Wireshark-bugs: [Wireshark-bugs] [Bug 7338] New: wireshark 1.6.8 crashes when selecting capture
Date: Wed, 6 Jun 2012 10:03:04 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7338

           Summary: wireshark 1.6.8 crashes when selecting capture options
           Product: Wireshark
           Version: 1.6.8
          Platform: SPARC
        OS/Version: Solaris
            Status: NEW
          Severity: Normal
          Priority: Low
         Component: Wireshark
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: empressdawn2@xxxxxxxxx


Build Information:
# wireshark -v
wireshark 1.6.8 (SVN Rev Unknown from unknown)

Copyright 1998-2012 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (32-bit) with GTK+ 2.4.9, with GLib 2.4.8, with libpcap (version
unknown), with libz 1.2.5, without POSIX capabilities, with libpcre (version
unknown), without SMI, without c-ares, with ADNS, without Lua, without Python,
without GnuTLS, with Gcrypt 1.4.6, with MIT Kerberos, with GeoIP, without
PortAudio, without AirPcap.

Running on SunOS 5.10, with libpcap version 1.2.0, with libz 1.2.5, Gcrypt
1.4.6.

Built using gcc 3.4.6.

--
if I just select the button "start a new live capture" it will run 
if I select bge1 from the interace list on the main screen it will run

If I attempt to capture using the toolbar either capture-->interfaces or
capture-->options, it will crash. 

 # pstack core
core 'core' of 22902:   wireshark
 fc6ee070 gtk_tree_model_get_valist (c8dd88, ffbfe890, ffbfe80c, 8800, f1464,
38       ) + 144
 fc6edf1c gtk_tree_model_get (c8dd88, ffbfe890, 8800, f1540, fc5a68c0,
fc7df398)        + d8
 000ccfc0 capture_start_cb (cb0970, e0c430, fd4748, f4ba48, e58118, 132efc0) +
6       c0
 ff03a26c g_cclosure_marshal_VOID__VOID (f9f498, 0, 1, ffbfeb88, ffbfea60,
cc900       ) + b4
 ff01d240 g_closure_invoke (f9f498, 0, 1, ffbfeb88, ffbfea60, 1418) + f0
 ff037d50 signal_emit_unlocked_R (b69f40, ffbfea40, b94460, 0, 7b, ffbfea60) +
7       58
 ff039820 g_signal_emit_valist (b94460, 7b, 1400, ffbfedd8, b69f40, ffbfeb78) +
       a78
 ff039c50 g_signal_emit (b94460, 7b, 0, ff04632c, 800, fc7f24dc) + 1c
 fc572d90 gtk_real_button_released (b94460, ae75e8, 3800007, 9e8, e7, b94460) +
       40
 ff03a248 g_cclosure_marshal_VOID__VOID (b6be98, 0, 1, ffbff130, ffbff008,
fc572       d50) + 90
 ff01d604 g_type_class_meta_marshal (b6be98, 0, 1, ffbff130, ffbff008, 1a4) +
38
 ff01d240 g_closure_invoke (b6be98, 0, 1, ffbff130, ffbff008, b6a720) + f0
 ff037ae4 signal_emit_unlocked_R (b6c408, 0, b94460, 0, 7a, ffbfefd0) + 4ec
 ff039820 g_signal_emit_valist (b94460, 7a, 1400, ffbff380, b6c408, 938) + a78
 ff039c50 g_signal_emit (b94460, 7a, 0, ff04632c, 800, fc7f24dc) + 1c
 fc572c28 gtk_button_button_release (b94460, 2c7a30, 1e4068, 4c00, 1, fec) + 14
 fc62e078 _gtk_marshal_BOOLEAN__BOXED (ffbff578, 1b140c, 1e6fb8, ffbff6c0,
ffbff       598, fc572c14) + f8
 ff01d604 g_type_class_meta_marshal (1e6fb8, ffbff578, 2, ffbff6c0, ffbff598,
b4       ) + 38
 ff01d240 g_closure_invoke (1e6fb8, ffbff578, 2, ffbff6c0, ffbff598, b6a720) +
f       0
 ff037ef0 signal_emit_unlocked_R (1e78d8, 0, b94460, 1e6470, 1c, ffbff560) +
8f8
 ff039464 g_signal_emit_valist (b94460, 1e7839, 1400, ffbff914, 1e78d8, 1e7818)
       + 6bc
 ff039c50 g_signal_emit (b94460, 1c, 0, 2c7a30, ffbff924, fffffec8) + 1c
 fc7339a4 gtk_widget_event_internal (b94460, 2c7a30, fc733750, 16c, 20, 9c00) +
       1cc
 fc62c5c8 gtk_propagate_event (b94460, 2c7a30, 9acac, 1b2f04, fc428db8,
fc7df398       ) + 13c
 fc62b4b8 gtk_main_do_event (38c, 2c7a30, b94460, fc62b128, 0, 20) + 308
 ff144e24 gdk_event_dispatch (1e3100, 1e0f98, 3a480, fc42b5c4, 2c7a30,
ff17f228)        + 8c
 fc42ce8c g_main_context_dispatch (1e3148, 900, 904, 193c, 1938, 1800) + 23c
 fc42f4d4 g_main_context_iterate (1e3148, 1, 1, 1eea98, 0, 0) + 568
 fc42f9c8 g_main_loop_run (270670, 0, 1934, 18f4, fc4a0fe4, fc4a11b4) + 338
 fc62aa44 gtk_main (0, 0, 270670, c946d8, fc7f2da8, 4cf8) + d0
 000527d8 main     (1c1400, 1bec00, 0, 0, 0, 0) + f38
 0002d364 _start   (0, 0, 0, 0, 0, 0) + 5c
# pflags core
core 'core' of 22902:   wireshark
        data model = _ILP32  flags = MSACCT|MSFORK
 /1:    flags = 0
        sigmask = 0xffffbefc,0x0000ffff  cursig = SIGSEGV

# file core
core:           ELF 32-bit MSB core file SPARC Version 1, from 'wireshark'
# adb core
adb: core file data for mapping at f6802000 not saved: Bad address
adb: core file data for mapping at f71fe000 not saved: Bad address
adb: core file data for mapping at f7802000 not saved: Bad address
adb: core file data for mapping at f81fe000 not saved: Bad address
core file = core -- program ``/usr/local/bin/wireshark'' on platform
SUNW,Sun-Fire-V215
SIGSEGV: Segmentation Fault

where
adb: failed to dereference symbol: unknown symbol name


[1] + Stopped (SIGTSTP)        adb core
# fg
adb core

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.