You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
On most OS platforms fprintf() et.al. are considered to be signal unsafe. I've noticed the signal handlers in tcpdump call fprintf(). The patch below defers call to fprintf() triggered by signal to pcap_loop callback.
Patch above is against tcpdump-4.9.2. It looks like the signal-safety here prevents tcpdump -w dump.pkt -v to work on Solaris. After applying patch above the issue gets fixed.
I understand proposed solution has some drawback. If there are no packets captured, then nothing gets printed. The ultimate fix calls for much more complex change.
thanks and
regards
sashan
The text was updated successfully, but these errors were encountered:
On most OS platforms fprintf() et.al. are considered to be signal unsafe. I've
noticed the signal handlers in tcpdump call fprintf(). The patch below defers
call to fprintf() triggered by signal to pcap_loop callback.
Submitted to upstream:
the-tcpdump-group#638
Sashan
pushed a commit
to Sashan/tcpdump
that referenced
this issue
Apr 17, 2019
On most OS platforms fprintf() et.al. are considered to be signal unsafe. I've
noticed the signal handlers in tcpdump call fprintf(). The patch below defers
call to fprintf() triggered by signal to pcap_loop callback.
Submitted to upstream:
the-tcpdump-group#638
On most OS platforms fprintf() et.al. are considered to be signal unsafe. I've
noticed the signal handlers in tcpdump call fprintf(). The patch below defers
call to fprintf() triggered by signal to pcap_loop callback.
Submitted to upstream:
the-tcpdump-group#638
(fixes broken build on windows)
Sashan
pushed a commit
to Sashan/tcpdump
that referenced
this issue
Apr 18, 2019
On most OS platforms fprintf() et.al. are considered to be signal unsafe. I've
noticed the signal handlers in tcpdump call fprintf(). The patch below defers
call to fprintf() triggered by signal to pcap_loop callback.
Submitted to upstream:
the-tcpdump-group#638
(fixes broken build on windows)
(s/ifdef/ifndef in my earlier change)
On most OS platforms
fprintf()
et.al. are considered to be signal unsafe. I've noticed the signal handlers in tcpdump callfprintf()
. The patch below defers call tofprintf()
triggered by signal to pcap_loop callback.Patch above is against tcpdump-4.9.2. It looks like the signal-safety here prevents
tcpdump -w dump.pkt -v
to work on Solaris. After applying patch above the issue gets fixed.I understand proposed solution has some drawback. If there are no packets captured, then nothing gets printed. The ultimate fix calls for much more complex change.
thanks and
regards
sashan
The text was updated successfully, but these errors were encountered: