HEAD was broken - ntpq -p kills it
Hal Murray
hmurray at megapathdsl.net
Mon Dec 14 10:25:46 UTC 2015
I just pushed a hack fix.
Program received signal SIGSEGV, Segmentation fault.
0x000000000041e957 in packet_dump ()
Missing separate debuginfos, use: dnf debuginfo-install
libattr-2.4.47-14.fc23.x86_64 libcap-2.24-8.fc23.x86_64
libgcc-5.3.1-2.fc23.x86_64 openssl-libs-1.0.2e-3.fc23.x86_64
zlib-1.2.8-9.fc23.x86_64
(gdb) bt
#0 0x000000000041e957 in packet_dump ()
#1 0x000000000041eb20 in intercept_receive ()
#2 0x000000000041375f in mainloop ()
#3 0x000000000041367b in ntpdmain ()
#4 0x0000000000412879 in main ()
Looks like it's dumping a packet before it has been received. I assume
things like length are uninitalized.
intercept_sendpkt dumps in non-capture mode, but that doesn't die, just clutters up the screen if you are running -n from gdb.
--
These are my opinions. I hate spam.
More information about the devel
mailing list