Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 302118 Details for
Bug 440264
fedora.pool.ntp.org isn't found so the clock isn't set correctly
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
log of ntpd -D 4 &>/tmp/ntp.log
ntp.log (text/plain), 17.73 KB, created by
Mark Summerfield
on 2008-04-11 13:51:19 UTC
(
hide
)
Description:
log of ntpd -D 4 &>/tmp/ntp.log
Filename:
MIME Type:
Creator:
Mark Summerfield
Created:
2008-04-11 13:51:19 UTC
Size:
17.73 KB
patch
obsolete
>ntpd 4.2.4p2@1.1495-o Mon Sep 24 14:40:07 UTC 2007 (1) >addto_syslog: set_process_priority: Leave priority alone: priority_done is <2> >addto_syslog: precision = 1.000 usec >create_sockets(123) >addto_syslog: ntp_io: estimated max descriptors: 1024, initial socket boundary: 16 >setsockopt SO_TIMESTAMP enabled on fd 16 address 0.0.0.0 >bind() fd 16, family 2, port 123, addr 0.0.0.0, flags=0x89 >flags for fd 16: 0x802 >Searching for addr 0.0.0.0 in list of addresses - NOT FOUND >Added addr 0.0.0.0 to list of addresses >addto_syslog: Listening on interface #0 wildcard, 0.0.0.0#123 Disabled >setsockopt SO_TIMESTAMP enabled on fd 17 address :: >bind() fd 17, family 10, port 123, addr ::, flags=0x81 >flags for fd 17: 0x802 >Searching for addr :: in list of addresses - NOT FOUND >Added addr :: to list of addresses >addto_syslog: Listening on interface #1 wildcard, ::#123 Disabled >update_interfaces(123) >address_okay: listen Virtual: 1, IF name: lo >address_okay: loopback - OK >examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, scope=1, ifindex=0, sin=::1, Enabled: >Searching for addr ::1 in list of addresses - NOT FOUND >create_interface(::1#123) >set SO_REUSEADDR to ON on :: >set SO_REUSEADDR to OFF on :: >setsockopt SO_TIMESTAMP enabled on fd 18 address ::1 >bind() fd 18, family 10, port 123, addr ::1, flags=0x5 >flags for fd 18: 0x802 >addto_syslog: Listening on interface #2 lo, ::1#123 Enabled >Searching for addr ::1 in list of addresses - NOT FOUND >Added addr ::1 to list of addresses >created interface #2: fd=18, bfd=-1, name=lo, flags=0x5, scope=1, ifindex=0, sin=::1, Enabled: >updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, scope=1, ifindex=0, sin=::1, Enabled: new - created >address_okay: listen Virtual: 1, IF name: eth0 >address_okay: OK >examining interface #0: fd=-1, bfd=-1, name=eth0, flags=0x11, scope=2, ifindex=0, sin=fe80::216:76ff:fe28:80e3, Enabled: >Searching for addr fe80::216:76ff:fe28:80e3 in list of addresses - NOT FOUND >create_interface(fe80::216:76ff:fe28:80e3#123) >set SO_REUSEADDR to ON on :: >set SO_REUSEADDR to OFF on :: >setsockopt SO_TIMESTAMP enabled on fd 19 address fe80::216:76ff:fe28:80e3 >bind() fd 19, family 10, port 123, addr fe80::216:76ff:fe28:80e3, flags=0x11 >flags for fd 19: 0x802 >addto_syslog: Listening on interface #3 eth0, fe80::216:76ff:fe28:80e3#123 Enabled >Searching for addr fe80::216:76ff:fe28:80e3 in list of addresses - NOT FOUND >Added addr fe80::216:76ff:fe28:80e3 to list of addresses >created interface #3: fd=19, bfd=-1, name=eth0, flags=0x11, scope=2, ifindex=0, sin=fe80::216:76ff:fe28:80e3, Enabled: >updating interface #3: fd=19, bfd=-1, name=eth0, flags=0x11, scope=2, ifindex=0, sin=fe80::216:76ff:fe28:80e3, Enabled: new - created >address_okay: listen Virtual: 1, IF name: lo >address_okay: loopback - OK >examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, scope=0, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: >Searching for addr 127.0.0.1 in list of addresses - NOT FOUND >create_interface(127.0.0.1#123) >set SO_REUSEADDR to ON on 0.0.0.0 >set SO_REUSEADDR to OFF on 0.0.0.0 >setsockopt SO_TIMESTAMP enabled on fd 20 address 127.0.0.1 >bind() fd 20, family 2, port 123, addr 127.0.0.1, flags=0x5 >flags for fd 20: 0x802 >addto_syslog: Listening on interface #4 lo, 127.0.0.1#123 Enabled >Searching for addr 127.0.0.1 in list of addresses - NOT FOUND >Added addr 127.0.0.1 to list of addresses >created interface #4: fd=20, bfd=-1, name=lo, flags=0x5, scope=0, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: >updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, scope=0, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: new - created >address_okay: listen Virtual: 1, IF name: eth0 >address_okay: OK >examining interface #0: fd=-1, bfd=-1, name=eth0, flags=0x19, scope=0, ifindex=0, sin=192.168.1.2, bcast=192.168.1.255,, mask=255.255.255.0, Enabled: >Searching for addr 192.168.1.2 in list of addresses - NOT FOUND >create_interface(192.168.1.2#123) >set SO_REUSEADDR to ON on 0.0.0.0 >set SO_REUSEADDR to OFF on 0.0.0.0 >setsockopt SO_TIMESTAMP enabled on fd 21 address 192.168.1.2 >bind() fd 21, family 2, port 123, addr 192.168.1.2, flags=0x19 >flags for fd 21: 0x802 >addto_syslog: Listening on interface #5 eth0, 192.168.1.2#123 Enabled >Searching for addr 192.168.1.2 in list of addresses - NOT FOUND >Added addr 192.168.1.2 to list of addresses >created interface #5: fd=21, bfd=-1, name=eth0, flags=0x19, scope=0, ifindex=0, sin=192.168.1.2, bcast=192.168.1.255,, mask=255.255.255.0, Enabled: >updating interface #5: fd=21, bfd=-1, name=eth0, flags=0x19, scope=0, ifindex=0, sin=192.168.1.2, bcast=192.168.1.255,, mask=255.255.255.0, Enabled: new - created >setting SO_REUSEADDR on lo@::1 to off >setting SO_REUSEADDR on eth0@fe80::216:76ff:fe28:80e3 to off >setting SO_REUSEADDR on lo@127.0.0.1 to off >setting SO_REUSEADDR on eth0@192.168.1.2 to off >create_sockets: Total interfaces = 6 >init_io: maxactivefd 21 >local_clock: time 0 offset 0.000000 freq 0.000 state 0 >addto_syslog: kernel time sync status 0040 >addto_syslog: frequency initialized 0.000 PPM from /var/lib/ntp/drift >getnetnum: calling getaddrinfo(127.0.0.1,...) >getnetnum given 127.0.0.1, got 127.0.0.1 (t_UNK/0) >getnetnum: calling getaddrinfo(::1,...) >getnetnum given ::1, got ::1 (t_UNK/0) >getnetnum: calling getaddrinfo(0.fedora.pool.ntp.org,...) >getnetnum given 0.fedora.pool.ntp.org, got 193.228.143.13 (t_UNK/0) >newpeer: cast flags: 0x1 for address: 193.228.143.13 >Finding interface for addr 193.228.143.13 in list of addresses >findlocalinterface: kernel maps 193.228.143.13 to 192.168.1.2 >Searching for addr 192.168.1.2 in list of addresses - FOUND >Found interface #5 eth0 for address 193.228.143.13 >set_peerdstadr(193.228.143.13): change interface from <null> to 192.168.1.2 >newpeer: using fd 21 and our addr 192.168.1.2 >peer_crypto_clear: at 0 next 0 assoc ID 24039 >key_expire: at 0 >peer_clear: at 0 next 1 assoc ID 24039 refid INIT >newpeer: 192.168.1.2->193.228.143.13 mode 3 vers 4 poll 6 10 flags 0x8001 0x1 ttl 0 key 00000000 >getnetnum: calling getaddrinfo(1.fedora.pool.ntp.org,...) >getnetnum given 1.fedora.pool.ntp.org, got 204.9.53.11 (t_UNK/0) >newpeer: cast flags: 0x1 for address: 204.9.53.11 >Finding interface for addr 204.9.53.11 in list of addresses >findlocalinterface: kernel maps 204.9.53.11 to 192.168.1.2 >Searching for addr 192.168.1.2 in list of addresses - FOUND >Found interface #5 eth0 for address 204.9.53.11 >set_peerdstadr(204.9.53.11): change interface from <null> to 192.168.1.2 >newpeer: using fd 21 and our addr 192.168.1.2 >peer_crypto_clear: at 0 next 0 assoc ID 24040 >key_expire: at 0 >peer_clear: at 0 next 2 assoc ID 24040 refid INIT >newpeer: 192.168.1.2->204.9.53.11 mode 3 vers 4 poll 6 10 flags 0x8001 0x1 ttl 0 key 00000000 >getnetnum: calling getaddrinfo(2.fedora.pool.ntp.org,...) >getnetnum given 2.fedora.pool.ntp.org, got 212.85.158.10 (t_UNK/0) >newpeer: cast flags: 0x1 for address: 212.85.158.10 >Finding interface for addr 212.85.158.10 in list of addresses >findlocalinterface: kernel maps 212.85.158.10 to 192.168.1.2 >Searching for addr 192.168.1.2 in list of addresses - FOUND >Found interface #5 eth0 for address 212.85.158.10 >set_peerdstadr(212.85.158.10): change interface from <null> to 192.168.1.2 >newpeer: using fd 21 and our addr 192.168.1.2 >peer_crypto_clear: at 0 next 0 assoc ID 24041 >key_expire: at 0 >peer_clear: at 0 next 3 assoc ID 24041 refid INIT >newpeer: 192.168.1.2->212.85.158.10 mode 3 vers 4 poll 6 10 flags 0x8001 0x1 ttl 0 key 00000000 >authtrust: keyid 0000ffff life 1 >local_clock: time 0 offset 0.000000 freq 0.000 state 1 >report_event: system event 'event_restart' (0x01) status 'sync_alarm, sync_unspec, 1 event, event_unspec' (0xc010) >next in 0.059850 >elapsed 1.000368 >loopfilter: 1 >sendpkt(fd=21 dst=193.228.143.13, src=192.168.1.2, ttl=0, len=48) >transmit: at 1 192.168.1.2->193.228.143.13 mode 3 >poll_update: at 1 193.228.143.13 flags 8001 poll 6 burst 0 last 1 next 65 >auth_agekeys: at 1 keys 1 expired 0 >timer: refresh ts 0 >timer: interface update >update_interfaces(123) >address_okay: listen Virtual: 1, IF name: lo >address_okay: loopback - OK >examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, scope=1, ifindex=0, sin=::1, Enabled: >Searching for addr ::1 in list of addresses - FOUND >updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, scope=1, ifindex=0, sin=::1, Enabled: present >address_okay: listen Virtual: 1, IF name: eth0 >address_okay: OK >examining interface #0: fd=-1, bfd=-1, name=eth0, flags=0x11, scope=2, ifindex=0, sin=fe80::216:76ff:fe28:80e3, Enabled: >Searching for addr fe80::216:76ff:fe28:80e3 in list of addresses - FOUND >updating interface #3: fd=19, bfd=-1, name=eth0, flags=0x11, scope=2, ifindex=0, sin=fe80::216:76ff:fe28:80e3, Enabled: present >address_okay: listen Virtual: 1, IF name: lo >address_okay: loopback - OK >examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, scope=0, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: >Searching for addr 127.0.0.1 in list of addresses - FOUND >updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, scope=0, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: present >address_okay: listen Virtual: 1, IF name: eth0 >address_okay: OK >examining interface #0: fd=-1, bfd=-1, name=eth0, flags=0x19, scope=0, ifindex=0, sin=192.168.1.2, bcast=192.168.1.255,, mask=255.255.255.0, Enabled: >Searching for addr 192.168.1.2 in list of addresses - FOUND >updating interface #5: fd=21, bfd=-1, name=eth0, flags=0x19, scope=0, ifindex=0, sin=192.168.1.2, bcast=192.168.1.255,, mask=255.255.255.0, Enabled: present >Finding interface for addr 212.85.158.10 in list of addresses >findlocalinterface: kernel maps 212.85.158.10 to 192.168.1.2 >Searching for addr 192.168.1.2 in list of addresses - FOUND >Found interface #5 eth0 for address 212.85.158.10 >peer_refresh_interface: 192.168.1.2->212.85.158.10 mode 3 vers 4 poll 6 10 flags 0x8001 0x1 ttl 0 key 00000000: new interface: fd=21, bfd=-1, name=eth0, flags=0x19, scope=0, , sin=192.168.1.2, bcast=192.168.1.255,, mask=255.255.255.0 >Finding interface for addr 204.9.53.11 in list of addresses >findlocalinterface: kernel maps 204.9.53.11 to 192.168.1.2 >Searching for addr 192.168.1.2 in list of addresses - FOUND >Found interface #5 eth0 for address 204.9.53.11 >peer_refresh_interface: 192.168.1.2->204.9.53.11 mode 3 vers 4 poll 6 10 flags 0x8001 0x1 ttl 0 key 00000000: new interface: fd=21, bfd=-1, name=eth0, flags=0x19, scope=0, , sin=192.168.1.2, bcast=192.168.1.255,, mask=255.255.255.0 >Finding interface for addr 193.228.143.13 in list of addresses >findlocalinterface: kernel maps 193.228.143.13 to 192.168.1.2 >Searching for addr 192.168.1.2 in list of addresses - FOUND >Found interface #5 eth0 for address 193.228.143.13 >peer_refresh_interface: 192.168.1.2->193.228.143.13 mode 3 vers 4 poll 6 10 flags 0x8001 0x1 ttl 0 key 00000000: new interface: fd=21, bfd=-1, name=eth0, flags=0x19, scope=0, , sin=192.168.1.2, bcast=192.168.1.255,, mask=255.255.255.0 >next in 0.999170 >elapsed 1.001372 >loopfilter: 1 >sendpkt(fd=21 dst=204.9.53.11, src=192.168.1.2, ttl=0, len=48) >transmit: at 2 192.168.1.2->204.9.53.11 mode 3 >poll_update: at 2 204.9.53.11 flags 8001 poll 6 burst 0 last 2 next 65 >next in 0.998553 >elapsed 1.001370 >loopfilter: 1 >sendpkt(fd=21 dst=212.85.158.10, src=192.168.1.2, ttl=0, len=48) >transmit: at 3 192.168.1.2->212.85.158.10 mode 3 >poll_update: at 3 212.85.158.10 flags 8001 poll 6 burst 0 last 3 next 68 >next in 61.998566 >elapsed 62.001369 >loopfilter: 62 >sendpkt(fd=21 dst=204.9.53.11, src=192.168.1.2, ttl=0, len=48) >transmit: at 65 192.168.1.2->204.9.53.11 mode 3 >poll_update: at 65 204.9.53.11 flags 8001 poll 6 burst 0 last 65 next 128 >sendpkt(fd=21 dst=193.228.143.13, src=192.168.1.2, ttl=0, len=48) >transmit: at 65 192.168.1.2->193.228.143.13 mode 3 >poll_update: at 65 193.228.143.13 flags 8001 poll 6 burst 0 last 65 next 131 >auth_agekeys: at 65 keys 1 expired 0 >next in 2.998519 >elapsed 3.001369 >loopfilter: 3 >sendpkt(fd=21 dst=212.85.158.10, src=192.168.1.2, ttl=0, len=48) >transmit: at 68 192.168.1.2->212.85.158.10 mode 3 >poll_update: at 68 212.85.158.10 flags 8001 poll 6 burst 0 last 68 next 131 >next in 59.998540 >elapsed 60.001372 >loopfilter: 60 >sendpkt(fd=21 dst=204.9.53.11, src=192.168.1.2, ttl=0, len=48) >transmit: at 128 192.168.1.2->204.9.53.11 mode 3 >poll_update: at 128 204.9.53.11 flags 8001 poll 6 burst 0 last 128 next 191 >auth_agekeys: at 128 keys 1 expired 0 >next in 2.998477 >elapsed 3.001383 >loopfilter: 3 >sendpkt(fd=21 dst=212.85.158.10, src=192.168.1.2, ttl=0, len=48) >transmit: at 131 192.168.1.2->212.85.158.10 mode 3 >poll_update: at 131 212.85.158.10 flags 8001 poll 6 burst 0 last 131 next 197 >sendpkt(fd=21 dst=193.228.143.13, src=192.168.1.2, ttl=0, len=48) >transmit: at 131 192.168.1.2->193.228.143.13 mode 3 >poll_update: at 131 193.228.143.13 flags 8001 poll 6 burst 0 last 131 next 194 >next in 59.998494 >elapsed 60.002425 >loopfilter: 60 >sendpkt(fd=21 dst=204.9.53.11, src=192.168.1.2, ttl=0, len=48) >transmit: at 191 192.168.1.2->204.9.53.11 mode 3 >poll_update: at 191 204.9.53.11 flags 8001 poll 6 burst 0 last 191 next 254 >auth_agekeys: at 191 keys 1 expired 0 >next in 2.997490 >elapsed 3.000373 >loopfilter: 3 >sendpkt(fd=21 dst=193.228.143.13, src=192.168.1.2, ttl=0, len=48) >transmit: at 194 192.168.1.2->193.228.143.13 mode 3 >poll_update: at 194 193.228.143.13 flags 8001 poll 6 burst 0 last 194 next 260 >next in 2.999532 >elapsed 3.001369 >loopfilter: 3 >sendpkt(fd=21 dst=212.85.158.10, src=192.168.1.2, ttl=0, len=48) >transmit: at 197 192.168.1.2->212.85.158.10 mode 3 >poll_update: at 197 212.85.158.10 flags 8001 poll 6 burst 0 last 197 next 262 >next in 56.998544 >elapsed 57.001371 >loopfilter: 57 >sendpkt(fd=21 dst=204.9.53.11, src=192.168.1.2, ttl=0, len=48) >transmit: at 254 192.168.1.2->204.9.53.11 mode 3 >poll_update: at 254 204.9.53.11 flags 8001 poll 6 burst 0 last 254 next 319 >auth_agekeys: at 254 keys 1 expired 0 >next in 5.998525 >elapsed 6.001372 >loopfilter: 6 >sendpkt(fd=21 dst=193.228.143.13, src=192.168.1.2, ttl=0, len=48) >transmit: at 260 192.168.1.2->193.228.143.13 mode 3 >poll_update: at 260 193.228.143.13 flags 8001 poll 6 burst 0 last 260 next 323 >next in 1.998546 >elapsed 2.001373 >loopfilter: 2 >sendpkt(fd=21 dst=212.85.158.10, src=192.168.1.2, ttl=0, len=48) >transmit: at 262 192.168.1.2->212.85.158.10 mode 3 >poll_update: at 262 212.85.158.10 flags 8001 poll 6 burst 0 last 262 next 328 >next in 38.998543 >elapsed 39.001368 >loopfilter: 39 >auth_agekeys: at 301 keys 1 expired 0 >timer: interface update >update_interfaces(123) >address_okay: listen Virtual: 1, IF name: lo >address_okay: loopback - OK >examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, scope=1, ifindex=0, sin=::1, Enabled: >Searching for addr ::1 in list of addresses - FOUND >updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, scope=1, ifindex=0, sin=::1, Enabled: present >address_okay: listen Virtual: 1, IF name: eth0 >address_okay: OK >examining interface #0: fd=-1, bfd=-1, name=eth0, flags=0x11, scope=2, ifindex=0, sin=fe80::216:76ff:fe28:80e3, Enabled: >Searching for addr fe80::216:76ff:fe28:80e3 in list of addresses - FOUND >updating interface #3: fd=19, bfd=-1, name=eth0, flags=0x11, scope=2, ifindex=0, sin=fe80::216:76ff:fe28:80e3, Enabled: present >address_okay: listen Virtual: 1, IF name: lo >address_okay: loopback - OK >examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, scope=0, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: >Searching for addr 127.0.0.1 in list of addresses - FOUND >updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, scope=0, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: present >address_okay: listen Virtual: 1, IF name: eth0 >address_okay: OK >examining interface #0: fd=-1, bfd=-1, name=eth0, flags=0x19, scope=0, ifindex=0, sin=192.168.1.2, bcast=192.168.1.255,, mask=255.255.255.0, Enabled: >Searching for addr 192.168.1.2 in list of addresses - FOUND >updating interface #5: fd=21, bfd=-1, name=eth0, flags=0x19, scope=0, ifindex=0, sin=192.168.1.2, bcast=192.168.1.255,, mask=255.255.255.0, Enabled: present >Finding interface for addr 212.85.158.10 in list of addresses >findlocalinterface: kernel maps 212.85.158.10 to 192.168.1.2 >Searching for addr 192.168.1.2 in list of addresses - FOUND >Found interface #5 eth0 for address 212.85.158.10 >peer_refresh_interface: 192.168.1.2->212.85.158.10 mode 3 vers 4 poll 6 10 flags 0x8001 0x1 ttl 0 key 00000000: new interface: fd=21, bfd=-1, name=eth0, flags=0x19, scope=0, , sin=192.168.1.2, bcast=192.168.1.255,, mask=255.255.255.0 >Finding interface for addr 204.9.53.11 in list of addresses >findlocalinterface: kernel maps 204.9.53.11 to 192.168.1.2 >Searching for addr 192.168.1.2 in list of addresses - FOUND >Found interface #5 eth0 for address 204.9.53.11 >peer_refresh_interface: 192.168.1.2->204.9.53.11 mode 3 vers 4 poll 6 10 flags 0x8001 0x1 ttl 0 key 00000000: new interface: fd=21, bfd=-1, name=eth0, flags=0x19, scope=0, , sin=192.168.1.2, bcast=192.168.1.255,, mask=255.255.255.0 >Finding interface for addr 193.228.143.13 in list of addresses >findlocalinterface: kernel maps 193.228.143.13 to 192.168.1.2 >Searching for addr 192.168.1.2 in list of addresses - FOUND >Found interface #5 eth0 for address 193.228.143.13 >peer_refresh_interface: 192.168.1.2->193.228.143.13 mode 3 vers 4 poll 6 10 flags 0x8001 0x1 ttl 0 key 00000000: new interface: fd=21, bfd=-1, name=eth0, flags=0x19, scope=0, , sin=192.168.1.2, bcast=192.168.1.255,, mask=255.255.255.0 >next in 17.998179 >elapsed 18.001368 >loopfilter: 18 >sendpkt(fd=21 dst=204.9.53.11, src=192.168.1.2, ttl=0, len=48) >transmit: at 319 192.168.1.2->204.9.53.11 mode 3 >poll_update: at 319 204.9.53.11 flags 8001 poll 6 burst 0 last 319 next 384 >next in 3.998549 >elapsed 4.002369 >loopfilter: 4 >sendpkt(fd=21 dst=193.228.143.13, src=192.168.1.2, ttl=0, len=48) >transmit: at 323 192.168.1.2->193.228.143.13 mode 3 >poll_update: at 323 193.228.143.13 flags 8001 poll 6 burst 0 last 323 next 388 >next in 4.997555 >elapsed 5.000373 >loopfilter: 5 >sendpkt(fd=21 dst=212.85.158.10, src=192.168.1.2, ttl=0, len=48) >transmit: at 328 192.168.1.2->212.85.158.10 mode 3 >poll_update: at 328 212.85.158.10 flags 8001 poll 6 burst 0 last 328 next 393 >next in 55.999553 >addto_syslog: ntpd exiting on signal 2
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 440264
:
302115
| 302118 |
302345
|
302409