Ethereal-dev: [Ethereal-dev] Buildbot crash output

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

Date: Mon, 12 Sep 2005 18:22:01 -0500 (CDT)
Problems have been found with the following capture file(s):

http://www.ethereal.com/distribution/buildbot-builds/randpkt/editcap.43260c71.pcap


Error information:
Core was generated by `lt-tethereal'.
Program terminated with signal 11, Segmentation fault.
#0  0x20000000424813e1 in strlen () from /lib/libc.so.5
#0  0x20000000424813e1 in strlen () from /lib/libc.so.5
No symbol table info available.
#1  0x20000000424775c0 in __vfprintf () from /lib/libc.so.5
No symbol table info available.
#2  0x20000000423a3bf0 in vsnprintf () from /lib/libc.so.5
No symbol table info available.
#3  0x2000000041d1dd60 in g_vsnprintf () from /usr/local/lib/libglib-2.0.so.400
No symbol table info available.
#4  0x200000004086fd80 in expert_set_info_vformat (pinfo=0x20000000005e9610, 
    pi=0x2000000001a887b0, group=512, severity=4, 
    format=0x200000000067d000 "GET /announce?info_hash=%85%11D%s\\000%AA%03%D4B%9D%s\\000%D6%9EDa%2AC%E6x%04%B3&peer_id=%89%\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\"..., ap=0x9fffffffffffcb38) at expert.c:85
	formatted = "GET /announce?info_hash=", ' ' <repeats 84 times>, "%11D\\0000X1.0000001A9A188P-511A00%D4B2305843009241588104", '\0' <repeats 135 times>
	ei = (expert_info_t *) 0x200000000067d000
#5  0x200000004086ff70 in expert_add_info_format (pinfo=0x20000000005e9610, 
    pi=0x2000000001a887b0, group=512, severity=4, 
    format=0x200000000067d000 "GET /announce?info_hash=%85%11D%s\\000%AA%03%D4B%9D%s\\000%D6%9EDa%2AC%E6x%04%B3&peer_id=%89%\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\252\\"...) at expert.c:113
No locals.
#6  0x2000000040cd4360 in dissect_http_message (tvb=0x200000000067c938, 
    offset=0, pinfo=0x20000000005e9610, tree=0x2000000001a89140)
    at packet-http.c:759
	proto_tag = 0x2000000041332328 "HTTP"
	http_tree = (proto_tree *) 0x2000000001a88ea0
	ti = (proto_item *) 0x2000000001a88ea0
	line = (
    const guchar *) 0x2000000001a9a036 "GET /announce?info_hash=%85%11D%s"
	next_offset = 338
	linep = (const guchar *) 0x2000000041332328 "HTTP"
	lineend = (
    const guchar *) 0x2000000001a9a188 ".avc,0XLSznpdI71fB300e78wj1X6BmYWmtB4JUMIfOqhHeQCeq", '�' <repeats 149 times>...
	orig_offset = 0
	first_linelen = 338
	linelen = 338
	is_request_or_reply = 1
	saw_req_resp_or_header = 1
	c = 82 'R'
	http_type = HTTP_REQUEST
	hdr_item = (proto_item *) 0x2000000001a887b0
	reqresp_dissector = 0x20000000425f08f0
	req_tree = (proto_tree *) 0xa
	colon_offset = -1
	headers = {content_type = 0x0, content_type_parameters = 0x0, 
  have_content_length = 0, content_length = 0, content_encoding = 0x0, 
  transfer_encoding = 0x0}
	datalen = 1093870376
	reported_datalen = -1
	handle = 0xa
	dissected = 10
	framenum = 1093870376
#7  0x2000000040cd7160 in dissect_http (tvb=0x200000000067c938, 
    pinfo=0x20000000005e9610, tree=0x2000000001a89140) at packet-http.c:1852
	offset = 0
	len = 10
#8  0x2000000040875250 in call_dissector_through_handle (
    handle=0x20000000000a9a60, tvb=0x200000000067c938, 
    pinfo=0x20000000005e9610, tree=0x2000000001a89140) at packet.c:382
	saved_proto = 0x2000000041332328 "HTTP"
	ret = 10
#9  0x2000000040876060 in call_dissector_work (handle=0x20000000000a9a60, 
    tvb=0x200000000067c938, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001a89140) at packet.c:557
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x2000000041403388 "TCP"
	saved_can_desegment = 0
	ret = 10
	save_writable = 536870912
	save_dl_src = {type = AT_NONE, len = -1304311295, 
  data = 0xffe8 <Address 0xffe8 out of bounds>}
	save_dl_dst = {type = AT_FC, len = -2100232192, 
  data = 0xffec <Address 0xffec out of bounds>}
	save_net_src = {type = AT_NONE, len = 1, 
  data = 0x1003e <Address 0x1003e out of bounds>}
	save_net_dst = {type = AT_NONE, len = 16, 
  data = 0x1000c <Address 0x1000c out of bounds>}
	save_src = {type = 43595, len = 0, 
  data = 0x1003e <Address 0x1003e out of bounds>}
	save_dst = {type = AT_NONE, len = 1414, 
  data = 0x1000c <Address 0x1000c out of bounds>}
	saved_layer_names_len = 10
	__PRETTY_FUNCTION__ = "call_dissector_work"
#10 0x20000000408769f0 in dissector_try_port (
    sub_dissectors=0x200000000054a6a0, port=80, tvb=0x200000000067c938, 
    pinfo=0x20000000005e9610, tree=0x2000000001a89140) at packet.c:832
	dtbl_entry = (dtbl_entry_t *) 0xa
	handle = (struct dissector_handle *) 0x20000000000a9a60
	saved_match_port = 6
#11 0x20000000410284b0 in decode_tcp_ports (tvb=0x200000000067c938, offset=20, 
    pinfo=0x20000000005e9610, tree=0x2000000001a89140, src_port=4519, 
    dst_port=4519) at packet-tcp.c:2545
	next_tvb = (tvbuff_t *) 0x200000000067c938
	low_port = 80
	high_port = 4519
#12 0x20000000410289e0 in process_tcp_payload (tvb=0x200000000067c8e0, 
    offset=20, pinfo=0x20000000005e9610, tree=0x2000000001a89140, 
    tcp_tree=0x2000000001a88e10, src_port=4519, dst_port=80, seq=0, 
    nxtseq=338, is_tcp_segment=1) at packet-tcp.c:2592
	except_sn = {except_down = 0x9fffffffffffd8f0, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffcef0, except_cleanup = 0x9fffffffffffcef0}}
	except_ch = {except_id = 0x200000004147bbc0, except_size = 1, 
  except_obj = {except_id = {except_group = 11529215046068457548, 
      except_code = 1236933650528}, 
    except_message = 0xffff0208 <Address 0xffff0208 out of bounds>, 
    except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, 
        <invalid float value>, 0, -inf, <invalid float value>, 0, 0, 
        <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, 
        -nan(0x4928824398483892), -inf, <invalid float value>, 0, 
        <invalid float value>, inf, inf, -0, -0, <invalid float value>, 
        <invalid float value>, 0, 0, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	__PRETTY_FUNCTION__ = "process_tcp_payload"
#13 0x2000000041028f10 in dissect_tcp_payload (tvb=0x200000000067c8e0, 
    pinfo=0x20000000005e9610, offset=20, seq=0, nxtseq=338, sport=4519, 
    dport=80, tree=0x2000000001a89140, tcp_tree=0x2000000001a88e10)
    at packet-tcp.c:2665
	save_fragmented = 0
#14 0x200000004102b790 in dissect_tcp (tvb=0x200000000067c8e0, 
    pinfo=0x20000000005e9610, tree=0x2000000001a89140) at packet-tcp.c:3118
	th_sum = 338
	th_urp = 18496
	tcp_tree = (proto_tree *) 0x2000000001a88e10
	field_tree = (proto_tree *) 0x152
	ti = (proto_item *) 0x2000000001a88e10
	tf = (proto_item *) 0xa
	offset = 20
	flags = "PSH, ACK", '\0' <repeats 55 times>
	fstr = {0x2000000041299480 "FIN", 0x2000000041404b50 "SYN", 
  0x200000004140ac38 "RST", 0x200000004147a410 "PSH", 
  0x20000000412a1780 "ACK", 0x200000004147a418 "URG", 
  0x2000000041435a60 "ECN", 0x20000000414357f8 "CWR"}
	fpos = 8
	i = 1101613120
	bpos = 1112358040
	optlen = 1101613120
	nxtseq = 338
	reported_len = 358
	cksum_vec = {{ptr = 0x2000000001a9a01a "Q\203)\006S\214A\202\021�", 
    len = 4}, {ptr = 0x2000000001a9a01e "S\214A\202\021�", len = 4}, {
    ptr = 0x9fffffffffffd260 "", len = 4}, {ptr = 0x2000000001a9a022 "\021�", 
    len = 358}}
	phdr = {1711343104, 0}
	computed_cksum = 10
	real_window = 8760
	length_remaining = 338
	desegment_ok = 1112019936
	tcpinfo = {seq = 0, nxtseq = 338, is_reassembled = 0, urgent = 0, 
  urgent_pointer = 43690}
	tcphstruct = {{th_seq = 0, th_ack = 1, th_have_seglen = 1, 
    th_seglen = 0, th_win = 5840, th_sport = 80, th_dport = 4519, 
    th_hlen = 28 '\034', th_flags = 18 '\022', ip_src = {type = AT_IPv4, 
      len = 4, data = 0x2000000001a9a01a "Q\203)\006S\214A\202\021�"}, 
    ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9a01e "S\214A\202\021�"}}, {th_seq = 1, th_ack = 1, 
    th_have_seglen = 1, th_seglen = 0, th_win = 8760, th_sport = 4519, 
    th_dport = 80, th_hlen = 20 '\024', th_flags = 16 '\020', ip_src = {
      type = AT_IPv4, len = 4, 
      data = 0x2000000001a9a01a "Q\203)\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9a01e "S\214A\202\021�"}}, {
    th_seq = 0, th_ack = 0, th_have_seglen = 1, th_seglen = 338, 
    th_win = 8760, th_sport = 4519, th_dport = 80, th_hlen = 20 '\024', 
    th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9a01a "Q\203)\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9a01e "S\214A\202\021�"}}, {
    th_seq = 1396329988, th_ack = 85, th_have_seglen = 1, th_seglen = 35, 
    th_win = 7905, th_sport = 4515, th_dport = 21, th_hlen = 20 '\024', 
    th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9a01a "Q\203)\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9a01e "S\214A\202\021�"}}}
	tcph = (struct tcpheader *) 0x2000000041aafc28
	tcph_count = 2
	tf_syn = (proto_item *) 0x2000000001a89050
	tf_fin = (proto_item *) 0x2000000001a88540
	tf_rst = (proto_item *) 0x2000000001a88930
#15 0x2000000040875250 in call_dissector_through_handle (
    handle=0x200000000061cf40, tvb=0x200000000067c8e0, 
    pinfo=0x20000000005e9610, tree=0x2000000001a89140) at packet.c:382
	saved_proto = 0x2000000041403388 "TCP"
	ret = 10
#16 0x2000000040876060 in call_dissector_work (handle=0x200000000061cf40, 
    tvb=0x200000000067c8e0, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001a89140) at packet.c:557
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x20000000411e6400 "IP"
	saved_can_desegment = 0
	ret = 20
	save_writable = 536870912
	save_dl_src = {type = 1635123301, len = 1936029036, 
  data = 0x7461687420666f20 <Address 0x7461687420666f20 out of bounds>}
	save_dl_dst = {type = AT_VINES, len = 1931961708, 
  data = 0x202020202020200a <Address 0x202020202020200a out of bounds>}
	save_net_src = {type = 6198800, len = 536870912, 
  data = 0x7065636e000000cf <Address 0x7065636e000000cf out of bounds>}
	save_net_dst = {type = 1818326388, len = 2003792416, 
  data = 0x6261206572612073 <Address 0x6261206572612073 out of bounds>}
	save_src = {type = 1948254316, len = 1700929647, 
  data = 0x33696669646f6d20 <Address 0x33696669646f6d20 out of bounds>}
	save_dst = {type = 1647851318, len = -1610612737, 
  data = 0x1400000030 <Address 0x1400000030 out of bounds>}
	saved_layer_names_len = 6
	__PRETTY_FUNCTION__ = "call_dissector_work"
#17 0x20000000408769f0 in dissector_try_port (
    sub_dissectors=0x20000000000a9c80, port=6, tvb=0x200000000067c8e0, 
    pinfo=0x20000000005e9610, tree=0x2000000001a89140) at packet.c:832
	dtbl_entry = (dtbl_entry_t *) 0xa
	handle = (struct dissector_handle *) 0x200000000061cf40
	saved_match_port = 2048
#18 0x2000000040d13850 in dissect_ip (tvb=0x200000000067c888, 
    pinfo=0x20000000005e9610, parent_tree=0x2000000001a89140)
    at packet-ip.c:1174
	ip_tree = (proto_tree *) 0x2000000001a88cc0
	field_tree = (proto_tree *) 0x20000000005e96ec
	ti = (proto_item *) 0x2000000001a88cc0
	tf = (proto_item *) 0x6
	addr = 2185333843
	offset = 20
	hlen = 20
	optlen = 6199024
	flags = 0
	nxt = 6 '\006'
	ipsum = 90
	ipfd_head = (fragment_data *) 0x0
	next_tvb = (tvbuff_t *) 0x200000000067c8e0
	update_col_info = 1
	save_fragmented = 0
	eip_arr = {{ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 40, 
    ip_id = 33370, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', 
    ip_sum = 3806, ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9a01a "Q\203)\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9a01e "S\214A\202\021�"}}, {
    ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 378, ip_id = 33371, 
    ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 3467, ip_src = {
      type = AT_IPv4, len = 4, 
      data = 0x2000000001a9a01a "Q\203)\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9a01e "S\214A\202\021�"}}, {
    ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 75, ip_id = 33369, 
    ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 49822, 
    ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9a01a "Q\203)\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9a01e "S\214A\202\021�"}}, {
    ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 48, ip_id = 0, ip_off = 16384, 
    ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 57136, ip_src = {
      type = AT_IPv4, len = 4, 
      data = 0x2000000001a9a01a "Q\203)\006S\214A\202\021�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9a01e "S\214A\202\021�"}}}
	eip_current = 1
	iph = (e_ip *) 0x2000000041aa7d38
	src_addr = (const guchar *) 0x200000000067c8e0 "\001"
	dst_addr = (const guchar *) 0x200000000067c8e0 "\001"
	src32 = 1367550214
	dst32 = 1401700738
	tree = (proto_tree *) 0x2000000001a89140
	item = (proto_item *) 0xa
	checksum_tree = (proto_tree *) 0x20000000005e96ec
#19 0x2000000040875250 in call_dissector_through_handle (
    handle=0x20000000000a9ca0, tvb=0x200000000067c888, 
    pinfo=0x20000000005e9610, tree=0x2000000001a89140) at packet.c:382
	saved_proto = 0x20000000411e6400 "IP"
	ret = 10
#20 0x2000000040876060 in call_dissector_work (handle=0x20000000000a9ca0, 
    tvb=0x200000000067c888, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001a89140) at packet.c:557
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x200000004128db50 "Ethernet"
	saved_can_desegment = 0
	ret = 40
	save_writable = 0
	save_dl_src = {type = 1299185789, len = 1866678857, 
  data = 0x65636e61696c706d <Address 0x65636e61696c706d out of bounds>}
	save_dl_dst = {type = 3435921523, len = 214748364, 
  data = 0x1003e <Address 0x1003e out of bounds>}
	save_net_src = {type = 3368026110, len = -858993460, 
  data = 0x1003a <Address 0x1003a out of bounds>}
	save_net_dst = {type = AT_NONE, len = 0, 
  data = 0x10018 <Address 0x10018 out of bounds>}
	save_src = {type = AT_NONE, len = -1879048192, 
  data = 0xffec <Address 0xffec out of bounds>}
	save_dst = {type = 4294902015, len = 2147483647, 
  data = 0x1003e <Address 0x1003e out of bounds>}
	saved_layer_names_len = 3
	__PRETTY_FUNCTION__ = "call_dissector_work"
#21 0x20000000408769f0 in dissector_try_port (
    sub_dissectors=0x20000000000a8e20, port=2048, tvb=0x200000000067c888, 
    pinfo=0x20000000005e9610, tree=0x2000000001a89140) at packet.c:832
	dtbl_entry = (dtbl_entry_t *) 0xa
	handle = (struct dissector_handle *) 0x20000000000a9ca0
	saved_match_port = 1
#22 0x2000000040b73040 in ethertype (etype=2048, tvb=0x200000000067c830, 
    offset_after_etype=14, pinfo=0x20000000005e9610, tree=0x2000000001a89140, 
    fh_tree=0x2000000001a888a0, etype_id=6242, trailer_id=6244, fcs_len=-1)
    at packet-ethertype.c:187
	except_sn = {except_down = 0x9fffffffffffe1c0, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffd910, except_cleanup = 0x9fffffffffffd910}}
	except_ch = {except_id = 0x20000000412a6c10, except_size = 1, 
  except_obj = {except_id = {except_group = 1, except_code = 2}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, 
        <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	description = 0xa <Address 0xa out of bounds>
	next_tvb = (tvbuff_t *) 0x200000000067c888
	length_before = 378
	dissector_found = 0
	saved_proto = 0x200000004128db50 "Ethernet"
	__PRETTY_FUNCTION__ = "ethertype"
#23 0x2000000040b6ec10 in dissect_eth_common (tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, parent_tree=0x2000000001a89140, fcs_len=-1)
    at packet-eth.c:311
	ehdr = (eth_hdr * volatile) 0x2000000041aa3540
	is_802_2 = 1970037110
	fh_tree = (proto_tree * volatile) 0x2000000001a888a0
	src_addr = (const guint8 *) 0x2000000001a9a006 ""
	dst_addr = (const guint8 *) 0x2000000001a9a000 "�r "
	ehdrs = {{dst = {type = AT_ETHER, len = 6, 
      data = 0x2000000001a9a000 "�r "}, src = {type = AT_ETHER, len = 6, 
      data = 0x2000000001a9a006 ""}, type = 2048}, {dst = {type = AT_ETHER, 
      len = 6, data = 0x2000000001a9a000 "�r "}, src = {type = AT_ETHER, 
      len = 6, data = 0x2000000001a9a006 ""}, type = 2048}, {dst = {
      type = AT_ETHER, len = 6, data = 0x2000000001a9a000 "�r "}, src = {
      type = AT_ETHER, len = 6, data = 0x2000000001a9a006 ""}, type = 2048}, {
    dst = {type = AT_ETHER, len = 6, data = 0x2000000001a9a000 "�r "}, src = {
      type = AT_ETHER, len = 6, data = 0x2000000001a9a006 ""}, type = 2048}}
	ehdr_num = 3
	tree = (proto_tree * volatile) 0x2000000001a89140
#24 0x2000000040b6ef60 in dissect_eth_maybefcs (tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, tree=0x2000000001a89140) at packet-eth.c:407
No locals.
#25 0x2000000040875250 in call_dissector_through_handle (
    handle=0x200000000058ee40, tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, tree=0x2000000001a89140) at packet.c:382
	saved_proto = 0x200000004128db50 "Ethernet"
	ret = 10
#26 0x2000000040876060 in call_dissector_work (handle=0x200000000058ee40, 
    tvb=0x200000000067c830, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001a89140) at packet.c:557
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x2000000041298248 "Frame"
	saved_can_desegment = 0
	ret = 54
	save_writable = 0
	save_dl_src = {type = 538976288, len = 538976288, 
  data = 0x7473655466692020 <Address 0x7473655466692020 out of bounds>}
	save_dl_dst = {type = 1701707776, len = 540876914, 
  data = 0x612d50492d796d27 <Address 0x612d50492d796d27 out of bounds>}
	save_net_src = {type = 1701995620, len = 690451315, 
  data = 0x4c494146203d3d20 <Address 0x4c494146203d3d20 out of bounds>}
	save_net_dst = {type = 4294901952, len = -1610612737, data = 0x0}
	save_src = {type = 842609457, len = 536870912, 
  data = 0x1 <Address 0x1 out of bounds>}
	save_dst = {type = 842609457, len = -1610612737, 
  data = 0x3 <Address 0x3 out of bounds>}
	saved_layer_names_len = 0
	__PRETTY_FUNCTION__ = "call_dissector_work"
#27 0x20000000408769f0 in dissector_try_port (
    sub_dissectors=0x20000000000a9100, port=1, tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, tree=0x2000000001a89140) at packet.c:832
	dtbl_entry = (dtbl_entry_t *) 0xa
	handle = (struct dissector_handle *) 0x200000000058ee40
	saved_match_port = 0
#28 0x2000000040baee30 in dissect_frame (tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, parent_tree=0x2000000001a89140)
    at packet-frame.c:234
	except_sn = {except_down = 0x9fffffffffffe760, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffe1e0, except_cleanup = 0x9fffffffffffe1e0}}
	except_ch = {except_id = 0x20000000412be3b8, except_size = 1, 
  except_obj = {except_id = {except_group = 2305843010288328704, 
      except_code = 2305843010288329216}, 
    except_message = 0x20000000400da400 "z�P�", except_dyndata = 0x0}, 
  except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, 
        -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, 
        -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 
        <invalid float value>, 0, <invalid float value>}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	fh_tree = (proto_tree *) 0x2000000001a886f0
	ti = (proto_item * volatile) 0x2000000001a88e70
	ts = {secs = 25, nsecs = 480000000}
	cap_len = 392
	pkt_len = 392
	tree = (proto_tree *) 0x2000000001a89140
	item = (proto_item *) 0xa
#29 0x2000000040875250 in call_dissector_through_handle (
    handle=0x20000000000a9120, tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, tree=0x2000000001a89140) at packet.c:382
	saved_proto = 0x2000000041298248 "Frame"
	ret = 10
#30 0x2000000040876060 in call_dissector_work (handle=0x20000000000a9120, 
    tvb=0x200000000067c830, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001a89140) at packet.c:557
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x2000000041118048 "<Missing Protocol Name>"
	saved_can_desegment = 0
	ret = 54
	save_writable = 536870912
	save_dl_src = {type = 1850277888, len = 774468195, 
  data = 0x3030373335ffe490 <Address 0x3030373335ffe490 out of bounds>}
	save_dl_dst = {type = 842609456, len = 1701344288, 
  data = 0x3030393734657320 <Address 0x3030393734657320 out of bounds>}
	save_net_src = {type = 842609464, len = -1610612737, data = 0x0}
	save_net_dst = {type = 1093402832, len = 536870912, 
  data = 0x1c <Address 0x1c out of bounds>}
	save_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dst = {type = AT_NONE, len = 0, 
  data = 0x1 <Address 0x1 out of bounds>}
	saved_layer_names_len = 0
	__PRETTY_FUNCTION__ = "call_dissector_work"
#31 0x2000000040879060 in call_dissector (handle=0x20000000000a9120, 
    tvb=0x200000000067c830, pinfo=0x20000000005e9610, tree=0x2000000001a89140)
    at packet.c:1700
	ret = 10
	__PRETTY_FUNCTION__ = "call_dissector"
#32 0x2000000040874e20 in dissect_packet (edt=0x20000000005e9600, 
    pseudo_header=0x20000000005e9610, pd=0x2000000001a9a000 "�r ", 
    fd=0x9fffffffffffe9e0, cinfo=0x0) at packet.c:321
	except_sn = {except_down = 0x0, except_type = XCEPT_CATCHER, 
  except_info = {except_catcher = 0x9fffffffffffe780, 
    except_cleanup = 0x9fffffffffffe780}}
	except_ch = {except_id = 0x2000000041118238, except_size = 1, 
  except_obj = {except_id = {except_group = 0, except_code = 0}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, 
        <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 
        <invalid float value>, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	__PRETTY_FUNCTION__ = "dissect_packet"
#33 0x200000004086ed30 in epan_dissect_run (edt=0x20000000005e9600, 
    pseudo_header=0x20000000005e9048, data=0x2000000001a9a000 "�r ", 
    fd=0x9fffffffffffe9e0, cinfo=0x0) at epan.c:158
No locals.
#34 0x2000000000037a10 in process_packet (cf=0x2000000000090ae8, pdh=0x0, 
    offset=2305843009219892736, whdr=0x20000000005e9028, 
    pseudo_header=0x20000000005e9048, pd=0x2000000001a9a000 "�r ", 
    err=0x9fffffffffffea50) at tethereal.c:2355
	fdata = {next = 0x0, prev = 0x0, pfd = 0x0, num = 91, pkt_len = 392, 
  cap_len = 392, cum_bytes = 18364, abs_ts = {secs = 1120786374, 
    nsecs = 538000000}, rel_ts = {secs = 25, nsecs = 480000000}, del_ts = {
    secs = 0, nsecs = 1000000}, file_off = 19452, lnk_t = 1, flags = {
    passed_dfilter = 0, encoding = 0, visited = 0, marked = 0, ref_time = 0}, 
  color_filter = 0x1000c}
	create_proto_tree = 6198784
	edt = (epan_dissect_t *) 0x20000000005e9600
	passed = 10
#35 0x2000000000036f60 in load_cap_file (cf=0x2000000000090ae8, save_file=0x0, 
    out_file_type=592704) at tethereal.c:2175
	linktype = 6197288
	snapshot_length = 6197288
	pdh = (wtap_dumper *) 0x0
	err = 1462964150
	err_info = (gchar *) 0x1003e <Address 0x1003e out of bounds>
	data_offset = 19452
#36 0x2000000000033e90 in main (argc=6, argv=0x28) at tethereal.c:1356
	opt = 10
	i = 6
	arg_error = 658504
	gpf_path = 0x0
	pf_path = 0x0
	gdp_path = 0x0
	dp_path = 0x0
	gpf_open_errno = 0
	gpf_read_errno = -2147483648
	pf_open_errno = 0
	pf_read_errno = -2147483648
	gdp_open_errno = 65598
	gdp_read_errno = 0
	dp_open_errno = 65516
	dp_read_errno = 0
	err = 2147483647
	capture_filter_specified = 658512
	if_list = (GList *) 0x200000000066d568
	if_entry = (GList *) 0x20000000000a0c48
	if_info = (if_info_t *) 0x1
	adapter_index = 1
	p = 0x20000000400d6170 "��\005"
	err_str = "\000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000\000\000\000\000\000\000\000\026]\001\000\000\000\000\000\000��\232\000\000\000\000>\000\001\000\000\000\000\000`������\237\025\000\000\000\024\000\000\000\000�\016@\000\000\000 "...
	cant_get_if_list_errstr = (gchar *) 0x1 <Address 0x1 out of bounds>
	list_link_layer_types = 0
	quiet = 0
	save_file = (gchar *) 0x0
	out_file_type = 2
	cf_name = (
    gchar *) 0x200000000066d400 "/home/buildbot/ethereal/random/editcap.out"
	rfilter = (gchar *) 0x0
	start_capture = 0
	if_text = (gchar *) 0xa <Address 0xa out of bounds>
	lt_list = (GList *) 0x20000000000a0c48
	lt_entry = (GList *) 0x200000000066d568
	data_link_info = (data_link_info_t *) 0x1
	fcode = {bf_len = 4026531840, bf_insns = 0x10003}
	rfcode = (dfilter_t *) 0x0
	prefs = (e_prefs *) 0x2000000041ab1d50
	__PRETTY_FUNCTION__ = "main"


(no stderr output)


Bug 434 posted.