Wireshark-bugs: [Wireshark-bugs] [Bug 13224] New: Buildbot crash output: fuzz-2016-12-08-20604.p
Date: Thu, 08 Dec 2016 13:30:06 +0000
Bug ID 13224
Summary Buildbot crash output: fuzz-2016-12-08-20604.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2016-12-08-20604.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee bugzilla-admin@wireshark.org
Reporter buildbot-do-not-reply@wireshark.org

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2016-12-08-20604.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/12802-iser_login.pcap

Build host information:
Linux wsbb04 4.4.0-47-generic #68-Ubuntu SMP Wed Oct 26 19:39:52 UTC 2016
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 16.04.1 LTS
Release:    16.04
Codename:    xenial

Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=3813
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_GOT_REVISION=5e3f8236b9945eac9105b65a14488374aa7a836f

Return value:  0

Dissector bug:  0

Valgrind error count:  1



Git commit
commit 5e3f8236b9945eac9105b65a14488374aa7a836f
Author: Chuck Lever <chuck.lever@oracle.com>
Date:   Sat Nov 12 14:40:31 2016 -0500

    packet-rpcrdma: Select correct size of transport header

    Nit: Make it easier to see the transition between the end of the
    RPC-over-RDMA transport header and the start of the RPC header.
    Calculate the selection size of the RPC-over-RDMA header
    properly, including the size of the chunk lists.

    Change-Id: I84bc7d970a95e8f50a21a45ded386322711b6512
    Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
    Reviewed-on: https://code.wireshark.org/review/19034
    Reviewed-by: Michael Mann <mmann78@netscape.net>
    Petri-Dish: Michael Mann <mmann78@netscape.net>
    Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
    Reviewed-by: Anders Broman <a.broman58@gmail.com>


==15768== Memcheck, a memory error detector
==15768== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==15768== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==15768== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2016-12-08-20604.pcap
==15768== 
==15768== Invalid read of size 2
==15768==    at 0x69977A1: ib_addr_to_str (address_types.c:451)
==15768==    by 0x699FF6C: col_set_addr (column-utils.c:1913)
==15768==    by 0x699FE57: col_fill_in (column-utils.c:2180)
==15768==    by 0x416797: print_packet (tshark.c:3852)
==15768==    by 0x416389: process_packet (tshark.c:3492)
==15768==    by 0x4140D1: load_cap_file (tshark.c:3234)
==15768==    by 0x4140D1: main (tshark.c:1934)
==15768==  Address 0xffefff5f0 is on thread 1's stack
==15768==  2336 bytes below stack pointer
==15768== 
==15768== 
==15768== HEAP SUMMARY:
==15768==     in use at exit: 6,083,167 bytes in 9,742 blocks
==15768==   total heap usage: 293,099 allocs, 283,357 frees, 38,043,175 bytes
allocated
==15768== 
==15768== LEAK SUMMARY:
==15768==    definitely lost: 360 bytes in 87 blocks
==15768==    indirectly lost: 0 bytes in 0 blocks
==15768==      possibly lost: 0 bytes in 0 blocks
==15768==    still reachable: 6,082,807 bytes in 9,655 blocks
==15768==         suppressed: 0 bytes in 0 blocks
==15768== Rerun with --leak-check=full to see details of leaked memory
==15768== 
==15768== For counts of detected and suppressed errors, rerun with: -v
==15768== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.