Hi,
On the binary search thing: this is useful if you have a capture with a single
offending packet in it. Then split the capture in two (using editcap) and test
both halves. One of them breaks Wireshark, so repeat with that one, until you
have a small capture (ideally a single packet) which causes the crash. Then
drill down into that packet, checking the code path through your dissector and
see what goes wrong.
Thanx,
Jaap
siri m wrote:
Hi Jaap/Ronnie,
Yes, I have access to the custom plugin code. I am using totalview to
attach to wireshark (trying to follow similar procedure as discussed in
http://www.wireshark.org/lists/wireshark-users/200808/msg00024.html for
XP), however, totalview is unable to find debugging symbols in wireshark
that I installed from yum repository.
Should we re-compile wireshark using some debug flag, can you please let
me know what the procedure is? The backtrace that I am getting after it
core dumps is not showing any code specific to the custom
plugin..(However, the custom plugin binary has the debug symbols...):
Jaap, About the second option, to do a (binary) search for the offending
packet in a capture -- can you please elaborate on how to achieve this?
Thanks a lot for your suggestions,
On Mon, Sep 15, 2008 at 11:01 PM, ronnie sahlberg
<ronniesahlberg@xxxxxxxxx <mailto:ronniesahlberg@xxxxxxxxx>> wrote:
Do you have access to the source code?
If you do not, it may be "difficult".
On Tue, Sep 16, 2008 at 10:59 AM, siri m <svu004@xxxxxxxxx
<mailto:svu004@xxxxxxxxx>> wrote:
> Hi,
>
>
>
> Can someone give a brief summary of how to debug custom written
external
> plugins for wireshark on linux (using kdbg or gdb)? Any
suggestions would be
> helpful to debug an invalid frees that glibc is complaining in
the custom
> plugin that was written long back by someone?
>
>
>
> Thanks,
>