HEAD was broken - ntpq -p kills it

Hal Murray hmurray at megapathdsl.net
Mon Dec 14 10:25:46 UTC 2015


I just pushed a hack fix.

Program received signal SIGSEGV, Segmentation fault.
0x000000000041e957 in packet_dump ()
Missing separate debuginfos, use: dnf debuginfo-install 
libattr-2.4.47-14.fc23.x86_64 libcap-2.24-8.fc23.x86_64 
libgcc-5.3.1-2.fc23.x86_64 openssl-libs-1.0.2e-3.fc23.x86_64 
zlib-1.2.8-9.fc23.x86_64
(gdb) bt
#0  0x000000000041e957 in packet_dump ()
#1  0x000000000041eb20 in intercept_receive ()
#2  0x000000000041375f in mainloop ()
#3  0x000000000041367b in ntpdmain ()
#4  0x0000000000412879 in main ()

Looks like it's dumping a packet before it has been received.  I assume 
things like length are uninitalized.

intercept_sendpkt dumps in non-capture mode, but that doesn't die, just clutters up the screen if you are running -n from gdb.



-- 
These are my opinions.  I hate spam.





More information about the devel mailing list