Ethereal-dev: [Ethereal-dev] Buildbot crash output

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

Date: Mon, 12 Sep 2005 21:37:01 -0500 (CDT)
Problems have been found with the following capture file(s):

http://www.ethereal.com/distribution/buildbot-builds/randpkt/editcap.43263afd.pcap


Error information:
Core was generated by `lt-tethereal'.
Program terminated with signal 11, Segmentation fault.
#0  0x20000000400956b0 in _rtld_bind () from /libexec/ld-elf.so.1
#0  0x20000000400956b0 in _rtld_bind () from /libexec/ld-elf.so.1
No symbol table info available.
#1  0x2000000040092c00 in _rtld_bind_start () from /libexec/ld-elf.so.1
No symbol table info available.
#2  0x2000000041028cb0 in process_tcp_payload (tvb=0x200000000067c8e0, 
    offset=20, pinfo=0x20000000005e9610, tree=0x2000000001aaf290, 
    tcp_tree=0x2000000001a9a120, src_port=80, dst_port=2599, seq=25, 
    nxtseq=1485, is_tcp_segment=1) at packet-tcp.c:2644
	except_sn = {except_down = 0x9fffffffffffd8f0, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffcef0, except_cleanup = 0x9fffffffffffcef0}}
	except_ch = {except_id = 0x200000004147bac0, except_size = 1, 
  except_obj = {except_id = {except_group = 1, except_code = 2}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, 
        <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}}
	exc = (except_t *) 0x9fffffffffffcf00
	except_state = 2
	catch_spec = {{except_group = 1, except_code = 0}}
	__PRETTY_FUNCTION__ = "process_tcp_payload"
#3  0x2000000041028e30 in dissect_tcp_payload (tvb=0x200000000067c8e0, 
    pinfo=0x20000000005e9610, offset=20, seq=25, nxtseq=1485, sport=80, 
    dport=2599, tree=0x2000000001aaf290, tcp_tree=0x2000000001a9a120)
    at packet-tcp.c:2665
	save_fragmented = 0
#4  0x200000004102b6b0 in dissect_tcp (tvb=0x200000000067c8e0, 
    pinfo=0x20000000005e9610, tree=0x2000000001aaf290) at packet-tcp.c:3118
	th_sum = 1460
	th_urp = 18216
	tcp_tree = (proto_tree *) 0x2000000001a9a120
	field_tree = (proto_tree *) 0x5b4
	ti = (proto_item *) 0x2000000001a9a120
	tf = (proto_item *) 0x1
	offset = 20
	flags = "ACK\000e>", '\0' <repeats 57 times>
	fstr = {0x2000000041299380 "FIN", 0x2000000041404a50 "SYN", 
  0x200000004140ab38 "RST", 0x200000004147a310 "PSH", 
  0x20000000412a1680 "ACK", 0x200000004147a318 "URG", 
  0x2000000041435960 "ECN", 0x20000000414356f8 "CWR"}
	fpos = 3
	i = 1101612840
	bpos = 0
	optlen = 1101612840
	nxtseq = 1485
	reported_len = 1480
	cksum_vec = {{ptr = 0x2000000001a9701a "\n\001\005Q�\022+�", len = 4}, 
  {ptr = 0x2000000001a9701e "�\022+�", len = 4}, {ptr = 0x9fffffffffffd260 "", 
    len = 4}, {ptr = 0x2000000001a97022 "", len = 1480}}
	phdr = {3355772416, 0}
	computed_cksum = 1
	real_window = 17066
	length_remaining = 1460
	desegment_ok = 86016
	tcpinfo = {seq = 25, nxtseq = 1485, is_reassembled = 0, urgent = 0, 
  urgent_pointer = 43690}
	tcphstruct = {{th_seq = 0, th_ack = 295, th_have_seglen = 1, 
    th_seglen = 25, th_win = 17226, th_sport = 80, th_dport = 2599, 
    th_hlen = 20 '\024', th_flags = 24 '\030', ip_src = {type = AT_IPv4, 
      len = 4, data = 0x2000000001a9701a "\n\001\005Q�\022+�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9701e "�\022+�"}}, {
    th_seq = 25, th_ack = 455, th_have_seglen = 1, th_seglen = 1460, 
    th_win = 17066, th_sport = 80, th_dport = 2599, th_hlen = 20 '\024', 
    th_flags = 16 '\020', ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9701a "\n\001\005Q�\022+�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9701e "�\022+�"}}, {
    th_seq = 1, th_ack = 0, th_have_seglen = 1, th_seglen = 294, 
    th_win = 60144, th_sport = 2599, th_dport = 80, th_hlen = 20 '\024', 
    th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9701a "\n\001\005Q�\022+�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9701e "�\022+�"}}, {
    th_seq = 295, th_ack = 0, th_have_seglen = 1, th_seglen = 160, 
    th_win = 64240, th_sport = 2599, th_dport = 80, th_hlen = 20 '\024', 
    th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9701a "\n\001\005Q�\022+�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9701e "�\022+�"}}}
	tcph = (struct tcpheader *) 0x2000000041aafad0
	tcph_count = 1
	tf_syn = (proto_item *) 0x2000000001aa5110
	tf_fin = (proto_item *) 0x2000000001a9a180
	tf_rst = (proto_item *) 0x2000000001aa4060
#5  0x2000000040875250 in call_dissector_through_handle (
    handle=0x200000000061cf40, tvb=0x200000000067c8e0, 
    pinfo=0x20000000005e9610, tree=0x2000000001aaf290) at packet.c:382
	saved_proto = 0x2000000041403288 "TCP"
	ret = 1
#6  0x2000000040876060 in call_dissector_work (handle=0x200000000061cf40, 
    tvb=0x200000000067c8e0, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001aaf290) at packet.c:557
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x20000000411e6320 "IP"
	saved_can_desegment = 0
	ret = 45
	save_writable = 536870912
	save_dl_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dl_dst = {type = AT_NONE, len = 0, data = 0x0}
	save_net_src = {type = 1627389952, len = 0, data = 0x0}
	save_net_dst = {type = 909312000, len = 0, data = 0x0}
	save_src = {type = 872415232, len = 0, 
  data = 0x3500000000000000 <Address 0x3500000000000000 out of bounds>}
	save_dst = {type = 809001779, len = 0, data = 0x0}
	saved_layer_names_len = 6
	__PRETTY_FUNCTION__ = "call_dissector_work"
#7  0x20000000408769f0 in dissector_try_port (
    sub_dissectors=0x20000000000a9c80, port=6, tvb=0x200000000067c8e0, 
    pinfo=0x20000000005e9610, tree=0x2000000001aaf290) at packet.c:832
	dtbl_entry = (dtbl_entry_t *) 0x1
	handle = (struct dissector_handle *) 0x200000000061cf40
	saved_match_port = 2048
#8  0x2000000040d13770 in dissect_ip (tvb=0x200000000067c888, 
    pinfo=0x20000000005e9610, parent_tree=0x2000000001aaf290)
    at packet-ip.c:1174
	ip_tree = (proto_tree *) 0x2000000001aaf170
	field_tree = (proto_tree *) 0x20000000005e96ec
	ti = (proto_item *) 0x2000000001aaf170
	tf = (proto_item *) 0x6
	addr = 3391820460
	offset = 20
	hlen = 20
	optlen = 6199024
	flags = 0
	nxt = 6 '\006'
	ipsum = 0
	ipfd_head = (fragment_data *) 0x0
	next_tvb = (tvbuff_t *) 0x200000000067c8e0
	update_col_info = 1
	save_fragmented = 0
	eip_arr = {{ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 65, 
    ip_id = 53216, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', 
    ip_sum = 17320, ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9701a "\n\001\005Q�\022+�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9701e "�\022+�"}}, {
    ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 1500, ip_id = 53613, 
    ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 15488, 
    ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9701a "\n\001\005Q�\022+�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9701e "�\022+�"}}, {
    ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 334, ip_id = 55812, 
    ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 15223, 
    ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9701a "\n\001\005Q�\022+�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9701e "�\022+�"}}, {
    ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 200, ip_id = 55813, 
    ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 15356, 
    ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001a9701a "\n\001\005Q�\022+�"}, ip_dst = {
      type = AT_IPv4, len = 4, data = 0x2000000001a9701e "�\022+�"}}}
	eip_current = 1
	iph = (e_ip *) 0x2000000041aa7c20
	src_addr = (const guchar *) 0x200000000067c8e0 "\001"
	dst_addr = (const guchar *) 0x200000000067c8e0 "\001"
	src32 = 167839057
	dst32 = 2886872010
	tree = (proto_tree *) 0x2000000001aaf290
	item = (proto_item *) 0x1
	checksum_tree = (proto_tree *) 0x20000000005e96ec
#9  0x2000000040875250 in call_dissector_through_handle (
    handle=0x20000000000a9ca0, tvb=0x200000000067c888, 
    pinfo=0x20000000005e9610, tree=0x2000000001aaf290) at packet.c:382
	saved_proto = 0x20000000411e6320 "IP"
	ret = 1
#10 0x2000000040876060 in call_dissector_work (handle=0x20000000000a9ca0, 
    tvb=0x200000000067c888, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001aaf290) at packet.c:557
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x200000004128da50 "Ethernet"
	saved_can_desegment = 0
	ret = 65
	save_writable = 6
	save_dl_src = {type = 1299185789, len = 1866678857, 
  data = 0x65636e61696c706d <Address 0x65636e61696c706d out of bounds>}
	save_dl_dst = {type = AT_NONE, len = 0, data = 0x0}
	save_net_src = {type = AT_NONE, len = 0, 
  data = 0x3265343200000000 <Address 0x3265343200000000 out of bounds>}
	save_net_dst = {type = AT_NONE, len = 0, data = 0x0}
	save_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dst = {type = AT_NONE, len = 0, data = 0x0}
	saved_layer_names_len = 3
	__PRETTY_FUNCTION__ = "call_dissector_work"
#11 0x20000000408769f0 in dissector_try_port (
    sub_dissectors=0x20000000000a8e20, port=2048, tvb=0x200000000067c888, 
    pinfo=0x20000000005e9610, tree=0x2000000001aaf290) at packet.c:832
	dtbl_entry = (dtbl_entry_t *) 0x1
	handle = (struct dissector_handle *) 0x20000000000a9ca0
	saved_match_port = 1
#12 0x2000000040b72f90 in ethertype (etype=2048, tvb=0x200000000067c830, 
    offset_after_etype=14, pinfo=0x20000000005e9610, tree=0x2000000001aaf290, 
    fh_tree=0x2000000001a9a390, etype_id=6242, trailer_id=6244, fcs_len=-1)
    at packet-ethertype.c:187
	except_sn = {except_down = 0x9fffffffffffe1c0, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffd910, except_cleanup = 0x9fffffffffffd910}}
	except_ch = {except_id = 0x20000000412a6b10, except_size = 1, 
  except_obj = {except_id = {except_group = 1, except_code = 2}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, 
        <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	description = 0x1 <Address 0x1 out of bounds>
	next_tvb = (tvbuff_t *) 0x200000000067c888
	length_before = 1500
	dissector_found = 0
	saved_proto = 0x200000004128da50 "Ethernet"
	__PRETTY_FUNCTION__ = "ethertype"
#13 0x2000000040b6eb60 in dissect_eth_common (tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, parent_tree=0x2000000001aaf290, fcs_len=-1)
    at packet-eth.c:311
	ehdr = (eth_hdr * volatile) 0x2000000041aa3400
	is_802_2 = 1
	fh_tree = (proto_tree * volatile) 0x2000000001a9a390
	src_addr = (const guint8 *) 0x2000000001a97006 ""
	dst_addr = (const guint8 *) 0x2000000001a97000 "�"
	ehdrs = {{dst = {type = AT_ETHER, len = 6, 
      data = 0x2000000001a97000 "�"}, src = {type = AT_ETHER, len = 6, 
      data = 0x2000000001a97006 ""}, type = 2048}, {dst = {type = AT_ETHER, 
      len = 6, data = 0x2000000001a97000 "�"}, src = {type = AT_ETHER, 
      len = 6, data = 0x2000000001a97006 ""}, type = 2048}, {dst = {
      type = AT_ETHER, len = 6, data = 0x2000000001a97000 "�"}, src = {
      type = AT_ETHER, len = 6, data = 0x2000000001a97006 ""}, type = 2048}, {
    dst = {type = AT_ETHER, len = 6, data = 0x2000000001a97000 "�"}, src = {
      type = AT_ETHER, len = 6, data = 0x2000000001a97006 ""}, type = 2048}}
	ehdr_num = 2
	tree = (proto_tree * volatile) 0x2000000001aaf290
#14 0x2000000040b6eeb0 in dissect_eth_maybefcs (tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, tree=0x2000000001aaf290) at packet-eth.c:407
No locals.
#15 0x2000000040875250 in call_dissector_through_handle (
    handle=0x200000000058ee40, tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, tree=0x2000000001aaf290) at packet.c:382
	saved_proto = 0x200000004128da50 "Ethernet"
	ret = 1
#16 0x2000000040876060 in call_dissector_work (handle=0x200000000058ee40, 
    tvb=0x200000000067c830, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001aaf290) at packet.c:557
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x2000000041298148 "Frame"
	saved_can_desegment = 0
	ret = 79
	save_writable = 0
	save_dl_src = {type = 4294958946, len = -1610612737, 
  data = 0x2 <Address 0x2 out of bounds>}
	save_dl_dst = {type = 4294958947, len = -1610612737, 
  data = 0x1 <Address 0x1 out of bounds>}
	save_net_src = {type = 4294958947, len = -1610612737, 
  data = 0x1 <Address 0x1 out of bounds>}
	save_net_dst = {type = 4294901760, len = -1610612737, data = 0x0}
	save_src = {type = 875640113, len = 536870912, 
  data = 0x3200000000000001 <Address 0x3200000000000001 out of bounds>}
	save_dst = {type = 875640113, len = -1610612737, data = 0x0}
	saved_layer_names_len = 0
	__PRETTY_FUNCTION__ = "call_dissector_work"
#17 0x20000000408769f0 in dissector_try_port (
    sub_dissectors=0x20000000000a9100, port=1, tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, tree=0x2000000001aaf290) at packet.c:832
	dtbl_entry = (dtbl_entry_t *) 0x1
	handle = (struct dissector_handle *) 0x200000000058ee40
	saved_match_port = 0
#18 0x2000000040baed80 in dissect_frame (tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, parent_tree=0x2000000001aaf290)
    at packet-frame.c:234
	except_sn = {except_down = 0x9fffffffffffe760, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffe1e0, except_cleanup = 0x9fffffffffffe1e0}}
	except_ch = {except_id = 0x20000000412be2b8, except_size = 1, 
  except_obj = {except_id = {except_group = 2314885530818453536, 
      except_code = 2314885530818453536}, 
    except_message = 0x2020202020202020 <Address 0x2020202020202020 out of bounds>, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, 
        <invalid float value>, 0, -inf, <invalid float value>, 0, 0, 
        <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, 
        -nan(0x4928824398483892), -inf, <invalid float value>, 0, 
        <invalid float value>, inf, inf, -0, -0, <invalid float value>, 
        <invalid float value>, 0, 0, 0, <invalid float value>}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	fh_tree = (proto_tree *) 0x2000000001aa4150
	ti = (proto_item * volatile) 0x2000000001aa4f00
	ts = {secs = 15, nsecs = 191168000}
	cap_len = 1514
	pkt_len = 1514
	tree = (proto_tree *) 0x2000000001aaf290
	item = (proto_item *) 0x1
#19 0x2000000040875250 in call_dissector_through_handle (
    handle=0x20000000000a9120, tvb=0x200000000067c830, 
    pinfo=0x20000000005e9610, tree=0x2000000001aaf290) at packet.c:382
	saved_proto = 0x2000000041298148 "Frame"
	ret = 1
#20 0x2000000040876060 in call_dissector_work (handle=0x20000000000a9120, 
    tvb=0x200000000067c830, pinfo_arg=0x20000000005e9610, 
    tree=0x2000000001aaf290) at packet.c:557
	pinfo = (packet_info * volatile) 0x20000000005e9610
	saved_proto = 0x2000000041117f68 "<Missing Protocol Name>"
	saved_can_desegment = 0
	ret = 79
	save_writable = 536870912
	save_dl_src = {type = 27983872, len = 536870912, 
  data = 0x3638313733ffe490 <Address 0x3638313733ffe490 out of bounds>}
	save_dl_dst = {type = 875640113, len = 536870912, 
  data = 0x313533343100005c <Address 0x313533343100005c out of bounds>}
	save_net_src = {type = 875640113, len = -1610612737, data = 0x0}
	save_net_dst = {type = 1093861512, len = 536870912, 
  data = 0x1b <Address 0x1b out of bounds>}
	save_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dst = {type = AT_NONE, len = 0, 
  data = 0x1 <Address 0x1 out of bounds>}
	saved_layer_names_len = 0
	__PRETTY_FUNCTION__ = "call_dissector_work"
#21 0x2000000040879060 in call_dissector (handle=0x20000000000a9120, 
    tvb=0x200000000067c830, pinfo=0x20000000005e9610, tree=0x2000000001aaf290)
    at packet.c:1700
	ret = 1
	__PRETTY_FUNCTION__ = "call_dissector"
#22 0x2000000040874e20 in dissect_packet (edt=0x20000000005e9600, 
    pseudo_header=0x20000000005e9610, pd=0x2000000001a97000 "�", 
    fd=0x9fffffffffffe9e0, cinfo=0x0) at packet.c:321
	except_sn = {except_down = 0x0, except_type = XCEPT_CATCHER, 
  except_info = {except_catcher = 0x9fffffffffffe780, 
    except_cleanup = 0x9fffffffffffe780}}
	except_ch = {except_id = 0x2000000041118158, except_size = 1, 
  except_obj = {except_id = {except_group = 0, except_code = 0}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, 
        <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 
        <invalid float value>, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	__PRETTY_FUNCTION__ = "dissect_packet"
#23 0x200000004086ed30 in epan_dissect_run (edt=0x20000000005e9600, 
    pseudo_header=0x20000000005e9048, data=0x2000000001a97000 "�", 
    fd=0x9fffffffffffe9e0, cinfo=0x0) at epan.c:158
No locals.
#24 0x2000000000037a10 in process_packet (cf=0x2000000000090ae8, pdh=0x0, 
    offset=2305843009219892736, whdr=0x20000000005e9028, 
    pseudo_header=0x20000000005e9048, pd=0x2000000001a97000 "�", 
    err=0x9fffffffffffea50) at tethereal.c:2355
	fdata = {next = 0x0, prev = 0x0, pfd = 0x0, num = 1058, 
  pkt_len = 1514, cap_len = 1514, cum_bytes = 240239, abs_ts = {
    secs = 1103451394, nsecs = 419494000}, rel_ts = {secs = 15, 
    nsecs = 191168000}, del_ts = {secs = 0, nsecs = 47630000}, 
  file_off = 255677, lnk_t = 1, flags = {passed_dfilter = 0, encoding = 0, 
    visited = 0, marked = 0, ref_time = 0}, color_filter = 0x1000c}
	create_proto_tree = 6198784
	edt = (epan_dissect_t *) 0x20000000005e9600
	passed = 1
#25 0x2000000000036f60 in load_cap_file (cf=0x2000000000090ae8, save_file=0x0, 
    out_file_type=592704) at tethereal.c:2175
	linktype = 6197288
	snapshot_length = 6197288
	pdh = (wtap_dumper *) 0x0
	err = 1462964150
	err_info = (gchar *) 0x1003e <Address 0x1003e out of bounds>
	data_offset = 255677
#26 0x2000000000033e90 in main (argc=6, argv=0x28) at tethereal.c:1356
	opt = 1
	i = 6
	arg_error = 658504
	gpf_path = 0x0
	pf_path = 0x0
	gdp_path = 0x0
	dp_path = 0x0
	gpf_open_errno = 0
	gpf_read_errno = -2147483648
	pf_open_errno = 0
	pf_read_errno = -2147483648
	gdp_open_errno = 65598
	gdp_read_errno = 0
	dp_open_errno = 65516
	dp_read_errno = 0
	err = 2147483647
	capture_filter_specified = 658512
	if_list = (GList *) 0x200000000066d568
	if_entry = (GList *) 0x20000000000a0c48
	if_info = (if_info_t *) 0x1
	adapter_index = 1
	p = 0x20000000400d6170 "��\005"
	err_str = "\000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000\000\000\000\000\000\000\000\026]\001\000\000\000\000\000\000��\232\000\000\000\000>\000\001\000\000\000\000\000`������\237\025\000\000\000\024\000\000\000\000�\016@\000\000\000 "...
	cant_get_if_list_errstr = (gchar *) 0x1 <Address 0x1 out of bounds>
	list_link_layer_types = 0
	quiet = 0
	save_file = (gchar *) 0x0
	out_file_type = 2
	cf_name = (
    gchar *) 0x200000000066d400 "/home/buildbot/ethereal/random/editcap.out"
	rfilter = (gchar *) 0x0
	start_capture = 0
	if_text = (gchar *) 0x1 <Address 0x1 out of bounds>
	lt_list = (GList *) 0x20000000000a0c48
	lt_entry = (GList *) 0x200000000066d568
	data_link_info = (data_link_info_t *) 0x1
	fcode = {bf_len = 4026531840, bf_insns = 0x10003}
	rfcode = (dfilter_t *) 0x0
	prefs = (e_prefs *) 0x2000000041ab1c38
	__PRETTY_FUNCTION__ = "main"


(no stderr output)


Bug 435 posted.