lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAO_aot5eyNmYhMi7LSKqwsb=hFbWUqOF3rzWt7Kt-C4hJ9pOmQ@mail.gmail.com> Date: Sun, 14 Oct 2012 22:56:22 +0200 From: Jan Hinnerk Stosch <janhinnerk.stosch@...il.com> To: Eric Dumazet <eric.dumazet@...il.com>, netdev@...r.kernel.org Subject: Re: regression when connecting to ipv6 localhost 2012/10/14 Eric Dumazet <eric.dumazet@...il.com>: > On Sun, 2012-10-14 at 22:45 +0200, Eric Dumazet wrote: > >> OK so IPv6 UDP frames are delivered to ntpd >> >> could you strace it while doing one "ntpq -p" >> >> strace -p 368 >> > > Also please post "ip -6 addr" > > ip -6 addr gives: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000 inet6 fe80::922b:34ff:fe33:c292/64 scope link valid_lft forever preferred_lft forever And the output of "strace ntpq -p" is attached in file "ntpq-p". I also did a tcpdump earlier this day as told in the bugtracker. Find the parts containing "ntpd" attached in file "tcpdump". Download attachment "ntpq-p" of type "application/octet-stream" (13327 bytes) Download attachment "tcpdump" of type "application/octet-stream" (428 bytes)
Powered by blists - more mailing lists