can you:
(gdb) frame 72747
(gdb) p pinfo->fd->num # you'll obtain the one packet where the
problem manifests

- use editcap to extract that one packet (have a pcap file with just 1 packet)
- check whether or not that one packet crashes tshark

if it causes the crash check if the packet  contains sensible data and
if not forward that to us.

On 11/13/06, "März, Frank" <[EMAIL PROTECTED]> wrote:
>
>
> Hello Wireshark Community,
>
> I have discovered a problem with causes Wireshark and Tshark to crash with a
>  segmentation fault error. This problem is new to the version 0.99.4.  I
> have a tcpdumb which holds mostly GTP data which I would like to open or
> filter with Wireshark or Tshark. When I use the same capture file in 0.99.2
> I have no problems at all.
>
> I have made a gdb backtrace which I have attached to this email. I can not
> include the capture file due to the size 110MB and due to it holds private
> data.
>
> I would appreciate if somebody could have a look at this please. Sorry I do
> not understand this output myself.
>
> Best Regards,
>
> Frank
>
> (gdb)
> Continuing.
>
> Program received signal SIGSEGV, Segmentation fault.
> 0x00f08abc in check_offset_length_no_exception
> (tvb=0x8f0e9a0, offset=0, length=4, offset_ptr=0xbf400064,
> length_ptr=0xbf400068, exception=0x0) at tvbuff.c:389
> 389             if (!compute_offset_length(tvb, offset, length, offset_ptr,
> length_ptr, exception)) {
> (gdb)
>
>
> (gdb) backtrace
> #0  0x00f08abc in check_offset_length_no_exception
> (tvb=0x8f0e9a0, offset=0, length=4, offset_ptr=0xbf400064,
> length_ptr=0xbf400068, exception=0x0) at tvbuff.c:389
> #1  0x00f099f0 in ensure_contiguous_no_exception (tvb=0x8f0e9a0,
> offset=Variable "offset" is not available.
> ) at tvbuff.c:824
> #2  0x00f0a990 in tvb_memeql (tvb=0x8f0e9a0, offset=0, str=0x1512474 "",
> size=4) at tvbuff.c:1696
> #3  0x01042f82 in dissect_dcerpc_cn (tvb=0x8f0e9a0, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298, can_desegment=1, pkt_len=0xbf40029c) at
> packet-dcerpc.c:3809
> #4  0x01044e3e in dissect_dcerpc_cn_bs_body (tvb=0x8f0e9a0, pinfo=0x8a9ce10,
> tree=0x89f2298) at packet-dcerpc.c:4104
> #5  0x00ee850c in dissector_try_heuristic (sub_dissectors=0x887c5c8,
> tvb=0x8f0e9a0, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:1532
> #6  0x01111722 in dissect_http_message (tvb=0x8f0e96c, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298) at packet-http.c:1112
> #7  0x01112002 in dissect_http (tvb=0x8f0e96c, pinfo=0x8a9ce10,
> tree=0x89f2298) at packet-http.c:1947
> #8  0x00ee6a7f in call_dissector_through_handle (handle=0x868ae60,
> tvb=0x8f0e96c, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
> #9  0x00ee6dd3 in call_dissector_work (handle=0x868ae60, tvb=0x8f0e96c,
> pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
> #10 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87e9160, port=80,
> tvb=0x8f0e96c, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
> #11 0x012e7b31 in decode_tcp_ports (tvb=0x8f0e938, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298, src_port=80, dst_port=1830,
> tcpd=0xb6919828) at packet-tcp.c:1901
> #12 0x012e7c7c in process_tcp_payload (tvb=0x8f0e938, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298, tcp_tree=0x89f2298, src_port=80,
> dst_port=1830, seq=1047784259,
>     nxtseq=1047785519, is_tcp_segment=1, tcpd=0xb6919828) at
> packet-tcp.c:1960
> #13 0x012e83c5 in dissect_tcp_payload (tvb=0x8f0e938, pinfo=0x8a9ce10,
> offset=0, seq=1047784259, nxtseq=1047785519, sport=80, dport=1830,
> tree=0x89f2298,
>     tcp_tree=0x89f2298, tcpd=0xb6919828) at packet-tcp.c:2036
> #14 0x01111f38 in dissect_http_message (tvb=0x8f0e904, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298) at packet-http.c:1442
> #15 0x01112002 in dissect_http (tvb=0x8f0e904, pinfo=0x8a9ce10,
> tree=0x89f2298) at packet-http.c:1947
> #16 0x00ee6a7f in call_dissector_through_handle (handle=0x868ae60,
> tvb=0x8f0e904, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
> #17 0x00ee6dd3 in call_dissector_work (handle=0x868ae60, tvb=0x8f0e904,
> pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
> #18 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87e9160, port=80,
> tvb=0x8f0e904, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
> #19 0x012e7b31 in decode_tcp_ports (tvb=0x8f0e8d0, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298, src_port=80, dst_port=1830,
> tcpd=0xb6919828) at packet-tcp.c:1901
> #20 0x012e7c7c in process_tcp_payload (tvb=0x8f0e8d0, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298, tcp_tree=0x89f2298, src_port=80,
> dst_port=1830, seq=1047784259,
>     nxtseq=1047785519, is_tcp_segment=1, tcpd=0xb6919828) at
> packet-tcp.c:1960
> #21 0x012e83c5 in dissect_tcp_payload (tvb=0x8f0e8d0, pinfo=0x8a9ce10,
> offset=0, seq=1047784259, nxtseq=1047785519, sport=80, dport=1830,
> tree=0x89f2298,
>     tcp_tree=0x89f2298, tcpd=0xb6919828) at packet-tcp.c:2036
> #22 0x01111f38 in dissect_http_message (tvb=0x8f0e6c0, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298) at packet-http.c:1442
> #23 0x01112002 in dissect_http (tvb=0x8f0e6c0, pinfo=0x8a9ce10,
> tree=0x89f2298) at packet-http.c:1947
> #24 0x00ee6a7f in call_dissector_through_handle (handle=0x868ae60,
> tvb=0x8f0e6c0, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
> #25 0x00ee6dd3 in call_dissector_work (handle=0x868ae60, tvb=0x8f0e6c0,
> pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
> #26 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87e9160, port=80,
> tvb=0x8f0e6c0, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
> #27 0x012e7b31 in decode_tcp_ports (tvb=0x8f0e68c, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298, src_port=80, dst_port=1830,
> tcpd=0xb6919828) at packet-tcp.c:1901
> #28 0x012e7c7c in process_tcp_payload (tvb=0x8f0e68c, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298, tcp_tree=0x89f2298, src_port=80,
> dst_port=1830, seq=1047784259,
>     nxtseq=1047785519, is_tcp_segment=1, tcpd=0xb6919828) at
> packet-tcp.c:1960
> #29 0x012e83c5 in dissect_tcp_payload (tvb=0x8f0e68c, pinfo=0x8a9ce10,
> offset=0, seq=1047784259, nxtseq=1047785519, sport=80, dport=1830,
> tree=0x89f2298,
>     tcp_tree=0x89f2298, tcpd=0xb6919828) at packet-tcp.c:2036
> #30 0x01111f38 in dissect_http_message (tvb=0x8f0e658, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298) at packet-http.c:1442
> #31 0x01112002 in dissect_http (tvb=0x8f0e658, pinfo=0x8a9ce10,
> tree=0x89f2298) at packet-http.c:1947
> #32 0x00ee6a7f in call_dissector_through_handle (handle=0x868ae60,
> tvb=0x8f0e658, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
> #33 0x00ee6dd3 in call_dissector_work (handle=0x868ae60, tvb=0x8f0e658,
> pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
> #34 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87e9160, port=80,
> tvb=0x8f0e658, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
> #35 0x012e7b31 in decode_tcp_ports (tvb=0x8f0e624, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298, src_port=80, dst_port=1830,
> tcpd=0xb6919828) at packet-tcp.c:1901
> #36 0x012e7c7c in process_tcp_payload (tvb=0x8f0e624, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298, tcp_tree=0x89f2298, src_port=80,
> dst_port=1830, seq=1047784259,
>     nxtseq=1047785519, is_tcp_segment=1, tcpd=0xb6919828) at
> packet-tcp.c:1960
> #37 0x012e83c5 in dissect_tcp_payload (tvb=0x8f0e624, pinfo=0x8a9ce10,
> offset=0, seq=1047784259, nxtseq=1047785519, sport=80, dport=1830,
> tree=0x89f2298,
>     tcp_tree=0x89f2298, tcpd=0xb6919828) at packet-tcp.c:2036
> #38 0x01111f38 in dissect_http_message (tvb=0x8f0e5f0, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298) at packet-http.c:1442
> #39 0x01112002 in dissect_http (tvb=0x8f0e5f0, pinfo=0x8a9ce10,
> tree=0x89f2298) at packet-http.c:1947
> #40 0x00ee6a7f in call_dissector_through_handle (handle=0x868ae60,
> tvb=0x8f0e5f0, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
> #41 0x00ee6dd3 in call_dissector_work (handle=0x868ae60, tvb=0x8f0e5f0,
> pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
> #42 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87e9160, port=80,
> tvb=0x8f0e5f0, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
> #43 0x012e7b31 in decode_tcp_ports (tvb=0x8f0e5bc, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298, src_port=80, dst_port=1830,
> tcpd=0xb6919828) at packet-tcp.c:1901
> #44 0x012e7c7c in process_tcp_payload (tvb=0x8f0e5bc, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298, tcp_tree=0x89f2298, src_port=80,
> dst_port=1830, seq=1047784259,
>     nxtseq=1047785519, is_tcp_segment=1, tcpd=0xb6919828) at
> packet-tcp.c:1960
> #45 0x012e83c5 in dissect_tcp_payload (tvb=0x8f0e5bc, pinfo=0x8a9ce10,
> offset=0, seq=1047784259, nxtseq=1047785519, sport=80, dport=1830,
> tree=0x89f2298,
>     tcp_tree=0x89f2298, tcpd=0xb6919828) at packet-tcp.c:2036
> #46 0x01111f38 in dissect_http_message (tvb=0x8f0e588, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298) at packet-http.c:1442
> #47 0x01112002 in dissect_http (tvb=0x8f0e588, pinfo=0x8a9ce10,
> tree=0x89f2298) at packet-http.c:1947
> #48 0x00ee6a7f in call_dissector_through_handle (handle=0x868ae60,
> tvb=0x8f0e588, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
> #49 0x00ee6dd3 in call_dissector_work (handle=0x868ae60, tvb=0x8f0e588,
> pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
> #50 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87e9160, port=80,
> tvb=0x8f0e588, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
> #51 0x012e7b31 in decode_tcp_ports (tvb=0x8f0e554, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298, src_port=80, dst_port=1830,
> tcpd=0xb6919828) at packet-tcp.c:1901
> #52 0x012e7c7c in process_tcp_payload (tvb=0x8f0e554, offset=0,
> pinfo=0x8a9ce10, tree=0x89f2298, tcp_tree=0x89f2298, src_port=80,
> dst_port=1830, seq=1047784259,
>     nxtseq=1047785519, is_tcp_segment=1, tcpd=0xb6919828) at
> packet-tcp.c:1960
> #53 0x012e83c5 in dissect_tcp_payload (tvb=0x8f0e554, pinfo=0x8a9ce10,
> offset=0, seq=1047784259, nxtseq=1047785519, sport=80, dport=1830,
> tree=0x89f2298,
> ---Type <return> to continue, or q <return> to quit---
>
> .
> .
> .
> .
> .
>
>
> #72723 0x00ee6a7f in call_dissector_through_handle (handle=0x8697c40,
> tvb=0x8b62698, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
> #72724 0x00ee6dd3 in call_dissector_work (handle=0x8697c40, tvb=0x8b62698,
> pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
> #72725 0x00ee7051 in call_dissector (handle=0x8697c40, tvb=0x8b62698,
> pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:1711
> #72726 0x010f142f in dissect_gtp (tvb=0x8b62664, pinfo=0x8a9ce10,
> tree=0x89f2298) at packet-gtp.c:5781
> #72727 0x00ee6a7f in call_dissector_through_handle (handle=0x866bee0,
> tvb=0x8b62664, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
> #72728 0x00ee6dd3 in call_dissector_work (handle=0x866bee0, tvb=0x8b62664,
> pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
> #72729 0x00ee78e6 in dissector_try_port (sub_dissectors=0x87ee330,
> port=2152, tvb=0x8b62664, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
> #72730 0x012fc7fc in decode_udp_ports (tvb=0x8b62630, offset=8,
> pinfo=0x8a9ce10, tree=0x89f2298, uh_sport=2152, uh_dport=2152, uh_ulen=1316)
> at packet-udp.c:140
> #72731 0x012fccd7 in dissect (tvb=0x8b62630, pinfo=0x8a9ce10,
> tree=0x89f2298, ip_proto=1114112) at packet-udp.c:347
> #72732 0x00ee6a7f in call_dissector_through_handle (handle=0x88b35c8,
> tvb=0x8b62630, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
> #72733 0x00ee6dd3 in call_dissector_work (handle=0x88b35c8, tvb=0x8b62630,
> pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
> #72734 0x00ee78e6 in dissector_try_port (sub_dissectors=0x8692b98, port=17,
> tvb=0x8b62630, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
> #72735 0x0112e373 in dissect_ip (tvb=0x8b625fc, pinfo=0x8a9ce10,
> parent_tree=0x89f2298) at packet-ip.c:1187
> #72736 0x00ee6a7f in call_dissector_through_handle (handle=0x8697c40,
> tvb=0x8b625fc, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
> #72737 0x00ee6dd3 in call_dissector_work (handle=0x8697c40, tvb=0x8b625fc,
> pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
> #72738 0x00ee78e6 in dissector_try_port (sub_dissectors=0x865c448,
> port=2048, tvb=0x8b625fc, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
> #72739 0x010888d6 in ethertype (etype=2048, tvb=0x8b625c8,
> offset_after_etype=14, pinfo=0x8a9ce10, tree=0x89f2298, fh_tree=0x89f2208,
> etype_id=10010,
>     trailer_id=10012, fcs_len=-1) at packet-ethertype.c:197
> #72740 0x01086451 in dissect_eth_common (tvb=0x8b625c8, pinfo=0x8a9ce10,
> parent_tree=0x89f2298, fcs_len=-1) at packet-eth.c:344
> #72741 0x00ee6a7f in call_dissector_through_handle (handle=0x889fbb8,
> tvb=0x8b625c8, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
>
> #72742 0x00ee6dd3 in call_dissector_work (handle=0x889fbb8, tvb=0x8b625c8,
> pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
> #72743 0x00ee78e6 in dissector_try_port (sub_dissectors=0x86565d8, port=1,
> tvb=0x8b625c8, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:842
> #72744 0x010a4edc in dissect_frame (tvb=0x8b625c8, pinfo=0x8a9ce10,
> parent_tree=0x89f2298) at packet-frame.c:286
> #72745 0x00ee6a7f in call_dissector_through_handle (handle=0x8656698,
> tvb=0x8b625c8, pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:392
> #72746 0x00ee6dd3 in call_dissector_work (handle=0x8656698, tvb=0x8b625c8,
> pinfo_arg=0x8a9ce10, tree=0x89f2298) at packet.c:567
> #72747 0x00ee7051 in call_dissector (handle=0x8656698, tvb=0x8b625c8,
> pinfo=0x8a9ce10, tree=0x89f2298) at packet.c:1711
> #72748 0x00ee74c2 in dissect_packet (edt=0x8a9ce08, pseudo_header=0x897a82c,
> pd=0x89fdf90 "", fd=0x8b1cb84, cinfo=0x8174e78) at packet.c:331
> #72749 0x00ee3829 in epan_dissect_run (edt=0x8a9ce08,
> pseudo_header=0x897a82c, data=0x89fdf90 "", fd=0x8b1cb84, cinfo=0x8174e78)
> at epan.c:195
> #72750 0x08069494 in add_packet_to_packet_list (fdata=0x8b1cb84,
> cf=0x8164d60, pseudo_header=0x897a82c, buf=0x89fdf90 "", refilter=1) at
> file.c:831
> #72751 0x080696d6 in read_packet (cf=0x8164d60, offset=761329) at file.c:955
> #72752 0x08069988 in cf_read (cf=0x8164d60) at file.c:459
>
> #72753 0x080b4e90 in file_open_ok_cb (w=0x8962ad0, fs=0x8901370) at
> capture_file_dlg.c:715
> #72754 0x002ad1a0 in gtk_marshal_NONE__NONE () from /usr/lib/libgtk-1.2.so.0
> #72755 0x0027a427 in gtk_signal_connect_while_alive () from
> /usr/lib/libgtk-1.2.so.0
> ---Type <return> to continue, or q <return> to quit---
> #72756 0x0027b230 in gtk_signal_emit_stop_by_name () from
> /usr/lib/libgtk-1.2.so.0
> #72757 0x0027bee7 in gtk_signal_emit () from /usr/lib/libgtk-1.2.so.0
> #72758 0x0031934a in gtk_button_clicked () from /usr/lib/libgtk-1.2.so.0
> #72759 0x0031abd8 in gtk_button_set_relief () from /usr/lib/libgtk-1.2.so.0
> #72760 0x002ad1a0 in gtk_marshal_NONE__NONE () from /usr/lib/libgtk-1.2.so.0
> #72761 0x0027b2dd in gtk_signal_emit_stop_by_name () from
> /usr/lib/libgtk-1.2.so.0
> #72762 0x0027bee7 in gtk_signal_emit () from /usr/lib/libgtk-1.2.so.0
> #72763 0x00319267 in gtk_button_released () from /usr/lib/libgtk-1.2.so.0
> #72764 0x0031a462 in gtk_button_set_relief () from /usr/lib/libgtk-1.2.so.0
> #72765 0x002ace79 in gtk_marshal_BOOL__POINTER () from
> /usr/lib/libgtk-1.2.so.0
> #72766 0x0027b333 in gtk_signal_emit_stop_by_name () from
> /usr/lib/libgtk-1.2.so.0
> #72767 0x0027bee7 in gtk_signal_emit () from /usr/lib/libgtk-1.2.so.0
> #72768 0x002411b9 in gtk_widget_event () from /usr/lib/libgtk-1.2.so.0
> #72769 0x002aec0c in gtk_propagate_event () from /usr/lib/libgtk-1.2.so.0
> #72770 0x002aefa7 in gtk_main_do_event () from /usr/lib/libgtk-1.2.so.0
> #72771 0x00154620 in gdk_event_get () from /usr/lib/libgdk-1.2.so.0
> #72772 0x0018b287 in g_get_current_time () from /usr/lib/libglib-1.2.so.0
> #72773 0x0018bf13 in g_main_add_poll () from /usr/lib/libglib-1.2.so.0
> #72774 0x0018c0e5 in g_main_run () from /usr/lib/libglib-1.2.so.0
> #72775 0x002ae232 in gtk_main () from /usr/lib/libgtk-1.2.so.0
> #72776 0x0807ed6d in main (argc=0, argv=0xbffcd438) at main.c:2985
> (gdb)
>
> (gdb)
>
>
>
> _______________________________________________
> Wireshark-dev mailing list
> [email protected]
> http://www.wireshark.org/mailman/listinfo/wireshark-dev
>
>


-- 
This information is top security. When you have read it, destroy yourself.
-- Marshall McLuhan
_______________________________________________
Wireshark-dev mailing list
[email protected]
http://www.wireshark.org/mailman/listinfo/wireshark-dev

Reply via email to