This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author anpetral
Recipients anpetral, barry, ned.deily, ronaldoussoren
Date 2018-01-06.18:06:47
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1515262008.03.0.467229070634.issue32502@psf.upfronthosting.co.za>
In-reply-to
Content
Here's the output from my system. This is a Mac Pro with a firewire port. Looks as if the address was picked up from fw0: actually, not lo0. Guess _find_mac just iterates until it hits a matching word for a hw address:

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
	options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP>
	inet 127.0.0.1 netmask 0xff000000 
	inet6 ::1 prefixlen 128 
	inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 
	nd6 options=201<PERFORMNUD,DAD>
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
UHC58: flags=0<> mtu 0
XHC0: flags=0<> mtu 0
UHC90: flags=0<> mtu 0
UHC61: flags=0<> mtu 0
UHC29: flags=0<> mtu 0
UHC26: flags=0<> mtu 0
UHC93: flags=0<> mtu 0
EHC253: flags=0<> mtu 0
EHC250: flags=0<> mtu 0
fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078
	lladdr 70:cd:60:ff:ab:cd:ef:12 
	nd6 options=201<PERFORMNUD,DAD>
	media: autoselect <full-duplex>
	status: inactive
History
Date User Action Args
2018-01-06 18:06:48anpetralsetrecipients: + anpetral, barry, ronaldoussoren, ned.deily
2018-01-06 18:06:48anpetralsetmessageid: <1515262008.03.0.467229070634.issue32502@psf.upfronthosting.co.za>
2018-01-06 18:06:48anpetrallinkissue32502 messages
2018-01-06 18:06:47anpetralcreate