ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 7565] Capture file that crashes wireshark in packet-cmip-t

Date: Tue, 7 Aug 2012 12:17:26 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7565

Jeff Morriss <jeff.morriss.ws@xxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |jeff.morriss.ws@xxxxxxxxx

--- Comment #1 from Jeff Morriss <jeff.morriss.ws@xxxxxxxxx> 2012-08-07 12:17:26 PDT ---
I get a very different backtrace with this capture file:

~~~
Program terminated with signal 11, Segmentation fault.
[New process 13426]
#0  0x00007f7491d3b723 in ep_strbuf_printf (strbuf=0x101010101010101,
format=0x7f7492a41415 "%s(") at ../../epan/emem.c:2301
2301        strbuf->len = 0;
Missing separate debuginfos, use: debuginfo-install glib2-2.18.4-2.fc10.x86_64
glibc-2.9-3.x86_64 gnutls-2.4.2-5.fc10.x86_64 libgcrypt-1.4.4-1.fc10.x86_64
libgpg-error-1.6-2.x86_64 libtasn1-1.5-1.fc10.x86_64 lua-5.1.4-2.fc10.x86_64
zlib-1.2.3-18.fc9.x86_64
(gdb) up
#1  0x00007f7491f88f2e in channelised_fill_vc_id_string
(out_string=0x101010101010101, in_fmt=0x7fff706a3cb0)
    at ../../../epan/dissectors/packet-erf.c:736
736      ep_strbuf_printf(out_string, "%s(",
(gdb) bt
#0  0x00007f7491d3b723 in ep_strbuf_printf (strbuf=0x101010101010101,
format=0x7f7492a41415 "%s(") at ../../epan/emem.c:2301
#1  0x00007f7491f88f2e in channelised_fill_vc_id_string
(out_string=0x101010101010101, in_fmt=0x7fff706a3cb0)
    at ../../../epan/dissectors/packet-erf.c:736
#2  0x00007f7491f89127 in dissect_channelised_ex_header (tvb=0x3077800,
pinfo=0x7fff706a42e0, tree=0x7f749096f600, idx=0)
    at ../../../epan/dissectors/packet-erf.c:790
#3  0x0101010101010101 in ?? ()
#4  0x0101010101010101 in ?? ()
#5  0x0101010101010101 in ?? ()
#6  0x0101010101010101 in ?? ()
#7  0x0101010101010101 in ?? ()
#8  0x0101010101010101 in ?? ()
#9  0x0101010101010101 in ?? ()
#10 0x0101010101010101 in ?? ()
#11 0x0101010101010101 in ?? ()
#12 0x00007fff70000101 in ?? ()
#13 0x00007f7491f8ab30 in dissect_erf (tvb=Cannot access memory at address
0x1010101010100b9
) at ../../../epan/dissectors/packet-erf.c:1182
Cannot access memory at address 0x101010101010109
~~~

With r44306 (for bug 7563) this crash goes away.  Did you attach the wrong
capture file to this bug?

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.