Buildbot crash output: fuzz-2021-02-12-1651908.pcap
Problems have been found with the following capture file:
https://www.wireshark.org/download/automated/captures/fuzz-2021-02-12-1651908.pcap
stderr:
Input file: /home/wireshark/menagerie/menagerie/15372-nvme-rdma_ext4-mount.pcap
Build host information:
Linux build1 5.4.0-65-generic #73-Ubuntu SMP Mon Jan 18 17:25:17 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description: Ubuntu 20.04.2 LTS
Release: 20.04
Codename: focal
Buildbot information:
BUILDBOT_REPOSITORY=git@gitlab.com:wireshark/wireshark.git
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_URL=https://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDNUMBER=5448
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_GOT_REVISION=aa0081327c0bd7b56a270bbf93fb38fc32c041bd
Return value: 0
Dissector bug: 0
Valgrind error count: 1
Latest (but not necessarily the problem) commit:
aa0081327c wccp: fix unused variable ‘length_remaining’ [-Werror=unused-variable]
Command and args: ./tools/valgrind-wireshark.sh -b /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin
==2206457== Memcheck, a memory error detector
==2206457== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==2206457== Using Valgrind-3.15.0 and LibVEX; rerun with -h for copyright info
==2206457== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2021-02-12-1651908.pcap
==2206457==
==2206457== Conditional jump or move depends on uninitialised value(s)
==2206457== at 0x713FF5A: dissect_nvme_from_host (packet-nvme-rdma.c:895)
==2206457== by 0x713F80B: dissect_nvme_ib (packet-nvme-rdma.c:1268)
==2206457== by 0x8029DE4: dissector_try_heuristic (packet.c:2827)
==2206457== by 0x6E482C0: parse_PAYLOAD (packet-infiniband.c:2735)
==2206457== by 0x6E47170: dissect_infiniband_common (packet-infiniband.c:2143)
==2206457== by 0x6E4572D: dissect_rroce (packet-infiniband.c:1709)
==2206457== by 0x802BB17: call_dissector_through_handle (packet.c:720)
==2206457== by 0x8027749: call_dissector_work (packet.c:813)
==2206457== by 0x8027527: dissector_try_uint_new (packet.c:1413)
==2206457== by 0x802789B: dissector_try_uint (packet.c:1437)
==2206457== by 0x75409A6: decode_udp_ports (packet-udp.c:700)
==2206457== by 0x75434C1: dissect (packet-udp.c:1267)
==2206457==
==2206457==
==2206457== HEAP SUMMARY:
==2206457== in use at exit: 41,873 bytes in 212 blocks
==2206457== total heap usage: 639,342 allocs, 639,130 frees, 60,753,573 bytes allocated
==2206457==
==2206457== LEAK SUMMARY:
==2206457== definitely lost: 0 bytes in 0 blocks
==2206457== indirectly lost: 0 bytes in 0 blocks
==2206457== possibly lost: 0 bytes in 0 blocks
==2206457== still reachable: 22,494 bytes in 177 blocks
==2206457== suppressed: 19,379 bytes in 35 blocks
==2206457== Rerun with --leak-check=full to see details of leaked memory
==2206457==
==2206457== Use --track-origins=yes to see where uninitialised values come from
==2206457== For lists of detected and suppressed errors, rerun with: -s
==2206457== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
no debug trace