SUMMARY (updated): Displaying packets from a snoop capture file r esults in a segment ation fault

From: eSolutions, Techlist <eSolutionsT_at_misys.com>
Date: Fri Nov 08 2002 - 00:50:10 EST
I think I've solved the problem of the segmentation fault in snoop -i
snoop-capture-file (see further down the mail for the original post) - the
person who sent me the snoop capture file had included it in a tar file
which they had ftp'ed in ascii mode from their server. Ftp'ing the file in
binary mode eradicated the segmentation fault which occurred after a number
of packets had been read.

James

-----Original Message-----
From: eSolutions, Techlist [mailto:eSolutionsT@misys.com]
Sent: 30 October 2002 15:37
To: 'sunmanagers@sunmanagers.org'
Subject: SUMMARY: Displaying packets from a snoop capture file results
in a segment ation fault


Just one response on this problem (below) and that was from Dennis Martens.
Dennis recommended dropping the -o option when running snoop and just piping
the output to a plain ascii file i.e. snoop -whatever_options > file.
Straightforward and simple! So, thanks to Dennis for that.

Part of me is still curious about the segmentation fault, while another part
is embarassed about not using something like the suggestion above originally
and the remainder is busy trying to solve the problem that got me using
snoop! :-)

Cheers

James


-----Original Message-----
From: eSolutions, Techlist [mailto:eSolutionsT@misys.com]
Sent: 29 October 2002 12:24
To: 'sunmanagers@sunmanagers.org'
Subject: Displaying packets from a snoop capture file results in a
segment ation fault


Hi everyone,

I'm trying to investigate a problem by using snoop to capture the packets
exchanged with a particular host. We have a capture file which is about 1Mb
and when I use:
 snoop -i snoop-capture-file -t a | more  OR
 snoop -i snoop-capture-file | more OR
 snoop -i snoop-capture-file tcp | more
 I'm getting a segmenation fault (I've tried several other combinations of
options for snoop). As far as I can see this is happening at/after a
specific packet each time (47 if you think there's a numerological reason)
On some occassions I'm seeing the following output as well as the
segmentation fault message:

offset 11460: length=21504
(warning) packet length greater than MTU in capture file
offset 32964: length=1326079820
(warning) packet length greater than MTU in capture file
Segmentation Fault (core dumped)

I'm assuming because that's a warning it shouldn't be fatal and most likely
isn't part of my segmenation fault issue, but it's in for completeness. I
used truss with my command above and the tail of its output gives me the
following, which is way beyond my ability to interpret.

write(2, " ( w a r n i n g )   p a".., 57)      = 57
    Incurred fault #6, FLTBOUNDS  %pc = 0x000178A8
      siginfo: SIGSEGV SEGV_MAPERR addr=0x3E4AE020
    Received signal #11, SIGSEGV [default]
      siginfo: SIGSEGV SEGV_MAPERR addr=0x3E4AE020
        [** process killed ***

I've looked through the archives and google. All I can see are similar
problems going back a few years which recognise that there is an issue when
you use an keyword on the snoop command line that maps to an ethertype (UDP
and TCP should work fine, hence the 3rd command I used in testing this).

If anyone has any suggestions or can help in anyway, I'd appreciate it.

Thanks

James Gallagher
_______________________________________________
sunmanagers mailing list
sunmanagers@sunmanagers.org
http://www.sunmanagers.org/mailman/listinfo/sunmanagers
_______________________________________________
sunmanagers mailing list
sunmanagers@sunmanagers.org
http://www.sunmanagers.org/mailman/listinfo/sunmanagers
_______________________________________________
sunmanagers mailing list
sunmanagers@sunmanagers.org
http://www.sunmanagers.org/mailman/listinfo/sunmanagers
Received on Fri Nov 8 00:59:10 2002

This archive was generated by hypermail 2.1.8 : Thu Mar 03 2016 - 06:42:57 EST