On Fri, Oct 15, 2021 at 08:05:08PM +0200, Otto Moerbeek wrote: [ some cut ]
> > Anything else I can collect. > > You might want to compile and install nsd wit debug symbols info: > > cd /usr/src/usr.sbin/nsd > make -f Makefile.bsd-wrapper obj > make -f Makefile.bsd-wrapper clean > DEBUG=-g make -f Makefile.bsd-wrapper > make -f Makefile.bsd-wrapper install > > > Then: collect a gdb trace from a running process: install gdb from ports, > run > egdb --pid=pidofnsdchild /usr/sbin/nsd > > and wait for the crash. > > But I'm mostly unfamiliar with the nsd code and what has been changed > recently. I's say make sure sthen@ and florian@ see this: move to > bugs@ as I do not know if they read misc@. > > -Otto Hi Otto and Mischa, I'm watching this unfold and I'm trying to convert this packet with tr and sed but I'm having a hard time, getting this to 101 bytes. It would be cool if you could show this packet in a hex dump ie. kdump -X or kdump -x. If you feel this really is a packet of nsd-death then I'd be interested in seeing the hexdump privately. I know how to read some DNS formats but the way it is in the kdump I'm having trouble converting that. Best Regards, -peter > > > > Mischa > > > > > > > > > > -Otto > > > > > > > 91127 nsd CALL > > > > recvfrom(7,0xb2ac85b8000,0x20109,0,0xb2acfa96018,0xb27e485a968) > > > > 91127 nsd GIO fd 7 read 101 bytes > > > > "By\0\0\0\^A\0\0\0\0\0\^A\^A6\^A0\^A1\^A0\^A0\^A0\^A0\^A0\^A0\^A0\^A0\^A0\^A0\^A0\^A0\^A0\^A1\^A0\^A0\^A0\^A4\^A0\^A0\^A1\^A0\^A0\^A0\^A6\^A3\^A0\^Aa\^A2\^Cip6\^Darpa\0\0\f\0\ > > > > \^A\0\0)\^E\M-,\0\0\M^@\0\0\0" > > > > 91127 nsd STRU struct sockaddr { AF_INET, > > > > 141.101.75.185:10029 } > > > > 91127 nsd RET recvfrom 101/0x65 > > > > 91127 nsd PSIG SIGSEGV SIG_DFL code SEGV_MAPERR<1> addr=0x10 > > > > trapno=6 > > > > 36104 nsd STRU struct pollfd [2] { fd=16, events=0x1<POLLIN>, > > > > revents=0<> } { fd=15, events=0x1<POLLIN>, revents=0<> } > > > > 36104 nsd PSIG SIGCHLD caught handler=0xb27e47fa340 mask=0<> >