Ethereal-dev: [Ethereal-dev] Buildbot crash output
Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.
From: Buildbot <buildbot-do-not-reply@xxxxxxxxxxxx>
Date: Mon, 12 Sep 2005 03:22:01 -0500 (CDT)
Problems have been found with the following capture file(s): http://www.ethereal.com/distribution/buildbot-builds/randpkt/editcap.4325397c.pcap Error information: Core was generated by `lt-tethereal'. Program terminated with signal 11, Segmentation fault. #0 0x20000000424813e1 in strlen () from /lib/libc.so.5 #0 0x20000000424813e1 in strlen () from /lib/libc.so.5 No symbol table info available. #1 0x20000000424775c0 in __vfprintf () from /lib/libc.so.5 No symbol table info available. #2 0x20000000423a3bf0 in vsnprintf () from /lib/libc.so.5 No symbol table info available. #3 0x2000000041d1dd60 in g_vsnprintf () from /usr/local/lib/libglib-2.0.so.400 No symbol table info available. #4 0x200000004086fc10 in expert_set_info_vformat (pinfo=0x20000000005e9610, pi=0x2000000001a88c90, group=512, severity=4, format=0x200000000067c000 "GET /announce?info_hash=%85%11D%1A%AA%03%D4B%9D%D3%D6%9EDa%2AC%E6x%04%B3&peer_id=%89%A0%27q%BA0%D1pp%06%F3%u1%F1%0DR%7F%F6%F2%2A%80&port=41730&uploaded=0&downloaded=0&left=0&compact=1&ip=127.0.0.1 HTT"..., ap=0x9fffffffffffcb38) at expert.c:85 formatted = "GET /announce?info_hash=", ' ' <repeats 84 times>, "%11D0X1.0000041A1EF7P-5110X1.0000001A96105P-511A00%D4B2305843009241571589353230584300924157141760.000000E+00Da0X0P+0C0.000000E+006x000%B3&peer_id=", ' ' <repeats 45 times> ei = (expert_info_t *) 0x200000000067c000 #5 0x200000004086fe00 in expert_add_info_format (pinfo=0x20000000005e9610, pi=0x2000000001a88c90, group=512, severity=4, format=0x200000000067c000 "GET /announce?info_hash=%85%11D%1A%AA%03%D4B%9D%D3%D6%9EDa%2AC%E6x%04%B3&peer_id=%89%A0%27q%BA0%D1pp%06%F3%u1%F1%0DR%7F%F6%F2%2A%80&port=41730&uploaded=0&downloaded=0&left=0&compact=1&ip=127.0.0.1 HTT"...) at expert.c:113 No locals. #6 0x2000000040cd41e0 in dissect_http_message (tvb=0x200000000067c938, offset=0, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet-http.c:759 proto_tag = 0x2000000041331ee0 "HTTP" http_tree = (proto_tree *) 0x2000000001a88570 ti = (proto_item *) 0x2000000001a88570 line = ( const guchar *) 0x2000000001a96036 "GET /announce?info_hash=%85%11D%1A%AA%03%D4B%9D%D3%D6%9EDa%2AC%E6x%04%B3&peer_id=%89%A0%27q%BA0%D1pp%06%F3%u1%F1%0DR%7F%F6%F2%2A%80&port=41730&uploaded=0&downloaded=0&left=0&compact=1&ip=127.0.0.1 HTT"... next_offset = 207 linep = (const guchar *) 0x2000000041331ee0 "HTTP" lineend = (const guchar *) 0x2000000001a96103 "\r\nAcce%s" orig_offset = 0 first_linelen = 205 linelen = 205 is_request_or_reply = 1 saw_req_resp_or_header = 1 c = 205 '�' http_type = HTTP_REQUEST hdr_item = (proto_item *) 0x2000000001a88c90 reqresp_dissector = 0x20000000425f08e0 req_tree = (proto_tree *) 0x23 colon_offset = -1 headers = {content_type = 0x0, content_type_parameters = 0x0, have_content_length = 0, content_length = 0, content_encoding = 0x0, transfer_encoding = 0x0} datalen = 1093869280 reported_datalen = -1 handle = 0x23 dissected = 35 framenum = 1093869280 #7 0x2000000040cd6fe0 in dissect_http (tvb=0x200000000067c938, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet-http.c:1852 offset = 0 len = 35 #8 0x20000000408750e0 in call_dissector_through_handle ( handle=0x20000000000a9a60, tvb=0x200000000067c938, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:382 saved_proto = 0x2000000041331ee0 "HTTP" ret = 35 #9 0x2000000040875ef0 in call_dissector_work (handle=0x20000000000a9a60, tvb=0x200000000067c938, pinfo_arg=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:557 pinfo = (packet_info * volatile) 0x20000000005e9610 saved_proto = 0x2000000041402f40 "TCP" saved_can_desegment = 0 ret = 35 save_writable = 536870912 save_dl_src = {type = 3221225472, len = -1822490853, data = 0xffe5 <Address 0xffe5 out of bounds>} save_dl_dst = {type = AT_FC, len = -2100232192, data = 0xffec <Address 0xffec out of bounds>} save_net_src = {type = AT_NONE, len = 1, data = 0x1003e <Address 0x1003e out of bounds>} save_net_dst = {type = AT_NONE, len = 16, data = 0x1000c <Address 0x1000c out of bounds>} save_src = {type = 4403, len = 0, data = 0x1003e <Address 0x1003e out of bounds>} save_dst = {type = AT_NONE, len = 1460, data = 0x1000c <Address 0x1000c out of bounds>} saved_layer_names_len = 10 __PRETTY_FUNCTION__ = "call_dissector_work" #10 0x2000000040876880 in dissector_try_port ( sub_dissectors=0x200000000054a6a0, port=80, tvb=0x200000000067c938, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:832 dtbl_entry = (dtbl_entry_t *) 0x23 handle = (struct dissector_handle *) 0x20000000000a9a60 saved_match_port = 6 #11 0x2000000041028050 in decode_tcp_ports (tvb=0x200000000067c938, offset=20, pinfo=0x20000000005e9610, tree=0x2000000001a89020, src_port=4519, dst_port=4519) at packet-tcp.c:2545 next_tvb = (tvbuff_t *) 0x200000000067c938 low_port = 80 high_port = 4519 #12 0x2000000041028580 in process_tcp_payload (tvb=0x200000000067c8e0, offset=20, pinfo=0x20000000005e9610, tree=0x2000000001a89020, tcp_tree=0x2000000001a88fc0, src_port=4519, dst_port=80, seq=1, nxtseq=339, is_tcp_segment=1) at packet-tcp.c:2592 except_sn = {except_down = 0x9fffffffffffd8f0, except_type = XCEPT_CATCHER, except_info = { except_catcher = 0x9fffffffffffcef0, except_cleanup = 0x9fffffffffffcef0}} except_ch = {except_id = 0x200000004147b680, except_size = 1, except_obj = {except_id = {except_group = 11529215046068457548, except_code = 1236933650528}, except_message = 0xffff0208 <Address 0xffff0208 out of bounds>, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}} exc = (except_t *) 0x0 except_state = 0 catch_spec = {{except_group = 1, except_code = 0}} __PRETTY_FUNCTION__ = "process_tcp_payload" #13 0x2000000041028ab0 in dissect_tcp_payload (tvb=0x200000000067c8e0, pinfo=0x20000000005e9610, offset=20, seq=1, nxtseq=339, sport=4519, dport=80, tree=0x2000000001a89020, tcp_tree=0x2000000001a88fc0) at packet-tcp.c:2665 save_fragmented = 0 #14 0x200000004102b330 in dissect_tcp (tvb=0x200000000067c8e0, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet-tcp.c:3118 th_sum = 338 th_urp = 16720 tcp_tree = (proto_tree *) 0x2000000001a88fc0 field_tree = (proto_tree *) 0x152 ti = (proto_item *) 0x2000000001a88fc0 tf = (proto_item *) 0x23 offset = 20 flags = "PSH, ACK", '\0' <repeats 55 times> fstr = {0x2000000041299038 "FIN", 0x2000000041404708 "SYN", 0x200000004140a7f0 "RST", 0x2000000041479ed0 "PSH", 0x20000000412a1338 "ACK", 0x2000000041479ed8 "URG", 0x20000000414355d8 "ECN", 0x20000000414353b0 "CWR"} fpos = 8 i = 1101611344 bpos = 1112358040 optlen = 1101611344 nxtseq = 339 reported_len = 358 cksum_vec = {{ptr = 0x2000000001a9601a "Q\203\203\006S\214A\202\021�", len = 4}, {ptr = 0x2000000001a9601e "S\214A\202\021�", len = 4}, { ptr = 0x9fffffffffffd260 "", len = 4}, {ptr = 0x2000000001a96022 "\021�", len = 358}} phdr = {1711343104, 0} computed_cksum = 35 real_window = 8760 length_remaining = 338 desegment_ok = 1112019936 tcpinfo = {seq = 1, nxtseq = 339, is_reassembled = 0, urgent = 0, urgent_pointer = 0} tcphstruct = {{th_seq = 1, th_ack = 1, th_have_seglen = 1, th_seglen = 338, th_win = 8760, th_sport = 4519, th_dport = 80, th_hlen = 20 '\024', th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, data = 0x2000000001a9601a "Q\203\203\006S\214A\202\021�"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}, {th_seq = 354, th_ack = 856, th_have_seglen = 1, th_seglen = 35, th_win = 7905, th_sport = 4515, th_dport = 21, th_hlen = 20 '\024', th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, data = 0x2000000001a9601a "Q\203\203\006S\214A\202\021�"}, ip_dst = { type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}, { th_seq = 0, th_ack = 1, th_have_seglen = 1, th_seglen = 0, th_win = 5765, th_sport = 80, th_dport = 4519, th_hlen = 28 '\034', th_flags = 18 '\022', ip_src = {type = AT_IPv4, len = 4, data = 0x2000000001a9601a "Q\203\203\006S\214A\202\021�"}, ip_dst = { type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}, { th_seq = 1, th_ack = 1, th_have_seglen = 1, th_seglen = 0, th_win = 8760, th_sport = 4519, th_dport = 80, th_hlen = 20 '\024', th_flags = 16 '\020', ip_src = {type = AT_IPv4, len = 4, data = 0x2000000001a9601a "Q\203\203\006S\214A\202\021�"}, ip_dst = { type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}} tcph = (struct tcpheader *) 0x2000000041aaf4b8 tcph_count = 0 tf_syn = (proto_item *) 0x2000000001a88e40 tf_fin = (proto_item *) 0x2000000001a889c0 tf_rst = (proto_item *) 0x2000000001a88d20 #15 0x20000000408750e0 in call_dissector_through_handle ( handle=0x200000000061cf40, tvb=0x200000000067c8e0, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:382 saved_proto = 0x2000000041402f40 "TCP" ret = 35 #16 0x2000000040875ef0 in call_dissector_work (handle=0x200000000061cf40, tvb=0x200000000067c8e0, pinfo_arg=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:557 pinfo = (packet_info * volatile) 0x20000000005e9610 saved_proto = 0x20000000411e5fc0 "IP" saved_can_desegment = 0 ret = 20 save_writable = 536870912 save_dl_src = {type = 1635123301, len = 1936029036, data = 0x7461687420666f20 <Address 0x7461687420666f20 out of bounds>} save_dl_dst = {type = 1650553888, len = 1931961708, data = 0x202020202020200a <Address 0x202020202020200a out of bounds>} save_net_src = {type = 538976288, len = 538976288, data = 0x7065636e6f632020 <Address 0x7065636e6f632020 out of bounds>} save_net_dst = {type = 1818326388, len = 2003792416, data = 0x6261206572612073 <Address 0x6261206572612073 out of bounds>} save_src = {type = 1948254316, len = 1700929647, data = 0x33696669646f6d20 <Address 0x33696669646f6d20 out of bounds>} save_dst = {type = 1647862835, len = -1610612737, data = 0x1400000030 <Address 0x1400000030 out of bounds>} saved_layer_names_len = 6 __PRETTY_FUNCTION__ = "call_dissector_work" #17 0x2000000040876880 in dissector_try_port ( sub_dissectors=0x20000000000a9c80, port=6, tvb=0x200000000067c8e0, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:832 dtbl_entry = (dtbl_entry_t *) 0x23 handle = (struct dissector_handle *) 0x200000000061cf40 saved_match_port = 2048 #18 0x2000000040d136d0 in dissect_ip (tvb=0x200000000067c888, pinfo=0x20000000005e9610, parent_tree=0x2000000001a89020) at packet-ip.c:1174 ip_tree = (proto_tree *) 0x2000000001a89170 field_tree = (proto_tree *) 0x20000000005e96ec ti = (proto_item *) 0x2000000001a89170 tf = (proto_item *) 0x6 addr = 2185333843 offset = 20 hlen = 20 optlen = 6199024 flags = 0 nxt = 6 '\006' ipsum = 0 ipfd_head = (fragment_data *) 0x0 next_tvb = (tvbuff_t *) 0x200000000067c8e0 update_col_info = 1 save_fragmented = 0 eip_arr = {{ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 40, ip_id = 33370, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 3806, ip_src = {type = AT_IPv4, len = 4, data = 0x2000000001a9601a "Q\203\203\006S\214A\202\021�"}, ip_dst = { type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}, { ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 378, ip_id = 33371, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 3467, ip_src = { type = AT_IPv4, len = 4, data = 0x2000000001a9601a "Q\203\203\006S\214A\202\021�"}, ip_dst = { type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}, { ip_v_hl = 69 'E', ip_tos = 88 'X', ip_len = 75, ip_id = 33369, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 49806, ip_src = {type = AT_IPv4, len = 4, data = 0x2000000001a9601a "Q\203\203\006S\214A\202\021�"}, ip_dst = { type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}, { ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 48, ip_id = 0, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 57136, ip_src = { type = AT_IPv4, len = 4, data = 0x2000000001a9601a "Q\203\203\006S\214A\202\021�"}, ip_dst = { type = AT_IPv4, len = 4, data = 0x2000000001a9601e "S\214A\202\021�"}}} eip_current = 1 iph = (e_ip *) 0x2000000041aa7648 src_addr = (const guchar *) 0x200000000067c8e0 "\001" dst_addr = (const guchar *) 0x200000000067c8e0 "\001" src32 = 1367573254 dst32 = 1401700738 tree = (proto_tree *) 0x2000000001a89020 item = (proto_item *) 0x23 checksum_tree = (proto_tree *) 0x20000000005e96ec #19 0x20000000408750e0 in call_dissector_through_handle ( handle=0x20000000000a9ca0, tvb=0x200000000067c888, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:382 saved_proto = 0x20000000411e5fc0 "IP" ret = 35 #20 0x2000000040875ef0 in call_dissector_work (handle=0x20000000000a9ca0, tvb=0x200000000067c888, pinfo_arg=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:557 pinfo = (packet_info * volatile) 0x20000000005e9610 saved_proto = 0x200000004128d708 "Ethernet" saved_can_desegment = 0 ret = 40 save_writable = 0 save_dl_src = {type = 1299185789, len = 1866678857, data = 0x65636e61696c706d <Address 0x65636e61696c706d out of bounds>} save_dl_dst = {type = 3435921523, len = 214748364, data = 0x1003e <Address 0x1003e out of bounds>} save_net_src = {type = 3368026110, len = -858993460, data = 0x1003a <Address 0x1003a out of bounds>} save_net_dst = {type = AT_NONE, len = 0, data = 0x10018 <Address 0x10018 out of bounds>} save_src = {type = AT_NONE, len = -1879048192, data = 0xffec <Address 0xffec out of bounds>} save_dst = {type = 4294902015, len = 2147483647, data = 0x1003e <Address 0x1003e out of bounds>} saved_layer_names_len = 3 __PRETTY_FUNCTION__ = "call_dissector_work" #21 0x2000000040876880 in dissector_try_port ( sub_dissectors=0x20000000000a8e20, port=2048, tvb=0x200000000067c888, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:832 dtbl_entry = (dtbl_entry_t *) 0x23 handle = (struct dissector_handle *) 0x20000000000a9ca0 saved_match_port = 1 #22 0x2000000040b72ec0 in ethertype (etype=2048, tvb=0x200000000067c830, offset_after_etype=14, pinfo=0x20000000005e9610, tree=0x2000000001a89020, fh_tree=0x2000000001a88690, etype_id=6242, trailer_id=6244, fcs_len=-1) at packet-ethertype.c:187 except_sn = {except_down = 0x9fffffffffffe1c0, except_type = XCEPT_CATCHER, except_info = { except_catcher = 0x9fffffffffffd910, except_cleanup = 0x9fffffffffffd910}} except_ch = {except_id = 0x20000000412a67c8, except_size = 1, except_obj = {except_id = {except_group = 1, except_code = 2}, except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}} exc = (except_t *) 0x0 except_state = 0 catch_spec = {{except_group = 1, except_code = 0}} description = 0x23 <Address 0x23 out of bounds> next_tvb = (tvbuff_t *) 0x200000000067c888 length_before = 378 dissector_found = 0 saved_proto = 0x200000004128d708 "Ethernet" __PRETTY_FUNCTION__ = "ethertype" #23 0x2000000040b6ea90 in dissect_eth_common (tvb=0x200000000067c830, pinfo=0x20000000005e9610, parent_tree=0x2000000001a89020, fcs_len=-1) at packet-eth.c:311 ehdr = (eth_hdr * volatile) 0x2000000041aa2e50 is_802_2 = 1970037110 fh_tree = (proto_tree * volatile) 0x2000000001a88690 src_addr = (const guint8 *) 0x2000000001a96006 "" dst_addr = (const guint8 *) 0x2000000001a96000 "�r " ehdrs = {{dst = {type = AT_ETHER, len = 6, data = 0x2000000001a96000 "�r "}, src = {type = AT_ETHER, len = 6, data = 0x2000000001a96006 ""}, type = 2048}, {dst = {type = AT_ETHER, len = 6, data = 0x2000000001a96000 "�r "}, src = {type = AT_ETHER, len = 6, data = 0x2000000001a96006 ""}, type = 2048}, {dst = { type = AT_ETHER, len = 6, data = 0x2000000001a96000 "�r "}, src = { type = AT_ETHER, len = 6, data = 0x2000000001a96006 ""}, type = 2048}, { dst = {type = AT_ETHER, len = 6, data = 0x2000000001a96000 "�r "}, src = { type = AT_ETHER, len = 6, data = 0x2000000001a96006 ""}, type = 2048}} ehdr_num = 3 tree = (proto_tree * volatile) 0x2000000001a89020 #24 0x2000000040b6ede0 in dissect_eth_maybefcs (tvb=0x200000000067c830, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet-eth.c:407 No locals. #25 0x20000000408750e0 in call_dissector_through_handle ( handle=0x200000000058ee40, tvb=0x200000000067c830, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:382 saved_proto = 0x200000004128d708 "Ethernet" ret = 35 #26 0x2000000040875ef0 in call_dissector_work (handle=0x200000000058ee40, tvb=0x200000000067c830, pinfo_arg=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:557 pinfo = (packet_info * volatile) 0x20000000005e9610 saved_proto = 0x2000000041297e00 "Frame" saved_can_desegment = 0 ret = 54 save_writable = 0 save_dl_src = {type = 538976288, len = 538976288, data = 0x7473655466692020 <Address 0x7473655466692020 out of bounds>} save_dl_dst = {type = 1701707776, len = 540876914, data = 0x612d50492d796d27 <Address 0x612d50492d796d27 out of bounds>} save_net_src = {type = 1701995620, len = 690451315, data = 0x4c494146203d3d20 <Address 0x4c494146203d3d20 out of bounds>} save_net_dst = {type = 4294901952, len = -1610612737, data = 0x0} save_src = {type = 842609457, len = 536870912, data = 0x1 <Address 0x1 out of bounds>} save_dst = {type = 842609457, len = -1610612737, data = 0x3 <Address 0x3 out of bounds>} saved_layer_names_len = 0 __PRETTY_FUNCTION__ = "call_dissector_work" #27 0x2000000040876880 in dissector_try_port ( sub_dissectors=0x20000000000a9100, port=1, tvb=0x200000000067c830, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:832 dtbl_entry = (dtbl_entry_t *) 0x23 handle = (struct dissector_handle *) 0x200000000058ee40 saved_match_port = 0 #28 0x2000000040baecb0 in dissect_frame (tvb=0x200000000067c830, pinfo=0x20000000005e9610, parent_tree=0x2000000001a89020) at packet-frame.c:234 except_sn = {except_down = 0x9fffffffffffe760, except_type = XCEPT_CATCHER, except_info = { except_catcher = 0x9fffffffffffe1e0, except_cleanup = 0x9fffffffffffe1e0}} except_ch = {except_id = 0x20000000412bdf70, except_size = 1, except_obj = {except_id = {except_group = 2305843010288328704, except_code = 2305843010288329216}, except_message = 0x20000000400da400 "z�P�", except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, <invalid float value>, <invalid float value>, 0, <invalid float value>, 0, <invalid float value>}}}} exc = (except_t *) 0x0 except_state = 0 catch_spec = {{except_group = 1, except_code = 0}} fh_tree = (proto_tree *) 0x2000000001a88db0 ti = (proto_item * volatile) 0x2000000001a88930 ts = {secs = 25, nsecs = 480000000} cap_len = 392 pkt_len = 392 tree = (proto_tree *) 0x2000000001a89020 item = (proto_item *) 0x23 #29 0x20000000408750e0 in call_dissector_through_handle ( handle=0x20000000000a9120, tvb=0x200000000067c830, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:382 saved_proto = 0x2000000041297e00 "Frame" ret = 35 #30 0x2000000040875ef0 in call_dissector_work (handle=0x20000000000a9120, tvb=0x200000000067c830, pinfo_arg=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:557 pinfo = (packet_info * volatile) 0x20000000005e9610 saved_proto = 0x2000000041117c08 "<Missing Protocol Name>" saved_can_desegment = 0 ret = 54 save_writable = 536870912 save_dl_src = {type = 1141964800, len = 536870912, data = 0x3030373335ffe490 <Address 0x3030373335ffe490 out of bounds>} save_dl_dst = {type = 842609456, len = 536870912, data = 0x303039373411b000 <Address 0x303039373411b000 out of bounds>} save_net_src = {type = 842609464, len = -1610612737, data = 0x0} save_net_dst = {type = 1093402760, len = 536870912, data = 0x1c <Address 0x1c out of bounds>} save_src = {type = AT_NONE, len = 0, data = 0x0} save_dst = {type = AT_NONE, len = 0, data = 0x1 <Address 0x1 out of bounds>} saved_layer_names_len = 0 __PRETTY_FUNCTION__ = "call_dissector_work" #31 0x2000000040878ef0 in call_dissector (handle=0x20000000000a9120, tvb=0x200000000067c830, pinfo=0x20000000005e9610, tree=0x2000000001a89020) at packet.c:1700 ret = 35 __PRETTY_FUNCTION__ = "call_dissector" #32 0x2000000040874cb0 in dissect_packet (edt=0x20000000005e9600, pseudo_header=0x20000000005e9610, pd=0x2000000001a96000 "�r ", fd=0x9fffffffffffe9e0, cinfo=0x0) at packet.c:321 except_sn = {except_down = 0x0, except_type = XCEPT_CATCHER, except_info = {except_catcher = 0x9fffffffffffe780, except_cleanup = 0x9fffffffffffe780}} except_ch = {except_id = 0x2000000041117df8, except_size = 1, except_obj = {except_id = {except_group = 0, except_code = 0}, except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, <invalid float value>, <invalid float value>, 0, <invalid float value>, 0, 0}}}} exc = (except_t *) 0x0 except_state = 0 catch_spec = {{except_group = 1, except_code = 0}} __PRETTY_FUNCTION__ = "dissect_packet" #33 0x200000004086ebc0 in epan_dissect_run (edt=0x20000000005e9600, pseudo_header=0x20000000005e9048, data=0x2000000001a96000 "�r ", fd=0x9fffffffffffe9e0, cinfo=0x0) at epan.c:158 No locals. #34 0x2000000000037a10 in process_packet (cf=0x2000000000090ae8, pdh=0x0, offset=2305843009219892736, whdr=0x20000000005e9028, pseudo_header=0x20000000005e9048, pd=0x2000000001a96000 "�r ", err=0x9fffffffffffea50) at tethereal.c:2355 fdata = {next = 0x0, prev = 0x0, pfd = 0x0, num = 91, pkt_len = 392, cap_len = 392, cum_bytes = 18364, abs_ts = {secs = 1120786374, nsecs = 538000000}, rel_ts = {secs = 25, nsecs = 480000000}, del_ts = { secs = 0, nsecs = 1000000}, file_off = 19452, lnk_t = 1, flags = { passed_dfilter = 0, encoding = 0, visited = 0, marked = 0, ref_time = 0}, color_filter = 0x1000c} create_proto_tree = 6198784 edt = (epan_dissect_t *) 0x20000000005e9600 passed = 35 #35 0x2000000000036f60 in load_cap_file (cf=0x2000000000090ae8, save_file=0x0, out_file_type=592704) at tethereal.c:2175 linktype = 6197288 snapshot_length = 6197288 pdh = (wtap_dumper *) 0x0 err = 1462964150 err_info = (gchar *) 0x1003e <Address 0x1003e out of bounds> data_offset = 19452 #36 0x2000000000033e90 in main (argc=6, argv=0x28) at tethereal.c:1356 opt = 35 i = 6 arg_error = 658504 gpf_path = 0x0 pf_path = 0x0 gdp_path = 0x0 dp_path = 0x0 gpf_open_errno = 0 gpf_read_errno = -2147483648 pf_open_errno = 0 pf_read_errno = -2147483648 gdp_open_errno = 65598 gdp_read_errno = 0 dp_open_errno = 65516 dp_read_errno = 0 err = 2147483647 capture_filter_specified = 658512 if_list = (GList *) 0x200000000066d568 if_entry = (GList *) 0x20000000000a0c48 if_info = (if_info_t *) 0x1 adapter_index = 1 p = 0x20000000400d6170 "��\005" err_str = "\000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000\000\000\000\000\000\000\000\026]\001\000\000\000\000\000\000��\232\000\000\000\000>\000\001\000\000\000\000\000`������\237\025\000\000\000\024\000\000\000\000�\016@\000\000\000 "... cant_get_if_list_errstr = (gchar *) 0x1 <Address 0x1 out of bounds> list_link_layer_types = 0 quiet = 0 save_file = (gchar *) 0x0 out_file_type = 2 cf_name = ( gchar *) 0x200000000066d400 "/home/buildbot/ethereal/random/editcap.out" rfilter = (gchar *) 0x0 start_capture = 0 if_text = (gchar *) 0x23 <Address 0x23 out of bounds> lt_list = (GList *) 0x20000000000a0c48 lt_entry = (GList *) 0x200000000066d568 data_link_info = (data_link_info_t *) 0x1 fcode = {bf_len = 4026531840, bf_insns = 0x10003} rfcode = (dfilter_t *) 0x0 prefs = (e_prefs *) 0x2000000041ab1660 __PRETTY_FUNCTION__ = "main" (no stderr output) Bug 428 posted.
- Prev by Date: Re: [Ethereal-dev] errors with epan/ipv5_utils.h
- Next by Date: [Ethereal-dev] Buildbot crash output
- Previous by thread: [Ethereal-dev] Buildbot crash output
- Next by thread: [Ethereal-dev] Buildbot crash output
- Index(es):