NOTE: Please Cc: all replies, I'm not subscribed, but willing to test
patches or dig out further information.

While trying to debug an NFS issue between FreeBSD 4.2-STABLE and Linux,
I ran tcpdump 3.6.1 on Linux 2.2.18, after some packets, it printed out
large amounts of binary data and finally dumped core after catching
SIGSEGV.

Here's the backtrace:
#0  fn_printn (s=0x815e08a "", n=1701670241, ep=0x0) at ./util.c:103
103                     c = *s++;
(gdb) bt
#0  fn_printn (s=0x815e08a "", n=1701670241, ep=0x0) at ./util.c:103
#1  0x8053e85 in parsefn (dp=0x815e086) at ./print-nfs.c:428
#2  0x8053eec in parsefhn (dp=0x815e062, v3=1) at ./print-nfs.c:448
#3  0x805405e in nfsreq_print (bp=0x815e012 "<T|$", length=124, 
    bp2=0x815dff6 "E") at ./print-nfs.c:509
#4  0x805e730 in udp_print (bp=0x815e00a "\003ú\b\001", length=124, 
    bp2=0x815dff6 "E", fragmented=0) at ./print-udp.c:547
#5  0x8051a2f in ip_print (bp=0x815dff6 "E", length=152) at ./print-ip.c:370
#6  0x804f662 in ether_encap_print (ethertype=2048, p=0x815dff6 "E", 
    length=152, caplen=152, extracted_ethertype=0xbffff41a)
    at ./print-ether.c:164
#7  0x804f48c in ether_if_print (user=0x0, h=0xbffff468, p=0x815dff6 "E")
    at ./print-ether.c:128
#8  0x8078e07 in pcap_read_packet ()
#9  0x8078c4e in pcap_read ()
#10 0x8079c1c in pcap_loop ()
#11 0x804a0f3 in main (argc=7, argv=0xbffff694) at ./tcpdump.c:429

frame #0 locals:
s = (u_char *) 0x817b000 <Address 0x817b000 out of bounds>
n = 1701551594
ret = 1
c = 64 '@'

frame #1 locals: (might not be too useful, though len looks strange to
me, who does not understand anything of tcpdump internals)
dp = (u_int32_t *) 0x6d834dee
len = 1701670241
cp = (u_char *) 0x815e08a ""



-- 
Matthias Andree

-
This is the TCPDUMP workers list. It is archived at
http://www.tcpdump.org/lists/workers/index.html
To unsubscribe use mailto:[EMAIL PROTECTED]?body=unsubscribe

Reply via email to