 0, flags [DF], proto
UDP (17), length 1320)
10.0.0.1.45232 > 224.0.0.56.46812: UDP, length 1292
0x: 4510 0528 5d10 4000 0111 2d6c 0a00 0001
0x0010: e000 0038 b0b0 b6dc 0514 f8b5 800a ee8f
0x0020: 0071 aac0 ed51 a42b
0x0030:
0x0040:
01:10:36.547289 IP (tos 0x10, ttl 1, id 23825, offset 0, flags [DF], proto
UDP (17), length 1320)
10.0.0.1.45232 > 224.0.0.56.46812: UDP, length 1292
0x: 4510 0528 5d11 4000 0111 2d6b 0a00 0001
0x0010: e000 0038 b0b0 b6dc 0514 f774 800a ee90
0x0020: 0071 ac00 ed51 a42b
0x0030:
0x0040:
01:10:36.556725 IP (tos 0x10, ttl 1, id 23826, offset 0, flags [DF], proto
UDP (17), length 1320)
10.0.0.1.45232 > 224.0.0.56.46812: UDP, length 1292
0x: 4510 0528 5d12 4000 0111 2d6a 0a00 0001
0x0010: e000 0038 b0b0 b6dc 0514 f633 800a ee91
0x0020: 0071 ad40 ed51 a42b
0x0030:
0x0040:
01:10:36.561680 IP (tos 0x10, ttl 1, id 23827, offset 0, flags [DF], proto
UDP (17), length 1320)
10.0.0.1.45232 > 224.0.0.56.46812: UDP, length 1292
0x: 4510 0528 5d13 4000 0111 2d69 0a00 0001
0x0010: e000 0038 b0b0 b6dc 0514 f4f2 800a ee92
0x0020: 0071 ae80 ed51 a42b
0x0030:
0x0040:
01:10:36.568984 IP (tos 0x10, ttl 1, id 23828, offset 0, flags [DF], proto
UDP (17), length 1320)
10.0.0.1.45232 > 224.0.0.56.46812: UDP, length 1292
0x: 4510 0528 5d14 4000 0111 2d68 0a00 0001
0x0010: e000 0038 b0b0 b6dc 0514 f3b1 800a ee93
0x0020: 0071 afc0 ed51 a42b
0x0030:
0x0040:
01:10:36.576212 IP (tos 0x10, ttl 1, id 23829, offset 0, flags [DF], proto
UDP (17), length 1320)
10.0.0.1.45232 > 224.0.0.56.46812: UDP, length 1292
0x: 4510 0528 5d15 4000 0111 2d67 0a00 0001
0x0010: e000 0038 b0b0 b6dc 0514 f270 800a ee94
0x0020: 0071 b100 ed51 a42b
0x0030:
0x0040:
01:10:36.588095 IP (tos 0x10, ttl 1, id 23830, offset 0, flags [DF], proto
UDP (17), length 1320)
10.0.0.1.45232 > 224.0.0.56.46812: UDP, length 1292
0x: 4510 0528 5d16 4000 0111 2d66 0a00 0001
0x0010: e000 0038 b0b0 b6dc 0514 f12f 800a ee95
0x0020: 0071 b240 ed51 a42b
0x0030:
0x0040:
01:10:36.590645 IP (tos 0x10, ttl 1, id 23831, offset 0, flags [DF], proto
UDP (17), length 1320)
10.0.0.1.45232 > 224.0.0.56.46812: UDP, length 1292
0x: 4510 0528 5d17 4000 0111 2d65 0a00 0001
0x0010: e000 0038 b0b0 b6dc 0514 efee 800a ee96
0x0020: 0071 b380 ed51 a42b
0x0030: