Ethereal-dev: [Ethereal-dev] Buildbot crash output

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

Date: Sun, 11 Sep 2005 18:07:01 -0500 (CDT)
Problems have been found with the following capture file(s):

http://www.ethereal.com/distribution/buildbot-builds/randpkt/editcap.4324b80f.pcap


Error information:
Core was generated by `lt-tethereal'.
Program terminated with signal 11, Segmentation fault.
#0  0x20000000424813e1 in strlen () from /lib/libc.so.5
#0  0x20000000424813e1 in strlen () from /lib/libc.so.5
No symbol table info available.
#1  0x20000000424775c0 in __vfprintf () from /lib/libc.so.5
No symbol table info available.
#2  0x20000000423a3bf0 in vsnprintf () from /lib/libc.so.5
No symbol table info available.
#3  0x2000000041d1dd60 in g_vsnprintf () from /usr/local/lib/libglib-2.0.so.400
No symbol table info available.
#4  0x200000004086fbf0 in expert_set_info_vformat (pinfo=0x20000000005e9610, 
    pi=0x2000000001a88cc0, group=512, severity=4, 
    format=0x2000000001a98000 "GET /announce?info_hash=%85%11D%1A%AA%03%D4B%9D%D3%D6%%s\\000a%2AC%E6x%04%B|&peer_id=%89%A0%27q%BA0%D1pp%06%F3%01%F1%0DR%7F%F6%F2%2AR80&port=41730&uploa\\372ed=0&downloaded=0&left=0&co%s\\000ct=1&ip=127."..., ap=0x9fffffffffffcb38) at expert.c:85
	formatted = "GET /announce?info_hash=", ' ' <repeats 84 times>, "%11D0X1.0000041A1F96P-5110X1.0000001A96105P-511A00%D4B230584300924157158913323058430092415713956%s\\000a0X0P+0C0.000000E+006x000%B|&peer_id=", ' ' <repeats 52 times>
	ei = (expert_info_t *) 0x2000000001a98000
#5  0x200000004086fde0 in expert_add_info_format (pinfo=0x20000000005e9610, 
    pi=0x2000000001a88cc0, group=512, severity=4, 
    format=0x2000000001a98000 "GET /announce?info_hash=%85%11D%1A%AA%03%D4B%9D%D3%D6%%s\\000a%2AC%E6x%04%B|&peer_id=%89%A0%27q%BA0%D1pp%06%F3%01%F1%0DR%7F%F6%F2%2AR80&port=41730&uploa\\372ed=0&downloaded=0&left=0&co%s\\000ct=1&ip=127."...)
    at expert.c:113
No locals.
#6  0x2000000040cd46e0 in dissect_http_message (tvb=0x200000000067c938, 
    offset=0, pinfo=0x20000000005e9610, tree=0x2000000001a88b40)
    at packet-http.c:759
	proto_tag = 0x2000000041332900 "HTTP"
	http_tree = (proto_tree *) 0x2000000001a88b70
	ti = (proto_item *) 0x2000000001a88b70
	line = (
    const guchar *) 0x2000000001a96036 "GET /announce?info_hash=%85%11D%1A%AA%03%D4B%9D%D3%D6%%s"
	next_offset = 207
	linep = (const guchar *) 0x2000000041332900 "HTTP"
	lineend = (
    const guchar *) 0x2000000001a96104 "\nAccept: application/x-bittorrent\r\nAccept-Encodin$: gzip\r\nUser-Aqent: RAZA 2.1.0�0\r\n\bost: tracker.prq.to\r\nConnection: Keep-Alive\r\n\r\n.avc,0XLSznpdI71fB300e7Uwj1X6BmYgmtB4JUMIfOqhHeQCeqVotIekQghqDO,7679"...
	orig_offset = 0
	first_linelen = 206
	linelen = 206
	is_request_or_reply = 1
	saw_req_resp_or_header = 1
	c = 206 '�'
	http_type = HTTP_REQUEST
	hdr_item = (proto_item *) 0x2000000001a88cc0
	reqresp_dissector = 0x20000000425f08d0
	req_tree = (proto_tree *) 0x15200000000
	colon_offset = -1
	headers = {content_type = 0x0, content_type_parameters = 0x0, 
  have_content_length = 0, content_length = 0, content_encoding = 0x0, 
  transfer_encoding = 0x0}
	datalen = 1093871872
	reported_datalen = -1
	handle = 0x15200000000
	dissected = 0
	framenum = 1093871872
#7  0x2000000040cd74e0 in dissect_http (tvb=0x200000000067c938, 
    pinfo=0x20000000005e9610, tree=0x2000000001a88b40) at packet-http.c:1852
	offset = 0
	len = 0
#8  0x20000000408750c0 in call_dissector_through_handle (
    handle=0x20000000000a9a60, tvb=0x200000000067c938, 
    pinfo=0x20000000005e9610, tree=0x2000000001a88b40) at packet.c:383
	saved_proto = 0x2000000041332900 "HTTP"
	ret = 0
#9  0x2000000040875ed0 in call_dissector_work (handle=0x20000000000a9a60, 
    tvb=0x200000000067c938, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001a88b40) at packet.c:558
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x2000000041403960 "TCP"
	saved_can_desegment = 0
	ret = 13
	save_writable = 536870912
	save_dl_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dl_dst = {type = AT_FC, len = 0, data = 0x0}
	save_net_src = {type = AT_NONE, len = 1, data = 0x0}
	save_net_dst = {type = AT_NONE, len = 16, data = 0x0}
	save_src = {type = 48, len = 0, data = 0x0}
	save_dst = {type = AT_NONE, len = 1460, data = 0x0}
	saved_layer_names_len = 10
	__PRETTY_FUNCTION__ = "call_dissector_work"
#10 0x2000000040876860 in dissector_try_port (
    sub_dissectors=0x200000000054a6a0, port=80, tvb=0x200000000067c938, 
    pinfo=0x20000000005e9610, tree=0x2000000001a88b40) at packet.c:833
	dtbl_entry = (dtbl_entry_t *) 0x15200000000
	handle = (struct dissector_handle *) 0x20000000000a9a60
	saved_match_port = 6
#11 0x2000000041028980 in decode_tcp_ports (tvb=0x200000000067c938, offset=20, 
    pinfo=0x20000000005e9610, tree=0x2000000001a88b40, src_port=4519, 
    dst_port=4519) at packet-tcp.c:2545
	next_tvb = (tvbuff_t *) 0x200000000067c938
	low_port = 80
	high_port = 4519
#12 0x2000000041028eb0 in process_tcp_payload (tvb=0x200000000067c8e0, 
    offset=20, pinfo=0x20000000005e9610, tree=0x2000000001a88b40, 
    tcp_tree=0x2000000001a891a0, src_port=4519, dst_port=80, seq=0, 
    nxtseq=338, is_tcp_segment=1) at packet-tcp.c:2592
	except_sn = {except_down = 0x9fffffffffffd8f0, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffcef0, except_cleanup = 0x9fffffffffffcef0}}
	except_ch = {except_id = 0x200000004147c0a0, except_size = 1, 
  except_obj = {except_id = {except_group = 11529215046068457548, 
      except_code = 1232655613953}, 
    except_message = 0xffff0208 <Address 0xffff0208 out of bounds>, 
    except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, 
        <invalid float value>, 0, -inf, <invalid float value>, 0, 0, 
        <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, 
        -nan(0x4928824398483892), -inf, <invalid float value>, 0, 
        <invalid float value>, inf, inf, -0, -0, <invalid float value>, 
        <invalid float value>, 0, 0, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	__PRETTY_FUNCTION__ = "process_tcp_payload"
#13 0x20000000410293e0 in dissect_tcp_payload (tvb=0x200000000067c8e0, 
    pinfo=0x20000000005e9610, offset=20, seq=0, nxtseq=338, sport=4519, 
    dport=80, tree=0x2000000001a88b40, tcp_tree=0x2000000001a891a0)
    at packet-tcp.c:2665
	save_fragmented = 0
#14 0x200000004102bc60 in dissect_tcp (tvb=0x200000000067c8e0, 
    pinfo=0x20000000005e9610, tree=0x2000000001a88b40) at packet-tcp.c:3117
	th_sum = 338
	th_urp = 19240
	tcp_tree = (proto_tree *) 0x2000000001a891a0
	field_tree = (proto_tree *) 0x152
	ti = (proto_item *) 0x2000000001a891a0
	tf = (proto_item *) 0x15200000000
	offset = 20
	flags = "PSH, ACK", '\0' <repeats 55 times>
	fstr = {0x2000000041299a58 "FIN", 0x2000000041405128 "SYN", 
  0x200000004140b210 "RST", 0x200000004147a8f0 "PSH", 
  0x20000000412a1d58 "ACK", 0x200000004147a8f8 "URG", 
  0x2000000041435ff8 "ECN", 0x2000000041435dd0 "CWR"}
	fpos = 8
	i = 1101613864
	bpos = 1112358040
	optlen = 1101613864
	nxtseq = 338
	reported_len = 358
	cksum_vec = {{ptr = 0x2000000001a9601a "5\203\203\006S\214A\202\021�", 
    len = 4}, {ptr = 0x2000000001a9601e "S\214A\202\021�", len = 4}, {
    ptr = 0x9fffffffffffd260 "", len = 4}, {ptr = 0x2000000001a96022 "\021�", 
    len = 358}}
	phdr = {1711343104, 0}
	computed_cksum = 0
	real_window = 8760
	length_remaining = 338
	desegment_ok = 1112019936
	tcpinfo = {seq = 0, nxtseq = 338, is_reassembled = 0, urgent = 0, 
  urgent_pointer = 55}
	tcphstruct = {{th_seq = 0, th_ack = 1, th_have_seglen = 1, 
    th_seglen = 0, th_win = 5840, th_sport = 80, th_dport = 4519, 
    th_hlen = 28 '\034', th_flags = 18 '\022', ip_src = {type = AT_IPv4, 
      len = 4, data = 0x2000000001a9601a "5\203\203\006S\214A\202\021�"}, 
    ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9601e "S\214A\202\021�"}}, {th_seq = 0, th_ack = 0, 
    th_have_seglen = 1, th_seglen = 338, th_win = 8760, th_sport = 4519, 
    th_dport = 80, th_hlen = 20 '\024', th_flags = 24 '\030', ip_src = {
      type = AT_IPv4, len = 4, 
      data = 0x2000000001a9601a "5\203\203\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}, {
    th_seq = 826, th_ack = 354, th_have_seglen = 1, th_seglen = 30, 
    th_win = 58400, th_sport = 21, th_dport = 4515, th_hlen = 20 '\024', 
    th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9601a "5\203\203\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}, {
    th_seq = 354, th_ack = 856, th_have_seglen = 1, th_seglen = 0, 
    th_win = 7905, th_sport = 4515, th_dport = 21, th_hlen = 20 '\024', 
    th_flags = 16 '\020', ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9601a "5\203\203\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}}
	tcph = (struct tcpheader *) 0x2000000041aafed0
	tcph_count = 1
	tf_syn = (proto_item *) 0x2000000001a88f30
	tf_fin = (proto_item *) 0x2000000001a88de0
	tf_rst = (proto_item *) 0x2000000001a88c30
#15 0x20000000408750c0 in call_dissector_through_handle (
    handle=0x200000000061cf40, tvb=0x200000000067c8e0, 
    pinfo=0x20000000005e9610, tree=0x2000000001a88b40) at packet.c:383
	saved_proto = 0x2000000041403960 "TCP"
	ret = 0
#16 0x2000000040875ed0 in call_dissector_work (handle=0x200000000061cf40, 
    tvb=0x200000000067c8e0, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001a88b40) at packet.c:558
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x20000000411e69e0 "IP"
	saved_can_desegment = 0
	ret = 28
	save_writable = 536870912
	save_dl_src = {type = 1635123301, len = 1936029036, 
  data = 0x7461687420666f20 <Address 0x7461687420666f20 out of bounds>}
	save_dl_dst = {type = 1650553888, len = 1931961708, 
  data = 0x202020202020200a <Address 0x202020202020200a out of bounds>}
	save_net_src = {type = 825303072, len = 538976288, 
  data = 0x7065636e6f632020 <Address 0x7065636e6f632020 out of bounds>}
	save_net_dst = {type = 859189620, len = 2003792416, 
  data = 0x6261206572612073 <Address 0x6261206572612073 out of bounds>}
	save_src = {type = 875692140, len = 1700929647, 
  data = 0x33696669646f6d20 <Address 0x33696669646f6d20 out of bounds>}
	save_dst = {type = 1647851826, len = -1610612737, 
  data = 0x1400000030 <Address 0x1400000030 out of bounds>}
	saved_layer_names_len = 6
	__PRETTY_FUNCTION__ = "call_dissector_work"
#17 0x2000000040876860 in dissector_try_port (
    sub_dissectors=0x20000000000a9c80, port=6, tvb=0x200000000067c8e0, 
    pinfo=0x20000000005e9610, tree=0x2000000001a88b40) at packet.c:833
	dtbl_entry = (dtbl_entry_t *) 0x15200000000
	handle = (struct dissector_handle *) 0x200000000061cf40
	saved_match_port = 2048
#18 0x2000000040d13c20 in dissect_ip (tvb=0x200000000067c888, 
    pinfo=0x20000000005e9610, parent_tree=0x2000000001a88b40)
    at packet-ip.c:1176
	ip_tree = (proto_tree *) 0x2000000001a88450
	field_tree = (proto_tree *) 0x20000000005e96ec
	ti = (proto_item *) 0x2000000001a88450
	tf = (proto_item *) 0x6
	addr = 2185333843
	offset = 20
	hlen = 20
	optlen = 6199024
	flags = 0
	nxt = 6 '\006'
	ipsum = 28
	ipfd_head = (fragment_data *) 0x0
	next_tvb = (tvbuff_t *) 0x200000000067c8e0
	update_col_info = 1
	save_fragmented = 0
	eip_arr = {{ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 40, 
    ip_id = 30040, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', 
    ip_sum = 49842, ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9601a "5\203\203\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}, {
    ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 75, ip_id = 33369, 
    ip_off = 16384, ip_ttl = 0 '\0', ip_p = 101 'e', ip_sum = 49806, ip_src = {
      type = AT_IPv4, len = 4, 
      data = 0x2000000001a9601a "5\203\203\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}, {
    ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 48, ip_id = 0, ip_off = 16384, 
    ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 57136, ip_src = {
      type = AT_IPv4, len = 4, 
      data = 0x2000000001a9601a "5\203\203\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}, {
    ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 378, ip_id = 33371, 
    ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 3467, ip_src = {
      type = AT_IPv4, len = 4, 
      data = 0x2000000001a9601a "5\203\203\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}}
	eip_current = 3
	iph = (e_ip *) 0x2000000041aa8080
	src_addr = (const guchar *) 0x200000000067c8e0 "\001"
	dst_addr = (const guchar *) 0x200000000067c8e0 "\001"
	src32 = 897811206
	dst32 = 1401700738
	tree = (proto_tree *) 0x2000000001a88b40
	item = (proto_item *) 0x15200000000
	checksum_tree = (proto_tree *) 0x20000000005e96ec
#19 0x20000000408750c0 in call_dissector_through_handle (
    handle=0x20000000000a9ca0, tvb=0x200000000067c888, 
    pinfo=0x20000000005e9610, tree=0x2000000001a88b40) at packet.c:383
	saved_proto = 0x20000000411e69e0 "IP"
	ret = 0
#20 0x2000000040875ed0 in call_dissector_work (handle=0x20000000000a9ca0, 
    tvb=0x200000000067c888, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001a88b40) at packet.c:558
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x200000004128e128 "Ethernet"
	saved_can_desegment = 0
	ret = 40
	save_writable = 3
	save_dl_src = {type = 1299185789, len = 1866678857, 
  data = 0x65636e61696c706d <Address 0x65636e61696c706d out of bounds>}
	save_dl_dst = {type = 3435921523, len = 214748364, 
  data = 0x1003e <Address 0x1003e out of bounds>}
	save_net_src = {type = 3368026110, len = -858993460, 
  data = 0x1003a <Address 0x1003a out of bounds>}
	save_net_dst = {type = AT_NONE, len = 0, 
  data = 0x10018 <Address 0x10018 out of bounds>}
	save_src = {type = AT_NONE, len = -1879048192, 
  data = 0xffec <Address 0xffec out of bounds>}
	save_dst = {type = 4294902015, len = 2147483647, 
  data = 0x1003e <Address 0x1003e out of bounds>}
	saved_layer_names_len = 3
	__PRETTY_FUNCTION__ = "call_dissector_work"
#21 0x2000000040876860 in dissector_try_port (
    sub_dissectors=0x20000000000a8e20, port=2048, tvb=0x200000000067c888, 
    pinfo=0x20000000005e9610, tree=0x2000000001a88b40) at packet.c:833
	dtbl_entry = (dtbl_entry_t *) 0x15200000000
	handle = (struct dissector_handle *) 0x20000000000a9ca0
	saved_match_port = 1
#22 0x2000000040b73380 in ethertype (etype=2048, tvb=0x200000000067c830, 
    offset_after_etype=14, pinfo=0x20000000005e9610, tree=0x2000000001a88b40, 
    fh_tree=0x2000000001a88a50, etype_id=6242, trailer_id=6244, fcs_len=-1)
    at packet-ethertype.c:187
	except_sn = {except_down = 0x9fffffffffffe1c0, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffd910, except_cleanup = 0x9fffffffffffd910}}
	except_ch = {except_id = 0x20000000412a71e8, except_size = 1, 
  except_obj = {except_id = {except_group = 1, except_code = 2}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, 
        <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	description = 0x15200000000 <Address 0x15200000000 out of bounds>
	next_tvb = (tvbuff_t *) 0x200000000067c888
	length_before = 378
	dissector_found = 0
	saved_proto = 0x200000004128e128 "Ethernet"
	__PRETTY_FUNCTION__ = "ethertype"
#23 0x2000000040b6ef50 in dissect_eth_common (tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, parent_tree=0x2000000001a88b40, fcs_len=-1)
    at packet-eth.c:311
	ehdr = (eth_hdr * volatile) 0x2000000041aa3828
	is_802_2 = 1970037110
	fh_tree = (proto_tree * volatile) 0x2000000001a88a50
	src_addr = (const guint8 *) 0x2000000001a96006 ""
	dst_addr = (const guint8 *) 0x2000000001a96000 "�r "
	ehdrs = {{dst = {type = AT_ETHER, len = 6, 
      data = 0x2000000001a96000 "�r "}, src = {type = AT_ETHER, len = 6, 
      data = 0x2000000001a96006 ""}, type = 2048}, {dst = {type = AT_ETHER, 
      len = 6, data = 0x2000000001a96000 "�r "}, src = {type = AT_ETHER, 
      len = 6, data = 0x2000000001a96006 ""}, type = 2048}, {dst = {
      type = AT_ETHER, len = 6, data = 0x2000000001a96000 "�r "}, src = {
      type = AT_ETHER, len = 6, data = 0x2000000001a96006 ""}, type = 2098}, {
    dst = {type = AT_ETHER, len = 6, data = 0x2000000001a96000 "�r "}, src = {
      type = AT_ETHER, len = 6, data = 0x2000000001a96006 ""}, type = 2048}}
	ehdr_num = 3
	tree = (proto_tree * volatile) 0x2000000001a88b40
#24 0x2000000040b6f2a0 in dissect_eth_maybefcs (tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, tree=0x2000000001a88b40) at packet-eth.c:407
No locals.
#25 0x20000000408750c0 in call_dissector_through_handle (
    handle=0x200000000058ee40, tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, tree=0x2000000001a88b40) at packet.c:383
	saved_proto = 0x200000004128e128 "Ethernet"
	ret = 0
#26 0x2000000040875ed0 in call_dissector_work (handle=0x200000000058ee40, 
    tvb=0x200000000067c830, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001a88b40) at packet.c:558
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x2000000041298820 "Frame"
	saved_can_desegment = 0
	ret = 54
	save_writable = 0
	save_dl_src = {type = 538976288, len = 538976288, 
  data = 0x7473655466692020 <Address 0x7473655466692020 out of bounds>}
	save_dl_dst = {type = 1701707776, len = 540876914, 
  data = 0x612d50492d796d27 <Address 0x612d50492d796d27 out of bounds>}
	save_net_src = {type = 1701995620, len = 690451315, 
  data = 0x4c494146203d3d20 <Address 0x4c494146203d3d20 out of bounds>}
	save_net_dst = {type = 4294901952, len = -1610612737, data = 0x0}
	save_src = {type = 842609457, len = 536870912, 
  data = 0x1 <Address 0x1 out of bounds>}
	save_dst = {type = 842609457, len = -1610612737, 
  data = 0x3 <Address 0x3 out of bounds>}
	saved_layer_names_len = 0
	__PRETTY_FUNCTION__ = "call_dissector_work"
#27 0x2000000040876860 in dissector_try_port (
    sub_dissectors=0x20000000000a9100, port=1, tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, tree=0x2000000001a88b40) at packet.c:833
	dtbl_entry = (dtbl_entry_t *) 0x15200000000
	handle = (struct dissector_handle *) 0x200000000058ee40
	saved_match_port = 0
#28 0x2000000040baf170 in dissect_frame (tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, parent_tree=0x2000000001a88b40)
    at packet-frame.c:234
	except_sn = {except_down = 0x9fffffffffffe760, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffe1e0, except_cleanup = 0x9fffffffffffe1e0}}
	except_ch = {except_id = 0x20000000412be990, except_size = 1, 
  except_obj = {except_id = {except_group = 2305843010288328704, 
      except_code = 2305843010288329216}, 
    except_message = 0x20000000400da400 "z�P�", except_dyndata = 0x0}, 
  except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, 
        -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, 
        -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 
        <invalid float value>, 0, <invalid float value>}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	fh_tree = (proto_tree *) 0x2000000001a887b0
	ti = (proto_item * volatile) 0x2000000001a890e0
	ts = {secs = 25, nsecs = 480000000}
	cap_len = 392
	pkt_len = 392
	tree = (proto_tree *) 0x2000000001a88b40
	item = (proto_item *) 0x15200000000
#29 0x20000000408750c0 in call_dissector_through_handle (
    handle=0x20000000000a9120, tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, tree=0x2000000001a88b40) at packet.c:383
	saved_proto = 0x2000000041298820 "Frame"
	ret = 0
#30 0x2000000040875ed0 in call_dissector_work (handle=0x20000000000a9120, 
    tvb=0x200000000067c830, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001a88b40) at packet.c:558
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x2000000041118628 "<Missing Protocol Name>"
	saved_can_desegment = 0
	ret = 54
	save_writable = 536870912
	save_dl_src = {type = 1074593792, len = 536870912, 
  data = 0x3030373335ffe490 <Address 0x3030373335ffe490 out of bounds>}
	save_dl_dst = {type = 842609456, len = 536870912, 
  data = 0x30303937340dae00 <Address 0x30303937340dae00 out of bounds>}
	save_net_src = {type = 842609456, len = -1610612737, data = 0x0}
	save_net_dst = {type = 1093402792, len = 536870912, 
  data = 0x1c <Address 0x1c out of bounds>}
	save_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dst = {type = AT_NONE, len = 0, 
  data = 0x1 <Address 0x1 out of bounds>}
	saved_layer_names_len = 0
	__PRETTY_FUNCTION__ = "call_dissector_work"
#31 0x2000000040878ed0 in call_dissector (handle=0x20000000000a9120, 
    tvb=0x200000000067c830, pinfo=0x20000000005e9610, tree=0x2000000001a88b40)
    at packet.c:1701
	ret = 0
	__PRETTY_FUNCTION__ = "call_dissector"
#32 0x2000000040874c90 in dissect_packet (edt=0x20000000005e9600, 
    pseudo_header=0x20000000005e9610, pd=0x2000000001a96000 "�r ", 
    fd=0x9fffffffffffe9e0, cinfo=0x0) at packet.c:322
	except_sn = {except_down = 0x0, except_type = XCEPT_CATCHER, 
  except_info = {except_catcher = 0x9fffffffffffe780, 
    except_cleanup = 0x9fffffffffffe780}}
	except_ch = {except_id = 0x2000000041118818, except_size = 1, 
  except_obj = {except_id = {except_group = 0, except_code = 0}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, 
        <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 
        <invalid float value>, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	__PRETTY_FUNCTION__ = "dissect_packet"
#33 0x200000004086eba0 in epan_dissect_run (edt=0x20000000005e9600, 
    pseudo_header=0x20000000005e9048, data=0x2000000001a96000 "�r ", 
    fd=0x9fffffffffffe9e0, cinfo=0x0) at epan.c:158
No locals.
#34 0x2000000000037a10 in process_packet (cf=0x2000000000090ae8, pdh=0x0, 
    offset=2305843009219892736, whdr=0x20000000005e9028, 
    pseudo_header=0x20000000005e9048, pd=0x2000000001a96000 "�r ", 
    err=0x9fffffffffffea50) at tethereal.c:2355
	fdata = {next = 0x0, prev = 0x0, pfd = 0x0, num = 91, pkt_len = 392, 
  cap_len = 392, cum_bytes = 18364, abs_ts = {secs = 1120786374, 
    nsecs = 538000000}, rel_ts = {secs = 25, nsecs = 480000000}, del_ts = {
    secs = 0, nsecs = 1000000}, file_off = 19452, lnk_t = 1, flags = {
    passed_dfilter = 0, encoding = 0, visited = 0, marked = 0, ref_time = 0}, 
  color_filter = 0x1000c}
	create_proto_tree = 6198784
	edt = (epan_dissect_t *) 0x20000000005e9600
	passed = 0
#35 0x2000000000036f60 in load_cap_file (cf=0x2000000000090ae8, save_file=0x0, 
    out_file_type=592704) at tethereal.c:2175
	linktype = 6197288
	snapshot_length = 6197288
	pdh = (wtap_dumper *) 0x0
	err = 1462964150
	err_info = (gchar *) 0x1003e <Address 0x1003e out of bounds>
	data_offset = 19452
#36 0x2000000000033e90 in main (argc=6, argv=0x28) at tethereal.c:1356
	opt = 0
	i = 6
	arg_error = 658504
	gpf_path = 0x0
	pf_path = 0x0
	gdp_path = 0x0
	dp_path = 0x0
	gpf_open_errno = 0
	gpf_read_errno = -2147483648
	pf_open_errno = 0
	pf_read_errno = -2147483648
	gdp_open_errno = 65598
	gdp_read_errno = 0
	dp_open_errno = 65516
	dp_read_errno = 0
	err = 2147483647
	capture_filter_specified = 658512
	if_list = (GList *) 0x200000000066d568
	if_entry = (GList *) 0x20000000000a0c48
	if_info = (if_info_t *) 0x1
	adapter_index = 1
	p = 0x20000000400d6170 "��\005"
	err_str = "\000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000\000\000\000\000\000\000\000\026]\001\000\000\000\000\000\000��\232\000\000\000\000>\000\001\000\000\000\000\000`������\237\025\000\000\000\024\000\000\000\000�\016@\000\000\000 "...
	cant_get_if_list_errstr = (gchar *) 0x1 <Address 0x1 out of bounds>
	list_link_layer_types = 0
	quiet = 0
	save_file = (gchar *) 0x0
	out_file_type = 2
	cf_name = (
    gchar *) 0x200000000066d400 "/home/buildbot/ethereal/random/editcap.out"
	rfilter = (gchar *) 0x0
	start_capture = 0
	if_text = (gchar *) 0x15200000000 <Address 0x15200000000 out of bounds>
	lt_list = (GList *) 0x20000000000a0c48
	lt_entry = (GList *) 0x200000000066d568
	data_link_info = (data_link_info_t *) 0x1
	fcode = {bf_len = 4026531840, bf_insns = 0x10003}
	rfcode = (dfilter_t *) 0x0
	prefs = (e_prefs *) 0x2000000041ab2038
	__PRETTY_FUNCTION__ = "main"


(no stderr output)


Bug 425 posted.