Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 91526 Details for
Bug 133092
net-analyzer/ethereal-0.99 tries to free invalid pointer when listing packets
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
gdb backtrace for tethereal
tethereal_backtrace.txt (text/plain), 11.76 KB, created by
sfp-a7x
on 2006-07-11 18:21:29 UTC
(
hide
)
Description:
gdb backtrace for tethereal
Filename:
MIME Type:
Creator:
sfp-a7x
Created:
2006-07-11 18:21:29 UTC
Size:
11.76 KB
patch
obsolete
>Using host libthread_db library "/lib/libthread_db.so.1". >Core was generated by `tethereal'. >Program terminated with signal 6, Aborted. >#0 0xffffe410 in __kernel_vsyscall () > >Thread 1 (process 32361): >#0 0xffffe410 in __kernel_vsyscall () >No symbol table info available. >#1 0xb67255e1 in raise () from /lib/libc.so.6 >No symbol table info available. >#2 0xb6726d99 in abort () from /lib/libc.so.6 >No symbol table info available. >#3 0xb6759f20 in __fsetlocking () from /lib/libc.so.6 >No symbol table info available. >#4 0xb675fe9e in malloc_usable_size () from /lib/libc.so.6 >No symbol table info available. >#5 0xb67608ab in free () from /lib/libc.so.6 >No symbol table info available. >#6 0xb6e3d904 in except_free (ptr=0x0) at except.c:371 >No locals. >#7 0xb726ee4d in dissect_802_3 (length=38, is_802_2=1, tvb=0x8364680, offset_after_length=14, pinfo=0x8403400, tree=0x0, fh_tree=0x0, length_id=0, trailer_id=8426, > fcs_len=44) at packet-ieee8023.c:71 > except_sn = {except_down = 0xbfc78180, except_type = XCEPT_CATCHER, except_info = {except_catcher = 0xbfc77c30, except_cleanup = 0xbfc77c30}} > except_ch = {except_id = 0xb794953c, except_size = 1, except_obj = {except_id = {except_group = 3217521884, except_code = 3217521820}, > except_message = 0x75c9b5a6 <Address 0x75c9b5a6 out of bounds>, except_dyndata = 0x0}, except_jmp = {{__jmpbuf = {137774832, 0, -1233022680, -1077445336, -1077445648, > -1222185614}, __mask_was_saved = 0, __saved_mask = {__val = {3061944616, 3217521848, 1976153510, 137774720, 14, 2, 3064114536, 3217521980, 4096, 3217521864, > 3063851180, 138129248, 4096, 3079224510, 3217521980, 1976153510, 3217523376, 3061025561, 3217523420, 3083712260, 3061944616, 3217521912, 3083712260, 5, > 134760792, 3217521960, 3068448450, 138129248, 4096, 3079224510, 3217521980, 3061188654}}}}} > exc = (except_t *) 0x0 > except_state = 0 > catch_spec = {{except_group = 1, except_code = 0}} > next_tvb = (tvbuff_t * volatile) 0x0 > trailer_tvb = (tvbuff_t * volatile) 0x83646f0 > saved_proto = 0x0 > captured_length = 0 > __PRETTY_FUNCTION__ = "dissect_802_3" >#8 0xb70ec2a0 in dissect_eth_common (tvb=0x8364680, pinfo=0x8403400, parent_tree=0x0, fcs_len=44) at packet-eth.c:307 > ti = (proto_item *) 0x6 > ehdr = (eth_hdr * volatile) 0xb7f2a49c > is_802_2 = 1 > fh_tree = (proto_tree * volatile) 0x0 > src_addr = (const guint8 *) 0x83f3060 "" > dst_addr = (const guint8 *) 0x83f305a "\001\200Â" > ehdrs = {{dst = {type = AT_NONE, len = 0, data = 0x0}, src = {type = AT_NONE, len = 0, data = 0x0}, type = 0}, {dst = {type = AT_ETHER, len = 6, > data = 0x83f305a "\001\200Â"}, src = {type = AT_ETHER, len = 6, data = 0x83f3060 ""}, type = 38}, {dst = {type = AT_NONE, len = 0, data = 0x0}, src = { > type = AT_NONE, len = 0, data = 0x0}, type = 0}, {dst = {type = AT_NONE, len = 0, data = 0x0}, src = {type = AT_NONE, len = 0, data = 0x0}, type = 0}} > ehdr_num = 1 > tree = (proto_tree * volatile) 0x0 > addr_item = (proto_item *) 0x6 > addr_tree = (proto_tree *) 0x0 >#9 0xb70ec8d3 in dissect_eth_maybefcs (tvb=0x8364680, pinfo=0x6, tree=0x7e69) at packet-eth.c:440 >No locals. >#10 0xb6e41a74 in call_dissector_through_handle (handle=0x8373578, tvb=0x8364680, pinfo=0x8403400, tree=0x0) at packet.c:386 > saved_proto = 0xb779d411 "Ethernet" > ret = 6 >#11 0xb6e4212c in call_dissector_work (handle=0x8373578, tvb=0x8364680, pinfo_arg=0x0, tree=0x0) at packet.c:561 > pinfo = (packet_info * volatile) 0x8403400 > saved_proto = 0xb787f7d4 "Frame" > saved_can_desegment = 0 > ret = 0 > save_writable = 0 > save_dl_src = {type = AT_NONE, len = 0, data = 0x0} > save_dl_dst = {type = AT_NONE, len = 0, data = 0x0} > save_net_src = {type = AT_NONE, len = 0, data = 0x0} > save_net_dst = {type = AT_NONE, len = 0, data = 0x0} > save_src = {type = AT_NONE, len = 0, data = 0x0} > save_dst = {type = AT_NONE, len = 0, data = 0x0} > saved_layer_names_len = 0 > __PRETTY_FUNCTION__ = "call_dissector_work" >#12 0xb6e426e6 in dissector_try_port (sub_dissectors=0x0, port=1, tvb=0x8364680, pinfo=0x8403400, tree=0x0) at packet.c:836 > dtbl_entry = (dtbl_entry_t *) 0x0 > handle = (struct dissector_handle *) 0x0 > saved_match_port = 0 > ret = 0 >#13 0xb711adbc in dissect_frame (tvb=0x8364680, pinfo=0x8403400, parent_tree=0x0) at packet-frame.c:284 > except_sn = {except_down = 0xbfc78520, except_type = XCEPT_CATCHER, except_info = {except_catcher = 0xbfc781a0, except_cleanup = 0xbfc781a0}} > except_ch = {except_id = 0xb78a97a0, except_size = 1, except_obj = {except_id = {except_group = 3061157242, except_code = 138358240}, > except_message = 0x83f2de0 "X\230\201¶X\230\201¶\024", except_dyndata = 0x0}, except_jmp = {{__jmpbuf = {-1211255036, 0, 0, -1077443960, -1077444304, -1223578381}, > __mask_was_saved = 0, __saved_mask = {__val = {138358240, 138358240, 138358240, 138358266, 138358340, 138358240, 138358340, 0 <repeats 14 times>, 4294967295, 0, 0, > 0, 0, 3061188865, 0, 0, 0, 0, 0}}}}} > exc = (except_t *) 0x0 > except_state = 0 > catch_spec = {{except_group = 1, except_code = 0}} > fh_tree = (proto_tree *) 0x0 > ti = (proto_item * volatile) 0x0 > ts = {secs = -1233020928, nsecs = -1233027604} > cap_len = 0 > pkt_len = 0 > tree = (proto_tree *) 0x0 > item = (proto_item *) 0x6 >#14 0xb6e41a74 in call_dissector_through_handle (handle=0x8100a10, tvb=0x8364680, pinfo=0x8403400, tree=0x0) at packet.c:386 > saved_proto = 0xb787f7d4 "Frame" > ret = 6 >#15 0xb6e4212c in call_dissector_work (handle=0x8100a10, tvb=0x8364680, pinfo_arg=0x0, tree=0x0) at packet.c:561 > pinfo = (packet_info * volatile) 0x8403400 > saved_proto = 0xb76d1789 "<Missing Protocol Name>" > saved_can_desegment = 0 > ret = 0 > save_writable = 2 > save_dl_src = {type = AT_NONE, len = 0, data = 0x0} > save_dl_dst = {type = AT_NONE, len = 1, data = 0x4 <Address 0x4 out of bounds>} > save_net_src = {type = 3061938656, len = 0, data = 0x0} > save_net_dst = {type = 30, len = 0, data = 0xb6819128 "¦µÉu"} > save_src = {type = 3061944616, len = 32, data = 0xbfc783c8 "\030\204Ç¿¡R\235¶¤\204Ç¿\021"} > save_dst = {type = 3217523612, len = 134634713, data = 0xbfc78800 "¦µÉu"} > saved_layer_names_len = 0 > __PRETTY_FUNCTION__ = "call_dissector_work" >#16 0xb6e4402c in call_dissector (handle=0x0, tvb=0x8364680, pinfo=0x8403400, tree=0x0) at packet.c:1704 > ret = 0 > __PRETTY_FUNCTION__ = "call_dissector" >#17 0xb6e41883 in dissect_packet (edt=0x84033f8, pseudo_header=0x8403400, pd=0x83f305a "\001\200Â", fd=0xbfc786c0, cinfo=0x0) at packet.c:325 > except_sn = {except_down = 0x0, except_type = XCEPT_CATCHER, except_info = {except_catcher = 0xbfc78540, except_cleanup = 0xbfc78540}} > except_ch = {except_id = 0xb76d1ed0, except_size = 1, except_obj = {except_id = {except_group = 3217524072, except_code = 3060962911}, > except_message = 0x840328b "", except_dyndata = 0x0}, except_jmp = {{__jmpbuf = {-1211255036, 134760792, -1077442672, -1077443032, -1077443344, -1226565689}, > __mask_was_saved = 0, __saved_mask = {__val = {0, 10, 0, 504, 138424456, 0, 3061946368, 264, 3061946368, 3061947392, 3061946424, 3061195969, 3061946368, 46, > 3063327988, 138424984, 138358312, 3217524264, 3063216669, 138424464, 3063277856, 0, 3068376189, 3061946368, 249, 0, 29, 133913, 138425328, 32, 0, 3061939692}}}}} > exc = (except_t *) 0x0 > except_state = 0 > catch_spec = {{except_group = 1, except_code = 0}} > __PRETTY_FUNCTION__ = "dissect_packet" >#18 0xb6e3cb08 in epan_dissect_run (edt=0x84033f8, pseudo_header=0xbfc78790, data=0x0, fd=0xbfc786c0, cinfo=0x8084958) at epan.c:161 >No locals. >#19 0x0806849c in process_packet (cf=0x8074840, offset=0, whdr=0x0, pseudo_header=0xbfc78790, pd=0x0) at tethereal.c:2293 > fdata = {next = 0x0, prev = 0x0, pfd = 0x0, num = 1, pkt_len = 60, cap_len = 60, cum_bytes = 60, abs_ts = {secs = 1152666196, nsecs = 833939000}, rel_ts = { > secs = 0, nsecs = 0}, del_ts = {secs = 0, nsecs = 0}, file_off = 0, lnk_t = 1, flags = {passed_dfilter = 0, encoding = 0, visited = 0, marked = 0, ref_time = 0}, > color_filter = 0x0} > create_proto_tree = 32361 > edt = (epan_dissect_t *) 0x84033f8 > passed = 1 >#20 0x08067ba5 in capture_pcap_cb (user=0x80746a0 "\001", phdr=0xbfc788a0, pd=0x83f305a "\001\200Â") at tethereal.c:1913 > whdr = {ts = {secs = 1152666196, nsecs = 833939000}, caplen = 60, len = 60, pkt_encap = 1} > pseudo_header = {eth = {fcs_len = 44}, x25 = {flags = 44 ','}, isdn = {uton = 44, channel = 32 ' '}, atm = {flags = 44, aal = 32 ' ', type = 161 '¡', > subtype = 157 '\235', vpi = 24688, vci = 2056, channel = 2305, cells = 46710, aal5t_u2u = 1, aal5t_len = 0, aal5t_chksum = 44}, ascend = {type = 44, > user = "\000\000 ¡\235¶p`\b\b\001\tv¶\001\000\000\000,\000\000\000\003\000\000\000h`\b\b¦µÉu\000\210Ç¿\001\000\000\000h`\b\b¦µÉuì}\201¶\220\210Ç¿h¢¶h", > sess = 138356320, call_num = "(\210Ç¿h¢¶P.?\bø2@\b8\210Ç¿¸¯\232¶\f\000\000\000\000\000\000\000À \235¶1¡\235¶¦µÉu\000\000\000\000\b\207Ç¿(\221\201¶¦µÉuð2@\b", > chunk = 138358240, task = 24}, p2p = {sent = 44}, ieee_802_11 = {fcs_len = 44, channel = 32 ' ', data_rate = 161 '¡', signal_level = 157 '\235'}, cosine = { > encap = 44 ',', direction = 0 '\0', > if_name = "\000\000 ¡\235¶p`\b\b\001\tv¶\001\000\000\000,\000\000\000\003\000\000\000h`\b\b¦µÉu\000\210Ç¿\001\000\000\000h`\b\b¦µÉuì}\201¶\220\210Ç¿h¢¶h¢¶`&?\b(\210Ç¿h¢¶P.?\bø2@\b8\210Ç¿¸¯\232¶\f\000\000\000\000\000\000\000À \235¶1¡\235¶¦µÉu\000\000\000\000\b\207Ç¿(\221\201¶¦µ", pro = 30153, off = 13040, pri = 2112, rm = 11744, > err = 2111}, irda = {pkttype = 44}, nettl = {subsys = 44, devid = 3063783712, kind = 134766704, pid = -1233778431, uid = 1}, mtp2 = {sent = 44 ',', > annex_a_used = 0 '\0', link_number = 0}, k12 = {input = 44, input_name = 0xb69da120 "U\211åWVS\203ì,\213M\bè\203\026üÿ\201Ã7\f\005", > stack_file = 0x8086070 "¨è;\b\037", input_type = 3061188865, input_info = {atm = {vp = 1, vc = 0, cid = 44}, ds0mask = 1}, stuff = 0x3}, lapd = {pkttype = 44, > we_network = 0 '\0'}} > wtap_pd = (const guchar *) 0x0 > ld = (loop_data *) 0x80746a0 > loop_err = -1231203679 > err = -1077442664 > save_file_fd = -1233772039 > packet_accepted = 0 >#21 0xb6953b11 in install_bpf_program () from /usr/lib/libpcap.so.0 >No symbol table info available. >#22 0xb695586f in pcap_dispatch () from /usr/lib/libpcap.so.0 >No symbol table info available. >#23 0x080675dd in capture () at tethereal.c:1698 > loop_err = 0 > err = 0 > volatile_err = 0 > inpkts = 0 > pcap_cnt = 6 > cnd_autostop_size = (condition * volatile) 0x0 > cnd_autostop_duration = (condition * volatile) 0x0 > descr = 0xd24 <Address 0xd24 out of bounds> > oldhandler = (void (*)(int)) 0 > pcap_data = '\0' <repeats 60736 times>, "\001\tv¶", '\0' <repeats 12 times>, "h\213È¿\000\220\000\000´Ïø·h\213È¿_µ÷·\b\000H¶\000\000\000\000à\001\000\000\022\b\000\000\004\000\000\000\000\200\000\0000\000\000\000\000\230\201¶\000\234\201¶8\230\201¶", '\0' <repeats 25 times>, "\220\000\000\020\200\000\000\020\200\000\000\000\000\000\000\005\000\000\000\000\220\000\000\000°\000\000\b \000\000è¡\000\000\000\200\000\000\003\000\000\000\230\n6\b\005\000\000\000 \000\000\000ì}\201¶\000\230\201¶8\b6\b´\213È¿Á$v¶\000\230\201¶\027\000\000\000´Ïø·\027\000\000\0008\b6\bô\213È¿Çí÷· \n6"... > stats = {ps_recv = 0, ps_drop = 0, ps_ifdrop = 0} > write_ok = 138358384 > close_ok = 0 > cfilter_error = 138358384 > errmsg = '\0' <repeats 1024 times> > secondary_errmsg = '\0' <repeats 4096 times> > save_file_fd = 0 >#24 0x08067126 in main (argc=1, argv=0xbfc89f24) at tethereal.c:1477 > opt = 6 > i = 6 > arg_error = 0 > gpf_path = 0x0 > pf_path = 0x0 > gdp_path = 0x0 > dp_path = 0x0 > gpf_open_errno = -1077366719 > gpf_read_errno = -1234099538 > pf_open_errno = 0 > pf_read_errno = -1077371272 > gdp_open_errno = 0 > gdp_read_errno = 0 > dp_open_errno = 0 > dp_read_errno = 0 > err = -1234099431 > list_link_layer_types = 0 > start_capture = 0 > quiet = 0 > out_file_type = 2 > cf_name = (gchar *) 0x0 > rfilter = (gchar *) 0x0 > fcode = {bf_len = 3, bf_insns = 0xb6819128} > rfcode = (dfilter_t *) 0x0 > prefs = (e_prefs *) 0xb7f35b60 > badopt = 0 '\0' > status = 0 > optstring = "a:b:c:d:Df:F:hi:lLnN:o:pqr:R:s:St:T:vVw:xX:y:z:" > __PRETTY_FUNCTION__ = "main"
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 133092
:
86635
|
91525
| 91526 |
101680