Wireshark-dev: Re: [Wireshark-dev] Wireshark / Tshark 0.99.4 crashes with Segmentation fault wh
From: LEGO <[email protected]>
Date: Mon, 13 Nov 2006 15:58:42 +0000
can you:
(gdb) frame 72747
(gdb) p pinfo->fd->num # you'll obtain the one packet where the
problem manifests

- use editcap to extract that one packet (have a pcap file with just 1 packet)
- check whether or not that one packet crashes tshark

if it causes the crash check if the packet  contains sensible data and
if not forward that to us.

On 11/13/06, "März, Frank" <[email protected]> wrote:

Hello Wireshark Community,

I have discovered a problem with causes Wireshark and Tshark to crash with a
 segmentation fault error. This problem is new to the version 0.99.4.  I
have a tcpdumb which holds mostly GTP data which I would like to open or
filter with Wireshark or Tshark. When I use the same capture file in 0.99.2
I have no problems at all.

I have made a gdb backtrace which I have attached to this email. I can not
include the capture file due to the size 110MB and due to it holds private
data.

I would appreciate if somebody could have a look at this please. Sorry I do
not understand this output myself.

Best Regards,

Frank

(gdb)
Continuing.

Program received signal SIGSEGV, Segmentation fault.
0x00f08abc in check_offset_length_no_exception
(tvb=0x8f0e9a0, offset=0, length=4, offset_ptr=0xbf400064,
length_ptr=0xbf400068, exception=0x0) at tvbuff.c:389
389             if (!compute_offset_length(tvb, offset, length, offset_ptr,
length_ptr, exception)) {
(gdb)


(gdb) backtrace
#0  0x00f08abc in check_offset_length_no_exception
(tvb=0x8f0e9a0, offset=0, length=4, offset_ptr=0xbf400064,
length_ptr=0xbf400068, exception=0x0) at tvbuff.c:389
#1  0x00f099f0 in ensure_contiguous_no_exception (tvb=0x8f0e9a0,
offset=Variable "offset" is not available.
) at tvbuff.c:824
#2  0x00f0a990 in tvb_memeql (tvb=0x8f0e9a0, offset=0, str=0x1512474 "",
size=4) at tvbuff.c:1696
#3  0x01042f82 in dissect_dcerpc_cn (tvb=0x8f0e9a0, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298, can_desegment=1, pkt_len=0xbf40029c) at
packet-dcerpc.c:3809
#4  0x01044e3e in dissect_dcerpc_cn_bs_body (tvb=0x8f0e9a0, pinfo=0x8a9ce10,
tree=0x89f2298) at packet-dcerpc.c:4104
#5  0x00ee850c in dissector_try_heuristic (sub_dissectors=0x887c5c8,
tvb=0x8f0e9a0, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:1532
#6  0x01111722 in dissect_http_message (tvb=0x8f0e96c, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298) at packet-http.c:1112
#7  0x01112002 in dissect_http (tvb=0x8f0e96c, pinfo=0x8a9ce10,
tree=0x89f2298) at packet-http.c:1947
#8  0x00ee6a7f in call_dissector_through_handle (handle=0x868ae60,
tvb=0x8f0e96c, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
#9  0x00ee6dd3 in call_dissector_work (handle=0x868ae60, tvb=0x8f0e96c,
pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
#10 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87e9160, port=80,
tvb=0x8f0e96c, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
#11 0x012e7b31 in decode_tcp_ports (tvb=0x8f0e938, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298, src_port=80, dst_port=1830,
tcpd=0xb6919828) at packet-tcp.c:1901
#12 0x012e7c7c in process_tcp_payload (tvb=0x8f0e938, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298, tcp_tree=0x89f2298, src_port=80,
dst_port=1830, seq=1047784259,
    nxtseq=1047785519, is_tcp_segment=1, tcpd=0xb6919828) at
packet-tcp.c:1960
#13 0x012e83c5 in dissect_tcp_payload (tvb=0x8f0e938, pinfo=0x8a9ce10,
offset=0, seq=1047784259, nxtseq=1047785519, sport=80, dport=1830,
tree=0x89f2298,
    tcp_tree=0x89f2298, tcpd=0xb6919828) at packet-tcp.c:2036
#14 0x01111f38 in dissect_http_message (tvb=0x8f0e904, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298) at packet-http.c:1442
#15 0x01112002 in dissect_http (tvb=0x8f0e904, pinfo=0x8a9ce10,
tree=0x89f2298) at packet-http.c:1947
#16 0x00ee6a7f in call_dissector_through_handle (handle=0x868ae60,
tvb=0x8f0e904, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
#17 0x00ee6dd3 in call_dissector_work (handle=0x868ae60, tvb=0x8f0e904,
pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
#18 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87e9160, port=80,
tvb=0x8f0e904, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
#19 0x012e7b31 in decode_tcp_ports (tvb=0x8f0e8d0, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298, src_port=80, dst_port=1830,
tcpd=0xb6919828) at packet-tcp.c:1901
#20 0x012e7c7c in process_tcp_payload (tvb=0x8f0e8d0, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298, tcp_tree=0x89f2298, src_port=80,
dst_port=1830, seq=1047784259,
    nxtseq=1047785519, is_tcp_segment=1, tcpd=0xb6919828) at
packet-tcp.c:1960
#21 0x012e83c5 in dissect_tcp_payload (tvb=0x8f0e8d0, pinfo=0x8a9ce10,
offset=0, seq=1047784259, nxtseq=1047785519, sport=80, dport=1830,
tree=0x89f2298,
    tcp_tree=0x89f2298, tcpd=0xb6919828) at packet-tcp.c:2036
#22 0x01111f38 in dissect_http_message (tvb=0x8f0e6c0, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298) at packet-http.c:1442
#23 0x01112002 in dissect_http (tvb=0x8f0e6c0, pinfo=0x8a9ce10,
tree=0x89f2298) at packet-http.c:1947
#24 0x00ee6a7f in call_dissector_through_handle (handle=0x868ae60,
tvb=0x8f0e6c0, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
#25 0x00ee6dd3 in call_dissector_work (handle=0x868ae60, tvb=0x8f0e6c0,
pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
#26 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87e9160, port=80,
tvb=0x8f0e6c0, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
#27 0x012e7b31 in decode_tcp_ports (tvb=0x8f0e68c, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298, src_port=80, dst_port=1830,
tcpd=0xb6919828) at packet-tcp.c:1901
#28 0x012e7c7c in process_tcp_payload (tvb=0x8f0e68c, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298, tcp_tree=0x89f2298, src_port=80,
dst_port=1830, seq=1047784259,
    nxtseq=1047785519, is_tcp_segment=1, tcpd=0xb6919828) at
packet-tcp.c:1960
#29 0x012e83c5 in dissect_tcp_payload (tvb=0x8f0e68c, pinfo=0x8a9ce10,
offset=0, seq=1047784259, nxtseq=1047785519, sport=80, dport=1830,
tree=0x89f2298,
    tcp_tree=0x89f2298, tcpd=0xb6919828) at packet-tcp.c:2036
#30 0x01111f38 in dissect_http_message (tvb=0x8f0e658, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298) at packet-http.c:1442
#31 0x01112002 in dissect_http (tvb=0x8f0e658, pinfo=0x8a9ce10,
tree=0x89f2298) at packet-http.c:1947
#32 0x00ee6a7f in call_dissector_through_handle (handle=0x868ae60,
tvb=0x8f0e658, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
#33 0x00ee6dd3 in call_dissector_work (handle=0x868ae60, tvb=0x8f0e658,
pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
#34 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87e9160, port=80,
tvb=0x8f0e658, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
#35 0x012e7b31 in decode_tcp_ports (tvb=0x8f0e624, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298, src_port=80, dst_port=1830,
tcpd=0xb6919828) at packet-tcp.c:1901
#36 0x012e7c7c in process_tcp_payload (tvb=0x8f0e624, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298, tcp_tree=0x89f2298, src_port=80,
dst_port=1830, seq=1047784259,
    nxtseq=1047785519, is_tcp_segment=1, tcpd=0xb6919828) at
packet-tcp.c:1960
#37 0x012e83c5 in dissect_tcp_payload (tvb=0x8f0e624, pinfo=0x8a9ce10,
offset=0, seq=1047784259, nxtseq=1047785519, sport=80, dport=1830,
tree=0x89f2298,
    tcp_tree=0x89f2298, tcpd=0xb6919828) at packet-tcp.c:2036
#38 0x01111f38 in dissect_http_message (tvb=0x8f0e5f0, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298) at packet-http.c:1442
#39 0x01112002 in dissect_http (tvb=0x8f0e5f0, pinfo=0x8a9ce10,
tree=0x89f2298) at packet-http.c:1947
#40 0x00ee6a7f in call_dissector_through_handle (handle=0x868ae60,
tvb=0x8f0e5f0, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
#41 0x00ee6dd3 in call_dissector_work (handle=0x868ae60, tvb=0x8f0e5f0,
pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
#42 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87e9160, port=80,
tvb=0x8f0e5f0, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
#43 0x012e7b31 in decode_tcp_ports (tvb=0x8f0e5bc, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298, src_port=80, dst_port=1830,
tcpd=0xb6919828) at packet-tcp.c:1901
#44 0x012e7c7c in process_tcp_payload (tvb=0x8f0e5bc, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298, tcp_tree=0x89f2298, src_port=80,
dst_port=1830, seq=1047784259,
    nxtseq=1047785519, is_tcp_segment=1, tcpd=0xb6919828) at
packet-tcp.c:1960
#45 0x012e83c5 in dissect_tcp_payload (tvb=0x8f0e5bc, pinfo=0x8a9ce10,
offset=0, seq=1047784259, nxtseq=1047785519, sport=80, dport=1830,
tree=0x89f2298,
    tcp_tree=0x89f2298, tcpd=0xb6919828) at packet-tcp.c:2036
#46 0x01111f38 in dissect_http_message (tvb=0x8f0e588, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298) at packet-http.c:1442
#47 0x01112002 in dissect_http (tvb=0x8f0e588, pinfo=0x8a9ce10,
tree=0x89f2298) at packet-http.c:1947
#48 0x00ee6a7f in call_dissector_through_handle (handle=0x868ae60,
tvb=0x8f0e588, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
#49 0x00ee6dd3 in call_dissector_work (handle=0x868ae60, tvb=0x8f0e588,
pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
#50 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87e9160, port=80,
tvb=0x8f0e588, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
#51 0x012e7b31 in decode_tcp_ports (tvb=0x8f0e554, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298, src_port=80, dst_port=1830,
tcpd=0xb6919828) at packet-tcp.c:1901
#52 0x012e7c7c in process_tcp_payload (tvb=0x8f0e554, offset=0,
pinfo=0x8a9ce10, tree=0x89f2298, tcp_tree=0x89f2298, src_port=80,
dst_port=1830, seq=1047784259,
    nxtseq=1047785519, is_tcp_segment=1, tcpd=0xb6919828) at
packet-tcp.c:1960
#53 0x012e83c5 in dissect_tcp_payload (tvb=0x8f0e554, pinfo=0x8a9ce10,
offset=0, seq=1047784259, nxtseq=1047785519, sport=80, dport=1830,
tree=0x89f2298,
---Type <return> to continue, or q <return> to quit---

.
.
.
.
.


#72723 0x00ee6a7f in call_dissector_through_handle (handle=0x8697c40,
tvb=0x8b62698, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
#72724 0x00ee6dd3 in call_dissector_work (handle=0x8697c40, tvb=0x8b62698,
pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
#72725 0x00ee7051 in call_dissector (handle=0x8697c40, tvb=0x8b62698,
pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:1711
#72726 0x010f142f in dissect_gtp (tvb=0x8b62664, pinfo=0x8a9ce10,
tree=0x89f2298) at packet-gtp.c:5781
#72727 0x00ee6a7f in call_dissector_through_handle (handle=0x866bee0,
tvb=0x8b62664, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
#72728 0x00ee6dd3 in call_dissector_work (handle=0x866bee0, tvb=0x8b62664,
pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
#72729 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87ee330,
port=2152, tvb=0x8b62664, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
#72730 0x012fc7fc in decode_udp_ports (tvb=0x8b62630, offset=8,
pinfo=0x8a9ce10, tree=0x89f2298, uh_sport=2152, uh_dport=2152, uh_ulen=1316)
at packet-udp.c:140
#72731 0x012fccd7 in dissect (tvb=0x8b62630, pinfo=0x8a9ce10,
tree=0x89f2298, ip_proto=1114112) at packet-udp.c:347
#72732 0x00ee6a7f in call_dissector_through_handle (handle=0x88b35c8,
tvb=0x8b62630, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
#72733 0x00ee6dd3 in call_dissector_work (handle=0x88b35c8, tvb=0x8b62630,
pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
#72734 0x00ee78e6 in dissector_try_port (sub_dissectors=0x8692b98, port=17,
tvb=0x8b62630, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
#72735 0x0112e373 in dissect_ip (tvb=0x8b625fc, pinfo=0x8a9ce10,
parent_tree=0x89f2298) at packet-ip.c:1187
#72736 0x00ee6a7f in call_dissector_through_handle (handle=0x8697c40,
tvb=0x8b625fc, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
#72737 0x00ee6dd3 in call_dissector_work (handle=0x8697c40, tvb=0x8b625fc,
pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
#72738 0x00ee78e6 in dissector_try_port (sub_dissectors=0x865c448,
port=2048, tvb=0x8b625fc, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
#72739 0x010888d6 in ethertype (etype=2048, tvb=0x8b625c8,
offset_after_etype=14, pinfo=0x8a9ce10, tree=0x89f2298, fh_tree=0x89f2208,
etype_id=10010,
    trailer_id=10012, fcs_len=-1) at packet-ethertype.c:197
#72740 0x01086451 in dissect_eth_common (tvb=0x8b625c8, pinfo=0x8a9ce10,
parent_tree=0x89f2298, fcs_len=-1) at packet-eth.c:344
#72741 0x00ee6a7f in call_dissector_through_handle (handle=0x889fbb8,
tvb=0x8b625c8, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392

#72742 0x00ee6dd3 in call_dissector_work (handle=0x889fbb8, tvb=0x8b625c8,
pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
#72743 0x00ee78e6 in dissector_try_port (sub_dissectors=0x86565d8, port=1,
tvb=0x8b625c8, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
#72744 0x010a4edc in dissect_frame (tvb=0x8b625c8, pinfo=0x8a9ce10,
parent_tree=0x89f2298) at packet-frame.c:286
#72745 0x00ee6a7f in call_dissector_through_handle (handle=0x8656698,
tvb=0x8b625c8, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
#72746 0x00ee6dd3 in call_dissector_work (handle=0x8656698, tvb=0x8b625c8,
pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
#72747 0x00ee7051 in call_dissector (handle=0x8656698, tvb=0x8b625c8,
pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:1711
#72748 0x00ee74c2 in dissect_packet (edt=0x8a9ce08, pseudo_header=0x897a82c,
pd=0x89fdf90 "", fd=0x8b1cb84, cinfo=0x8174e78) at packet.c:331
#72749 0x00ee3829 in epan_dissect_run (edt=0x8a9ce08,
pseudo_header=0x897a82c, data=0x89fdf90 "", fd=0x8b1cb84, cinfo=0x8174e78)
at epan.c:195
#72750 0x08069494 in add_packet_to_packet_list (fdata=0x8b1cb84,
cf=0x8164d60, pseudo_header=0x897a82c, buf=0x89fdf90 "", refilter=1) at
file.c:831
#72751 0x080696d6 in read_packet (cf=0x8164d60, offset=761329) at file.c:955
#72752 0x08069988 in cf_read (cf=0x8164d60) at file.c:459

#72753 0x080b4e90 in file_open_ok_cb (w=0x8962ad0, fs=0x8901370) at
capture_file_dlg.c:715
#72754 0x002ad1a0 in gtk_marshal_NONE__NONE () from /usr/lib/libgtk-1.2.so.0
#72755 0x0027a427 in gtk_signal_connect_while_alive () from
/usr/lib/libgtk-1.2.so.0
---Type <return> to continue, or q <return> to quit---
#72756 0x0027b230 in gtk_signal_emit_stop_by_name () from
/usr/lib/libgtk-1.2.so.0
#72757 0x0027bee7 in gtk_signal_emit () from /usr/lib/libgtk-1.2.so.0
#72758 0x0031934a in gtk_button_clicked () from /usr/lib/libgtk-1.2.so.0
#72759 0x0031abd8 in gtk_button_set_relief () from /usr/lib/libgtk-1.2.so.0
#72760 0x002ad1a0 in gtk_marshal_NONE__NONE () from /usr/lib/libgtk-1.2.so.0
#72761 0x0027b2dd in gtk_signal_emit_stop_by_name () from
/usr/lib/libgtk-1.2.so.0
#72762 0x0027bee7 in gtk_signal_emit () from /usr/lib/libgtk-1.2.so.0
#72763 0x00319267 in gtk_button_released () from /usr/lib/libgtk-1.2.so.0
#72764 0x0031a462 in gtk_button_set_relief () from /usr/lib/libgtk-1.2.so.0
#72765 0x002ace79 in gtk_marshal_BOOL__POINTER () from
/usr/lib/libgtk-1.2.so.0
#72766 0x0027b333 in gtk_signal_emit_stop_by_name () from
/usr/lib/libgtk-1.2.so.0
#72767 0x0027bee7 in gtk_signal_emit () from /usr/lib/libgtk-1.2.so.0
#72768 0x002411b9 in gtk_widget_event () from /usr/lib/libgtk-1.2.so.0
#72769 0x002aec0c in gtk_propagate_event () from /usr/lib/libgtk-1.2.so.0
#72770 0x002aefa7 in gtk_main_do_event () from /usr/lib/libgtk-1.2.so.0
#72771 0x00154620 in gdk_event_get () from /usr/lib/libgdk-1.2.so.0
#72772 0x0018b287 in g_get_current_time () from /usr/lib/libglib-1.2.so.0
#72773 0x0018bf13 in g_main_add_poll () from /usr/lib/libglib-1.2.so.0
#72774 0x0018c0e5 in g_main_run () from /usr/lib/libglib-1.2.so.0
#72775 0x002ae232 in gtk_main () from /usr/lib/libgtk-1.2.so.0
#72776 0x0807ed6d in main (argc=0, argv=0xbffcd438) at main.c:2985
(gdb)

(gdb)



_______________________________________________
Wireshark-dev mailing list
[email protected]
http://www.wireshark.org/mailman/listinfo/wireshark-dev



--
This information is top security. When you have read it, destroy yourself.
-- Marshall McLuhan