Wireshark-bugs: [Wireshark-bugs] [Bug 7338] New: wireshark 1.6.8 crashes when selecting capture
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7338
Summary: wireshark 1.6.8 crashes when selecting capture options
Product: Wireshark
Version: 1.6.8
Platform: SPARC
OS/Version: Solaris
Status: NEW
Severity: Normal
Priority: Low
Component: Wireshark
AssignedTo: [email protected]
ReportedBy: [email protected]
Build Information:
# wireshark -v
wireshark 1.6.8 (SVN Rev Unknown from unknown)
Copyright 1998-2012 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 2.4.9, with GLib 2.4.8, with libpcap (version
unknown), with libz 1.2.5, without POSIX capabilities, with libpcre (version
unknown), without SMI, without c-ares, with ADNS, without Lua, without Python,
without GnuTLS, with Gcrypt 1.4.6, with MIT Kerberos, with GeoIP, without
PortAudio, without AirPcap.
Running on SunOS 5.10, with libpcap version 1.2.0, with libz 1.2.5, Gcrypt
1.4.6.
Built using gcc 3.4.6.
--
if I just select the button "start a new live capture" it will run
if I select bge1 from the interace list on the main screen it will run
If I attempt to capture using the toolbar either capture-->interfaces or
capture-->options, it will crash.
# pstack core
core 'core' of 22902: wireshark
fc6ee070 gtk_tree_model_get_valist (c8dd88, ffbfe890, ffbfe80c, 8800, f1464,
38 ) + 144
fc6edf1c gtk_tree_model_get (c8dd88, ffbfe890, 8800, f1540, fc5a68c0,
fc7df398) + d8
000ccfc0 capture_start_cb (cb0970, e0c430, fd4748, f4ba48, e58118, 132efc0) +
6 c0
ff03a26c g_cclosure_marshal_VOID__VOID (f9f498, 0, 1, ffbfeb88, ffbfea60,
cc900 ) + b4
ff01d240 g_closure_invoke (f9f498, 0, 1, ffbfeb88, ffbfea60, 1418) + f0
ff037d50 signal_emit_unlocked_R (b69f40, ffbfea40, b94460, 0, 7b, ffbfea60) +
7 58
ff039820 g_signal_emit_valist (b94460, 7b, 1400, ffbfedd8, b69f40, ffbfeb78) +
a78
ff039c50 g_signal_emit (b94460, 7b, 0, ff04632c, 800, fc7f24dc) + 1c
fc572d90 gtk_real_button_released (b94460, ae75e8, 3800007, 9e8, e7, b94460) +
40
ff03a248 g_cclosure_marshal_VOID__VOID (b6be98, 0, 1, ffbff130, ffbff008,
fc572 d50) + 90
ff01d604 g_type_class_meta_marshal (b6be98, 0, 1, ffbff130, ffbff008, 1a4) +
38
ff01d240 g_closure_invoke (b6be98, 0, 1, ffbff130, ffbff008, b6a720) + f0
ff037ae4 signal_emit_unlocked_R (b6c408, 0, b94460, 0, 7a, ffbfefd0) + 4ec
ff039820 g_signal_emit_valist (b94460, 7a, 1400, ffbff380, b6c408, 938) + a78
ff039c50 g_signal_emit (b94460, 7a, 0, ff04632c, 800, fc7f24dc) + 1c
fc572c28 gtk_button_button_release (b94460, 2c7a30, 1e4068, 4c00, 1, fec) + 14
fc62e078 _gtk_marshal_BOOLEAN__BOXED (ffbff578, 1b140c, 1e6fb8, ffbff6c0,
ffbff 598, fc572c14) + f8
ff01d604 g_type_class_meta_marshal (1e6fb8, ffbff578, 2, ffbff6c0, ffbff598,
b4 ) + 38
ff01d240 g_closure_invoke (1e6fb8, ffbff578, 2, ffbff6c0, ffbff598, b6a720) +
f 0
ff037ef0 signal_emit_unlocked_R (1e78d8, 0, b94460, 1e6470, 1c, ffbff560) +
8f8
ff039464 g_signal_emit_valist (b94460, 1e7839, 1400, ffbff914, 1e78d8, 1e7818)
+ 6bc
ff039c50 g_signal_emit (b94460, 1c, 0, 2c7a30, ffbff924, fffffec8) + 1c
fc7339a4 gtk_widget_event_internal (b94460, 2c7a30, fc733750, 16c, 20, 9c00) +
1cc
fc62c5c8 gtk_propagate_event (b94460, 2c7a30, 9acac, 1b2f04, fc428db8,
fc7df398 ) + 13c
fc62b4b8 gtk_main_do_event (38c, 2c7a30, b94460, fc62b128, 0, 20) + 308
ff144e24 gdk_event_dispatch (1e3100, 1e0f98, 3a480, fc42b5c4, 2c7a30,
ff17f228) + 8c
fc42ce8c g_main_context_dispatch (1e3148, 900, 904, 193c, 1938, 1800) + 23c
fc42f4d4 g_main_context_iterate (1e3148, 1, 1, 1eea98, 0, 0) + 568
fc42f9c8 g_main_loop_run (270670, 0, 1934, 18f4, fc4a0fe4, fc4a11b4) + 338
fc62aa44 gtk_main (0, 0, 270670, c946d8, fc7f2da8, 4cf8) + d0
000527d8 main (1c1400, 1bec00, 0, 0, 0, 0) + f38
0002d364 _start (0, 0, 0, 0, 0, 0) + 5c
# pflags core
core 'core' of 22902: wireshark
data model = _ILP32 flags = MSACCT|MSFORK
/1: flags = 0
sigmask = 0xffffbefc,0x0000ffff cursig = SIGSEGV
# file core
core: ELF 32-bit MSB core file SPARC Version 1, from 'wireshark'
# adb core
adb: core file data for mapping at f6802000 not saved: Bad address
adb: core file data for mapping at f71fe000 not saved: Bad address
adb: core file data for mapping at f7802000 not saved: Bad address
adb: core file data for mapping at f81fe000 not saved: Bad address
core file = core -- program ``/usr/local/bin/wireshark'' on platform
SUNW,Sun-Fire-V215
SIGSEGV: Segmentation Fault
where
adb: failed to dereference symbol: unknown symbol name
[1] + Stopped (SIGTSTP) adb core
# fg
adb core
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.