Wireshark-bugs: [Wireshark-bugs] [Bug 10402] New: Buildbot crash output: fuzz-2014-08-21-8385.pc
Date: Fri, 22 Aug 2014 13:00:06 +0000
Bug ID | 10402 |
---|---|
Summary | Buildbot crash output: fuzz-2014-08-21-8385.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2014-08-21-8385.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | [email protected] |
Reporter | [email protected] |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2014-08-21-8385.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/6656-ani_20110706172821.pcap Build host information: Linux wsbb04 3.13.0-32-generic #57-Ubuntu SMP Tue Jul 15 03:51:08 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.1 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark BUILDBOT_BUILDNUMBER=2932 BUILDBOT_URL=http://buildbot.wireshark.org/trunk/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=41af6dddc73aaa37fd9e47f396d1755c00d9574e Return value: 152 Dissector bug: 0 Valgrind error count: 0 Git commit commit 41af6dddc73aaa37fd9e47f396d1755c00d9574e Author: Kevin Cox <[email protected]> Date: Wed Aug 6 09:56:38 2014 -0400 Add more messages for the Ceph protocol. New messages: - Mon Paxos. - Mon Global ID. - Mon Get Version - OSD Ping - Ping - OSD Boot - OSD PG Create. - PG Stats. Other updates: - Documentation for modifying the dissector. - Update assertions to show values. - Replace proto_tree_add_text()/expert_add_info...() by proto_tree_add_expert...(). - Fix a bug: misplaced break. - Do some minor whitespace & other cosmetic changes. Change-Id: Ib19ce509b67fb5e6fb31e82b5a551a9e952a9c6d Reviewed-on: https://code.wireshark.org/review/3623 Petri-Dish: Bill Meier <[email protected]> Reviewed-by: Bill Meier <[email protected]> Command and args: ./tools/valgrind-wireshark.sh -T ==18571== Memcheck, a memory error detector ==18571== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==18571== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info ==18571== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -Vx -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2014-08-21-8385.pcap ==18571== ==18571== ==18571== Process terminating with default action of signal 24 (SIGXCPU): dumping core ==18571== at 0xA41F39E: __read_nocancel (syscall-template.S:81) ==18571== by 0x4E4CB5C: raw_read (unistd.h:44) ==18571== by 0x4E4D262: fill_out_buffer (file_wrappers.c:718) ==18571== by 0x4E4E4A0: file_read (file_wrappers.c:1196) ==18571== by 0x4E71AAC: wtap_read_packet_bytes (wtap.c:1046) ==18571== by 0x4E652CB: pcapng_read_packet_block.isra.4 (pcapng.c:1196) ==18571== by 0x4E66B0F: pcapng_read_block (pcapng.c:2119) ==18571== by 0x4E678DA: pcapng_read (pcapng.c:2348) ==18571== by 0x4E719F1: wtap_read (wtap.c:996) ==18571== by 0x40BF98: main (tshark.c:3345) ==18571== ==18571== HEAP SUMMARY: ==18571== in use at exit: 63,964,112 bytes in 1,014,388 blocks ==18571== total heap usage: 70,955,123 allocs, 69,940,735 frees, 4,756,877,319 bytes allocated ==18571== ==18571== LEAK SUMMARY: ==18571== definitely lost: 304 bytes in 22 blocks ==18571== indirectly lost: 8 bytes in 1 blocks ==18571== possibly lost: 0 bytes in 0 blocks ==18571== still reachable: 63,963,800 bytes in 1,014,365 blocks ==18571== suppressed: 0 bytes in 0 blocks ==18571== Rerun with --leak-check=full to see details of leaked memory ==18571== ==18571== For counts of detected and suppressed errors, rerun with: -v ==18571== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) ./tools/valgrind-wireshark.sh: line 113: 18571 CPU time limit exceeded (core dumped) $LIBTOOL valgrind --suppressions=`dirname $0`/vg-suppressions --tool=$TOOL $CALLGRIND_OUT_FILE $VERBOSE $LEAK_CHECK $REACHABLE $TRACK_ORIGINS $COMMAND $COMMAND_ARGS $PCAP $COMMAND_ARGS2 > /dev/null [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 10402] Buildbot crash output: fuzz-2014-08-21-8385.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10402] Buildbot crash output: fuzz-2014-08-21-8385.pcap
- Prev by Date: [Wireshark-bugs] [Bug 4096] Wireshark's RADIUS retry detection incorrectly tags unrelated RADIUS packets as duplicates
- Next by Date: [Wireshark-bugs] [Bug 10400] Don't show RTP packets in call flow
- Previous by thread: [Wireshark-bugs] [Bug 4096] Wireshark's RADIUS retry detection incorrectly tags unrelated RADIUS packets as duplicates
- Next by thread: [Wireshark-bugs] [Bug 10402] Buildbot crash output: fuzz-2014-08-21-8385.pcap
- Index(es):