These changes avoid some pcap_loop() errors messages like:
"tcpdump: pcap_loop: invalid packet capture length X, bigger than
snaplen of Y"
or
"tcpdump: pcap_loop: truncated dump file; tried to read X captured
bytes, only got Y"
The outputs of the tests are unchanged.
Remove the no more useful -c options in the test configurations.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
The problem was fixed in master branch by commit
09822d484b.
Update the output of the test accordingly.
Update from b35eb4c163
in 4.9 branch.
These are tests for print-smb.c:print_trans().
These capture files triggered a buffer over-read fixed by
50f375f9f1.
The pcap files were updated to avoid pcap_loop() error messages.
Update the output of the tests accordingly.
Update from 4bfd71eee4
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With the new GET_ macros, the problem no longer exists.
Thus no fix needed.
The pcap file was updated to pass the sanity checks and to avoid
pcap_loop() error messages.
Moreover:
Fix an existing length check.
Update the output of the test accordingly.
Partial update from 12f66f69f7
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
and was fixed in the 4.9.3 release.
The problem was fixed in master branch by commit
ad69daa2e4.
Update the output of the test accordingly.
Partial update from 1ccaff3764
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
and was fixed in the 4.9.3 release.
The problem was fixed in master branch by commit
6df4852ec3.
The pcap file was updated to avoid pcap_loop() error messages.
Update the output of the test accordingly.
Partial update from 211124b972
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With a previous fix (3f1c4af001),
the problem no longer exists.
The pcap file was updated to pass the sanity checks and to avoid
pcap_loop() error messages.
Update the output of the test accordingly.
Partial update from 4846b3c5d0
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With a previous update (511915bef7),
the problem no longer exists.
Thus no fix needed.
The pcap file was renamed from pcapng to pcap because it is.
Update the output of the test accordingly.
Partial update from 83a412a527
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With some previous updates, the problem no longer exists.
Thus no fix needed.
The pcap file was updated to pass the sanity checks and to avoid
pcap_loop() error messages.
Update the output of the test accordingly.
Partial update from 13d52e9c0e
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With the new GET_ macros, the problem no longer exists.
Thus no fix needed.
The pcap file was updated to avoid pcap_loop() error messages.
It was rename from pcapng to pcap because it is.
Update the output of the test accordingly.
Partial update from d750527684
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With a bounds check previously added, the problem no longer exists.
Thus no fix needed.
The pcap file was updated to avoid pcap_loop() error messages.
It was rename from pcapng to pcap because it is.
Update the output of the test accordingly.
Partial update from e01c9bf767
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With the new GET_ macros, the problem no longer exists.
Thus no fix needed.
The pcap file was updated to pass the sanity checks, keep only the
relevant packets and avoid pcap_loop() error messages.
Update the output of the test accordingly.
Partial update from d97e942237
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With the new GET_ macros, the problem no longer exists.
Thus no fix needed.
The pcap file was updated to pass the sanity checks and to avoid
pcap_loop() error messages.
Update the output of the test accordingly.
Partial update from a152aebfd1
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With a length check previously added, the problem no longer exists.
Thus no fix needed.
The pcap file was updated to pass the sanity checks and to avoid
pcap_loop() error messages.
Update the output of the test accordingly.
Partial update from e3f3b445e2
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With a length check previously added, the problem no longer exists.
Thus no fix needed.
The pcap file was updated to pass the sanity checks and to avoid
pcap_loop() error messages.
Update the output of the test accordingly.
Partial update from 86326e880d
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With the new GET_ macros, the problem no longer exists.
Thus no fix needed.
The pcap file was updated to avoid pcap_loop() error messages.
Update the output of the test accordingly.
Partial update from 3de07c7721
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With the new GET_ macros, the problem no longer exists.
Thus no fix needed.
The pcap file was updated to pass the sanity checks and to avoid
pcap_loop() error messages.
Update the output of the test accordingly.
Partial update from bea2686c29
in 4.9 branch.
These capture files triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With the new GET_ macros, the problem no longer exists.
Thus no fix needed.
The pcap files were updated to avoid pcap_loop() error messages.
Update the output of the tests accordingly.
Partial update from 1a1bce0526
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
fixed in the 4.9.3 release.
With the new GET_ macros, the problem no longer exists.
Thus no fix needed.
The pcap file was updated to avoid pcap_loop() error messages.
Update the output of the test accordingly.
Partial update from aa5c6b710d
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
and was fixed in the 4.9.3 release.
With the new GET_ macros, the problem no longer exists.
Thus no fix needed.
The pcap file was updated to pass the sanity checks and avoid
pcap_loop() error messages.
Update the output of the test accordingly.
Partial update from 396e94ff55
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
and was fixed in the 4.9.3 release.
It was fixed in master branch by commit
4154778a26.
The pcap file was updated to pass the sanity checks, keep only the
relevant packets and avoid pcap_loop() error messages.
Update the output of the test accordingly.
Partial update from c24922e692
in 4.9 branch.
This capture file triggered a buffer over-read with the 4.9.2 release
and was fixed in the 4.9.3 release.
With the new GET_ macros, the problem no longer exists.
Thus no fix needed.
The pcap file was updated to pass the sanity checks and to avoid
pcap_loop() error messages.
Update the output of the test accordingly.
Partial update from aa3e54f594
in 4.9 branch.
Put back the bfd_port_values, and use it to distinguish
between destination ports for RFC5883 multihop and
RFC7310 lag sessions. (The destination port is the only
difference between these messages.)
MEDSA (which unofficially stands for Marvell EDSA) relies on the
unregistered 0xDADA ethertype value that was randomly choosen and
currently used by the kernel. But with EDSA this value is programmable,
hence can be changed anytime.
Now that a reliable DLT parser is implemented for both DSA and EDSA
tagged master interfaces, let's get rid for the MEDSA ethertype parser.
The checksum calculation for IPv6 packets is based on a pseudo
header that includes the packet's final Destination Address (DA).
If the IPv6 packet contains a Routing header, the final DA is the
last element of the Routing header [RFC8200].
Currently, tcpdump supports Routing header types 0 and 2.
IPv6 Segment Routing Header (SRH) is a new Routing header type (4).
SRH is defined in draft-ietf-6man-segment-routing-header [1].
This patch fix the checksum calculation for SRv6 packets. It allows
tcpdump to get the final DA value from SRv6 packets.
[1] https://tools.ietf.org/html/draft-ietf-6man-segment-routing-header-17