Nmap Development mailing list archives
Re: nmap on sparc/linux
From: Tom Duffy <tduffy () sun com>
Date: Mon, 16 Dec 2002 15:10:39 -0800
On Mon, 2002-12-16 at 14:20, Fyodor wrote:
Thanks for all the debug info. I have a few questions: o Do this bus error happen at every execution, or is it an intermittent problem?
happens every time.
o The stack trace you sent involved a crash in the Nmap ping routine. Does it crash when you use -P0? If so, please send a stack trace like the one you sent last time. That can help us determine whether the problem is in Libpcap or the Nmap ping code.
(gdb) set args -P0 deedeed (gdb) run Starting program: /root/nmap-3.10ALPHA4/nmap -P0 deedeed Starting nmap V. 3.10ALPHA4 ( www.insecure.org/nmap/ ) Program received signal SIGBUS, Bus error. 0x0003b354 in bpf_filter (pc=0xd8c18, p=0xd8490 "ÿÿÿÿÿÿ", wirelen=42, buflen=42) at bpf_filter.c:300 300 continue; Current language: auto; currently c (gdb) bt #0 0x0003b354 in bpf_filter (pc=0xd8c18, p=0xd8490 "ÿÿÿÿÿÿ", wirelen=42, buflen=42) at bpf_filter.c:300 #1 0x00032ae4 in pcap_read_packet (handle=0xd82f0, callback=0x33a28 <pcap_oneshot>, userdata=0xeffb8940 "ïû\211ÀØ\214\v\233ïû\211è") at pcap-linux.c:451 #2 0x00033a74 in pcap_next (p=0xd82f0, h=0xeffb89c0) at pcap.c:112 #3 0x0001d3a4 in readip_pcap(pcap*, unsigned*, long) (pd=0xd82f0, len=0xeffb8a4c, to_usec=6000000) at tcpip.cc:1385 #4 0x00028e9c in get_syn_results (target=0x8dfd0, scan=0xc23d0, ss=0xefffb440, pil=0xefffb1b0, portlookup=0xeffbb1b0, pd=0xd82f0, sequences=0xeffb8ff0, scantype=SYN_SCAN) at scan_engine.cc:367 #5 0x00029e50 in pos_scan(Target*, unsigned short*, int, stype) ( target=0x8dfd0, portarray=0x850ec, numports=1605, scantype=SYN_SCAN) at scan_engine.cc:986 #6 0x00014dec in nmap_main(int, char**) (argc=3, argv=0x8dfd0) at nmap.cc:861 #7 0x000127e8 in main (argc=3, argv=0xeffffcc4, envp=0xeffffcd4) at main.cc:169
o If you compile the tcpdump & libpcap from tcpdump.org with the same compiler, does it work for you or crash?
choller tcpdump # tcpdump --version tcpdump version 3.7.1 libpcap version 0.7 Usage: tcpdump [-adeflnNOpqRStuvxX] [ -c count ] [ -C file_size ] [ -F file ] [ -i interface ] [ -r file ] [ -s snaplen ] [ -T type ] [ -w file ] [ -E algo:secret ] [ expression ] choller tcpdump # tcpdump > /dev/null tcpdump: listening on eth0 8 packets received by filter 0 packets dropped by kernel I.E. it works fine. HTH. -tduffy -- YOO-ESS-AYE! YOO-ESS-AYE! --------------------------------------------------------------------- For help using this (nmap-dev) mailing list, send a blank email to nmap-dev-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
Current thread:
- nmap on sparc/linux Tom Duffy (Dec 05)
- Re: nmap on sparc/linux Fyodor (Dec 16)
- Re: nmap on sparc/linux Tom Duffy (Dec 16)
- Re: nmap on sparc/linux Matt (Dec 16)
- Re: nmap on sparc/linux Tom Duffy (Dec 16)
- Re: nmap on sparc/linux Tom Duffy (Dec 16)
- Re: nmap on sparc/linux Fyodor (Dec 16)
- <Possible follow-ups>
- Re: nmap on sparc/linux Tom Duffy (Dec 16)
- Re: nmap on sparc/linux Tom Duffy (Dec 16)
- Re: nmap on sparc/linux Fyodor (Dec 16)
- Re: nmap on sparc/linux Tom Duffy (Dec 16)