After upgrading libpcap-1.4.0 to libpcap-1.5.1, when i try to capture ICMP packets, UDP packets were also captured. I am using NFS mount root file system target board and tried to capture ICMP packets on target by using ping command from the host.
$ tcpdump -c 10 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
00:00:16.817199 IP 192.168.10.2.880 > 192.168.10.1.nfs: UDP, length 104
00:00:16.817413 IP 192.168.10.1.nfs > 192.168.10.2.880: UDP, length 96
00:00:16.817871 IP 192.168.10.2.880 > 192.168.10.1.nfs: UDP, length 104
00:00:16.818054 IP 192.168.10.1.nfs > 192.168.10.2.880: UDP, length 96
00:00:16.818664 IP 192.168.10.2.880 > 192.168.10.1.nfs: UDP, length 104
00:00:16.818878 IP 192.168.10.1.nfs > 192.168.10.2.880: UDP, length 96
echo request, id 14494, seq 4, length 64
echo reply, id 14494, seq 4, length 64
echo request, id 14494, seq 5, length 64
echo reply, id 14494, seq 5, length 64
10 packets captured
10 packets received by filter
0 packets dropped by kernel
anybody face this issue?? any help please!!!
thanks in advance.
Ethan
After upgrading libpcap-1.4.0 to libpcap-1.5.1, when i try to capture ICMP packets, UDP packets were also captured. I am using NFS mount root file system target board and tried to capture ICMP packets on target by using ping command from the host.
$ tcpdump -c 10 icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
00:00:16.817199 IP 192.168.10.2.880 > 192.168.10.1.nfs: UDP, length 104
00:00:16.817413 IP 192.168.10.1.nfs > 192.168.10.2.880: UDP, length 96
00:00:16.817871 IP 192.168.10.2.880 > 192.168.10.1.nfs: UDP, length 104
00:00:16.818054 IP 192.168.10.1.nfs > 192.168.10.2.880: UDP, length 96
00:00:16.818664 IP 192.168.10.2.880 > 192.168.10.1.nfs: UDP, length 104
00:00:16.818878 IP 192.168.10.1.nfs > 192.168.10.2.880: UDP, length 96
echo request, id 14494, seq 4, length 64
echo reply, id 14494, seq 4, length 64
echo request, id 14494, seq 5, length 64
echo reply, id 14494, seq 5, length 64
10 packets captured
10 packets received by filter
0 packets dropped by kernel
anybody face this issue?? any help please!!!
thanks in advance.
Ethan