Peter Wu
changed
bug 12616
What |
Removed |
Added |
Status |
RESOLVED
|
CONFIRMED
|
Resolution |
FIXED
|
---
|
Comment # 8
on bug 12616
from Peter Wu
There are apparently two issues here, one with the -qz follow,ssl,raw,0 option
(which is still open) and the other one (which is now fixed). Reopening.
Program received signal SIGSEGV, Segmentation fault.
0x000055555565af4f in follow_draw (contextp=0x608000003020) at
ui/cli/tap-follow.c:274
274 buffer[jj++] = bin2hex[follow_record->data->data[ii] >> 4];
(gdb) p ii
$1 = 0
(gdb) p follow_record->data->data[ii]
Cannot access memory at address 0x312e312f50545448
(gdb) bt
#0 0x000055555565af4f in follow_draw (contextp=0x608000003020) at
ui/cli/tap-follow.c:274
#1 0x00007fffec481399 in draw_tap_listeners (draw_all=1) at epan/tap.c:454
#2 0x000055555563f3d1 in main (argc=11, argv=0x7fffffffe1f8) at tshark.c:2023
(reproduced with v2.1.2rc0)
You are receiving this mail because:
- You are watching all bug changes.