Wireshark-bugs: [Wireshark-bugs] [Bug 11129] Buildbot crash output: fuzz-2015-04-19-5769.pcap
Date: Sun, 19 Apr 2015 23:58:52 +0000

changed bug 11129


What Removed Added
CC   eapache@gmail.com

Comment # 1 on bug 11129 from
So entirely apart from all the assertion failures, this bug was actually
triggered because of an enormous memory leak which got cut off in the buildbot
output:

==15628== 672 bytes in 12 blocks are definitely lost in loss record 3,471 of
3,531
==15628==    at 0x4C2ABA0: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==15628==    by 0xB9387C9: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4200.1)
==15628==    by 0xB94F70F: g_slice_alloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4200.1)
==15628==    by 0x6B0B59C: fragment_add_work (reassemble.c:872)
==15628==    by 0x6B0FA23: fragment_add_check (reassemble.c:1455)
==15628==    by 0x7143266: mp2t_fragment_handle (packet-mp2t.c:541)
==15628==    by 0x7143B8D: mp2t_process_fragmented_payload (packet-mp2t.c:789)
==15628==    by 0x7143B8D: dissect_tsp (packet-mp2t.c:1187)
==15628==    by 0x7143B8D: dissect_mp2t (packet-mp2t.c:1204)
==15628==    by 0x6ACE929: call_dissector_through_handle (packet.c:614)
==15628==    by 0x6ACFB20: call_dissector_work (packet.c:700)
==15628==    by 0x6AD0792: dissector_try_uint_new (packet.c:1132)
==15628==    by 0x6AD0830: dissector_try_uint (packet.c:1158)
==15628==    by 0x6EDF13B: dissect_frame (packet-frame.c:496)
==15628== 
==15628== 587,160 bytes in 10,485 blocks are definitely lost in loss record
3,531 of 3,531
==15628==    at 0x4C2ABA0: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==15628==    by 0xB9387C9: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4200.1)
==15628==    by 0xB94F70F: g_slice_alloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4200.1)
==15628==    by 0x6B0B59C: fragment_add_work (reassemble.c:872)
==15628==    by 0x6B0FA23: fragment_add_check (reassemble.c:1455)
==15628==    by 0x7143266: mp2t_fragment_handle (packet-mp2t.c:541)
==15628==    by 0x71441B6: mp2t_process_fragmented_payload (packet-mp2t.c:795)
==15628==    by 0x71441B6: dissect_tsp (packet-mp2t.c:1187)
==15628==    by 0x71441B6: dissect_mp2t (packet-mp2t.c:1204)
==15628==    by 0x6ACE929: call_dissector_through_handle (packet.c:614)
==15628==    by 0x6ACFB20: call_dissector_work (packet.c:700)
==15628==    by 0x6AD0792: dissector_try_uint_new (packet.c:1132)
==15628==    by 0x6AD0830: dissector_try_uint (packet.c:1158)
==15628==    by 0x6EDF13B: dissect_frame (packet-frame.c:496)


You are receiving this mail because:
  • You are watching all bug changes.