Wireshark-bugs: [Wireshark-bugs] [Bug 12738] New: Buildbot crash output: fuzz-2016-08-12-14000.p

Date: Fri, 12 Aug 2016 16:30:02 +0000
Bug ID 12738
Summary Buildbot crash output: fuzz-2016-08-12-14000.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2016-08-12-14000.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2016-08-12-14000.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/0000.cap

Build host information:
Linux wsbb04 4.4.0-31-generic #50-Ubuntu SMP Wed Jul 13 00:07:12 UTC 2016
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 16.04.1 LTS
Release:    16.04
Codename:    xenial

Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_WORKERNAME=fuzz-test
BUILDBOT_BUILDNUMBER=35
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-2.2/
BUILDBOT_BUILDERNAME=Fuzz Test
BUILDBOT_GOT_REVISION=9efee4b9d52ca34cecb7089e0f74583cea760f09

Return value:  0

Dissector bug:  0

Valgrind error count:  1



Git commit
commit 9efee4b9d52ca34cecb7089e0f74583cea760f09
Author: Martin Kaiser <[email protected]>
Date:   Sun Jul 31 15:03:43 2016 +0200

    extcap: fix a compile error with Qt4

    declare ExtcapArgument * as a metatype so it can be used by QVariant

      CXX    extcap_argument.moc.o
    In file included from /usr/include/qt4/QtCore/qvariant.h:48:0,
                     from /usr/include/qt4/QtCore/qabstractitemmodel.h:45,
                     from /usr/include/qt4/QtGui/qabstractitemview.h:46,
                     from /usr/include/qt4/QtGui/qtreeview.h:45,
                     from /usr/include/qt4/QtGui/qtreewidget.h:45,
                     from /usr/include/qt4/QtGui/QTreeWidget:1,
                     from ./interface_tree.h:38,
                     from ./extcap_options_dialog.h:35,
                     from extcap_options_dialog.cpp:26:
    /usr/include/qt4/QtCore/qmetatype.h: In instantiation of ‘static int
QMetaTypeId2<T>::qt_metatype_id() [with T = ExtcapArgument*]’:
    /usr/include/qt4/QtCore/qmetatype.h:230:44:   required from ‘int
qMetaTypeId(T*) [with T = ExtcapArgument*]’
    /usr/include/qt4/QtCore/qvariant.h:341:47:   required from ‘bool
QVariant::canConvert() const [with T = ExtcapArgument*]’
    extcap_options_dialog.cpp:378:74:   required from here
/usr/include/qt4/QtCore/qmetatype.h:169:80: error: ‘qt_metatype_id’ is not a
member of ‘QMetaTypeId<ExtcapArgument*>’
    make[2]: *** [extcap_options_dialog.o] Error 1

    Change-Id: Ib7d052a5cb550ab2595b8d9580d35ffeb62093da
    Reviewed-on: https://code.wireshark.org/review/16799
    Reviewed-by: Martin Kaiser <[email protected]>
    Petri-Dish: Martin Kaiser <[email protected]>
    Tested-by: Petri Dish Buildbot <[email protected]>
    Reviewed-by: Michael Mann <[email protected]>
    (cherry picked from commit 63c5216843e84f07089903e330bb75e67ce114aa)
    Reviewed-on: https://code.wireshark.org/review/17009
    Petri-Dish: Roland Knall <[email protected]>
    Reviewed-by: Jaap Keuter <[email protected]>


==14055== Memcheck, a memory error detector
==14055== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==14055== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==14055== Command:
/home/wireshark/builders/wireshark-2.2-fuzz/fuzztest/install/bin/tshark -nr
/fuzz/buildbot/fuzztest/valgrind-fuzz-2.2/fuzz-2016-08-12-14000.pcap
==14055== 
==14055== 
==14055== HEAP SUMMARY:
==14055==     in use at exit: 1,506,659 bytes in 39,767 blocks
==14055==   total heap usage: 265,279 allocs, 225,512 frees, 30,569,439 bytes
allocated
==14055== 
==14055== LEAK SUMMARY:
==14055==    definitely lost: 332,998 bytes in 150 blocks
==14055==    indirectly lost: 727,768 bytes in 30,021 blocks
==14055==      possibly lost: 0 bytes in 0 blocks
==14055==    still reachable: 445,893 bytes in 9,596 blocks
==14055==         suppressed: 0 bytes in 0 blocks
==14055== Rerun with --leak-check=full to see details of leaked memory
==14055== 
==14055== For counts of detected and suppressed errors, rerun with: -v
==14055== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 1 from 1)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.