Package: ntpdate
Version: 1:4.2.6.p5+dfsg-3.1
Followup-For: Bug #484974

Dear Maintainer,

I also think this is a problem, specially on hosts with a lot of alias
interfaces.

This may possibly be related to
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=647465
and
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649692

I attached a patch to fix it.

Thanks,
~David

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.14-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages ntpdate depends on:
ii  dpkg         1.17.13
ii  libc6        2.19-10
ii  libssl1.0.0  1.0.1i-2
ii  netbase      5.2

Versions of packages ntpdate recommends:
ii  lockfile-progs  0.1.17

ntpdate suggests no packages.

-- no debconf information
--- /etc/network/if-up.d/ntpdate~   2014-09-02 18:01:01.000000000 +0200
+++ /etc/network/if-up.d/ntpdate    2014-09-02 18:50:34.000000000 +0200
@@ -16,6 +16,11 @@
    exit 0
 fi
 
+# Check if an alias interface is being brought up. If so, don't do anything.
+if echo "$IFACE" | grep -q : ; then
+   exit 0
+fi
+
 # Check whether ntpdate was removed but not purged; it's useless to wait for 
 # it in that case.
 if [ ! -x /usr/sbin/ntpdate-debian ] && [ -d /usr/sbin ]; then

Reply via email to