components/ntp/patches/92-in6.patch
branchs11-update
changeset 3925 49fdcf040780
parent 3923 d19fbc6076b9
child 3931 2c8009f52a2b
--- a/components/ntp/patches/92-in6.patch	Mon Mar 09 03:42:59 2015 -0700
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,38 +0,0 @@
-The bug for this issue is NTP community bug 2707. This patch has been
-submitted to the community. This patch may be removed when NTP is
-upgraded to any version that has bug 2702 fixed in it.
-
---- ntpd/ntp_io.c
-+++ ntpd/ntp_io.c
-@@ -3450,19 +3450,18 @@ read_network_packet(
- 	*/
- 
- 	// temporary hack...
--#ifndef HAVE_SOLARIS_PRIVS
- 	if (AF_INET6 == itf->family) {
- 		DPRINTF(1, ("Got an IPv6 packet, from <%s> (%d) to <%s> (%d)\n",
- 			stoa(&rb->recv_srcadr),
--			IN6_IS_ADDR_LOOPBACK(&rb->recv_srcadr),
-+			IN6_IS_ADDR_LOOPBACK(&rb->recv_srcadr.sa6.sin6_addr),
- 			stoa(&itf->sin),
--			!IN6_IS_ADDR_LOOPBACK(&itf->sin)
-+			!IN6_IS_ADDR_LOOPBACK(&itf->sin.sa6.sin6_addr)
- 			));
- 	}
- 
- 	if (   AF_INET6 == itf->family
--	    && IN6_IS_ADDR_LOOPBACK(&rb->recv_srcadr)
--	    && !IN6_IS_ADDR_LOOPBACK(&itf->sin)
-+	    && IN6_IS_ADDR_LOOPBACK(&rb->recv_srcadr.sa6.sin6_addr)
-+	    && !IN6_IS_ADDR_LOOPBACK(&itf->sin.sa6.sin6_addr)
- 	   ) {
- 		packets_dropped++;
- 		DPRINTF(1, ("DROPPING that packet\n"));
-@@ -3470,7 +3469,6 @@ read_network_packet(
- 		return buflen;
- 	}
- 	DPRINTF(1, ("processing that packet\n"));
--#endif
- 
- 	/*
- 	 * Got one.  Mark how and when it got here,