lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200808271700.36029.denys@visp.net.lb>
Date:	Wed, 27 Aug 2008 17:00:35 +0300
From:	Denys Fedoryshchenko <denys@...p.net.lb>
To:	Evgeniy Polyakov <johnpol@....mipt.ru>
Cc:	Eric Dumazet <dada1@...mosbay.com>, netdev@...r.kernel.org,
	linux-kernel@...r.kernel.org
Subject: Re: loaded router, excessive getnstimeofday in oprofile

On Wednesday 27 August 2008, Evgeniy Polyakov wrote:
> Can you put debug print into
> net_enable_timestamp()/net_disable_timestamp() to determine if someone
> enabled timestamp socket option?
OK, i will do that on next system reboot.

> > 0.0.0.0:*                          3207/udhcpd
>
> This one looks suspicious                                                  
>      ^^^^^^^^^^
It is busybox udhcpd... i guess it is innocent. Even i kill it - it doesn't 
change anything at all. 
Only who possible listen multicast socket - it is ripd, i cannot kill him. But 
i think it doesn't matter much too...

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ