Error Setsockopt Ip_tos 16 Invalid Argument - Sshd
Help Follow Us Facebook Twitter Google + LinkedIn Newsletter Instagram YouTube DirectoryNetwork InfrastructureWAN, Routing and Switching LAN, Switching and Routing Network Management Remote Access Optical Networking Getting Started with LANs IPv6 Integration and Transition EEM Scripting Other Subjects SecurityVPN Security Management Firewalling Intrusion Prevention Systems/IDS AAA, Identity and NAC Physical Security MARS Email Security Web Security Other Subjects Service ProvidersMetro MPLS Voice Over IP XR OS and Platforms Video Other Subjects Collaboration, Voice and VideoIP Telephony Video Over IP Jabber Clients Unified Communications Applications TelePresence Digital Media System Contact Center Conferencing UC Migrations Other Subjects Wireless - MobilitySecurity and Network Management Wireless IP Voice and Video Getting Started with Wireless WLCCA Other Subjects ServicesCisco ServiceGrid Connected Analytics Smart Call Home Smart Net Total Care Operations Exchange Mobile ApplicationsCisco Proximity Cisco Technical Support Online Tools and ResourcesCisco Bug Discussions Technical Documentation Ideas Cisco CLI Analyzer Support Community Help Data CenterApplication Centric Infrastructure Application Networking Intelligent Automation Server Networking Storage Networking Unified Computing Wide Area Application Services (WAAS) Other Subjects Small BusinessNetwork Storage Routers Security Surveillance Switches Voice and Conferencing Wireless Solutions and ArchitecturesBorderless Networks Collaboration Cisco User GroupsSeattle Cisco User Group (SEACUG) Silicon Valley Cisco User Group (SVCUG) Southern California Cisco User Group (SCCUG) Cisco Certifications Cisco.com Idea Center Cisco Cafe Expert CornerTop Contributors Leaderboards Cisco Live! Events Events Community CornerAwards & Recognition Behind the Scenes Feedback Forum Cisco Certifications Cisco Press Café Cisco On Demand Supp
Cisco Bug: CSCue13430 - error: setsockopt IP_TOS 16: Invalid argument: - sshd Last Modified Oct 07, 2014 Product Cisco Nexus 4000 Series Switches Known Affected Releases 4.1(2)E1(1j) Description (partial) Symptom: seeing following message in syslog: <
openssh-client: portforwarding with either -R or -L fails with module tun loaded From: Lars Bahner
here for a quick overview of the site Help Center Detailed answers to any questions you might have Meta Discuss the workings and policies of this site About Us Learn more about Stack Overflow the company Business Learn more about hiring developers or posting ads with us Stack Overflow Questions Jobs Documentation Tags Users Badges Ask Question x Dismiss Join the Stack Overflow Community Stack Overflow is a community of 4.7 million programmers, just like you, helping each other. Join them; it only takes a minute: Sign up Error in setsockopt(): Numerical argument out of domain up vote 3 down vote favorite I have a working code running on a RedHat installed Linux with kernel 2.6.18-194.el5 #1 SMP x86_64. When I moved the code to a newly installed machine with CentOS 6.3 the same code failed with Error assigning socket option: Numerical argument out of domain The kernel version of the latter machine is 2.6.32-279.el6.x86_64 #1 SMP Below is the code of what's both working and failing in the machines, respectively. struct timeval tv; tv.tv_sec = 0; tv.tv_usec = 1500000; if (setsockopt(sockfd, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(struct timeval)) != 0) { LM_ERR("Error assigning socket option: %s", strerror( errno )); return FALSE; } c linux sockets share|improve this question edited Dec 14 '12 at 23:03 asked Dec 14 '12 at 21:49 caruizdiaz 73129 add a comment| 2 Answers 2 active oldest votes up vote 5 down vote accepted Try using tv.tv_sec = 1; tv.tv_usec = 500000; I've seen some implementations not accepting tv_usec above 10^6. Edit: The issue is interesting enough to dig a little bit. Looking for SO_RCVTIMEO in the kernel source code I've found the following piece of code in net/core/sock.c: int sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int optlen) { / ... / switch (optname) { / ... / case SO_RCVTIMEO: ret = sock_set_timeout(&sk->sk_rcvtimeo, optval, optlen); break; / ... / } The beginning of the sock_set_timeout() function indeed contains some range checking: static int sock_set_timeout(long *timeo_p, char __user *optval, int optlen) { struct timeval tv; if (optlen < sizeof(tv)) return -EINVAL; if (copy_from_user(&tv, optval, sizeof(tv)))