3 Feb 11:59:43 ntpd[15698]: ntpd address@hidden Tue Feb 3 19:29:38 UTC 2015 (1): Starting 3 Feb 11:59:43 ntpd[15698]: Command line: ntpd -g -N -dddddd ntp_rlimit: STACK: 50 4k pages ntp_rlimit: MEMLOCK: 32 MB filegen_register(peerstats, 0x6a0f80) adding new filegen filegen_register(loopstats, 0x6a0f40) adding new filegen filegen_register(clockstats, 0x6a0f00) adding new filegen filegen_register(rawstats, 0x6a0ec0) adding new filegen filegen_register(sysstats, 0x6a0e80) adding new filegen filegen_register(protostats, 0x6a0e40) adding new filegen filegen_register(cryptostats, 0x6a0e00) adding new filegen filegen_register(timingstats, 0x6a0dc0) adding new filegen 3 Feb 11:59:43 ntpd[15698]: GPSD_JSON: failed to resolve 'localhost:gpsd', rc=-8 (Servname not supported for ai_socktype) GPSD_JSON: failed to resolve 'localhost:gpsd', rc=-8 (Servname not supported for ai_socktype) 3 Feb 11:59:43 ntpd[15698]: set_process_priority: Attempt to set priority: priority_done is <0> 3 Feb 11:59:43 ntpd[15698]: proto: precision = 0.243 usec (-22) Starting parse Entering state 0 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 Entering state 56 Next token is token T_EOC () Shifting token T_EOC () Entering state 207 Reducing stack by rule 3 (line 369): $1 = nterm command () $2 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'driftfile' -> T_Driftfile Next token is token T_Driftfile () Shifting token T_Driftfile () Entering state 10 Reading a token: yylex: lexeme '/var/lib/ntp/ntp.drift' -> T_String Next token is token T_String () Shifting token T_String () Entering state 101 Reading a token: Next token is token T_EOC () Reducing stack by rule 235 (line 1215): $1 = token T_String () -> $$ = nterm drift_parm () Stack now 0 55 10 Entering state 102 Reducing stack by rule 221 (line 1178): $1 = token T_Driftfile () $2 = nterm drift_parm () -> $$ = nterm miscellaneous_command () Stack now 0 55 Entering state 70 Reducing stack by rule 17 (line 396): $1 = nterm miscellaneous_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'logfile' -> T_Logfile Next token is token T_Logfile () Shifting token T_Logfile () Entering state 22 Reducing stack by rule 233 (line 1210): $1 = token T_Logfile () -> $$ = nterm misc_cmd_str_lcl_keyword () Stack now 0 55 Entering state 73 Reading a token: yylex: lexeme '/var/log/ntp.log' -> T_String Next token is token T_String () Shifting token T_String () Entering state 214 Reducing stack by rule 218 (line 1138): $1 = nterm misc_cmd_str_lcl_keyword () $2 = token T_String () -> $$ = nterm miscellaneous_command () Stack now 0 55 Entering state 70 Reducing stack by rule 17 (line 396): $1 = nterm miscellaneous_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Reading a token: Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'server' -> T_Server Next token is token T_Server () Shifting token T_Server () Entering state 41 Reducing stack by rule 20 (line 415): $1 = token T_Server () -> $$ = nterm client_type () Stack now 0 55 Entering state 58 Reading a token: yylex: lexeme 'time-a.timefreq.bldrdoc.gov' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 58 Entering state 117 Reducing stack by rule 25 (line 423): $1 = nterm ip_address () -> $$ = nterm address () Stack now 0 55 58 Entering state 208 Reducing stack by rule 30 (line 442): -> $$ = nterm option_list () Stack now 0 55 58 208 Entering state 278 Reading a token: Next token is token T_EOC () Reducing stack by rule 19 (line 405): $1 = nterm client_type () $2 = nterm address () $3 = nterm option_list () -> $$ = nterm server_command () Stack now 0 55 Entering state 57 Reducing stack by rule 6 (line 385): $1 = nterm server_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'server' -> T_Server Next token is token T_Server () Shifting token T_Server () Entering state 41 Reducing stack by rule 20 (line 415): $1 = token T_Server () -> $$ = nterm client_type () Stack now 0 55 Entering state 58 Reading a token: yylex: lexeme 'bonehed.lcs.mit.edu' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 58 Entering state 117 Reducing stack by rule 25 (line 423): $1 = nterm ip_address () -> $$ = nterm address () Stack now 0 55 58 Entering state 208 Reducing stack by rule 30 (line 442): -> $$ = nterm option_list () Stack now 0 55 58 208 Entering state 278 Reading a token: Next token is token T_EOC () Reducing stack by rule 19 (line 405): $1 = nterm client_type () $2 = nterm address () $3 = nterm option_list () -> $$ = nterm server_command () Stack now 0 55 Entering state 57 Reducing stack by rule 6 (line 385): $1 = nterm server_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'server' -> T_Server Next token is token T_Server () Shifting token T_Server () Entering state 41 Reducing stack by rule 20 (line 415): $1 = token T_Server () -> $$ = nterm client_type () Stack now 0 55 Entering state 58 Reading a token: yylex: lexeme 'clock.sjc.he.net' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 58 Entering state 117 Reducing stack by rule 25 (line 423): $1 = nterm ip_address () -> $$ = nterm address () Stack now 0 55 58 Entering state 208 Reducing stack by rule 30 (line 442): -> $$ = nterm option_list () Stack now 0 55 58 208 Entering state 278 Reading a token: Next token is token T_EOC () Reducing stack by rule 19 (line 405): $1 = nterm client_type () $2 = nterm address () $3 = nterm option_list () -> $$ = nterm server_command () Stack now 0 55 Entering state 57 Reducing stack by rule 6 (line 385): $1 = nterm server_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'pool' -> T_Pool Next token is token T_Pool () Shifting token T_Pool () Entering state 34 Reducing stack by rule 21 (line 416): $1 = token T_Pool () -> $$ = nterm client_type () Stack now 0 55 Entering state 58 Reading a token: yylex: lexeme 'us.pool.ntp.org' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 58 Entering state 117 Reducing stack by rule 25 (line 423): $1 = nterm ip_address () -> $$ = nterm address () Stack now 0 55 58 Entering state 208 Reducing stack by rule 30 (line 442): -> $$ = nterm option_list () Stack now 0 55 58 208 Entering state 278 Reading a token: yylex: lexeme 'iburst' -> T_Iburst Next token is token T_Iburst () Shifting token T_Iburst () Entering state 333 Reducing stack by rule 38 (line 464): $1 = token T_Iburst () -> $$ = nterm option_flag_keyword () Stack now 0 55 58 208 278 Entering state 348 Reducing stack by rule 35 (line 457): $1 = nterm option_flag_keyword () -> $$ = nterm option_flag () Stack now 0 55 58 208 278 Entering state 347 Reducing stack by rule 32 (line 451): $1 = nterm option_flag () -> $$ = nterm option () Stack now 0 55 58 208 278 Entering state 346 Reducing stack by rule 31 (line 443): $1 = nterm option_list () $2 = nterm option () -> $$ = nterm option_list () Stack now 0 55 58 208 Entering state 278 Reading a token: Next token is token T_EOC () Reducing stack by rule 19 (line 405): $1 = nterm client_type () $2 = nterm address () $3 = nterm option_list () -> $$ = nterm server_command () Stack now 0 55 Entering state 57 Reducing stack by rule 6 (line 385): $1 = nterm server_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'statsdir' -> T_Statsdir Next token is token T_Statsdir () Shifting token T_Statsdir () Entering state 44 Reading a token: yylex: lexeme '/var/log/ntp/' -> T_String Next token is token T_String () Shifting token T_String () Entering state 170 Reducing stack by rule 96 (line 664): $1 = token T_Statsdir () $2 = token T_String () -> $$ = nterm monitoring_command () Stack now 0 55 Entering state 64 Reducing stack by rule 10 (line 389): $1 = nterm monitoring_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Reading a token: Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'filegen' -> T_Filegen Next token is token T_Filegen () Shifting token T_Filegen () Entering state 13 Reading a token: yylex: lexeme 'clockstats' -> T_Clockstats Next token is token T_Clockstats () Shifting token T_Clockstats () Entering state 104 Reducing stack by rule 100 (line 696): $1 = token T_Clockstats () -> $$ = nterm stat () Stack now 0 55 13 Entering state 112 Reducing stack by rule 108 (line 708): -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'type' -> T_Type Next token is token T_Type () Shifting token T_Type () Entering state 297 Reading a token: yylex: lexeme 'day' -> T_Day Next token is token T_Day () Shifting token T_Day () Entering state 362 Reducing stack by rule 120 (line 768): $1 = token T_Day () -> $$ = nterm filegen_type () Stack now 0 55 13 112 232 297 Entering state 368 Reducing stack by rule 111 (line 727): $1 = token T_Type () $2 = nterm filegen_type () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'link' -> T_Link Next token is token T_Link () Shifting token T_Link () Entering state 295 Reducing stack by rule 114 (line 756): $1 = token T_Link () -> $$ = nterm link_nolink () Stack now 0 55 13 112 232 Entering state 299 Reducing stack by rule 112 (line 736): $1 = nterm link_nolink () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: Next token is token T_EOC () Reducing stack by rule 97 (line 673): $1 = token T_Filegen () $2 = nterm stat () $3 = nterm filegen_option_list () -> $$ = nterm monitoring_command () Stack now 0 55 Entering state 64 Reducing stack by rule 10 (line 389): $1 = nterm monitoring_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'filegen' -> T_Filegen Next token is token T_Filegen () Shifting token T_Filegen () Entering state 13 Reading a token: yylex: lexeme 'loopstats' -> T_Loopstats Next token is token T_Loopstats () Shifting token T_Loopstats () Entering state 106 Reducing stack by rule 102 (line 698): $1 = token T_Loopstats () -> $$ = nterm stat () Stack now 0 55 13 Entering state 112 Reducing stack by rule 108 (line 708): -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'type' -> T_Type Next token is token T_Type () Shifting token T_Type () Entering state 297 Reading a token: yylex: lexeme 'day' -> T_Day Next token is token T_Day () Shifting token T_Day () Entering state 362 Reducing stack by rule 120 (line 768): $1 = token T_Day () -> $$ = nterm filegen_type () Stack now 0 55 13 112 232 297 Entering state 368 Reducing stack by rule 111 (line 727): $1 = token T_Type () $2 = nterm filegen_type () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'link' -> T_Link Next token is token T_Link () Shifting token T_Link () Entering state 295 Reducing stack by rule 114 (line 756): $1 = token T_Link () -> $$ = nterm link_nolink () Stack now 0 55 13 112 232 Entering state 299 Reducing stack by rule 112 (line 736): $1 = nterm link_nolink () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: Next token is token T_EOC () Reducing stack by rule 97 (line 673): $1 = token T_Filegen () $2 = nterm stat () $3 = nterm filegen_option_list () -> $$ = nterm monitoring_command () Stack now 0 55 Entering state 64 Reducing stack by rule 10 (line 389): $1 = nterm monitoring_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'filegen' -> T_Filegen Next token is token T_Filegen () Shifting token T_Filegen () Entering state 13 Reading a token: yylex: lexeme 'peerstats' -> T_Peerstats Next token is token T_Peerstats () Shifting token T_Peerstats () Entering state 107 Reducing stack by rule 103 (line 699): $1 = token T_Peerstats () -> $$ = nterm stat () Stack now 0 55 13 Entering state 112 Reducing stack by rule 108 (line 708): -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'type' -> T_Type Next token is token T_Type () Shifting token T_Type () Entering state 297 Reading a token: yylex: lexeme 'day' -> T_Day Next token is token T_Day () Shifting token T_Day () Entering state 362 Reducing stack by rule 120 (line 768): $1 = token T_Day () -> $$ = nterm filegen_type () Stack now 0 55 13 112 232 297 Entering state 368 Reducing stack by rule 111 (line 727): $1 = token T_Type () $2 = nterm filegen_type () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'link' -> T_Link Next token is token T_Link () Shifting token T_Link () Entering state 295 Reducing stack by rule 114 (line 756): $1 = token T_Link () -> $$ = nterm link_nolink () Stack now 0 55 13 112 232 Entering state 299 Reducing stack by rule 112 (line 736): $1 = nterm link_nolink () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: Next token is token T_EOC () Reducing stack by rule 97 (line 673): $1 = token T_Filegen () $2 = nterm stat () $3 = nterm filegen_option_list () -> $$ = nterm monitoring_command () Stack now 0 55 Entering state 64 Reducing stack by rule 10 (line 389): $1 = nterm monitoring_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'filegen' -> T_Filegen Next token is token T_Filegen () Shifting token T_Filegen () Entering state 13 Reading a token: yylex: lexeme 'protostats' -> T_Protostats Next token is token T_Protostats () Shifting token T_Protostats () Entering state 108 Reducing stack by rule 107 (line 703): $1 = token T_Protostats () -> $$ = nterm stat () Stack now 0 55 13 Entering state 112 Reducing stack by rule 108 (line 708): -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'type' -> T_Type Next token is token T_Type () Shifting token T_Type () Entering state 297 Reading a token: yylex: lexeme 'day' -> T_Day Next token is token T_Day () Shifting token T_Day () Entering state 362 Reducing stack by rule 120 (line 768): $1 = token T_Day () -> $$ = nterm filegen_type () Stack now 0 55 13 112 232 297 Entering state 368 Reducing stack by rule 111 (line 727): $1 = token T_Type () $2 = nterm filegen_type () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'link' -> T_Link Next token is token T_Link () Shifting token T_Link () Entering state 295 Reducing stack by rule 114 (line 756): $1 = token T_Link () -> $$ = nterm link_nolink () Stack now 0 55 13 112 232 Entering state 299 Reducing stack by rule 112 (line 736): $1 = nterm link_nolink () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: Next token is token T_EOC () Reducing stack by rule 97 (line 673): $1 = token T_Filegen () $2 = nterm stat () $3 = nterm filegen_option_list () -> $$ = nterm monitoring_command () Stack now 0 55 Entering state 64 Reducing stack by rule 10 (line 389): $1 = nterm monitoring_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'filegen' -> T_Filegen Next token is token T_Filegen () Shifting token T_Filegen () Entering state 13 Reading a token: yylex: lexeme 'rawstats' -> T_Rawstats Next token is token T_Rawstats () Shifting token T_Rawstats () Entering state 109 Reducing stack by rule 104 (line 700): $1 = token T_Rawstats () -> $$ = nterm stat () Stack now 0 55 13 Entering state 112 Reducing stack by rule 108 (line 708): -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'type' -> T_Type Next token is token T_Type () Shifting token T_Type () Entering state 297 Reading a token: yylex: lexeme 'day' -> T_Day Next token is token T_Day () Shifting token T_Day () Entering state 362 Reducing stack by rule 120 (line 768): $1 = token T_Day () -> $$ = nterm filegen_type () Stack now 0 55 13 112 232 297 Entering state 368 Reducing stack by rule 111 (line 727): $1 = token T_Type () $2 = nterm filegen_type () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'link' -> T_Link Next token is token T_Link () Shifting token T_Link () Entering state 295 Reducing stack by rule 114 (line 756): $1 = token T_Link () -> $$ = nterm link_nolink () Stack now 0 55 13 112 232 Entering state 299 Reducing stack by rule 112 (line 736): $1 = nterm link_nolink () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: Next token is token T_EOC () Reducing stack by rule 97 (line 673): $1 = token T_Filegen () $2 = nterm stat () $3 = nterm filegen_option_list () -> $$ = nterm monitoring_command () Stack now 0 55 Entering state 64 Reducing stack by rule 10 (line 389): $1 = nterm monitoring_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'filegen' -> T_Filegen Next token is token T_Filegen () Shifting token T_Filegen () Entering state 13 Reading a token: yylex: lexeme 'sysstats' -> T_Sysstats Next token is token T_Sysstats () Shifting token T_Sysstats () Entering state 110 Reducing stack by rule 105 (line 701): $1 = token T_Sysstats () -> $$ = nterm stat () Stack now 0 55 13 Entering state 112 Reducing stack by rule 108 (line 708): -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'type' -> T_Type Next token is token T_Type () Shifting token T_Type () Entering state 297 Reading a token: yylex: lexeme 'day' -> T_Day Next token is token T_Day () Shifting token T_Day () Entering state 362 Reducing stack by rule 120 (line 768): $1 = token T_Day () -> $$ = nterm filegen_type () Stack now 0 55 13 112 232 297 Entering state 368 Reducing stack by rule 111 (line 727): $1 = token T_Type () $2 = nterm filegen_type () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'link' -> T_Link Next token is token T_Link () Shifting token T_Link () Entering state 295 Reducing stack by rule 114 (line 756): $1 = token T_Link () -> $$ = nterm link_nolink () Stack now 0 55 13 112 232 Entering state 299 Reducing stack by rule 112 (line 736): $1 = nterm link_nolink () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: Next token is token T_EOC () Reducing stack by rule 97 (line 673): $1 = token T_Filegen () $2 = nterm stat () $3 = nterm filegen_option_list () -> $$ = nterm monitoring_command () Stack now 0 55 Entering state 64 Reducing stack by rule 10 (line 389): $1 = nterm monitoring_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'statistics' -> T_Statistics Next token is token T_Statistics () Shifting token T_Statistics () Entering state 43 Reading a token: yylex: lexeme 'peerstats' -> T_Peerstats Next token is token T_Peerstats () Shifting token T_Peerstats () Entering state 107 Reducing stack by rule 103 (line 699): $1 = token T_Peerstats () -> $$ = nterm stat () Stack now 0 55 43 Entering state 169 Reducing stack by rule 99 (line 688): $1 = nterm stat () -> $$ = nterm stats_list () Stack now 0 55 43 Entering state 168 Reading a token: Next token is token T_EOC () Reducing stack by rule 95 (line 662): $1 = token T_Statistics () $2 = nterm stats_list () -> $$ = nterm monitoring_command () Stack now 0 55 Entering state 64 Reducing stack by rule 10 (line 389): $1 = nterm monitoring_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'filegen' -> T_Filegen Next token is token T_Filegen () Shifting token T_Filegen () Entering state 13 Reading a token: yylex: lexeme 'peerstats' -> T_Peerstats Next token is token T_Peerstats () Shifting token T_Peerstats () Entering state 107 Reducing stack by rule 103 (line 699): $1 = token T_Peerstats () -> $$ = nterm stat () Stack now 0 55 13 Entering state 112 Reducing stack by rule 108 (line 708): -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'file' -> T_File Next token is token T_File () Shifting token T_File () Entering state 294 Reading a token: yylex: lexeme 'peerstats' -> T_String Next token is token T_String () Shifting token T_String () Entering state 360 Reducing stack by rule 110 (line 717): $1 = token T_File () $2 = token T_String () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'type' -> T_Type Next token is token T_Type () Shifting token T_Type () Entering state 297 Reading a token: yylex: lexeme 'day' -> T_Day Next token is token T_Day () Shifting token T_Day () Entering state 362 Reducing stack by rule 120 (line 768): $1 = token T_Day () -> $$ = nterm filegen_type () Stack now 0 55 13 112 232 297 Entering state 368 Reducing stack by rule 111 (line 727): $1 = token T_Type () $2 = nterm filegen_type () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: yylex: lexeme 'enable' -> T_Enable Next token is token T_Enable () Shifting token T_Enable () Entering state 293 Reducing stack by rule 116 (line 761): $1 = token T_Enable () -> $$ = nterm enable_disable () Stack now 0 55 13 112 232 Entering state 300 Reducing stack by rule 113 (line 751): $1 = nterm enable_disable () -> $$ = nterm filegen_option () Stack now 0 55 13 112 232 Entering state 298 Reducing stack by rule 109 (line 709): $1 = nterm filegen_option_list () $2 = nterm filegen_option () -> $$ = nterm filegen_option_list () Stack now 0 55 13 112 Entering state 232 Reading a token: Next token is token T_EOC () Reducing stack by rule 97 (line 673): $1 = token T_Filegen () $2 = nterm stat () $3 = nterm filegen_option_list () -> $$ = nterm monitoring_command () Stack now 0 55 Entering state 64 Reducing stack by rule 10 (line 389): $1 = nterm monitoring_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'restrict' -> T_Restrict Next token is token T_Restrict () Shifting token T_Restrict () Entering state 37 Reading a token: yylex: lexeme 'default' -> T_Default Next token is token T_Default () Shifting token T_Default () Entering state 153 Reducing stack by rule 133 (line 856): -> $$ = nterm ac_flag_list () Stack now 0 55 37 153 Entering state 254 Reading a token: yylex: lexeme 'nomodify' -> T_Nomodify Next token is token T_Nomodify () Shifting token T_Nomodify () Entering state 313 Reducing stack by rule 141 (line 871): $1 = token T_Nomodify () -> $$ = nterm access_control_flag () Stack now 0 55 37 153 254 Entering state 322 Reducing stack by rule 134 (line 857): $1 = nterm ac_flag_list () $2 = nterm access_control_flag () -> $$ = nterm ac_flag_list () Stack now 0 55 37 153 Entering state 254 Reading a token: yylex: lexeme 'notrap' -> T_Notrap Next token is token T_Notrap () Shifting token T_Notrap () Entering state 318 Reducing stack by rule 146 (line 876): $1 = token T_Notrap () -> $$ = nterm access_control_flag () Stack now 0 55 37 153 254 Entering state 322 Reducing stack by rule 134 (line 857): $1 = nterm ac_flag_list () $2 = nterm access_control_flag () -> $$ = nterm ac_flag_list () Stack now 0 55 37 153 Entering state 254 Reading a token: yylex: lexeme 'nopeer' -> T_Nopeer Next token is token T_Nopeer () Shifting token T_Nopeer () Entering state 315 Reducing stack by rule 143 (line 873): $1 = token T_Nopeer () -> $$ = nterm access_control_flag () Stack now 0 55 37 153 254 Entering state 322 Reducing stack by rule 134 (line 857): $1 = nterm ac_flag_list () $2 = nterm access_control_flag () -> $$ = nterm ac_flag_list () Stack now 0 55 37 153 Entering state 254 Reading a token: yylex: lexeme 'noquery' -> T_Noquery Next token is token T_Noquery () Shifting token T_Noquery () Entering state 316 Reducing stack by rule 144 (line 874): $1 = token T_Noquery () -> $$ = nterm access_control_flag () Stack now 0 55 37 153 254 Entering state 322 Reducing stack by rule 134 (line 857): $1 = nterm ac_flag_list () $2 = nterm access_control_flag () -> $$ = nterm ac_flag_list () Stack now 0 55 37 153 Entering state 254 Reading a token: Next token is token T_EOC () Reducing stack by rule 129 (line 805): $1 = token T_Restrict () $2 = token T_Default () $3 = nterm ac_flag_list () -> $$ = nterm access_control_command () Stack now 0 55 Entering state 65 Reducing stack by rule 11 (line 390): $1 = nterm access_control_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'restrict' -> T_Restrict Next token is token T_Restrict () Shifting token T_Restrict () Entering state 37 Reading a token: yylex: lexeme '-6' -> T_Ipv6_flag Next token is token T_Ipv6_flag () Shifting token T_Ipv6_flag () Entering state 155 Reading a token: yylex: lexeme 'default' -> T_Default Next token is token T_Default () Shifting token T_Default () Entering state 256 Reducing stack by rule 133 (line 856): -> $$ = nterm ac_flag_list () Stack now 0 55 37 155 256 Entering state 324 Reading a token: yylex: lexeme 'nomodify' -> T_Nomodify Next token is token T_Nomodify () Shifting token T_Nomodify () Entering state 313 Reducing stack by rule 141 (line 871): $1 = token T_Nomodify () -> $$ = nterm access_control_flag () Stack now 0 55 37 155 256 324 Entering state 322 Reducing stack by rule 134 (line 857): $1 = nterm ac_flag_list () $2 = nterm access_control_flag () -> $$ = nterm ac_flag_list () Stack now 0 55 37 155 256 Entering state 324 Reading a token: yylex: lexeme 'notrap' -> T_Notrap Next token is token T_Notrap () Shifting token T_Notrap () Entering state 318 Reducing stack by rule 146 (line 876): $1 = token T_Notrap () -> $$ = nterm access_control_flag () Stack now 0 55 37 155 256 324 Entering state 322 Reducing stack by rule 134 (line 857): $1 = nterm ac_flag_list () $2 = nterm access_control_flag () -> $$ = nterm ac_flag_list () Stack now 0 55 37 155 256 Entering state 324 Reading a token: yylex: lexeme 'nopeer' -> T_Nopeer Next token is token T_Nopeer () Shifting token T_Nopeer () Entering state 315 Reducing stack by rule 143 (line 873): $1 = token T_Nopeer () -> $$ = nterm access_control_flag () Stack now 0 55 37 155 256 324 Entering state 322 Reducing stack by rule 134 (line 857): $1 = nterm ac_flag_list () $2 = nterm access_control_flag () -> $$ = nterm ac_flag_list () Stack now 0 55 37 155 256 Entering state 324 Reading a token: yylex: lexeme 'noquery' -> T_Noquery Next token is token T_Noquery () Shifting token T_Noquery () Entering state 316 Reducing stack by rule 144 (line 874): $1 = token T_Noquery () -> $$ = nterm access_control_flag () Stack now 0 55 37 155 256 324 Entering state 322 Reducing stack by rule 134 (line 857): $1 = nterm ac_flag_list () $2 = nterm access_control_flag () -> $$ = nterm ac_flag_list () Stack now 0 55 37 155 256 Entering state 324 Reading a token: Next token is token T_EOC () Reducing stack by rule 131 (line 828): $1 = token T_Restrict () $2 = token T_Ipv6_flag () $3 = token T_Default () $4 = nterm ac_flag_list () -> $$ = nterm access_control_command () Stack now 0 55 Entering state 65 Reducing stack by rule 11 (line 390): $1 = nterm access_control_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'restrict' -> T_Restrict Next token is token T_Restrict () Shifting token T_Restrict () Entering state 37 Reading a token: yylex: lexeme '127.0.0.1' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 37 Entering state 158 Reading a token: yylex: lexeme 'mask' -> T_Mask Next token is token T_Mask () Shifting token T_Mask () Entering state 259 Reading a token: yylex: lexeme '255.255.255.0' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 37 158 259 Entering state 325 Reducing stack by rule 133 (line 856): -> $$ = nterm ac_flag_list () Stack now 0 55 37 158 259 325 Entering state 369 Reading a token: Next token is token T_EOC () Reducing stack by rule 128 (line 797): $1 = token T_Restrict () $2 = nterm ip_address () $3 = token T_Mask () $4 = nterm ip_address () $5 = nterm ac_flag_list () -> $$ = nterm access_control_command () Stack now 0 55 Entering state 65 Reducing stack by rule 11 (line 390): $1 = nterm access_control_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'restrict' -> T_Restrict Next token is token T_Restrict () Shifting token T_Restrict () Entering state 37 Reading a token: yylex: lexeme '204.17.205.0' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 37 Entering state 158 Reading a token: yylex: lexeme 'mask' -> T_Mask Next token is token T_Mask () Shifting token T_Mask () Entering state 259 Reading a token: yylex: lexeme '255.255.255.0' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 37 158 259 Entering state 325 Reducing stack by rule 133 (line 856): -> $$ = nterm ac_flag_list () Stack now 0 55 37 158 259 325 Entering state 369 Reading a token: Next token is token T_EOC () Reducing stack by rule 128 (line 797): $1 = token T_Restrict () $2 = nterm ip_address () $3 = token T_Mask () $4 = nterm ip_address () $5 = nterm ac_flag_list () -> $$ = nterm access_control_command () Stack now 0 55 Entering state 65 Reducing stack by rule 11 (line 390): $1 = nterm access_control_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'restrict' -> T_Restrict Next token is token T_Restrict () Shifting token T_Restrict () Entering state 37 Reading a token: yylex: lexeme '-6' -> T_Ipv6_flag Next token is token T_Ipv6_flag () Shifting token T_Ipv6_flag () Entering state 155 Reading a token: yylex: lexeme '2001:470:e815::/64' -> T_String Next token is token T_String () Reducing stack by rule 29 (line 436): $1 = token T_Ipv6_flag () -> $$ = nterm address_fam () Stack now 0 55 37 Entering state 118 Next token is token T_String () Shifting token T_String () Entering state 246 Reducing stack by rule 26 (line 424): $1 = nterm address_fam () $2 = token T_String () -> $$ = nterm address () Stack now 0 55 37 Entering state 157 Reducing stack by rule 133 (line 856): -> $$ = nterm ac_flag_list () Stack now 0 55 37 157 Entering state 258 Reading a token: Next token is token T_EOC () Reducing stack by rule 127 (line 789): $1 = token T_Restrict () $2 = nterm address () $3 = nterm ac_flag_list () -> $$ = nterm access_control_command () Stack now 0 55 Entering state 65 Reducing stack by rule 11 (line 390): $1 = nterm access_control_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'restrict' -> T_Restrict Next token is token T_Restrict () Shifting token T_Restrict () Entering state 37 Reading a token: yylex: lexeme '-6' -> T_Ipv6_flag Next token is token T_Ipv6_flag () Shifting token T_Ipv6_flag () Entering state 155 Reading a token: yylex: lexeme '::1' -> T_String Next token is token T_String () Reducing stack by rule 29 (line 436): $1 = token T_Ipv6_flag () -> $$ = nterm address_fam () Stack now 0 55 37 Entering state 118 Next token is token T_String () Shifting token T_String () Entering state 246 Reducing stack by rule 26 (line 424): $1 = nterm address_fam () $2 = token T_String () -> $$ = nterm address () Stack now 0 55 37 Entering state 157 Reducing stack by rule 133 (line 856): -> $$ = nterm ac_flag_list () Stack now 0 55 37 157 Entering state 258 Reading a token: Next token is token T_EOC () Reducing stack by rule 127 (line 789): $1 = token T_Restrict () $2 = nterm address () $3 = nterm ac_flag_list () -> $$ = nterm access_control_command () Stack now 0 55 Entering state 65 Reducing stack by rule 11 (line 390): $1 = nterm access_control_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'server' -> T_Server Next token is token T_Server () Shifting token T_Server () Entering state 41 Reducing stack by rule 20 (line 415): $1 = token T_Server () -> $$ = nterm client_type () Stack now 0 55 Entering state 58 Reading a token: yylex: lexeme '127.127.28.0' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 58 Entering state 117 Reducing stack by rule 25 (line 423): $1 = nterm ip_address () -> $$ = nterm address () Stack now 0 55 58 Entering state 208 Reducing stack by rule 30 (line 442): -> $$ = nterm option_list () Stack now 0 55 58 208 Entering state 278 Reading a token: Next token is token T_EOC () Reducing stack by rule 19 (line 405): $1 = nterm client_type () $2 = nterm address () $3 = nterm option_list () -> $$ = nterm server_command () Stack now 0 55 Entering state 57 Reducing stack by rule 6 (line 385): $1 = nterm server_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'fudge' -> T_Fudge Next token is token T_Fudge () Shifting token T_Fudge () Entering state 14 Reading a token: yylex: lexeme '127.127.28.0' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 14 Entering state 117 Reducing stack by rule 25 (line 423): $1 = nterm ip_address () -> $$ = nterm address () Stack now 0 55 14 Entering state 116 Reading a token: yylex: lexeme 'time1' -> T_Time1 Next token is token T_Time1 () Shifting token T_Time1 () Entering state 240 Reducing stack by rule 175 (line 976): $1 = token T_Time1 () -> $$ = nterm fudge_factor_dbl_keyword () Stack now 0 55 14 116 Entering state 244 Reading a token: yylex: lexeme '0.142' -> T_Double Next token is token T_Double () Shifting token T_Double () Entering state 210 Reducing stack by rule 284 (line 1457): $1 = token T_Double () -> $$ = nterm number () Stack now 0 55 14 116 244 Entering state 305 Reducing stack by rule 170 (line 963): $1 = nterm fudge_factor_dbl_keyword () $2 = nterm number () -> $$ = nterm fudge_factor () Stack now 0 55 14 116 Entering state 243 Reducing stack by rule 169 (line 955): $1 = nterm fudge_factor () -> $$ = nterm fudge_factor_list () Stack now 0 55 14 116 Entering state 242 Reading a token: yylex: lexeme 'refid' -> T_Refid Next token is token T_Refid () Shifting token T_Refid () Entering state 238 Reading a token: yylex: lexeme 'GPS' -> T_String Next token is token T_String () Shifting token T_String () Entering state 302 Reducing stack by rule 174 (line 971): $1 = token T_Refid () $2 = token T_String () -> $$ = nterm fudge_factor () Stack now 0 55 14 116 242 Entering state 304 Reducing stack by rule 168 (line 950): $1 = nterm fudge_factor_list () $2 = nterm fudge_factor () -> $$ = nterm fudge_factor_list () Stack now 0 55 14 116 Entering state 242 Reading a token: Next token is token T_EOC () Reducing stack by rule 167 (line 940): $1 = token T_Fudge () $2 = nterm address () $3 = nterm fudge_factor_list () -> $$ = nterm fudge_command () Stack now 0 55 Entering state 66 Reducing stack by rule 13 (line 392): $1 = nterm fudge_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'server' -> T_Server Next token is token T_Server () Shifting token T_Server () Entering state 41 Reducing stack by rule 20 (line 415): $1 = token T_Server () -> $$ = nterm client_type () Stack now 0 55 Entering state 58 Reading a token: yylex: lexeme '127.127.28.1' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 58 Entering state 117 Reducing stack by rule 25 (line 423): $1 = nterm ip_address () -> $$ = nterm address () Stack now 0 55 58 Entering state 208 Reducing stack by rule 30 (line 442): -> $$ = nterm option_list () Stack now 0 55 58 208 Entering state 278 Reading a token: yylex: lexeme 'prefer' -> T_Prefer Next token is token T_Prefer () Shifting token T_Prefer () Entering state 341 Reducing stack by rule 41 (line 467): $1 = token T_Prefer () -> $$ = nterm option_flag_keyword () Stack now 0 55 58 208 278 Entering state 348 Reducing stack by rule 35 (line 457): $1 = nterm option_flag_keyword () -> $$ = nterm option_flag () Stack now 0 55 58 208 278 Entering state 347 Reducing stack by rule 32 (line 451): $1 = nterm option_flag () -> $$ = nterm option () Stack now 0 55 58 208 278 Entering state 346 Reducing stack by rule 31 (line 443): $1 = nterm option_list () $2 = nterm option () -> $$ = nterm option_list () Stack now 0 55 58 208 Entering state 278 Reading a token: Next token is token T_EOC () Reducing stack by rule 19 (line 405): $1 = nterm client_type () $2 = nterm address () $3 = nterm option_list () -> $$ = nterm server_command () Stack now 0 55 Entering state 57 Reducing stack by rule 6 (line 385): $1 = nterm server_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'fudge' -> T_Fudge Next token is token T_Fudge () Shifting token T_Fudge () Entering state 14 Reading a token: yylex: lexeme '127.127.28.1' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 14 Entering state 117 Reducing stack by rule 25 (line 423): $1 = nterm ip_address () -> $$ = nterm address () Stack now 0 55 14 Entering state 116 Reading a token: yylex: lexeme 'time1' -> T_Time1 Next token is token T_Time1 () Shifting token T_Time1 () Entering state 240 Reducing stack by rule 175 (line 976): $1 = token T_Time1 () -> $$ = nterm fudge_factor_dbl_keyword () Stack now 0 55 14 116 Entering state 244 Reading a token: yylex: lexeme '0.001500' -> T_Double Next token is token T_Double () Shifting token T_Double () Entering state 210 Reducing stack by rule 284 (line 1457): $1 = token T_Double () -> $$ = nterm number () Stack now 0 55 14 116 244 Entering state 305 Reducing stack by rule 170 (line 963): $1 = nterm fudge_factor_dbl_keyword () $2 = nterm number () -> $$ = nterm fudge_factor () Stack now 0 55 14 116 Entering state 243 Reducing stack by rule 169 (line 955): $1 = nterm fudge_factor () -> $$ = nterm fudge_factor_list () Stack now 0 55 14 116 Entering state 242 Reading a token: yylex: lexeme 'refid' -> T_Refid Next token is token T_Refid () Shifting token T_Refid () Entering state 238 Reading a token: yylex: lexeme 'GPS1' -> T_String Next token is token T_String () Shifting token T_String () Entering state 302 Reducing stack by rule 174 (line 971): $1 = token T_Refid () $2 = token T_String () -> $$ = nterm fudge_factor () Stack now 0 55 14 116 242 Entering state 304 Reducing stack by rule 168 (line 950): $1 = nterm fudge_factor_list () $2 = nterm fudge_factor () -> $$ = nterm fudge_factor_list () Stack now 0 55 14 116 Entering state 242 Reading a token: Next token is token T_EOC () Reducing stack by rule 167 (line 940): $1 = token T_Fudge () $2 = nterm address () $3 = nterm fudge_factor_list () -> $$ = nterm fudge_command () Stack now 0 55 Entering state 66 Reducing stack by rule 13 (line 392): $1 = nterm fudge_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'server' -> T_Server Next token is token T_Server () Shifting token T_Server () Entering state 41 Reducing stack by rule 20 (line 415): $1 = token T_Server () -> $$ = nterm client_type () Stack now 0 55 Entering state 58 Reading a token: yylex: lexeme '127.127.46.0' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 58 Entering state 117 Reducing stack by rule 25 (line 423): $1 = nterm ip_address () -> $$ = nterm address () Stack now 0 55 58 Entering state 208 Reducing stack by rule 30 (line 442): -> $$ = nterm option_list () Stack now 0 55 58 208 Entering state 278 Reading a token: Next token is token T_EOC () Reducing stack by rule 19 (line 405): $1 = nterm client_type () $2 = nterm address () $3 = nterm option_list () -> $$ = nterm server_command () Stack now 0 55 Entering state 57 Reducing stack by rule 6 (line 385): $1 = nterm server_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'fudge' -> T_Fudge Next token is token T_Fudge () Shifting token T_Fudge () Entering state 14 Reading a token: yylex: lexeme '127.127.46.0' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 14 Entering state 117 Reducing stack by rule 25 (line 423): $1 = nterm ip_address () -> $$ = nterm address () Stack now 0 55 14 Entering state 116 Reading a token: yylex: lexeme 'flag4' -> T_Flag4 Next token is token T_Flag4 () Shifting token T_Flag4 () Entering state 237 Reducing stack by rule 180 (line 984): $1 = token T_Flag4 () -> $$ = nterm fudge_factor_bool_keyword () Stack now 0 55 14 116 Entering state 245 Reading a token: yylex: lexeme '1' -> T_Integer Next token is token T_Integer () Shifting token T_Integer () Entering state 267 Reducing stack by rule 280 (line 1442): $1 = token T_Integer () -> $$ = nterm boolean () Stack now 0 55 14 116 245 Entering state 306 Reducing stack by rule 171 (line 965): $1 = nterm fudge_factor_bool_keyword () $2 = nterm boolean () -> $$ = nterm fudge_factor () Stack now 0 55 14 116 Entering state 243 Reducing stack by rule 169 (line 955): $1 = nterm fudge_factor () -> $$ = nterm fudge_factor_list () Stack now 0 55 14 116 Entering state 242 Reading a token: Next token is token T_EOC () Reducing stack by rule 167 (line 940): $1 = token T_Fudge () $2 = nterm address () $3 = nterm fudge_factor_list () -> $$ = nterm fudge_command () Stack now 0 55 Entering state 66 Reducing stack by rule 13 (line 392): $1 = nterm fudge_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'server' -> T_Server Next token is token T_Server () Shifting token T_Server () Entering state 41 Reducing stack by rule 20 (line 415): $1 = token T_Server () -> $$ = nterm client_type () Stack now 0 55 Entering state 58 Reading a token: yylex: lexeme '204.17.205.18' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 58 Entering state 117 Reducing stack by rule 25 (line 423): $1 = nterm ip_address () -> $$ = nterm address () Stack now 0 55 58 Entering state 208 Reducing stack by rule 30 (line 442): -> $$ = nterm option_list () Stack now 0 55 58 208 Entering state 278 Reading a token: Next token is token T_EOC () Reducing stack by rule 19 (line 405): $1 = nterm client_type () $2 = nterm address () $3 = nterm option_list () -> $$ = nterm server_command () Stack now 0 55 Entering state 57 Reducing stack by rule 6 (line 385): $1 = nterm server_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'server' -> T_Server Next token is token T_Server () Shifting token T_Server () Entering state 41 Reducing stack by rule 20 (line 415): $1 = token T_Server () -> $$ = nterm client_type () Stack now 0 55 Entering state 58 Reading a token: yylex: lexeme '204.17.205.1' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 58 Entering state 117 Reducing stack by rule 25 (line 423): $1 = nterm ip_address () -> $$ = nterm address () Stack now 0 55 58 Entering state 208 Reducing stack by rule 30 (line 442): -> $$ = nterm option_list () Stack now 0 55 58 208 Entering state 278 Reading a token: Next token is token T_EOC () Reducing stack by rule 19 (line 405): $1 = nterm client_type () $2 = nterm address () $3 = nterm option_list () -> $$ = nterm server_command () Stack now 0 55 Entering state 57 Reducing stack by rule 6 (line 385): $1 = nterm server_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: yylex: lexeme 'server' -> T_Server Next token is token T_Server () Shifting token T_Server () Entering state 41 Reducing stack by rule 20 (line 415): $1 = token T_Server () -> $$ = nterm client_type () Stack now 0 55 Entering state 58 Reading a token: yylex: lexeme '204.17.205.7' -> T_String Next token is token T_String () Shifting token T_String () Entering state 115 Reducing stack by rule 27 (line 429): $1 = token T_String () -> $$ = nterm ip_address () Stack now 0 55 58 Entering state 117 Reducing stack by rule 25 (line 423): $1 = nterm ip_address () -> $$ = nterm address () Stack now 0 55 58 Entering state 208 Reducing stack by rule 30 (line 442): -> $$ = nterm option_list () Stack now 0 55 58 208 Entering state 278 Reading a token: Next token is token T_EOC () Reducing stack by rule 19 (line 405): $1 = nterm client_type () $2 = nterm address () $3 = nterm option_list () -> $$ = nterm server_command () Stack now 0 55 Entering state 57 Reducing stack by rule 6 (line 385): $1 = nterm server_command () -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Next token is token T_EOC () Reducing stack by rule 5 (line 384): -> $$ = nterm command () Stack now 0 55 Entering state 206 Next token is token T_EOC () Shifting token T_EOC () Entering state 277 Reducing stack by rule 2 (line 368): $1 = nterm command_list () $2 = nterm command () $3 = token T_EOC () -> $$ = nterm command_list () Stack now 0 Entering state 55 Reading a token: Now at end of input. Reducing stack by rule 1 (line 364): $1 = nterm command_list () -> $$ = nterm configuration () Stack now 0 Entering state 54 Now at end of input. Shifting token $end () Entering state 205 Stack now 0 54 205 Cleanup: popping token $end () Cleanup: popping nterm configuration () Finished Parsing!! create_sockets(123) interface_action: interface wildcard default wildcard drop move_fd: estimated max descriptors: 1024, initial socket boundary: 16 setsockopt SO_TIMESTAMPNS enabled on fd 16 address :: bind(16) AF_INET6, addr ::%0#123, flags 0x81 flags for fd 16: 0x802 Searching for addr :: in list of addresses - NOT FOUND Added addr :: to list of addresses 3 Feb 11:59:43 ntpd[15698]: Listen and drop on 0 v6wildcard [::]:123 created interface #0: fd=16, bfd=-1, name=v6wildcard, flags=0x81, ifindex=0, sin=::, Disabled: Dumping interface: 0xc009e0 fd = 16 bfd = -1 sin = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 00000000 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a000000 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = v6wildcard flags = 0x00000081 last_ttl = 0 addr_refid = 3613e74a num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wildcard default wildcard drop setsockopt SO_TIMESTAMPNS enabled on fd 17 address 0.0.0.0 bind(17) AF_INET, addr 0.0.0.0%0#123, flags 0x89 flags for fd 17: 0x802 Searching for addr 0.0.0.0 in list of addresses - NOT FOUND Added addr 0.0.0.0 to list of addresses 3 Feb 11:59:43 ntpd[15698]: Listen and drop on 1 v4wildcard 0.0.0.0:123 created interface #1: fd=17, bfd=-1, name=v4wildcard, flags=0x89, ifindex=0, sin=0.0.0.0, bcast=0.0.0.0, mask=255.255.255.255, Disabled: Dumping interface: 0xc00b30 fd = 17 bfd = -1 sin = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.255, 02000000 ffffffff 00000000 00000000 00000000 00000000 00000000 name = v4wildcard flags = 0x00000089 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 update_interfaces(123) examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: Dumping interface: 0x7fff1978c0f0 fd = -1 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface lo default loopback listen listen interface lo (127.0.0.1) - by nic rules Searching for addr 127.0.0.1 in list of addresses - NOT FOUND create_interface(127.0.0.1#123) set SO_REUSEADDR to on on 0.0.0.0 set SO_REUSEADDR to off on 0.0.0.0 setsockopt SO_TIMESTAMPNS enabled on fd 18 address 127.0.0.1 bind(18) AF_INET, addr 127.0.0.1%0#123, flags 0x5 flags for fd 18: 0x802 3 Feb 11:59:43 ntpd[15698]: Listen normally on 2 lo 127.0.0.1:123 restrict: op 1 addr 127.0.0.1 mask 255.255.255.255 mflags 00003000 flags 00000001 Searching for addr 127.0.0.1 in list of addresses - NOT FOUND Added addr 127.0.0.1 to list of addresses created interface #2: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: Dumping interface: 0xc036b0 fd = 18 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 0100007f num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: new - created Dumping interface: 0xc036b0 fd = 18 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 0100007f num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: Dumping interface: 0x7fff1978c0f0 fd = -1 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (204.17.205.226) - by nic rules Searching for addr 204.17.205.226 in list of addresses - NOT FOUND create_interface(204.17.205.226#123) set SO_REUSEADDR to on on 0.0.0.0 set SO_REUSEADDR to off on 0.0.0.0 setsockopt SO_TIMESTAMPNS enabled on fd 19 address 204.17.205.226 bind(19) AF_INET, addr 204.17.205.226%0#123, flags 0x19 flags for fd 19: 0x802 3 Feb 11:59:43 ntpd[15698]: Listen normally on 3 wlp1s0 204.17.205.226:123 restrict: op 1 addr 204.17.205.226 mask 255.255.255.255 mflags 00003000 flags 00000001 Searching for addr 204.17.205.226 in list of addresses - NOT FOUND Added addr 204.17.205.226 to list of addresses add_interface mcast-capable 204.17.205.226 added 204.17.205.226 to head of IPv4 multicast-capable unicast local address list created interface #3: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: Dumping interface: 0xc016c0 fd = 19 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = e2cd11cc num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 updating interface #3: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: new - created Dumping interface: 0xc016c0 fd = 19 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = e2cd11cc num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: Dumping interface: 0x7fff1978c0f0 fd = -1 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface lo default loopback listen listen interface lo (::1) - by nic rules Searching for addr ::1 in list of addresses - NOT FOUND create_interface(::1#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: setsockopt SO_TIMESTAMPNS enabled on fd 20 address ::1 bind(20) AF_INET6, addr ::1%0#123, flags 0x5 flags for fd 20: 0x802 3 Feb 11:59:43 ntpd[15698]: Listen normally on 4 lo [::1]:123 restrict: op 1 addr ::1 mask ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff mflags 00003000 flags 00000001 Searching for addr ::1 in list of addresses - NOT FOUND Added addr ::1 to list of addresses created interface #4: fd=20, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: Dumping interface: 0xc03800 fd = 20 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = c84d40cf num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: new - created Dumping interface: 0xc03800 fd = 20 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = c84d40cf num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: Dumping interface: 0x7fff1978c0f0 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface enp2s0 default listen listen interface enp2s0 (fe80::d8ca:2adf:82a8:8149%2) - by nic rules Searching for addr fe80::d8ca:2adf:82a8:8149%2 in list of addresses - NOT FOUND create_interface(fe80::d8ca:2adf:82a8:8149%2#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: 3 Feb 11:59:43 ntpd[15698]: bind(21) AF_INET6 fe80::d8ca:2adf:82a8:8149%2#123 flags 0x11 failed: Cannot assign requested address 3 Feb 11:59:43 ntpd[15698]: unable to create socket on enp2s0 (5) for fe80::d8ca:2adf:82a8:8149%2#123 updating interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: new - creation FAILEDDumping interface: 0x7fff1978c0f0 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 3 Feb 11:59:43 ntpd[15698]: failed to init interface for address fe80::d8ca:2adf:82a8:8149%2 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: Dumping interface: 0x7fff1978c0f0 fd = -1 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (2001:470:e815:0:705a:540a:f1d4:edc4) - by nic rules Searching for addr 2001:470:e815:0:705a:540a:f1d4:edc4 in list of addresses - NOT FOUND create_interface(2001:470:e815:0:705a:540a:f1d4:edc4#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: setsockopt SO_TIMESTAMPNS enabled on fd 21 address 2001:470:e815:0:705a:540a:f1d4:edc4 bind(21) AF_INET6, addr 2001:470:e815:0:705a:540a:f1d4:edc4%0#123, flags 0x11 flags for fd 21: 0x802 3 Feb 11:59:43 ntpd[15698]: Listen normally on 6 wlp1s0 [2001:470:e815:0:705a:540a:f1d4:edc4]:123 restrict: op 1 addr 2001:470:e815:0:705a:540a:f1d4:edc4 mask ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff mflags 00003000 flags 00000001 Searching for addr 2001:470:e815:0:705a:540a:f1d4:edc4 in list of addresses - NOT FOUND Added addr 2001:470:e815:0:705a:540a:f1d4:edc4 to list of addresses add_interface mcast-capable 2001:470:e815:0:705a:540a:f1d4:edc4 added 2001:470:e815:0:705a:540a:f1d4:edc4 to head of IPv6 multicast-capable unicast local address list created interface #6: fd=21, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: Dumping interface: 0xc01020 fd = 21 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 12ad7896 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 updating interface #6: fd=21, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: new - created Dumping interface: 0xc01020 fd = 21 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 12ad7896 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: Dumping interface: 0x7fff1978c0f0 fd = -1 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (fe80::b80d:cf4b:d3a4:c720%3) - by nic rules Searching for addr fe80::b80d:cf4b:d3a4:c720%3 in list of addresses - NOT FOUND create_interface(fe80::b80d:cf4b:d3a4:c720%3#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: setsockopt SO_TIMESTAMPNS enabled on fd 22 address fe80::b80d:cf4b:d3a4:c720%3 bind(22) AF_INET6, addr fe80::b80d:cf4b:d3a4:c720%3%3#123, flags 0x11 flags for fd 22: 0x802 3 Feb 11:59:43 ntpd[15698]: Listen normally on 7 wlp1s0 [fe80::b80d:cf4b:d3a4:c720%3]:123 restrict: op 1 addr fe80::b80d:cf4b:d3a4:c720%3 mask ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff mflags 00003000 flags 00000001 Searching for addr fe80::b80d:cf4b:d3a4:c720%3 in list of addresses - NOT FOUND Added addr fe80::b80d:cf4b:d3a4:c720%3 to list of addresses add_interface mcast-capable fe80::b80d:cf4b:d3a4:c720%3 link/scope-local add_interface mcast-capable scan 2001:470:e815:0:705a:540a:f1d4:edc4 did not add fe80::b80d:cf4b:d3a4:c720%3 to tail of IPv6 multicast-capable list which already has 2001:470:e815:0:705a:540a:f1d4:edc4 created interface #7: fd=22, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: Dumping interface: 0xc01170 fd = 22 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 64ba6aa9 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 updating interface #7: fd=22, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: new - created Dumping interface: 0xc01170 fd = 22 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 64ba6aa9 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 setting SO_REUSEADDR on address@hidden to off setting SO_REUSEADDR on address@hidden to off setting SO_REUSEADDR on lo@::1 to off setting SO_REUSEADDR on address@hidden:470:e815:0:705a:540a:f1d4:edc4 to off setting SO_REUSEADDR on address@hidden::b80d:cf4b:d3a4:c720%3 to off create_sockets: Total interfaces = 7 3 Feb 11:59:43 ntpd[15698]: Listening on routing socket on fd #23 for interface updates io_open_sockets: maxactivefd 23 configuring filegen: dir: /var/NTP/ -> /var/log/ntp/ fname: peerstats -> peerstats type: 2 -> 2 flag: 1 -> 1 configuring filegen: dir: /var/NTP/ -> /var/log/ntp/ fname: loopstats -> loopstats type: 2 -> 2 flag: 1 -> 1 configuring filegen: dir: /var/NTP/ -> /var/log/ntp/ fname: clockstats -> clockstats type: 2 -> 2 flag: 1 -> 1 configuring filegen: dir: /var/NTP/ -> /var/log/ntp/ fname: rawstats -> rawstats type: 2 -> 2 flag: 1 -> 1 configuring filegen: dir: /var/NTP/ -> /var/log/ntp/ fname: sysstats -> sysstats type: 2 -> 2 flag: 1 -> 1 configuring filegen: dir: /var/NTP/ -> /var/log/ntp/ fname: protostats -> protostats type: 2 -> 2 flag: 1 -> 1 configuring filegen: dir: /var/NTP/ -> /var/log/ntp/ fname: cryptostats -> cryptostats type: 2 -> 2 flag: 1 -> 1 configuring filegen: dir: /var/NTP/ -> /var/log/ntp/ fname: timingstats -> timingstats type: 2 -> 2 flag: 1 -> 1 filegen_get(peerstats) = 0x6a0f80 enabling filegen for peerstats statistics '/var/log/ntp/peerstats' configuring filegen: dir: /var/log/ntp/ -> /var/log/ntp/ fname: peerstats -> peerstats type: 2 -> 2 flag: 1 -> 81 filegen_get(clockstats) = 0x6a0f00 configuring filegen: dir: /var/log/ntp/ -> /var/log/ntp/ fname: clockstats -> clockstats type: 2 -> 2 flag: 1 -> 81 filegen_get(loopstats) = 0x6a0f40 configuring filegen: dir: /var/log/ntp/ -> /var/log/ntp/ fname: loopstats -> loopstats type: 2 -> 2 flag: 1 -> 81 filegen_get(peerstats) = 0x6a0f80 filegen_get(protostats) = 0x6a0e40 configuring filegen: dir: /var/log/ntp/ -> /var/log/ntp/ fname: protostats -> protostats type: 2 -> 2 flag: 1 -> 81 filegen_get(rawstats) = 0x6a0ec0 configuring filegen: dir: /var/log/ntp/ -> /var/log/ntp/ fname: rawstats -> rawstats type: 2 -> 2 flag: 1 -> 81 filegen_get(sysstats) = 0x6a0e80 configuring filegen: dir: /var/log/ntp/ -> /var/log/ntp/ fname: sysstats -> sysstats type: 2 -> 2 flag: 1 -> 81 filegen_get(peerstats) = 0x6a0f80 restrict: op 1 addr 0.0.0.0 mask 0.0.0.0 mflags 00000000 flags 000001d0 restrict: op 1 addr :: mask :: mflags 00000000 flags 000001d0 getnetnum given ::, got :: getnetnum given ::, got :: restrict: op 1 addr :: mask :: mflags 00000000 flags 000001d0 getnetnum given 127.0.0.1, got 127.0.0.1 getnetnum given 255.255.255.0, got 255.255.255.0 restrict: op 1 addr 127.0.0.1 mask 255.255.255.0 mflags 00000000 flags 00000000 getnetnum given 204.17.205.0, got 204.17.205.0 getnetnum given 255.255.255.0, got 255.255.255.0 restrict: op 1 addr 204.17.205.0 mask 255.255.255.0 mflags 00000000 flags 00000000 3 Feb 11:59:43 ntpd[15698]: restrict: ignoring line 33, address/host '2001:470:e815::/64' unusable. getnetnum given ::1, got ::1 restrict: op 1 addr ::1 mask ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff mflags 00000000 flags 00000000 loop_config: item 10 freq 12.563000 attempting to open log /var/log/ntp.log 3 Feb 11:59:43 ntpd[15698]: switching logging to file /var/log/ntp.log Finding interface for addr 0.0.0.0 in list of addresses blocking_getaddrinfo given node time-a.timefreq.bldrdoc.gov serv ntp fam 0 flags 0 Found no interface for address 0.0.0.0 - returning wildcard newpeer(0.0.0.0): local interface currently not bound key_expire: at 0 associd 31141 peer_clear: at 0 next 1 associd 31141 refid POOL filegen 2 3631982383 opening filegen (type=2/stamp=3631982383) "/var/log/ntp/protostats.20150203" event at 0 0.0.0.0 8811 81 mobilize assoc 31141 newpeer: ->0.0.0.0 mode 3 vers 4 poll 6 10 flags 0x101 0x8 ttl 0 key 00000000 findexistingpeer_addr(127.127.28.0:123, NULL, 3, 0x1) 127.127.28.0:123 0.0.0.0:0 3 3 0x1 0x8 newpeer(127.127.28.0): using fd 18 and our addr 127.0.0.1 key_expire: at 0 associd 31142 peer_clear: at 0 next 2 associd 31142 refid INIT event at 0 SHM(0) 8011 81 mobilize assoc 31142 newpeer: 127.0.0.1->127.127.28.0 mode 3 vers 4 poll 6 6 flags 0x9 0x1 ttl 0 key 00000000 findexistingpeer_addr(127.127.28.1:123, NULL, 3, 0x1) newpeer(127.127.28.1): using fd 18 and our addr 127.0.0.1 key_expire: at 0 associd 31143 peer_clear: at 0 next 3 associd 31143 refid INIT event at 0 SHM(1) 8011 81 mobilize assoc 31143 newpeer: 127.0.0.1->127.127.28.1 mode 3 vers 4 poll 6 6 flags 0x29 0x1 ttl 0 key 00000000 findexistingpeer_addr(127.127.46.0:123, NULL, 3, 0x1) newpeer(127.127.46.0): using fd 18 and our addr 127.0.0.1 key_expire: at 0 associd 31144 peer_clear: at 0 next 4 associd 31144 refid INIT 3 Feb 11:59:43 ntpd[15698]: GPSD_JSON(0): no GPSD socket address, giving up 3 Feb 11:59:43 ntpd[15698]: 127.127.46.0 local addr 127.0.0.1 -> findexistingpeer_addr(204.17.205.18:123, NULL, 3, 0x1) Finding interface for addr 204.17.205.18 in list of addresses findlocalinterface: kernel maps 204.17.205.18 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.18 newpeer(204.17.205.18): using fd 19 and our addr 204.17.205.226 key_expire: at 0 associd 31145 peer_clear: at 0 next 5 associd 31145 refid INIT event at 0 204.17.205.18 8011 81 mobilize assoc 31145 newpeer: 204.17.205.226->204.17.205.18 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000 findexistingpeer_addr(204.17.205.1:123, NULL, 3, 0x1) Finding interface for addr 204.17.205.1 in list of addresses findlocalinterface: kernel maps 204.17.205.1 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.1 newpeer(204.17.205.1): using fd 19 and our addr 204.17.205.226 key_expire: at 0 associd 31146 peer_clear: at 0 next 6 associd 31146 refid INIT event at 0 204.17.205.1 8011 81 mobilize assoc 31146 newpeer: 204.17.205.226->204.17.205.1 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000 findexistingpeer_addr(204.17.205.7:123, NULL, 3, 0x1) Finding interface for addr 204.17.205.7 in list of addresses findlocalinterface: kernel maps 204.17.205.7 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.7 newpeer(204.17.205.7): using fd 19 and our addr 204.17.205.226 key_expire: at 0 associd 31147 peer_clear: at 0 next 7 associd 31147 refid INIT event at 0 204.17.205.7 8011 81 mobilize assoc 31147 newpeer: 204.17.205.226->204.17.205.7 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000 getnetnum given 127.127.28.0, got 127.127.28.0 findexistingpeer_addr(127.127.28.0:123, NULL, -1, 0x0) 127.127.28.0:123 127.127.28.0:123 -1 3 0x0 0x1 found. getnetnum given 127.127.28.1, got 127.127.28.1 findexistingpeer_addr(127.127.28.1:123, NULL, -1, 0x0) 127.127.28.1:123 127.127.28.1:123 -1 3 0x0 0x1 found. getnetnum given 127.127.46.0, got 127.127.46.0 findexistingpeer_addr(127.127.46.0:123, NULL, -1, 0x0) loop_config: item 1 freq 0.000000 event at 0 0.0.0.0 c01d 0d kern kernel time sync enabled event at 0 0.0.0.0 c012 02 freq_set kernel 12.563 PPM local_clock: mu 0 state 2 poll 3 count 0 event at 0 0.0.0.0 c016 06 restart blocking_getaddrinfo given node bonehed.lcs.mit.edu serv ntp fam 0 flags 0 peer_name_resolved(time-a.timefreq.bldrdoc.gov) rescode 0 findexistingpeer_addr(132.163.4.101:123, NULL, 3, 0x1) Finding interface for addr 132.163.4.101 in list of addresses findlocalinterface: kernel maps 132.163.4.101 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 132.163.4.101 newpeer(132.163.4.101): using fd 19 and our addr 204.17.205.226 key_expire: at 0 associd 31148 peer_clear: at 0 next 4 associd 31148 refid INIT event at 0 132.163.4.101 8011 81 mobilize assoc 31148 newpeer: 204.17.205.226->132.163.4.101 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000 blocking_getaddrinfo given node clock.sjc.he.net serv ntp fam 0 flags 0 peer_name_resolved(bonehed.lcs.mit.edu) rescode 0 findexistingpeer_addr(18.26.4.105:123, NULL, 3, 0x1) Finding interface for addr 18.26.4.105 in list of addresses findlocalinterface: kernel maps 18.26.4.105 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 18.26.4.105 newpeer(18.26.4.105): using fd 19 and our addr 204.17.205.226 key_expire: at 0 associd 31149 peer_clear: at 0 next 1 associd 31149 refid INIT event at 0 18.26.4.105 8011 81 mobilize assoc 31149 newpeer: 204.17.205.226->18.26.4.105 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000 peer_name_resolved(clock.sjc.he.net) rescode 0 findexistingpeer_addr(216.218.254.202:123, NULL, 3, 0x1) Finding interface for addr 216.218.254.202 in list of addresses findlocalinterface: kernel maps 216.218.254.202 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 216.218.254.202 newpeer(216.218.254.202): using fd 19 and our addr 204.17.205.226 key_expire: at 0 associd 31150 peer_clear: at 0 next 4 associd 31150 refid INIT event at 0 216.218.254.202 8011 81 mobilize assoc 31150 newpeer: 204.17.205.226->216.218.254.202 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000 read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993583.803355578 receive: at 0 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993583.809691519 receive: at 0 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993583.815677670 receive: at 0 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993583.821584704 receive: at 0 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993583.827773519 receive: at 0 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993583.838005357 receive: at 0 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993583.848873240 receive: at 0 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993583.859849715 receive: at 0 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993583.869622016 receive: at 0 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993583.880550523 receive: at 0 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=104) routing message op = 20: scheduling interface update alarming: normal 3 Feb 11:59:44 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard sendpkt(19, dst=18.26.4.105, src=204.17.205.226, ttl=0, len=48) transmit: at 1 204.17.205.226->18.26.4.105 mode 3 len 48 poll_update: at 1 18.26.4.105 poll 6 burst 0 retry 0 head 62 early 2 next 67 pool DNS lookup us.pool.ntp.org started poll_update: at 1 0.0.0.0 poll 6 burst 0 retry 0 head 0 early 2 next 65 auth_agekeys: at 1 keys 0 expired 0 blocking_getaddrinfo given node us.pool.ntp.org serv ntp fam 0 flags 0 pool DNS us.pool.ntp.org completed findexistingpeer_addr(66.241.101.63:123, NULL, 3, 0x0) Finding interface for addr 66.241.101.63 in list of addresses findlocalinterface: kernel maps 66.241.101.63 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 66.241.101.63 sendpkt(19, dst=66.241.101.63, src=204.17.205.226, ttl=0, len=48) transmit: at 1 204.17.205.226->66.241.101.63 pool 3 Feb 11:59:44 ntpd[15698]: Soliciting pool server 66.241.101.63 read_network_packet: fd=19 length 48 from 66.241.101.63 fetch_timestamp: system nsec network time stamp: 1422993584.702158464 receive: at 1 204.17.205.226<-66.241.101.63 flags 19 restrict 1d0 receive: at 1 204.17.205.226<-66.241.101.63 mode 4 len 48 alarming: normal 3 Feb 11:59:45 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data refclock_transmit: at 2 127.127.28.0 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard refclock_receive: at 2 127.127.28.0 event at 2 SHM(0) 8024 84 reachable refclock_sample: n 2 offset 0.012933 disp 0.000000 jitter 0.000734 filegen 2 3631982385 opening filegen (type=2/stamp=3631982385) "/var/log/ntp/peerstats.20150203" clock_filter: n 1 off 0.012933 del 0.000000 dsp 7.937867 jit 0.000000 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard select: endpoint -1 -0.487067 select: endpoint 1 0.512934 select: survivor 127.127.28.0 0.500000 select: combine offset 0.012933093 jitter 0.000000000 event at 2 SHM(0) 903a 8a sys_peer poll_update: at 2 127.127.28.0 poll 6 burst 0 retry 0 head 0 early 2 next 64 clock_update: at 2 sample 2 associd 31142 local_clock: mu 2 state 5 poll 6 count 0 event at 2 0.0.0.0 c415 05 clock_sync filegen 2 3631982385 opening filegen (type=2/stamp=3631982385) "/var/log/ntp/loopstats.20150203" local_clock: offset 0.012933093 jit 0.004572539 freq 12.563 stab 0.000 poll 6 poll_update: at 2 127.127.28.0 poll 6 burst 0 retry 0 head 0 early 2 next 64 timer: interface update update_interfaces(123) examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface lo default loopback listen listen interface lo (127.0.0.1) - by nic rules Searching for addr 127.0.0.1 in list of addresses - FOUND updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: present Dumping interface: 0xc036b0 fd = 18 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 0100007f num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 2 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (204.17.205.226) - by nic rules Searching for addr 204.17.205.226 in list of addresses - FOUND updating interface #3: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: present Dumping interface: 0xc016c0 fd = 19 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = e2cd11cc num_mcast = 0 received = 1 sent = 2 notsent = 0 ifindex = 0 peercnt = 6 phase = 1 examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface lo default loopback listen listen interface lo (::1) - by nic rules Searching for addr ::1 in list of addresses - FOUND updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: present Dumping interface: 0xc03800 fd = 20 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = c84d40cf num_mcast = 0 received = 10 sent = 19 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface enp2s0 default listen listen interface enp2s0 (fe80::d8ca:2adf:82a8:8149%2) - by nic rules Searching for addr fe80::d8ca:2adf:82a8:8149%2 in list of addresses - NOT FOUND create_interface(fe80::d8ca:2adf:82a8:8149%2#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: 3 Feb 11:59:45 ntpd[15698]: bind(26) AF_INET6 fe80::d8ca:2adf:82a8:8149%2#123 flags 0x11 failed: Cannot assign requested address 3 Feb 11:59:45 ntpd[15698]: unable to create socket on enp2s0 (8) for fe80::d8ca:2adf:82a8:8149%2#123 updating interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: new - creation FAILEDDumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 3 Feb 11:59:45 ntpd[15698]: failed to init interface for address fe80::d8ca:2adf:82a8:8149%2 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (2001:470:e815:0:705a:540a:f1d4:edc4) - by nic rules Searching for addr 2001:470:e815:0:705a:540a:f1d4:edc4 in list of addresses - FOUND updating interface #6: fd=21, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: present Dumping interface: 0xc01020 fd = 21 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 12ad7896 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (fe80::b80d:cf4b:d3a4:c720%3) - by nic rules Searching for addr fe80::b80d:cf4b:d3a4:c720%3 in list of addresses - FOUND updating interface #7: fd=22, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: present Dumping interface: 0xc01170 fd = 22 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 64ba6aa9 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 Finding interface for addr 216.218.254.202 in list of addresses findlocalinterface: kernel maps 216.218.254.202 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 216.218.254.202 peer_refresh_interface: 204.17.205.226->216.218.254.202 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 18.26.4.105 in list of addresses findlocalinterface: kernel maps 18.26.4.105 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 18.26.4.105 peer_refresh_interface: 204.17.205.226->18.26.4.105 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 132.163.4.101 in list of addresses findlocalinterface: kernel maps 132.163.4.101 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 132.163.4.101 peer_refresh_interface: 204.17.205.226->132.163.4.101 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.7 in list of addresses findlocalinterface: kernel maps 204.17.205.7 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.7 peer_refresh_interface: 204.17.205.226->204.17.205.7 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.1 in list of addresses findlocalinterface: kernel maps 204.17.205.1 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.1 peer_refresh_interface: 204.17.205.226->204.17.205.1 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.18 in list of addresses findlocalinterface: kernel maps 204.17.205.18 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.18 peer_refresh_interface: 204.17.205.226->204.17.205.18 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 peer_refresh_interface: 127.0.0.1->127.127.28.1 mode 3 vers 4 poll 6 6 flags 0x29 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 peer_refresh_interface: 127.0.0.1->127.127.28.0 mode 3 vers 4 poll 6 6 flags 0x9 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard peer_refresh_interface: ->0.0.0.0 mode 3 vers 4 poll 6 10 flags 0x101 0x8 ttl 0 key 00000000: new interface: read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993585.907692378 receive: at 2 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993585.914130559 receive: at 2 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993585.919950793 receive: at 2 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993585.925709576 receive: at 2 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993585.931355889 receive: at 2 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993585.941325295 receive: at 2 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993585.950934407 receive: at 2 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993585.961771614 receive: at 2 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993585.971632956 receive: at 2 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993585.982469679 receive: at 2 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=104) alarming: normal 3 Feb 11:59:46 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data refclock_transmit: at 3 127.127.28.1 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard select: endpoint -1 -0.487082 select: endpoint 1 0.512949 select: survivor 127.127.28.0 0.500015 select: combine offset 0.012933093 jitter 0.000000000 refclock_receive: at 3 127.127.28.1 event at 3 SHM(1) 8024 84 reachable refclock_sample: n 3 offset 0.000058 disp 0.000000 jitter 0.000027 clock_filter: n 1 off 0.000058 del 0.000000 dsp 7.937514 jit 0.000000 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard select: endpoint -1 -0.487082 select: endpoint -1 -0.000942 select: endpoint 1 0.001058 select: endpoint 1 0.512949 select: survivor 127.127.28.1 0.001000 select: survivor 127.127.28.0 0.500015 select: combine offset 0.000058040 jitter 0.000000238 event at 3 SHM(1) 903a 8a sys_peer poll_update: at 3 127.127.28.1 poll 6 burst 0 retry 0 head 0 early 2 next 64 clock_update: at 3 sample 3 associd 31143 local_clock: mu 1 state 5 poll 6 count 0 local_clock: offset 0.000058039 jit 0.006246237 freq 12.563 stab 0.000 poll 6 poll_update: at 3 127.127.28.1 poll 6 burst 0 retry 0 head 0 early 2 next 64 alarming: normal 3 Feb 11:59:47 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard select: endpoint -1 -0.487097 select: endpoint -1 -0.000942 select: endpoint 1 0.001058 select: endpoint 1 0.512964 select: survivor 127.127.28.1 0.001000 select: survivor 127.127.28.0 0.500030 select: combine offset 0.000058040 jitter 0.000000238 sendpkt(19, dst=216.218.254.202, src=204.17.205.226, ttl=0, len=48) transmit: at 4 204.17.205.226->216.218.254.202 mode 3 len 48 poll_update: at 4 216.218.254.202 poll 6 burst 0 retry 0 head 62 early 2 next 65 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard select: endpoint -1 -0.487097 select: endpoint -1 -0.000942 select: endpoint 1 0.001058 select: endpoint 1 0.512964 select: survivor 127.127.28.1 0.001000 select: survivor 127.127.28.0 0.500030 select: combine offset 0.000058040 jitter 0.000000238 sendpkt(19, dst=132.163.4.101, src=204.17.205.226, ttl=0, len=48) transmit: at 4 204.17.205.226->132.163.4.101 mode 3 len 48 poll_update: at 4 132.163.4.101 poll 6 burst 0 retry 0 head 62 early 2 next 65 read_network_packet: fd=19 length 48 from 216.218.254.202 fetch_timestamp: system nsec network time stamp: 1422993587.314201354 receive: at 4 204.17.205.226<-216.218.254.202 flags 19 restrict 1d0 receive: at 4 204.17.205.226<-216.218.254.202 mode 4 len 48 filegen 2 3631982387 opening filegen (type=2/stamp=3631982387) "/var/log/ntp/rawstats.20150203" poll_update: at 4 216.218.254.202 poll 6 burst 0 retry 0 head 62 early 2 next 65 event at 4 216.218.254.202 8024 84 reachable clock_filter: n 1 off 0.000086 del 0.030125 dsp 7.937501 jit 0.000000 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard select: endpoint -1 -0.487097 select: endpoint -1 -0.015329 select: endpoint -1 -0.000942 select: endpoint 1 0.001058 select: endpoint 1 0.015500 select: endpoint 1 0.512964 select: survivor 216.218.254.202 0.015415 select: survivor 127.127.28.1 0.001000 select: survivor 127.127.28.0 0.500030 select: combine offset 0.000058040 jitter 0.000000238 read_network_packet: fd=19 length 48 from 132.163.4.101 fetch_timestamp: system nsec network time stamp: 1422993587.344703041 receive: at 4 204.17.205.226<-132.163.4.101 flags 19 restrict 1d0 receive: at 4 204.17.205.226<-132.163.4.101 mode 4 len 48 poll_update: at 4 132.163.4.101 poll 6 burst 0 retry 0 head 62 early 2 next 64 event at 4 132.163.4.101 8024 84 reachable clock_filter: n 1 off -0.006912 del 0.056045 dsp 7.937501 jit 0.000000 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard select: endpoint -1 -0.487097 select: endpoint -1 -0.034935 select: endpoint -1 -0.015329 select: endpoint -1 -0.000942 select: endpoint 1 0.001058 select: endpoint 1 0.015500 select: endpoint 1 0.021111 select: endpoint 1 0.512964 select: survivor 216.218.254.202 0.015415 select: survivor 132.163.4.101 0.028023 select: survivor 127.127.28.1 0.001000 select: survivor 127.127.28.0 0.500030 select: drop 127.127.28.0 seljit 0.015542 jit 0.000000 select: combine offset 0.000058040 jitter 0.000000238 read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993588.007634778 receive: at 4 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993588.014281717 receive: at 4 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993588.020265134 receive: at 4 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993588.026091078 receive: at 4 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993588.031875544 receive: at 4 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993588.041958617 receive: at 4 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993588.051477789 receive: at 4 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993588.062566376 receive: at 4 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993588.072973245 receive: at 4 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993588.084308270 receive: at 4 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) routing message op = 20: scheduling interface update alarming: normal 3 Feb 11:59:48 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard select: endpoint -1 -0.487112 select: endpoint -1 -0.034950 select: endpoint -1 -0.015344 select: endpoint -1 -0.000942 select: endpoint 1 0.001058 select: endpoint 1 0.015515 select: endpoint 1 0.021126 select: endpoint 1 0.512979 select: survivor 216.218.254.202 0.015430 select: survivor 132.163.4.101 0.028038 select: survivor 127.127.28.1 0.001000 select: survivor 127.127.28.0 0.500045 select: drop 127.127.28.0 seljit 0.015542 jit 0.000000 select: combine offset 0.000058040 jitter 0.000000238 sendpkt(19, dst=204.17.205.18, src=204.17.205.226, ttl=0, len=48) transmit: at 5 204.17.205.226->204.17.205.18 mode 3 len 48 poll_update: at 5 204.17.205.18 poll 6 burst 0 retry 0 head 62 early 2 next 64 read_network_packet: fd=19 length 48 from 204.17.205.18 fetch_timestamp: system nsec network time stamp: 1422993588.285811558 receive: at 5 204.17.205.226<-204.17.205.18 flags 19 restrict 000 receive: at 5 204.17.205.226<-204.17.205.18 mode 4 len 48 poll_update: at 5 204.17.205.18 poll 6 burst 0 retry 0 head 62 early 2 next 66 event at 5 204.17.205.18 8024 84 reachable clock_filter: n 1 off -0.000976 del 0.001593 dsp 7.937501 jit 0.000000 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard select: endpoint -1 -0.487112 select: endpoint -1 -0.034950 select: endpoint -1 -0.028942 select: endpoint -1 -0.015344 select: endpoint -1 -0.000942 select: endpoint 1 0.001058 select: endpoint 1 0.015515 select: endpoint 1 0.021126 select: endpoint 1 0.026991 select: endpoint 1 0.512979 select: survivor 216.218.254.202 0.015430 select: survivor 132.163.4.101 0.028038 select: survivor 204.17.205.18 0.027966 select: survivor 127.127.28.1 0.001000 select: survivor 127.127.28.0 0.500045 select: drop 127.127.28.0 seljit 0.015150 jit 0.000000 select: drop 132.163.4.101 seljit 0.006653 jit 0.000000 select: combine offset 0.000058040 jitter 0.000000238 alarming: normal 3 Feb 11:59:49 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard select: endpoint -1 -0.487127 select: endpoint -1 -0.034965 select: endpoint -1 -0.028957 select: endpoint -1 -0.015359 select: endpoint -1 -0.000942 select: endpoint 1 0.001058 select: endpoint 1 0.015530 select: endpoint 1 0.021141 select: endpoint 1 0.027006 select: endpoint 1 0.512994 select: survivor 216.218.254.202 0.015445 select: survivor 132.163.4.101 0.028053 select: survivor 204.17.205.18 0.027981 select: survivor 127.127.28.1 0.001000 select: survivor 127.127.28.0 0.500060 select: drop 127.127.28.0 seljit 0.015150 jit 0.000000 select: drop 132.163.4.101 seljit 0.006653 jit 0.000000 select: combine offset 0.000058040 jitter 0.000000238 sendpkt(19, dst=204.17.205.1, src=204.17.205.226, ttl=0, len=48) transmit: at 6 204.17.205.226->204.17.205.1 mode 3 len 48 poll_update: at 6 204.17.205.1 poll 6 burst 0 retry 0 head 62 early 2 next 64 timer: interface update update_interfaces(123) examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface lo default loopback listen listen interface lo (127.0.0.1) - by nic rules Searching for addr 127.0.0.1 in list of addresses - FOUND updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: present Dumping interface: 0xc036b0 fd = 18 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 0100007f num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 2 phase = 0 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (204.17.205.226) - by nic rules Searching for addr 204.17.205.226 in list of addresses - FOUND updating interface #3: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: present Dumping interface: 0xc016c0 fd = 19 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = e2cd11cc num_mcast = 0 received = 4 sent = 6 notsent = 0 ifindex = 0 peercnt = 6 phase = 0 examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface lo default loopback listen listen interface lo (::1) - by nic rules Searching for addr ::1 in list of addresses - FOUND updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: present Dumping interface: 0xc03800 fd = 20 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = c84d40cf num_mcast = 0 received = 30 sent = 57 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 examining interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface enp2s0 default listen listen interface enp2s0 (fe80::d8ca:2adf:82a8:8149%2) - by nic rules Searching for addr fe80::d8ca:2adf:82a8:8149%2 in list of addresses - NOT FOUND create_interface(fe80::d8ca:2adf:82a8:8149%2#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: 3 Feb 11:59:49 ntpd[15698]: bind(26) AF_INET6 fe80::d8ca:2adf:82a8:8149%2#123 flags 0x11 failed: Cannot assign requested address 3 Feb 11:59:49 ntpd[15698]: unable to create socket on enp2s0 (9) for fe80::d8ca:2adf:82a8:8149%2#123 updating interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: new - creation FAILEDDumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 3 Feb 11:59:49 ntpd[15698]: failed to init interface for address fe80::d8ca:2adf:82a8:8149%2 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (2001:470:e815:0:705a:540a:f1d4:edc4) - by nic rules Searching for addr 2001:470:e815:0:705a:540a:f1d4:edc4 in list of addresses - FOUND updating interface #6: fd=21, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: present Dumping interface: 0xc01020 fd = 21 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 12ad7896 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (fe80::b80d:cf4b:d3a4:c720%3) - by nic rules Searching for addr fe80::b80d:cf4b:d3a4:c720%3 in list of addresses - FOUND updating interface #7: fd=22, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: present Dumping interface: 0xc01170 fd = 22 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 64ba6aa9 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 Finding interface for addr 216.218.254.202 in list of addresses findlocalinterface: kernel maps 216.218.254.202 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 216.218.254.202 peer_refresh_interface: 204.17.205.226->216.218.254.202 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 18.26.4.105 in list of addresses findlocalinterface: kernel maps 18.26.4.105 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 18.26.4.105 peer_refresh_interface: 204.17.205.226->18.26.4.105 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 132.163.4.101 in list of addresses findlocalinterface: kernel maps 132.163.4.101 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 132.163.4.101 peer_refresh_interface: 204.17.205.226->132.163.4.101 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.7 in list of addresses findlocalinterface: kernel maps 204.17.205.7 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.7 peer_refresh_interface: 204.17.205.226->204.17.205.7 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.1 in list of addresses findlocalinterface: kernel maps 204.17.205.1 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.1 peer_refresh_interface: 204.17.205.226->204.17.205.1 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.18 in list of addresses findlocalinterface: kernel maps 204.17.205.18 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.18 peer_refresh_interface: 204.17.205.226->204.17.205.18 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 peer_refresh_interface: 127.0.0.1->127.127.28.1 mode 3 vers 4 poll 6 6 flags 0x29 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 peer_refresh_interface: 127.0.0.1->127.127.28.0 mode 3 vers 4 poll 6 6 flags 0x9 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard peer_refresh_interface: ->0.0.0.0 mode 3 vers 4 poll 6 10 flags 0x101 0x8 ttl 0 key 00000000: new interface: read_network_packet: fd=19 length 48 from 204.17.205.1 fetch_timestamp: system nsec network time stamp: 1422993589.289920374 receive: at 6 204.17.205.226<-204.17.205.1 flags 19 restrict 000 receive: at 6 204.17.205.226<-204.17.205.1 mode 4 len 48 poll_update: at 6 204.17.205.1 poll 6 burst 0 retry 0 head 62 early 2 next 64 event at 6 204.17.205.1 8024 84 reachable clock_filter: n 1 off -0.001454 del 0.001710 dsp 7.937500 jit 0.000000 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard select: endpoint -1 -0.487127 select: endpoint -1 -0.035765 select: endpoint -1 -0.034965 select: endpoint -1 -0.028957 select: endpoint -1 -0.015359 select: endpoint -1 -0.000942 select: endpoint 1 0.001058 select: endpoint 1 0.015530 select: endpoint 1 0.021141 select: endpoint 1 0.027006 select: endpoint 1 0.032856 select: endpoint 1 0.512994 select: survivor 216.218.254.202 0.015445 select: survivor 132.163.4.101 0.028053 select: survivor 204.17.205.1 0.034310 select: survivor 204.17.205.18 0.027981 select: survivor 127.127.28.1 0.001000 select: survivor 127.127.28.0 0.500060 select: drop 127.127.28.0 seljit 0.015001 jit 0.000000 select: drop 132.163.4.101 seljit 0.006375 jit 0.000000 select: drop 204.17.205.1 seljit 0.001276 jit 0.000000 select: combine offset 0.000058040 jitter 0.000000238 read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993590.112636997 receive: at 6 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993590.120966871 receive: at 6 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993590.126920978 receive: at 6 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993590.132766833 receive: at 6 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993590.138506647 receive: at 6 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993590.151206517 receive: at 6 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993590.164168957 receive: at 6 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=100) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993590.174163278 receive: at 6 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993590.184307866 receive: at 6 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993590.194310858 receive: at 6 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 11:59:50 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard select: endpoint -1 -0.487142 select: endpoint -1 -0.035780 select: endpoint -1 -0.034980 select: endpoint -1 -0.028972 select: endpoint -1 -0.015374 select: endpoint -1 -0.000942 select: endpoint 1 0.001058 select: endpoint 1 0.015545 select: endpoint 1 0.021156 select: endpoint 1 0.027021 select: endpoint 1 0.032871 select: endpoint 1 0.513009 select: survivor 216.218.254.202 0.015460 select: survivor 132.163.4.101 0.028068 select: survivor 204.17.205.1 0.034325 select: survivor 204.17.205.18 0.027996 select: survivor 127.127.28.1 0.001000 select: survivor 127.127.28.0 0.500075 select: drop 127.127.28.0 seljit 0.015001 jit 0.000000 select: drop 132.163.4.101 seljit 0.006375 jit 0.000000 select: drop 204.17.205.1 seljit 0.001276 jit 0.000000 select: combine offset 0.000058040 jitter 0.000000238 sendpkt(19, dst=204.17.205.7, src=204.17.205.226, ttl=0, len=48) transmit: at 7 204.17.205.226->204.17.205.7 mode 3 len 48 poll_update: at 7 204.17.205.7 poll 6 burst 0 retry 0 head 62 early 2 next 67 read_network_packet: fd=19 length 48 from 204.17.205.7 fetch_timestamp: system nsec network time stamp: 1422993590.286078929 receive: at 7 204.17.205.226<-204.17.205.7 flags 19 restrict 000 receive: at 7 204.17.205.226<-204.17.205.7 mode 4 len 48 poll_update: at 7 204.17.205.7 poll 6 burst 0 retry 0 head 62 early 2 next 67 event at 7 204.17.205.7 8024 84 reachable clock_filter: n 1 off -0.001320 del 0.001730 dsp 7.937501 jit 0.000000 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard select: endpoint -1 -0.487142 select: endpoint -1 -0.035780 select: endpoint -1 -0.034980 select: endpoint -1 -0.031514 select: endpoint -1 -0.028972 select: endpoint -1 -0.015374 select: endpoint -1 -0.000942 select: endpoint 1 0.001058 select: endpoint 1 0.015545 select: endpoint 1 0.021156 select: endpoint 1 0.027021 select: endpoint 1 0.028874 select: endpoint 1 0.032871 select: endpoint 1 0.513009 select: survivor 216.218.254.202 0.015460 select: survivor 132.163.4.101 0.028068 select: survivor 204.17.205.7 0.030194 select: survivor 204.17.205.1 0.034325 select: survivor 204.17.205.18 0.027996 select: survivor 127.127.28.1 0.001000 select: survivor 127.127.28.0 0.500075 select: drop 127.127.28.0 seljit 0.014879 jit 0.000000 select: drop 132.163.4.101 seljit 0.006226 jit 0.000000 select: drop 204.17.205.1 seljit 0.001107 jit 0.000000 select: drop 204.17.205.7 seljit 0.001154 jit 0.000000 select: combine offset 0.000058040 jitter 0.000000238 alarming: normal 3 Feb 11:59:51 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data event at 8 0.0.0.0 041b 0b leap_event routing message op = 20: scheduling interface update read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993592.221478897 receive: at 8 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993592.227874853 receive: at 8 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993592.233867654 receive: at 8 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993592.239712530 receive: at 8 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993592.245299069 receive: at 8 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993592.257798418 receive: at 8 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993592.271594413 receive: at 8 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) alarming: normal 3 Feb 11:59:52 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993592.284978756 receive: at 9 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993592.296109356 receive: at 9 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993592.307123877 receive: at 9 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 11:59:53 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data timer: interface update update_interfaces(123) examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface lo default loopback listen listen interface lo (127.0.0.1) - by nic rules Searching for addr 127.0.0.1 in list of addresses - FOUND updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: present Dumping interface: 0xc036b0 fd = 18 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 0100007f num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 2 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (204.17.205.226) - by nic rules Searching for addr 204.17.205.226 in list of addresses - FOUND updating interface #3: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: present Dumping interface: 0xc016c0 fd = 19 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = e2cd11cc num_mcast = 0 received = 6 sent = 7 notsent = 0 ifindex = 0 peercnt = 6 phase = 1 examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface lo default loopback listen listen interface lo (::1) - by nic rules Searching for addr ::1 in list of addresses - FOUND updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: present Dumping interface: 0xc03800 fd = 20 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = c84d40cf num_mcast = 0 received = 50 sent = 95 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface enp2s0 default listen listen interface enp2s0 (fe80::d8ca:2adf:82a8:8149%2) - by nic rules Searching for addr fe80::d8ca:2adf:82a8:8149%2 in list of addresses - NOT FOUND create_interface(fe80::d8ca:2adf:82a8:8149%2#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: 3 Feb 11:59:53 ntpd[15698]: bind(26) AF_INET6 fe80::d8ca:2adf:82a8:8149%2#123 flags 0x11 failed: Cannot assign requested address 3 Feb 11:59:53 ntpd[15698]: unable to create socket on enp2s0 (10) for fe80::d8ca:2adf:82a8:8149%2#123 updating interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: new - creation FAILEDDumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 3 Feb 11:59:53 ntpd[15698]: failed to init interface for address fe80::d8ca:2adf:82a8:8149%2 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (2001:470:e815:0:705a:540a:f1d4:edc4) - by nic rules Searching for addr 2001:470:e815:0:705a:540a:f1d4:edc4 in list of addresses - FOUND updating interface #6: fd=21, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: present Dumping interface: 0xc01020 fd = 21 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 12ad7896 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (fe80::b80d:cf4b:d3a4:c720%3) - by nic rules Searching for addr fe80::b80d:cf4b:d3a4:c720%3 in list of addresses - FOUND updating interface #7: fd=22, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: present Dumping interface: 0xc01170 fd = 22 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 64ba6aa9 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 Finding interface for addr 216.218.254.202 in list of addresses findlocalinterface: kernel maps 216.218.254.202 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 216.218.254.202 peer_refresh_interface: 204.17.205.226->216.218.254.202 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 18.26.4.105 in list of addresses findlocalinterface: kernel maps 18.26.4.105 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 18.26.4.105 peer_refresh_interface: 204.17.205.226->18.26.4.105 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 132.163.4.101 in list of addresses findlocalinterface: kernel maps 132.163.4.101 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 132.163.4.101 peer_refresh_interface: 204.17.205.226->132.163.4.101 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.7 in list of addresses findlocalinterface: kernel maps 204.17.205.7 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.7 peer_refresh_interface: 204.17.205.226->204.17.205.7 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.1 in list of addresses findlocalinterface: kernel maps 204.17.205.1 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.1 peer_refresh_interface: 204.17.205.226->204.17.205.1 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.18 in list of addresses findlocalinterface: kernel maps 204.17.205.18 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.18 peer_refresh_interface: 204.17.205.226->204.17.205.18 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 peer_refresh_interface: 127.0.0.1->127.127.28.1 mode 3 vers 4 poll 6 6 flags 0x29 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 peer_refresh_interface: 127.0.0.1->127.127.28.0 mode 3 vers 4 poll 6 6 flags 0x9 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard peer_refresh_interface: ->0.0.0.0 mode 3 vers 4 poll 6 10 flags 0x101 0x8 ttl 0 key 00000000: new interface: alarming: normal 3 Feb 11:59:54 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993594.336475368 receive: at 11 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993594.344009082 receive: at 11 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993594.350038231 receive: at 11 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993594.355728841 receive: at 11 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993594.361965514 receive: at 11 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993594.374634947 receive: at 11 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993594.387875016 receive: at 11 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993594.401842373 receive: at 11 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993594.411989696 receive: at 11 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993594.423612363 receive: at 11 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 11:59:55 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 11:59:56 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993596.449902952 receive: at 13 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993596.455952238 receive: at 13 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993596.461566621 receive: at 13 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993596.467026581 receive: at 13 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993596.472608701 receive: at 13 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993596.484979490 receive: at 13 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993596.498569825 receive: at 13 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993596.512396424 receive: at 13 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993596.522331632 receive: at 13 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993596.533378120 receive: at 13 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 11:59:57 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 11:59:58 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data routing message op = 25: scheduling interface update routing message op = 25: scheduling interface update read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993598.560460703 receive: at 15 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993598.566860019 receive: at 15 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993598.572974750 receive: at 15 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993598.578715573 receive: at 15 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993598.584484218 receive: at 15 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993598.596876486 receive: at 15 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993598.610748512 receive: at 15 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993598.622786556 receive: at 15 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993598.632830086 receive: at 15 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993598.643930747 receive: at 15 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 11:59:59 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data routing message op = 20: scheduling interface update alarming: normal 3 Feb 12:00:00 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993600.671515790 receive: at 17 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993600.677529057 receive: at 17 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993600.683139880 receive: at 17 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993600.688620506 receive: at 17 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993600.694086629 receive: at 17 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993600.706529104 receive: at 17 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993600.720448516 receive: at 17 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993600.732563945 receive: at 17 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993600.742669731 receive: at 17 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993600.753730822 receive: at 17 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:01 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data timer: interface update update_interfaces(123) examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface lo default loopback listen listen interface lo (127.0.0.1) - by nic rules Searching for addr 127.0.0.1 in list of addresses - FOUND updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: present Dumping interface: 0xc036b0 fd = 18 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 0100007f num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 2 phase = 0 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (204.17.205.226) - by nic rules Searching for addr 204.17.205.226 in list of addresses - FOUND updating interface #3: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: present Dumping interface: 0xc016c0 fd = 19 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = e2cd11cc num_mcast = 0 received = 6 sent = 7 notsent = 0 ifindex = 0 peercnt = 6 phase = 0 examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface lo default loopback listen listen interface lo (::1) - by nic rules Searching for addr ::1 in list of addresses - FOUND updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: present Dumping interface: 0xc03800 fd = 20 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = c84d40cf num_mcast = 0 received = 90 sent = 171 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 examining interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface enp2s0 default listen listen interface enp2s0 (fe80::d8ca:2adf:82a8:8149%2) - by nic rules Searching for addr fe80::d8ca:2adf:82a8:8149%2 in list of addresses - NOT FOUND create_interface(fe80::d8ca:2adf:82a8:8149%2#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: 3 Feb 12:00:01 ntpd[15698]: bind(26) AF_INET6 fe80::d8ca:2adf:82a8:8149%2#123 flags 0x11 failed: Cannot assign requested address 3 Feb 12:00:01 ntpd[15698]: unable to create socket on enp2s0 (11) for fe80::d8ca:2adf:82a8:8149%2#123 updating interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: new - creation FAILEDDumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 3 Feb 12:00:01 ntpd[15698]: failed to init interface for address fe80::d8ca:2adf:82a8:8149%2 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (2001:470:e815:0:705a:540a:f1d4:edc4) - by nic rules Searching for addr 2001:470:e815:0:705a:540a:f1d4:edc4 in list of addresses - FOUND updating interface #6: fd=21, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: present Dumping interface: 0xc01020 fd = 21 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 12ad7896 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (fe80::b80d:cf4b:d3a4:c720%3) - by nic rules Searching for addr fe80::b80d:cf4b:d3a4:c720%3 in list of addresses - FOUND updating interface #7: fd=22, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: present Dumping interface: 0xc01170 fd = 22 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 64ba6aa9 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 Finding interface for addr 216.218.254.202 in list of addresses findlocalinterface: kernel maps 216.218.254.202 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 216.218.254.202 peer_refresh_interface: 204.17.205.226->216.218.254.202 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 18.26.4.105 in list of addresses findlocalinterface: kernel maps 18.26.4.105 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 18.26.4.105 peer_refresh_interface: 204.17.205.226->18.26.4.105 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 132.163.4.101 in list of addresses findlocalinterface: kernel maps 132.163.4.101 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 132.163.4.101 peer_refresh_interface: 204.17.205.226->132.163.4.101 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.7 in list of addresses findlocalinterface: kernel maps 204.17.205.7 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.7 peer_refresh_interface: 204.17.205.226->204.17.205.7 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.1 in list of addresses findlocalinterface: kernel maps 204.17.205.1 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.1 peer_refresh_interface: 204.17.205.226->204.17.205.1 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.18 in list of addresses findlocalinterface: kernel maps 204.17.205.18 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.18 peer_refresh_interface: 204.17.205.226->204.17.205.18 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 peer_refresh_interface: 127.0.0.1->127.127.28.1 mode 3 vers 4 poll 6 6 flags 0x29 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 peer_refresh_interface: 127.0.0.1->127.127.28.0 mode 3 vers 4 poll 6 6 flags 0x9 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard peer_refresh_interface: ->0.0.0.0 mode 3 vers 4 poll 6 10 flags 0x101 0x8 ttl 0 key 00000000: new interface: alarming: normal 3 Feb 12:00:02 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data routing message op = 24: scheduling interface update read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993602.781673643 receive: at 19 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993602.788060414 receive: at 19 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993602.794094660 receive: at 19 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993602.800129821 receive: at 19 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993602.805643874 receive: at 19 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993602.818489982 receive: at 19 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993602.832384897 receive: at 19 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993602.844831323 receive: at 19 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993602.856326982 receive: at 19 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993602.867516668 receive: at 19 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:03 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 12:00:04 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data timer: interface update update_interfaces(123) examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface lo default loopback listen listen interface lo (127.0.0.1) - by nic rules Searching for addr 127.0.0.1 in list of addresses - FOUND updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: present Dumping interface: 0xc036b0 fd = 18 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 0100007f num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 2 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (204.17.205.226) - by nic rules Searching for addr 204.17.205.226 in list of addresses - FOUND updating interface #3: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: present Dumping interface: 0xc016c0 fd = 19 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = e2cd11cc num_mcast = 0 received = 6 sent = 7 notsent = 0 ifindex = 0 peercnt = 6 phase = 1 examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface lo default loopback listen listen interface lo (::1) - by nic rules Searching for addr ::1 in list of addresses - FOUND updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: present Dumping interface: 0xc03800 fd = 20 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = c84d40cf num_mcast = 0 received = 100 sent = 190 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface enp2s0 default listen listen interface enp2s0 (fe80::d8ca:2adf:82a8:8149%2) - by nic rules Searching for addr fe80::d8ca:2adf:82a8:8149%2 in list of addresses - NOT FOUND create_interface(fe80::d8ca:2adf:82a8:8149%2#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: 3 Feb 12:00:04 ntpd[15698]: bind(26) AF_INET6 fe80::d8ca:2adf:82a8:8149%2#123 flags 0x11 failed: Cannot assign requested address 3 Feb 12:00:04 ntpd[15698]: unable to create socket on enp2s0 (12) for fe80::d8ca:2adf:82a8:8149%2#123 updating interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: new - creation FAILEDDumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 3 Feb 12:00:04 ntpd[15698]: failed to init interface for address fe80::d8ca:2adf:82a8:8149%2 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (2001:470:e815:0:705a:540a:f1d4:edc4) - by nic rules Searching for addr 2001:470:e815:0:705a:540a:f1d4:edc4 in list of addresses - FOUND updating interface #6: fd=21, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: present Dumping interface: 0xc01020 fd = 21 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 12ad7896 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (fe80::b80d:cf4b:d3a4:c720%3) - by nic rules Searching for addr fe80::b80d:cf4b:d3a4:c720%3 in list of addresses - FOUND updating interface #7: fd=22, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: present Dumping interface: 0xc01170 fd = 22 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 64ba6aa9 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 Finding interface for addr 216.218.254.202 in list of addresses findlocalinterface: kernel maps 216.218.254.202 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 216.218.254.202 peer_refresh_interface: 204.17.205.226->216.218.254.202 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 18.26.4.105 in list of addresses findlocalinterface: kernel maps 18.26.4.105 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 18.26.4.105 peer_refresh_interface: 204.17.205.226->18.26.4.105 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 132.163.4.101 in list of addresses findlocalinterface: kernel maps 132.163.4.101 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 132.163.4.101 peer_refresh_interface: 204.17.205.226->132.163.4.101 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.7 in list of addresses findlocalinterface: kernel maps 204.17.205.7 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.7 peer_refresh_interface: 204.17.205.226->204.17.205.7 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.1 in list of addresses findlocalinterface: kernel maps 204.17.205.1 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.1 peer_refresh_interface: 204.17.205.226->204.17.205.1 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.18 in list of addresses findlocalinterface: kernel maps 204.17.205.18 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.18 peer_refresh_interface: 204.17.205.226->204.17.205.18 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 peer_refresh_interface: 127.0.0.1->127.127.28.1 mode 3 vers 4 poll 6 6 flags 0x29 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 peer_refresh_interface: 127.0.0.1->127.127.28.0 mode 3 vers 4 poll 6 6 flags 0x9 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard peer_refresh_interface: ->0.0.0.0 mode 3 vers 4 poll 6 10 flags 0x101 0x8 ttl 0 key 00000000: new interface: read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993604.893075120 receive: at 21 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993604.899596515 receive: at 21 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993604.905558218 receive: at 21 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993604.911451876 receive: at 21 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993604.917260264 receive: at 21 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993604.930136635 receive: at 21 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993604.942027193 receive: at 21 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993604.955390294 receive: at 21 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993604.966554248 receive: at 21 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993604.977632827 receive: at 21 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:05 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 12:00:06 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993607.005482002 receive: at 23 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993607.013303763 receive: at 23 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993607.019221221 receive: at 23 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993607.024677253 receive: at 23 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993607.030155382 receive: at 23 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993607.042400717 receive: at 23 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993607.055242628 receive: at 23 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993607.070255947 receive: at 23 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993607.080555960 receive: at 23 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993607.090536866 receive: at 23 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:07 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 12:00:08 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data routing message op = 20: scheduling interface update read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993609.115245817 receive: at 25 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993609.122633120 receive: at 25 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993609.129125823 receive: at 25 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993609.135326836 receive: at 25 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993609.141353041 receive: at 25 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993609.155480179 receive: at 25 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993609.169473568 receive: at 25 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993609.183977999 receive: at 25 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993609.193762809 receive: at 25 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993609.203738056 receive: at 25 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:09 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 12:00:10 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data timer: interface update update_interfaces(123) examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface lo default loopback listen listen interface lo (127.0.0.1) - by nic rules Searching for addr 127.0.0.1 in list of addresses - FOUND updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: present Dumping interface: 0xc036b0 fd = 18 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 0100007f num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 2 phase = 0 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (204.17.205.226) - by nic rules Searching for addr 204.17.205.226 in list of addresses - FOUND updating interface #3: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: present Dumping interface: 0xc016c0 fd = 19 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = e2cd11cc num_mcast = 0 received = 6 sent = 7 notsent = 0 ifindex = 0 peercnt = 6 phase = 0 examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface lo default loopback listen listen interface lo (::1) - by nic rules Searching for addr ::1 in list of addresses - FOUND updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: present Dumping interface: 0xc03800 fd = 20 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = c84d40cf num_mcast = 0 received = 130 sent = 247 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 examining interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface enp2s0 default listen listen interface enp2s0 (fe80::d8ca:2adf:82a8:8149%2) - by nic rules Searching for addr fe80::d8ca:2adf:82a8:8149%2 in list of addresses - NOT FOUND create_interface(fe80::d8ca:2adf:82a8:8149%2#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: 3 Feb 12:00:10 ntpd[15698]: bind(26) AF_INET6 fe80::d8ca:2adf:82a8:8149%2#123 flags 0x11 failed: Cannot assign requested address 3 Feb 12:00:10 ntpd[15698]: unable to create socket on enp2s0 (13) for fe80::d8ca:2adf:82a8:8149%2#123 updating interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: new - creation FAILEDDumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 3 Feb 12:00:10 ntpd[15698]: failed to init interface for address fe80::d8ca:2adf:82a8:8149%2 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (2001:470:e815:0:705a:540a:f1d4:edc4) - by nic rules Searching for addr 2001:470:e815:0:705a:540a:f1d4:edc4 in list of addresses - FOUND updating interface #6: fd=21, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: present Dumping interface: 0xc01020 fd = 21 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 12ad7896 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (fe80::b80d:cf4b:d3a4:c720%3) - by nic rules Searching for addr fe80::b80d:cf4b:d3a4:c720%3 in list of addresses - FOUND updating interface #7: fd=22, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: present Dumping interface: 0xc01170 fd = 22 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 64ba6aa9 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 Finding interface for addr 216.218.254.202 in list of addresses findlocalinterface: kernel maps 216.218.254.202 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 216.218.254.202 peer_refresh_interface: 204.17.205.226->216.218.254.202 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 18.26.4.105 in list of addresses findlocalinterface: kernel maps 18.26.4.105 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 18.26.4.105 peer_refresh_interface: 204.17.205.226->18.26.4.105 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 132.163.4.101 in list of addresses findlocalinterface: kernel maps 132.163.4.101 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 132.163.4.101 peer_refresh_interface: 204.17.205.226->132.163.4.101 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.7 in list of addresses findlocalinterface: kernel maps 204.17.205.7 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.7 peer_refresh_interface: 204.17.205.226->204.17.205.7 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.1 in list of addresses findlocalinterface: kernel maps 204.17.205.1 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.1 peer_refresh_interface: 204.17.205.226->204.17.205.1 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.18 in list of addresses findlocalinterface: kernel maps 204.17.205.18 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.18 peer_refresh_interface: 204.17.205.226->204.17.205.18 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 peer_refresh_interface: 127.0.0.1->127.127.28.1 mode 3 vers 4 poll 6 6 flags 0x29 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 peer_refresh_interface: 127.0.0.1->127.127.28.0 mode 3 vers 4 poll 6 6 flags 0x9 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard peer_refresh_interface: ->0.0.0.0 mode 3 vers 4 poll 6 10 flags 0x101 0x8 ttl 0 key 00000000: new interface: read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993611.231561871 receive: at 27 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993611.237884088 receive: at 27 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993611.244431468 receive: at 27 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993611.250395579 receive: at 27 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993611.256179635 receive: at 27 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993611.269115965 receive: at 27 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) alarming: normal 3 Feb 12:00:11 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993611.282879292 receive: at 28 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993611.295552091 receive: at 28 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993611.307158814 receive: at 28 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993611.318498965 receive: at 28 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:12 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 12:00:13 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993613.344060354 receive: at 30 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993613.350716181 receive: at 30 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993613.356796941 receive: at 30 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993613.362538943 receive: at 30 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993613.368303263 receive: at 30 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993613.381036647 receive: at 30 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993613.393392219 receive: at 30 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993613.406651825 receive: at 30 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993613.416926415 receive: at 30 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993613.428978604 receive: at 30 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:14 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 12:00:15 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993615.455528840 receive: at 32 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993615.462355100 receive: at 32 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993615.467942916 receive: at 32 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993615.473546517 receive: at 32 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993615.479001368 receive: at 32 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993615.491770112 receive: at 32 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993615.503753150 receive: at 32 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993615.516765815 receive: at 32 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993615.528057980 receive: at 32 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993615.539015704 receive: at 32 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:16 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data routing message op = 20: scheduling interface update alarming: normal 3 Feb 12:00:17 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993617.567117884 receive: at 34 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993617.574783951 receive: at 34 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993617.580790840 receive: at 34 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993617.586553192 receive: at 34 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993617.592519150 receive: at 34 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993617.605414307 receive: at 34 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993617.618643437 receive: at 34 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993617.632908872 receive: at 34 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993617.643047985 receive: at 34 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993617.653796982 receive: at 34 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:18 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data timer: interface update update_interfaces(123) examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface lo default loopback listen listen interface lo (127.0.0.1) - by nic rules Searching for addr 127.0.0.1 in list of addresses - FOUND updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: present Dumping interface: 0xc036b0 fd = 18 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 0100007f num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 2 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (204.17.205.226) - by nic rules Searching for addr 204.17.205.226 in list of addresses - FOUND updating interface #3: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: present Dumping interface: 0xc016c0 fd = 19 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = e2cd11cc num_mcast = 0 received = 6 sent = 7 notsent = 0 ifindex = 0 peercnt = 6 phase = 1 examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface lo default loopback listen listen interface lo (::1) - by nic rules Searching for addr ::1 in list of addresses - FOUND updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: present Dumping interface: 0xc03800 fd = 20 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = c84d40cf num_mcast = 0 received = 170 sent = 323 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface enp2s0 default listen listen interface enp2s0 (fe80::d8ca:2adf:82a8:8149%2) - by nic rules Searching for addr fe80::d8ca:2adf:82a8:8149%2 in list of addresses - NOT FOUND create_interface(fe80::d8ca:2adf:82a8:8149%2#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: 3 Feb 12:00:18 ntpd[15698]: bind(26) AF_INET6 fe80::d8ca:2adf:82a8:8149%2#123 flags 0x11 failed: Cannot assign requested address 3 Feb 12:00:18 ntpd[15698]: unable to create socket on enp2s0 (14) for fe80::d8ca:2adf:82a8:8149%2#123 updating interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: new - creation FAILEDDumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 3 Feb 12:00:18 ntpd[15698]: failed to init interface for address fe80::d8ca:2adf:82a8:8149%2 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (2001:470:e815:0:705a:540a:f1d4:edc4) - by nic rules Searching for addr 2001:470:e815:0:705a:540a:f1d4:edc4 in list of addresses - FOUND updating interface #6: fd=21, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: present Dumping interface: 0xc01020 fd = 21 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 12ad7896 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (fe80::b80d:cf4b:d3a4:c720%3) - by nic rules Searching for addr fe80::b80d:cf4b:d3a4:c720%3 in list of addresses - FOUND updating interface #7: fd=22, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: present Dumping interface: 0xc01170 fd = 22 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 64ba6aa9 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 Finding interface for addr 216.218.254.202 in list of addresses findlocalinterface: kernel maps 216.218.254.202 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 216.218.254.202 peer_refresh_interface: 204.17.205.226->216.218.254.202 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 18.26.4.105 in list of addresses findlocalinterface: kernel maps 18.26.4.105 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 18.26.4.105 peer_refresh_interface: 204.17.205.226->18.26.4.105 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 132.163.4.101 in list of addresses findlocalinterface: kernel maps 132.163.4.101 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 132.163.4.101 peer_refresh_interface: 204.17.205.226->132.163.4.101 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.7 in list of addresses findlocalinterface: kernel maps 204.17.205.7 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.7 peer_refresh_interface: 204.17.205.226->204.17.205.7 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.1 in list of addresses findlocalinterface: kernel maps 204.17.205.1 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.1 peer_refresh_interface: 204.17.205.226->204.17.205.1 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.18 in list of addresses findlocalinterface: kernel maps 204.17.205.18 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.18 peer_refresh_interface: 204.17.205.226->204.17.205.18 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 peer_refresh_interface: 127.0.0.1->127.127.28.1 mode 3 vers 4 poll 6 6 flags 0x29 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 peer_refresh_interface: 127.0.0.1->127.127.28.0 mode 3 vers 4 poll 6 6 flags 0x9 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard peer_refresh_interface: ->0.0.0.0 mode 3 vers 4 poll 6 10 flags 0x101 0x8 ttl 0 key 00000000: new interface: alarming: normal 3 Feb 12:00:19 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993619.680265730 receive: at 36 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993619.686605624 receive: at 36 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993619.692552157 receive: at 36 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993619.698696593 receive: at 36 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993619.704501003 receive: at 36 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993619.717602253 receive: at 36 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993619.737428501 receive: at 36 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993619.751722352 receive: at 36 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993619.762006211 receive: at 36 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993619.773307425 receive: at 36 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:20 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 12:00:21 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993621.800405821 receive: at 38 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993621.806740135 receive: at 38 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993621.812595953 receive: at 38 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993621.818358688 receive: at 38 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993621.824131454 receive: at 38 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993621.837053241 receive: at 38 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993621.850956945 receive: at 38 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993621.863439245 receive: at 38 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993621.874838934 receive: at 38 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993621.886354477 receive: at 38 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:22 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data routing message op = 20: scheduling interface update alarming: normal 3 Feb 12:00:23 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993623.913625279 receive: at 40 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993623.920792857 receive: at 40 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993623.926673515 receive: at 40 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993623.932496508 receive: at 40 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993623.938397151 receive: at 40 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993623.951009528 receive: at 40 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993623.963267904 receive: at 40 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993623.976109393 receive: at 40 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993623.987515622 receive: at 40 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993623.998545313 receive: at 40 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:24 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data timer: interface update update_interfaces(123) examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface lo default loopback listen listen interface lo (127.0.0.1) - by nic rules Searching for addr 127.0.0.1 in list of addresses - FOUND updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: present Dumping interface: 0xc036b0 fd = 18 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 0100007f num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 2 phase = 0 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (204.17.205.226) - by nic rules Searching for addr 204.17.205.226 in list of addresses - FOUND updating interface #3: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: present Dumping interface: 0xc016c0 fd = 19 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = e2cd11cc num_mcast = 0 received = 6 sent = 7 notsent = 0 ifindex = 0 peercnt = 6 phase = 0 examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface lo default loopback listen listen interface lo (::1) - by nic rules Searching for addr ::1 in list of addresses - FOUND updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: present Dumping interface: 0xc03800 fd = 20 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = c84d40cf num_mcast = 0 received = 200 sent = 380 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 examining interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface enp2s0 default listen listen interface enp2s0 (fe80::d8ca:2adf:82a8:8149%2) - by nic rules Searching for addr fe80::d8ca:2adf:82a8:8149%2 in list of addresses - NOT FOUND create_interface(fe80::d8ca:2adf:82a8:8149%2#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: 3 Feb 12:00:24 ntpd[15698]: bind(26) AF_INET6 fe80::d8ca:2adf:82a8:8149%2#123 flags 0x11 failed: Cannot assign requested address 3 Feb 12:00:24 ntpd[15698]: unable to create socket on enp2s0 (15) for fe80::d8ca:2adf:82a8:8149%2#123 updating interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: new - creation FAILEDDumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 3 Feb 12:00:24 ntpd[15698]: failed to init interface for address fe80::d8ca:2adf:82a8:8149%2 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (2001:470:e815:0:705a:540a:f1d4:edc4) - by nic rules Searching for addr 2001:470:e815:0:705a:540a:f1d4:edc4 in list of addresses - FOUND updating interface #6: fd=21, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: present Dumping interface: 0xc01020 fd = 21 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 12ad7896 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (fe80::b80d:cf4b:d3a4:c720%3) - by nic rules Searching for addr fe80::b80d:cf4b:d3a4:c720%3 in list of addresses - FOUND updating interface #7: fd=22, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: present Dumping interface: 0xc01170 fd = 22 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 64ba6aa9 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 Finding interface for addr 216.218.254.202 in list of addresses findlocalinterface: kernel maps 216.218.254.202 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 216.218.254.202 peer_refresh_interface: 204.17.205.226->216.218.254.202 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 18.26.4.105 in list of addresses findlocalinterface: kernel maps 18.26.4.105 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 18.26.4.105 peer_refresh_interface: 204.17.205.226->18.26.4.105 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 132.163.4.101 in list of addresses findlocalinterface: kernel maps 132.163.4.101 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 132.163.4.101 peer_refresh_interface: 204.17.205.226->132.163.4.101 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.7 in list of addresses findlocalinterface: kernel maps 204.17.205.7 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.7 peer_refresh_interface: 204.17.205.226->204.17.205.7 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.1 in list of addresses findlocalinterface: kernel maps 204.17.205.1 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.1 peer_refresh_interface: 204.17.205.226->204.17.205.1 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.18 in list of addresses findlocalinterface: kernel maps 204.17.205.18 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.18 peer_refresh_interface: 204.17.205.226->204.17.205.18 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 peer_refresh_interface: 127.0.0.1->127.127.28.1 mode 3 vers 4 poll 6 6 flags 0x29 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 peer_refresh_interface: 127.0.0.1->127.127.28.0 mode 3 vers 4 poll 6 6 flags 0x9 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard peer_refresh_interface: ->0.0.0.0 mode 3 vers 4 poll 6 10 flags 0x101 0x8 ttl 0 key 00000000: new interface: alarming: normal 3 Feb 12:00:25 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data routing message op = 20: scheduling interface update read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993626.023780780 receive: at 42 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993626.030671203 receive: at 42 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993626.036297470 receive: at 42 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993626.041908813 receive: at 42 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993626.047417240 receive: at 42 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993626.059683201 receive: at 42 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993626.072174686 receive: at 42 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993626.085737634 receive: at 42 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993626.097421802 receive: at 42 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993626.109450490 receive: at 42 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:26 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 12:00:27 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data timer: interface update update_interfaces(123) examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface lo default loopback listen listen interface lo (127.0.0.1) - by nic rules Searching for addr 127.0.0.1 in list of addresses - FOUND updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: present Dumping interface: 0xc036b0 fd = 18 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 0100007f num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 2 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (204.17.205.226) - by nic rules Searching for addr 204.17.205.226 in list of addresses - FOUND updating interface #3: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: present Dumping interface: 0xc016c0 fd = 19 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = e2cd11cc num_mcast = 0 received = 6 sent = 7 notsent = 0 ifindex = 0 peercnt = 6 phase = 1 examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface lo default loopback listen listen interface lo (::1) - by nic rules Searching for addr ::1 in list of addresses - FOUND updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: present Dumping interface: 0xc03800 fd = 20 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = c84d40cf num_mcast = 0 received = 210 sent = 399 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface enp2s0 default listen listen interface enp2s0 (fe80::d8ca:2adf:82a8:8149%2) - by nic rules Searching for addr fe80::d8ca:2adf:82a8:8149%2 in list of addresses - NOT FOUND create_interface(fe80::d8ca:2adf:82a8:8149%2#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: 3 Feb 12:00:27 ntpd[15698]: bind(26) AF_INET6 fe80::d8ca:2adf:82a8:8149%2#123 flags 0x11 failed: Cannot assign requested address 3 Feb 12:00:27 ntpd[15698]: unable to create socket on enp2s0 (16) for fe80::d8ca:2adf:82a8:8149%2#123 updating interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: new - creation FAILEDDumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 3 Feb 12:00:27 ntpd[15698]: failed to init interface for address fe80::d8ca:2adf:82a8:8149%2 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (2001:470:e815:0:705a:540a:f1d4:edc4) - by nic rules Searching for addr 2001:470:e815:0:705a:540a:f1d4:edc4 in list of addresses - FOUND updating interface #6: fd=21, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: present Dumping interface: 0xc01020 fd = 21 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 12ad7896 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (fe80::b80d:cf4b:d3a4:c720%3) - by nic rules Searching for addr fe80::b80d:cf4b:d3a4:c720%3 in list of addresses - FOUND updating interface #7: fd=22, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: present Dumping interface: 0xc01170 fd = 22 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 64ba6aa9 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 Finding interface for addr 216.218.254.202 in list of addresses findlocalinterface: kernel maps 216.218.254.202 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 216.218.254.202 peer_refresh_interface: 204.17.205.226->216.218.254.202 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 18.26.4.105 in list of addresses findlocalinterface: kernel maps 18.26.4.105 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 18.26.4.105 peer_refresh_interface: 204.17.205.226->18.26.4.105 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 132.163.4.101 in list of addresses findlocalinterface: kernel maps 132.163.4.101 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 132.163.4.101 peer_refresh_interface: 204.17.205.226->132.163.4.101 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.7 in list of addresses findlocalinterface: kernel maps 204.17.205.7 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.7 peer_refresh_interface: 204.17.205.226->204.17.205.7 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.1 in list of addresses findlocalinterface: kernel maps 204.17.205.1 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.1 peer_refresh_interface: 204.17.205.226->204.17.205.1 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.18 in list of addresses findlocalinterface: kernel maps 204.17.205.18 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.18 peer_refresh_interface: 204.17.205.226->204.17.205.18 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 peer_refresh_interface: 127.0.0.1->127.127.28.1 mode 3 vers 4 poll 6 6 flags 0x29 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 peer_refresh_interface: 127.0.0.1->127.127.28.0 mode 3 vers 4 poll 6 6 flags 0x9 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard peer_refresh_interface: ->0.0.0.0 mode 3 vers 4 poll 6 10 flags 0x101 0x8 ttl 0 key 00000000: new interface: read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993628.138825520 receive: at 44 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993628.145464900 receive: at 44 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993628.151719065 receive: at 44 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993628.158566854 receive: at 44 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993628.164769832 receive: at 44 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993628.177927864 receive: at 44 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993628.190055524 receive: at 44 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993628.202087204 receive: at 44 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993628.212113495 receive: at 44 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993628.222084431 receive: at 44 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:28 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 12:00:29 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993630.249405152 receive: at 46 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993630.255435691 receive: at 46 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993630.261027951 receive: at 46 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993630.266645032 receive: at 46 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993630.272036454 receive: at 46 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) alarming: normal 3 Feb 12:00:30 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993630.284444195 receive: at 47 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993630.298156519 receive: at 47 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993630.312360182 receive: at 47 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993630.322030614 receive: at 47 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993630.332896839 receive: at 47 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:31 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 12:00:32 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993632.360603737 receive: at 49 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993632.367488499 receive: at 49 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993632.373599842 receive: at 49 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993632.379488708 receive: at 49 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993632.385267794 receive: at 49 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993632.397938945 receive: at 49 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993632.412775707 receive: at 49 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993632.425919371 receive: at 49 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993632.437333291 receive: at 49 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993632.448588704 receive: at 49 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:33 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 12:00:34 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993634.488562451 receive: at 51 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993634.494844617 receive: at 51 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993634.500634082 receive: at 51 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993634.506437025 receive: at 51 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993634.512351825 receive: at 51 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993634.524980716 receive: at 51 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993634.538546378 receive: at 51 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993634.552530716 receive: at 51 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993634.562568130 receive: at 51 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993634.573609010 receive: at 51 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:35 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data routing message op = 20: scheduling interface update alarming: normal 3 Feb 12:00:36 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993636.601059145 receive: at 53 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993636.607418867 receive: at 53 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993636.613552859 receive: at 53 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993636.619382574 receive: at 53 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993636.625243059 receive: at 53 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993636.637953127 receive: at 53 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993636.651960777 receive: at 53 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993636.664745837 receive: at 53 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993636.676151139 receive: at 53 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993636.687276440 receive: at 53 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:37 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data timer: interface update update_interfaces(123) examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface lo default loopback listen listen interface lo (127.0.0.1) - by nic rules Searching for addr 127.0.0.1 in list of addresses - FOUND updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: present Dumping interface: 0xc036b0 fd = 18 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 0100007f num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 2 phase = 0 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (204.17.205.226) - by nic rules Searching for addr 204.17.205.226 in list of addresses - FOUND updating interface #3: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: present Dumping interface: 0xc016c0 fd = 19 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = e2cd11cc num_mcast = 0 received = 6 sent = 7 notsent = 0 ifindex = 0 peercnt = 6 phase = 0 examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface lo default loopback listen listen interface lo (::1) - by nic rules Searching for addr ::1 in list of addresses - FOUND updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: present Dumping interface: 0xc03800 fd = 20 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = c84d40cf num_mcast = 0 received = 260 sent = 494 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 examining interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface enp2s0 default listen listen interface enp2s0 (fe80::d8ca:2adf:82a8:8149%2) - by nic rules Searching for addr fe80::d8ca:2adf:82a8:8149%2 in list of addresses - NOT FOUND create_interface(fe80::d8ca:2adf:82a8:8149%2#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: 3 Feb 12:00:37 ntpd[15698]: bind(26) AF_INET6 fe80::d8ca:2adf:82a8:8149%2#123 flags 0x11 failed: Cannot assign requested address 3 Feb 12:00:37 ntpd[15698]: unable to create socket on enp2s0 (17) for fe80::d8ca:2adf:82a8:8149%2#123 updating interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: new - creation FAILEDDumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 3 Feb 12:00:37 ntpd[15698]: failed to init interface for address fe80::d8ca:2adf:82a8:8149%2 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (2001:470:e815:0:705a:540a:f1d4:edc4) - by nic rules Searching for addr 2001:470:e815:0:705a:540a:f1d4:edc4 in list of addresses - FOUND updating interface #6: fd=21, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: present Dumping interface: 0xc01020 fd = 21 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 12ad7896 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (fe80::b80d:cf4b:d3a4:c720%3) - by nic rules Searching for addr fe80::b80d:cf4b:d3a4:c720%3 in list of addresses - FOUND updating interface #7: fd=22, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: present Dumping interface: 0xc01170 fd = 22 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 64ba6aa9 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 Finding interface for addr 216.218.254.202 in list of addresses findlocalinterface: kernel maps 216.218.254.202 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 216.218.254.202 peer_refresh_interface: 204.17.205.226->216.218.254.202 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 18.26.4.105 in list of addresses findlocalinterface: kernel maps 18.26.4.105 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 18.26.4.105 peer_refresh_interface: 204.17.205.226->18.26.4.105 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 132.163.4.101 in list of addresses findlocalinterface: kernel maps 132.163.4.101 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 132.163.4.101 peer_refresh_interface: 204.17.205.226->132.163.4.101 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.7 in list of addresses findlocalinterface: kernel maps 204.17.205.7 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.7 peer_refresh_interface: 204.17.205.226->204.17.205.7 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.1 in list of addresses findlocalinterface: kernel maps 204.17.205.1 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.1 peer_refresh_interface: 204.17.205.226->204.17.205.1 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.18 in list of addresses findlocalinterface: kernel maps 204.17.205.18 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.18 peer_refresh_interface: 204.17.205.226->204.17.205.18 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 peer_refresh_interface: 127.0.0.1->127.127.28.1 mode 3 vers 4 poll 6 6 flags 0x29 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 peer_refresh_interface: 127.0.0.1->127.127.28.0 mode 3 vers 4 poll 6 6 flags 0x9 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard peer_refresh_interface: ->0.0.0.0 mode 3 vers 4 poll 6 10 flags 0x101 0x8 ttl 0 key 00000000: new interface: alarming: normal 3 Feb 12:00:38 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993638.716728076 receive: at 55 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993638.723704312 receive: at 55 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993638.729466503 receive: at 55 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993638.735163941 receive: at 55 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993638.740792933 receive: at 55 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993638.753491337 receive: at 55 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993638.766409246 receive: at 55 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993638.780410745 receive: at 55 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993638.790174478 receive: at 55 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993638.801119935 receive: at 55 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) alarming: normal 3 Feb 12:00:39 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 12:00:40 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993640.828975258 receive: at 57 ::1<-::1 flags 5 restrict 000 in process_control() opcode 1, found command handler read_status: ID 0 sendpkt(20, dst=::1, src=::1, ttl=-6, len=48) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993640.835288613 receive: at 57 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993640.841717183 receive: at 57 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993640.847830880 receive: at 57 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=92) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993640.853715640 receive: at 57 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993640.866636901 receive: at 57 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993640.880214702 receive: at 57 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=120) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993640.892266742 receive: at 57 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993640.902238803 receive: at 57 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=116) read_network_packet: fd=20 length 12 from ::1 Got an IPv6 packet, from <::1> (1) to <::1> (0) processing that packet fetch_timestamp: system nsec network time stamp: 1422993640.913394121 receive: at 57 ::1<-::1 flags 5 restrict 000 in process_control() opcode 2, found command handler sendpkt(20, dst=::1, src=::1, ttl=-6, len=480) sendpkt(20, dst=::1, src=::1, ttl=-6, len=112) routing message op = 24: scheduling interface update alarming: normal 3 Feb 12:00:41 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data alarming: normal 3 Feb 12:00:42 ntpd[15698]: select(): nfound=-1, error: Interrupted system call SHM(1): SHM type 1 sample SHM(1): SHM feeding data SHM(0): SHM type 1 sample SHM(0): SHM feeding data timer: interface update update_interfaces(123) examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface lo default loopback listen listen interface lo (127.0.0.1) - by nic rules Searching for addr 127.0.0.1 in list of addresses - FOUND updating interface #2: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0, Enabled: present Dumping interface: 0xc036b0 fd = 18 bfd = -1 sin = 127.0.0.1, 0200007b 7f000001 00000000 00000000 00000000 00000000 00000000 bcast = 0.0.0.0, 0200007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = 255.0.0.0, 0200007b ff000000 00000000 00000000 00000000 00000000 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 0100007f num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 2 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (204.17.205.226) - by nic rules Searching for addr 204.17.205.226 in list of addresses - FOUND updating interface #3: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0, Enabled: present Dumping interface: 0xc016c0 fd = 19 bfd = -1 sin = 204.17.205.226, 0200007b cc11cde2 00000000 00000000 00000000 00000000 00000000 bcast = 204.17.205.255, 0200007b cc11cdff 00000000 00000000 00000000 00000000 00000000 mask = 255.255.255.0, 0200007b ffffff00 00000000 00000000 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000019 last_ttl = 0 addr_refid = e2cd11cc num_mcast = 0 received = 6 sent = 7 notsent = 0 ifindex = 0 peercnt = 6 phase = 1 examining interface #0: fd=-1, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface lo default loopback listen listen interface lo (::1) - by nic rules Searching for addr ::1 in list of addresses - FOUND updating interface #4: fd=20, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=::1, Enabled: present Dumping interface: 0xc03800 fd = 20 bfd = -1 sin = ::1, 0a00007b 00000000 00000000 00000000 00000000 00000001 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff, 0a00007b 00000000 ffffffff ffffffff ffffffff ffffffff 00000000 name = lo flags = 0x00000005 last_ttl = 0 addr_refid = c84d40cf num_mcast = 0 received = 280 sent = 532 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface enp2s0 default listen listen interface enp2s0 (fe80::d8ca:2adf:82a8:8149%2) - by nic rules Searching for addr fe80::d8ca:2adf:82a8:8149%2 in list of addresses - NOT FOUND create_interface(fe80::d8ca:2adf:82a8:8149%2#123) set SO_REUSEADDR to on on :: set SO_REUSEADDR to off on :: 3 Feb 12:00:42 ntpd[15698]: bind(26) AF_INET6 fe80::d8ca:2adf:82a8:8149%2#123 flags 0x11 failed: Cannot assign requested address 3 Feb 12:00:42 ntpd[15698]: unable to create socket on enp2s0 (18) for fe80::d8ca:2adf:82a8:8149%2#123 updating interface #0: fd=-1, bfd=-1, name=enp2s0, flags=0x11, ifindex=0, sin=fe80::d8ca:2adf:82a8:8149%2, Enabled: new - creation FAILEDDumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::d8ca:2adf:82a8:8149%2, 0a00007b 00000000 fe800000 00000000 d8ca2adf 82a88149 02000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = enp2s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 3 Feb 12:00:42 ntpd[15698]: failed to init interface for address fe80::d8ca:2adf:82a8:8149%2 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (2001:470:e815:0:705a:540a:f1d4:edc4) - by nic rules Searching for addr 2001:470:e815:0:705a:540a:f1d4:edc4 in list of addresses - FOUND updating interface #6: fd=21, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=2001:470:e815:0:705a:540a:f1d4:edc4, Enabled: present Dumping interface: 0xc01020 fd = 21 bfd = -1 sin = 2001:470:e815:0:705a:540a:f1d4:edc4, 0a00007b 00000000 20010470 e8150000 705a540a f1d4edc4 00000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 12ad7896 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 examining interface #0: fd=-1, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: Dumping interface: 0x7fff1978c370 fd = -1 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 00000000 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 0 interface_action: interface wlp1s0 default listen listen interface wlp1s0 (fe80::b80d:cf4b:d3a4:c720%3) - by nic rules Searching for addr fe80::b80d:cf4b:d3a4:c720%3 in list of addresses - FOUND updating interface #7: fd=22, bfd=-1, name=wlp1s0, flags=0x11, ifindex=0, sin=fe80::b80d:cf4b:d3a4:c720%3, Enabled: present Dumping interface: 0xc01170 fd = 22 bfd = -1 sin = fe80::b80d:cf4b:d3a4:c720%3, 0a00007b 00000000 fe800000 00000000 b80dcf4b d3a4c720 03000000 bcast = ::, 0a00007b 00000000 00000000 00000000 00000000 00000000 00000000 mask = ffff:ffff:ffff:ffff::, 0a00007b 00000000 ffffffff ffffffff 00000000 00000000 00000000 name = wlp1s0 flags = 0x00000011 last_ttl = 0 addr_refid = 64ba6aa9 num_mcast = 0 received = 0 sent = 0 notsent = 0 ifindex = 0 peercnt = 0 phase = 1 Finding interface for addr 216.218.254.202 in list of addresses findlocalinterface: kernel maps 216.218.254.202 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 216.218.254.202 peer_refresh_interface: 204.17.205.226->216.218.254.202 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 18.26.4.105 in list of addresses findlocalinterface: kernel maps 18.26.4.105 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 18.26.4.105 peer_refresh_interface: 204.17.205.226->18.26.4.105 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 132.163.4.101 in list of addresses findlocalinterface: kernel maps 132.163.4.101 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 132.163.4.101 peer_refresh_interface: 204.17.205.226->132.163.4.101 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.7 in list of addresses findlocalinterface: kernel maps 204.17.205.7 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.7 peer_refresh_interface: 204.17.205.226->204.17.205.7 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.1 in list of addresses findlocalinterface: kernel maps 204.17.205.1 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.1 peer_refresh_interface: 204.17.205.226->204.17.205.1 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 Finding interface for addr 204.17.205.18 in list of addresses findlocalinterface: kernel maps 204.17.205.18 to 204.17.205.226 Searching for addr 204.17.205.226 in list of addresses - FOUND Found interface #3 wlp1s0 for address 204.17.205.18 peer_refresh_interface: 204.17.205.226->204.17.205.18 mode 3 vers 4 poll 6 10 flags 0x1 0x1 ttl 0 key 00000000: new interface: fd=19, bfd=-1, name=wlp1s0, flags=0x19, ifindex=0, sin=204.17.205.226, bcast=204.17.205.255, mask=255.255.255.0 peer_refresh_interface: 127.0.0.1->127.127.28.1 mode 3 vers 4 poll 6 6 flags 0x29 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 peer_refresh_interface: 127.0.0.1->127.127.28.0 mode 3 vers 4 poll 6 6 flags 0x9 0x1 ttl 0 key 00000000: new interface: fd=18, bfd=-1, name=lo, flags=0x5, ifindex=0, sin=127.0.0.1, mask=255.0.0.0 Finding interface for addr 0.0.0.0 in list of addresses Found no interface for address 0.0.0.0 - returning wildcard peer_refresh_interface: ->0.0.0.0 mode 3 vers 4 poll 6 10 flags 0x101 0x8 ttl 0 key 00000000: new interface: 3 Feb 12:00:42 ntpd[15698]: ntpd exiting on signal 2 (Interrupt) event at 59 0.0.0.0 041d 0d kern kernel time sync disabled filegen_unregister(peerstats) filegen_unregister(loopstats) filegen_unregister(clockstats) filegen_unregister(rawstats) filegen_unregister(sysstats) filegen_unregister(protostats) filegen_unregister(cryptostats)