Wireshark-bugs: [Wireshark-bugs] [Bug 10095] New: Buildbot crash output: fuzz-2014-05-08-27950.p
Date: Fri, 09 May 2014 05:20:08 +0000
Bug ID | 10095 |
---|---|
Summary | Buildbot crash output: fuzz-2014-05-08-27950.pcap |
Classification | Unclassified |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | http://www.wireshark.org/download/automated/captures/fuzz-2014-05-08-27950.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | bugzilla-admin@wireshark.org |
Reporter | buildbot-do-not-reply@wireshark.org |
Problems have been found with the following capture file: http://www.wireshark.org/download/automated/captures/fuzz-2014-05-08-27950.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/1277-bt.log Build host information: Linux wsbb04 3.2.0-61-generic #92-Ubuntu SMP Mon Mar 31 23:47:59 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 12.04.4 LTS Release: 12.04 Codename: precise Buildbot information: BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark BUILDBOT_BUILDNUMBER=2747 BUILDBOT_URL=http://buildbot.wireshark.org/trunk/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=f3b631668bc35db2acac25d9c537f02d6c143e15 Return value: 0 Dissector bug: 0 Valgrind error count: 283 Git commit commit f3b631668bc35db2acac25d9c537f02d6c143e15 Author: Evan Huus <eapache@gmail.com> Date: Tue May 6 21:45:16 2014 -0400 Use a strong hash function for ethernet addresses. The capture for bug 10078 caused the buildbot to time out; callgrind revealed an enourmous amount of time being spent looking up ethernet addresses. The previous code cast each address (6 bytes) to a guint64 (8 bytes) then used the built-in g_int64_hash. Unfortunately, g_int64_hash is an *awful* hash function - it produces a 4-byte hash by simply discarding the upper 4 bytes of its input. For the capture file in question this strategy (which effectively ignores the upper two bytes of each ethernet address) produced an astounding number of collisions, leading to the terrible running-time. Use wmem_strong_hash directly on the 6-byte address instead, which saves us a bunch of useless casting and bit-twiddling and produces a much better hash distribution. This shaves 20% off the time to tshark-with-tree the capture file in question *despite* a substantially more expensive hash function (wmem_strong_hash is not exactly fast compared to g_int64_hash). Bug:10078 Change-Id: I8e81cbc478e6394ec3a8efe39eec08f680a55609 Reviewed-on: https://code.wireshark.org/review/1543 Reviewed-by: Anders Broman <a.broman58@gmail.com> Command and args: ./tools/valgrind-wireshark.sh -T ==13827== Memcheck, a memory error detector ==13827== Copyright (C) 2002-2011, and GNU GPL'd, by Julian Seward et al. ==13827== Using Valgrind-3.7.0 and LibVEX; rerun with -h for copyright info ==13827== Command: /home/wireshark/builders/trunk-clang-ca/clangcodeanalysis/install/bin/tshark -Vx -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2014-05-08-27950.pcap ==13827== ==13827== Conditional jump or move depends on uninitialised value(s) ==13827== at 0x65E18E2: uint_to_str_back (to_str.c:1173) ==13827== by 0x65C26EA: fill_label_number (proto.c:6097) ==13827== by 0x65CB686: proto_item_fill_label (proto.c:5779) ==13827== by 0x65C027D: proto_tree_print_node (print.c:186) ==13827== by 0x65C1BCB: proto_tree_children_foreach (proto.c:629) ==13827== by 0x65C015D: proto_tree_print_node (print.c:241) ==13827== by 0x65C1BCB: proto_tree_children_foreach (proto.c:629) ==13827== by 0x65BF225: proto_tree_print (print.c:153) ==13827== by 0x413420: print_packet (tshark.c:3939) ==13827== by 0x414472: process_packet (tshark.c:3551) ==13827== by 0x40BF82: main (tshark.c:3327) ==13827== ==13827== ==13827== HEAP SUMMARY: ==13827== in use at exit: 1,222,378 bytes in 29,740 blocks ==13827== total heap usage: 304,781 allocs, 275,041 frees, 35,371,823 bytes allocated ==13827== ==13827== LEAK SUMMARY: ==13827== definitely lost: 9,323 bytes in 648 blocks ==13827== indirectly lost: 36,424 bytes in 49 blocks ==13827== possibly lost: 0 bytes in 0 blocks ==13827== still reachable: 1,176,631 bytes in 29,043 blocks ==13827== suppressed: 0 bytes in 0 blocks ==13827== Rerun with --leak-check=full to see details of leaked memory ==13827== ==13827== For counts of detected and suppressed errors, rerun with: -v ==13827== Use --track-origins=yes to see where uninitialised values come from ==13827== ERROR SUMMARY: 283 errors from 1 contexts (suppressed: 3 from 3) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 10095] Buildbot crash output: fuzz-2014-05-08-27950.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10095] Buildbot crash output: fuzz-2014-05-08-27950.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10095] Buildbot crash output: fuzz-2014-05-08-27950.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10095] Buildbot crash output: fuzz-2014-05-08-27950.pcap
- Prev by Date: [Wireshark-bugs] [Bug 10081] Failed to export pdml on large pcap
- Next by Date: [Wireshark-bugs] [Bug 10095] Buildbot crash output: fuzz-2014-05-08-27950.pcap
- Previous by thread: [Wireshark-bugs] [Bug 9511] Dissectors are called MANY more times with qtshark than with wireshark
- Next by thread: [Wireshark-bugs] [Bug 10095] Buildbot crash output: fuzz-2014-05-08-27950.pcap
- Index(es):