Wireshark-bugs: [Wireshark-bugs] [Bug 2017] VoIP trace crashes Wireshark when specific RTP Playe
Date: Thu, 27 Dec 2007 02:16:34 +0000 (GMT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2017 ------- Comment #14 from jyoung@xxxxxxx 2007-12-27 02:16 GMT ------- Hello Steve, Using gdb, with a breakpoint of "b add_to_graph" (from the file voip_calls.c) I've occasionally been able to cause Wireshark to crash earlier rather than later. The backtraces are not 100% consistent, but with the breakpoint enabled (and with some extra debug printf()s in place), more often than not the crash shows up before the "VoIP Calls" window is even displayed the first time. These earlier crashes are more likely to show up in pango_item_free(). Here's a backtrace report that's pretty representative of what I'm currently seeing: <snip> Breakpoint 1, add_to_graph (tapinfo=0x817e100, pinfo=0x8fcaa78, frame_label=0x8f44de0 "facility", comment=0x8fdc790 "H225 TunnH245:off FS:on", call_num=0, src_addr=0x8fcaabc, dst_addr=0x8fcaac8, line_style=1) at voip_calls.c:211 211 { (gdb) c Continuing. Program received signal SIGSEGV, Segmentation fault. 0x41c8466a in pango_item_free () from /opt/gnome/lib/libpango-1.0.so.0 (gdb) bt #0 0x41c8466a in pango_item_free () from /opt/gnome/lib/libpango-1.0.so.0 #1 0x41c85977 in pango_layout_line_index_to_x () from /opt/gnome/lib/libpango-1.0.so.0 #2 0x41c859ec in pango_layout_line_unref () from /opt/gnome/lib/libpango-1.0.so.0 #3 0x41c85a73 in pango_layout_line_unref () from /opt/gnome/lib/libpango-1.0.so.0 #4 0x41c85fed in pango_layout_set_width () from /opt/gnome/lib/libpango-1.0.so.0 #5 0x41d00743 in g_object_unref () from /opt/gnome/lib/libgobject-2.0.so.0 #6 0x419ba908 in gtk_label_get () from /opt/gnome/lib/libgtk-x11-2.0.so.0 #7 0x419bc6c0 in gtk_label_set_attributes () from /opt/gnome/lib/libgtk-x11-2.0.so.0 #8 0x419bd009 in gtk_label_set_text () from /opt/gnome/lib/libgtk-x11-2.0.so.0 #9 0x080f5e41 in voip_calls_dlg_update (list=0x8e6c610) at voip_calls_dlg.c:192 #10 0x080f60c4 in voip_calls_dlg_draw (ptr=0x817e144) at voip_calls_dlg.c:886 #11 0x4045c4b9 in draw_tap_listeners (draw_all=0) at tap.c:333 #12 0x0808028d in update_cb (data=0x0) at main.c:1404 #13 0x41f91106 in g_main_context_wakeup () from /opt/gnome/lib/libglib-2.0.so.0 #14 0x41f8f35c in g_main_context_dispatch () from /opt/gnome/lib/libglib-2.0.so.0 #15 0x41f927cb in g_main_context_check () from /opt/gnome/lib/libglib-2.0.so.0 #16 0x41f92ae7 in g_main_loop_run () from /opt/gnome/lib/libglib-2.0.so.0 #17 0x419cc861 in gtk_main () from /opt/gnome/lib/libgtk-x11-2.0.so.0 #18 0x080831d6 in main (argc=0, argv=0xbfa93218) at main.c:3103 (gdb) I've added some instrumentation code (basically printf()s) to report the addresses of the various address.data buffers created by the COPY_ADDRESS() macro and just prior to any g_free()s of same within the voip_calls.c module. I also added some printf()s simply to report entering and leaving various functions in voip_calls_dlg.c. The presence of the printf()s along with the gdb breakpoint along with using various subsets of the original problem trace file make it more likely or less likely to get a consistent crash results. Given the various crash results I'm seeing I suspect that memory has been corrupted long before we actually see the problem. Seeing the crash detected by a pango function makes sense given the odd text I would occasionally noticed within the labels of the "Refiltering statistics on:" and in the "VoIP Calls" windows (see comment #4 and comment #6). Further evidence that something has trashed some part of memory. I'm guessing that having both the extra printf()s and having the gdb breakpoint interrupt the normal program flow is causing the runtime memory footpoint of Wireshark to change just enough to expose the results of the underlying bug earlier rather than later. Hopefully with some extra instrumentation we'll be able to narrow this down even more. If interested I can upload the subset trace file and a patch file with the instrumentation code that I'm currently using to help isolate this bug. -- Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
- Prev by Date: [Wireshark-bugs] [Bug 2142] DHCPv6 dissector update
- Next by Date: [Wireshark-bugs] [Bug 2141] Buildbot crash output: fuzz-2007-12-26-32600.pcap
- Previous by thread: [Wireshark-bugs] [Bug 2017] VoIP trace crashes Wireshark when specific RTP Player buttons are clicked
- Next by thread: [Wireshark-bugs] [Bug 2017] VoIP trace crashes Wireshark when specific RTP Player buttons are clicked
- Index(es):