Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 18 Nov 2001 08:30:02 -0800 (PST)
From:      Ian Dowse <iedowse@maths.tcd.ie>
To:        freebsd-bugs@FreeBSD.org
Subject:   Re: bin/22737: syslog gets spammed with /kernel: arp_rtrequest: bad gateway value
Message-ID:  <200111181630.fAIGU2226737@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR bin/22737; it has been noted by GNATS.

From: Ian Dowse <iedowse@maths.tcd.ie>
To: freebsd-gnats-submit@freebsd.org
Cc:  
Subject: Re: bin/22737: syslog gets spammed with /kernel: arp_rtrequest: bad gateway value
Date: Sun, 18 Nov 2001 16:26:03 +0000

 Adding this to the audit trail.
 
 ------- Forwarded Message
 
 Date: Sun, 18 Nov 2001 16:30:17 +0100
 From: Daniel Lang <dl@leo.org>
 To: iedowse@FreeBSD.org
 Cc: langd@leo.org, freebsd-bugs@FreeBSD.org
 Subject: Re: bin/22737: syslog gets spammed with /kernel: arp_rtrequest: bad gateway value
 Message-ID: <20011118163017.A55510@atrbg11.informatik.tu-muenchen.de>
 References: <200111180024.fAI0OGd46920@freefall.freebsd.org>
 
 Dear Ian,
 
 iedowse@FreeBSD.org wrote on Sat, Nov 17, 2001 at 04:24:16PM -0800:
 > Synopsis: syslog gets spammed with /kernel: arp_rtrequest: bad gateway value
 [..]
 > Does this problem still exist?
 > 
 > http://www.FreeBSD.org/cgi/query-pr.cgi?pr=22737
 
 apparently yes, I do not use dynamic routing any more, but
 I just checked by starting routed. The entry in the syslog
 appeared almost immediately:
 
 /var/log/messages:
 [..]
 Nov 18 16:19:19 atleo2 /kernel: arp_rtrequest: bad gateway value
 [..]
 
 uname -a:
 FreeBSD atleo2.leo.org 4.4-STABLE FreeBSD 4.4-STABLE #3: Fri Oct 12 20:46:54 CEST 2001     root@atleo2.leo.org:/usr/obj/usr/src/sys/ATLEO2  i386
 
 ifconfig xl0:
 
 xl0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
         inet 131.159.72.4 netmask 0xfffffe00 broadcast 131.159.73.255
         inet6 fe80::2a0:24ff:fe45:e715%xl0 prefixlen 64 scopeid 0x1 
         inet 131.159.72.16 netmask 0xffffffff broadcast 131.159.72.16
         inet 131.159.72.17 netmask 0xffffffff broadcast 131.159.72.17
         inet 131.159.72.18 netmask 0xffffffff broadcast 131.159.72.18
         inet 131.159.72.10 netmask 0xffffffff broadcast 131.159.72.10
         inet 131.159.72.21 netmask 0xffffffff broadcast 131.159.72.21
         inet 131.159.72.25 netmask 0xffffffff broadcast 131.159.72.25
         inet 131.159.72.5 netmask 0xffffffff broadcast 131.159.72.5
         inet 131.159.72.11 netmask 0xffffffff broadcast 131.159.72.11
         inet 131.159.72.19 netmask 0xffffffff broadcast 131.159.72.19
         inet 131.159.72.1 netmask 0xffffffff broadcast 131.159.72.1
         inet 131.159.72.31 netmask 0xffffffff broadcast 131.159.72.31
         inet 131.159.72.32 netmask 0xffffffff broadcast 131.159.72.32
         inet 131.159.72.24 netmask 0xffffffff broadcast 131.159.72.24
         inet 131.159.72.27 netmask 0xffffffff broadcast 131.159.72.27
         ether 00:a0:24:45:e7:15 
         media: Ethernet autoselect (100baseTX <full-duplex>)
         status: active
 
 If you need more info, let me know.
 
 Best regards,
  Daniel
 - -- 
 IRCnet: Mr-Spock     - Cool people don't move, they just hang around. -  
 Daniel Lang * dl@leo.org * ++49 89 289 25735  * http://www.leo.org/~dl/
 
 To Unsubscribe: send mail to majordomo@FreeBSD.org
 with "unsubscribe freebsd-bugs" in the body of the message
 
 ------- End of Forwarded Message
 

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200111181630.fAIGU2226737>