Nmap Development mailing list archives
Re: nmap on sparc/linux
From: Tom Duffy <tduffy () sun com>
Date: Mon, 16 Dec 2002 15:10:39 -0800
On Mon, 2002-12-16 at 14:20, Fyodor wrote:
Thanks for all the debug info. I have a few questions: o Do this bus error happen at every execution, or is it an intermittent problem?
happens every time.
o The stack trace you sent involved a crash in the Nmap ping routine. Does it crash when you use -P0? If so, please send a stack trace like the one you sent last time. That can help us determine whether the problem is in Libpcap or the Nmap ping code.
(gdb) set args -P0 deedeed
(gdb) run
Starting program: /root/nmap-3.10ALPHA4/nmap -P0 deedeed
Starting nmap V. 3.10ALPHA4 ( www.insecure.org/nmap/ )
Program received signal SIGBUS, Bus error.
0x0003b354 in bpf_filter (pc=0xd8c18, p=0xd8490 "ÿÿÿÿÿÿ", wirelen=42,
buflen=42) at bpf_filter.c:300
300 continue;
Current language: auto; currently c
(gdb) bt
#0 0x0003b354 in bpf_filter (pc=0xd8c18, p=0xd8490 "ÿÿÿÿÿÿ", wirelen=42,
buflen=42) at bpf_filter.c:300
#1 0x00032ae4 in pcap_read_packet (handle=0xd82f0,
callback=0x33a28 <pcap_oneshot>,
userdata=0xeffb8940 "ïû\211ÀØ\214\v\233ïû\211è") at pcap-linux.c:451
#2 0x00033a74 in pcap_next (p=0xd82f0, h=0xeffb89c0) at pcap.c:112
#3 0x0001d3a4 in readip_pcap(pcap*, unsigned*, long) (pd=0xd82f0,
len=0xeffb8a4c, to_usec=6000000) at tcpip.cc:1385
#4 0x00028e9c in get_syn_results (target=0x8dfd0, scan=0xc23d0,
ss=0xefffb440, pil=0xefffb1b0, portlookup=0xeffbb1b0, pd=0xd82f0,
sequences=0xeffb8ff0, scantype=SYN_SCAN) at scan_engine.cc:367
#5 0x00029e50 in pos_scan(Target*, unsigned short*, int, stype) (
target=0x8dfd0, portarray=0x850ec, numports=1605, scantype=SYN_SCAN)
at scan_engine.cc:986
#6 0x00014dec in nmap_main(int, char**) (argc=3, argv=0x8dfd0) at nmap.cc:861
#7 0x000127e8 in main (argc=3, argv=0xeffffcc4, envp=0xeffffcd4)
at main.cc:169
o If you compile the tcpdump & libpcap from tcpdump.org with the same compiler, does it work for you or crash?
choller tcpdump # tcpdump --version
tcpdump version 3.7.1
libpcap version 0.7
Usage: tcpdump [-adeflnNOpqRStuvxX] [ -c count ] [ -C file_size ]
[ -F file ] [ -i interface ] [ -r file ] [ -s snaplen ]
[ -T type ] [ -w file ] [ -E algo:secret ] [ expression
]
choller tcpdump # tcpdump > /dev/null
tcpdump: listening on eth0
8 packets received by filter
0 packets dropped by kernel
I.E. it works fine.
HTH.
-tduffy
--
YOO-ESS-AYE! YOO-ESS-AYE!
---------------------------------------------------------------------
For help using this (nmap-dev) mailing list, send a blank email to
nmap-dev-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
Current thread:
- nmap on sparc/linux Tom Duffy (Dec 05)
- Re: nmap on sparc/linux Fyodor (Dec 16)
- Re: nmap on sparc/linux Tom Duffy (Dec 16)
- Re: nmap on sparc/linux Matt (Dec 16)
- Re: nmap on sparc/linux Tom Duffy (Dec 16)
- Re: nmap on sparc/linux Tom Duffy (Dec 16)
- Re: nmap on sparc/linux Fyodor (Dec 16)
- <Possible follow-ups>
- Re: nmap on sparc/linux Tom Duffy (Dec 16)
- Re: nmap on sparc/linux Tom Duffy (Dec 16)
- Re: nmap on sparc/linux Fyodor (Dec 16)
- Re: nmap on sparc/linux Tom Duffy (Dec 16)
