Nmap Development mailing list archives

Re: nmap core dumps on FreeBSD/ARM 8.1


From: David Fifield <david () bamsoftware com>
Date: Fri, 12 Nov 2010 18:54:05 -0800

On Tue, Nov 02, 2010 at 06:13:08PM +0100, Florian Klemenz wrote:
Hello Luis,

Here is the debug output:

# nmap 192.168.1.1 -d9

Starting Nmap 5.35DC1 ( http://nmap.org ) at 2010-11-02 18:07 CET
Fetchfile found /usr/local/share/nmap/nmap-services
PORTS: Using top 1000 ports found open (TCP:1000, UDP:0, SCTP:0)
The max # of sockets we are using is: 0
--------------- Timing report ---------------
  hostgroups: min 1, max 100000
  rtt-timeouts: init 1000, min 100, max 10000
  max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
  parallelism: min 0, max 0
  max-retries: 10, host-timeout: 0
  min-rate: 0, max-rate: 0
---------------------------------------------
doing 0.0.0.0 = 192.168.1.1
Fetchfile found /usr/local/share/nmap/nmap-payloads
Initiating ARP Ping Scan at 18:07
Scanning 192.168.1.1 [1 port]
Packet capture filter (device mge0): arp and arp[18:4] = 0x0010751A
and arp[22:2] = 0xC801
Bus error (core dumped)

# nping 192.168.1.1 -d9
Nping will send packets at raw IP level

Starting Nping 0.5.35DC1 ( http://nmap.org/nping ) at 2010-11-02 18:07 CET
Resolving specified targets...
+-----------------TARGET-----------------+
Device Name:            mge0
Device FullName:        mge0
Device Type:            Ethernet
Directly connected?:    yes
Address family:         AF_INET
Resolved Hostname:
Supplied Hostname:      (null)
Target Address:         192.168.1.1
Source Address:         192.168.1.4
Next Hop Address:       192.168.1.1
Target MAC Address:     00:00:00:00:00:00
Source MAC Address:     00:10:75:c8:c8:01
Next Hop MAC Address:   00:00:00:00:00:00
1 target IP address determined.
Next target returned by getNextTarget(): Targets[0/1] --> 192.168.1.1

Blocking packets sent from current address 192.168.1.4 in BFP filter
BPF-filter: (not src host 192.168.1.4 and dst host 192.168.1.4) and
((icmp and icmp[icmptype] = 0) or (icmp and (icmp[icmptype] = 3 or
icmp[icmptype] = 4 or icmp[icmptype] = 5 or icmp[icmptype] = 11 or
icmp[icmptype] = 12)) )
Opening pcap device mge0
NSOCK (0.0000s) PCAP requested on device 'mge0' with berkeley filter
'(not src host 192.168.1.4 and dst host 192.168.1.4) and ((icmp and
icmp[icmptype] = 0) or (icmp and (icmp[icmptype] = 3 or icmp[icmptype]
= 4 or icmp[icmptype] = 5 or icmp[icmptype] = 11 or icmp[icmptype] =
12)) )' (promisc=0 snaplen=8192 to_ms=357913941) (IOD #1)
NSOCK (0.0000s) PCAP created successfully on device 'mge0'
(pcap_desc=5 bsd_hack=1 to_valid=1 l3_offset=14) (IOD #1)
Pcap device mge0 open successfully
Next target returned by getNextTarget(): Targets[0/1] --> 192.168.1.1

fillPacket(target=0x2052d200, port=0, buff=0xbffe7495, bufflen=65535,
filledlen=0xbfffe728 rawfd=3)
fillPacketICMP(target=0x2052d200, buff=0xbffe7495, bufflen=65535,
filledlen=0xbffe743c)
Bus error (core dumped)

Please send me the core file and executable.

Also it will help a lot if you can try previous releases and see if any
or all of them have the same problem.

http://nmap.org/dist-old/nmap-4.20.tgz
http://nmap.org/dist-old/nmap-4.65.tgz
http://nmap.org/dist-old/nmap-4.76.tgz
http://nmap.org/dist/nmap-5.00.tgz
http://nmap.org/dist/nmap-5.21.tgz

David Fifield
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: