Ethereal-dev: [Ethereal-dev] Buildbot crash output
Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.
From: Buildbot <buildbot-do-not-reply@xxxxxxxxxxxx>
Date: Thu, 8 Dec 2005 08:37:01 -0600 (CST)
Problems have been found with the following capture file(s): http://www.ethereal.com/distribution/buildbot-builds/randpkt/editcap.439844df.pcap Error information: Core was generated by `lt-tethereal'. Program terminated with signal 11, Segmentation fault. #0 0x20000000428fb3e1 in strlen () from /lib/libc.so.5 #0 0x20000000428fb3e1 in strlen () from /lib/libc.so.5 No symbol table info available. #1 0x20000000409f05f0 in se_strdup (src=0x0) at emem.c:365 len = 4294967295 #2 0x2000000041260950 in dissect_smb2_session_setup_request ( tvb=0x2000000000750720, pinfo=0x2000000000607420, tree=0x1, offset=262, si=0x2000000000750700) at packet-smb2.c:1687 uid = (smb2_uid_info_t *) 0x200000000116b9f0 s_olb = {off = 80, len = 182, off_offset = 76, len_offset = 78, offset_size = OLB_O_UINT16_S_UINT16, hfindex = 33807} ntlmssph = (ntlmssp_header_t *) 0x2000000000750720 ntlmssp_tap_id = 39 idx = 1 #3 0x2000000041266ab0 in dissect_smb2_command (pinfo=0x2000000000607410, tree=0x2000000001b60930, tvb=0x2000000000719990, offset=64, si=0x20000000007506d8) at packet-smb2.c:3861 cmd_dissector = (int (*)(tvbuff_t *, packet_info *, proto_tree *, int, smb2_info_t *)) 0x2000000041e8b2c8 <__JCR_LIST__+8> cmd_tree = (proto_tree *) 0x0 #4 0x2000000041267f90 in dissect_smb2 (tvb=0x2000000000719990, pinfo=0x2000000000607410, parent_tree=0x2000000001b52d20) at packet-smb2.c:4168 tree = (proto_tree *) 0x2000000001b60930 header_item = (proto_item *) 0x2000000001b52090 header_tree = (proto_tree *) 0x2000000001b52090 offset = 64 old_offset = 0 conversation = (conversation_t *) 0x0 ssi = (smb2_saved_info_t *) 0x200000000116b930 ssi_key = {class = 0 '\0', infolevel = 0 '\0', seqnum = 2, private_data = 0x100000000, frame_req = 0, frame_res = 0, req_time = { secs = 68719476736, nsecs = 0}} si = (smb2_info_t *) 0x20000000007506d8 #5 0x2000000041268100 in dissect_smb2_heur (tvb=0x2000000000719990, pinfo=0x2000000000607410, parent_tree=0x2000000001b52d20) at packet-smb2.c:4185 No locals. #6 0x20000000409fb030 in dissector_try_heuristic ( sub_dissectors=0x2000000000662fd0, tvb=0x2000000000719990, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:1526 status = 0 saved_proto = 0x20000000416b1c18 "NBSS" entry = (GSList *) 0x2000000000662fd0 dtbl_entry = (heur_dtbl_entry_t *) 0x2000000000661ef0 saved_can_desegment = 0 saved_layer_names_len = 15 #7 0x20000000410a46d0 in dissect_netbios_payload (tvb=0x2000000000719990, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet-netbios.c:1081 No locals. #8 0x200000004104a680 in dissect_nbss_packet (tvb=0x2000000000719938, offset=4, pinfo=0x2000000000607410, tree=0x2000000001b52d20, is_cifs=1) at packet-nbns.c:1605 except_sn = {except_down = 0x9fffffffffffcf20, except_type = XCEPT_CATCHER, except_info = { except_catcher = 0x9fffffffffffc990, except_cleanup = 0x9fffffffffffc990}} except_ch = {except_id = 0x20000000416b2110, except_size = 1, except_obj = {except_id = {except_group = 0, except_code = 279155943520}, except_message = 0x4 <Address 0x4 out of bounds>, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, <invalid float value>, <invalid float value>, 0, <invalid float value>, 0, <invalid float value>}}}} exc = (except_t *) 0x0 except_state = 0 catch_spec = {{except_group = 1, except_code = 0}} nbss_tree = (proto_tree *) 0x2000000001b52360 ti = (proto_item *) 0x2000000001b52360 field_tree = (proto_tree *) 0x0 msg_type = 0 '\0' flags = 0 '\0' length = 262 length_remaining = 0 len = 0 name = 0x2000000000750258 "Nov 18, 2005 06:36:35.832489000" name_type = 0 reported_len = 0 next_tvb = (tvbuff_t *) 0x2000000000719990 saved_proto = 0x20000000416b1c18 "NBSS" __PRETTY_FUNCTION__ = "dissect_nbss_packet" #9 0x200000004104ad50 in dissect_nbss (tvb=0x2000000000719938, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet-nbns.c:1789 tcpinfo = (struct tcpinfo *) 0x0 offset = 0 max_data = 6321176 msg_type = 0 '\0' flags = 0 '\0' length = 0 len = 0 is_cifs = 1 #10 0x20000000409f7c40 in call_dissector_through_handle ( handle=0x200000000065cc60, tvb=0x2000000000719938, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:386 saved_proto = 0x20000000416b1c18 "NBSS" ret = 0 #11 0x20000000409f8a50 in call_dissector_work (handle=0x200000000065cc60, tvb=0x2000000000719938, pinfo_arg=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:561 pinfo = (packet_info * volatile) 0x2000000000607410 saved_proto = 0x200000004171c1e0 "TCP" saved_can_desegment = 0 ret = 255 save_writable = 536870912 save_dl_src = {type = AT_NONE, len = 0, data = 0x0} save_dl_dst = {type = AT_FC, len = 0, data = 0x0} save_net_src = {type = AT_NONE, len = 1, data = 0x0} save_net_dst = {type = AT_NONE, len = 16, data = 0x0} save_src = {type = 170, len = 1769234797, data = 0x2000000001b55ef0 "\210��A"} save_dst = {type = AT_NONE, len = 100, data = 0x2000000041545038 "s"} saved_layer_names_len = 10 __PRETTY_FUNCTION__ = "call_dissector_work" #12 0x20000000409f93e0 in dissector_try_port ( sub_dissectors=0x20000000004a31a0, port=445, tvb=0x2000000000719938, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:836 dtbl_entry = (dtbl_entry_t *) 0x0 handle = (struct dissector_handle *) 0x200000000065cc60 saved_match_port = 6 #13 0x20000000412b8390 in decode_tcp_ports (tvb=0x2000000000719938, offset=32, pinfo=0x2000000000607410, tree=0x2000000001b52d20, src_port=51168, dst_port=51168) at packet-tcp.c:2544 next_tvb = (tvbuff_t *) 0x2000000000719938 low_port = 445 high_port = 51168 #14 0x20000000412b88c0 in process_tcp_payload (tvb=0x20000000007198e0, offset=32, pinfo=0x2000000000607410, tree=0x2000000001b52d20, tcp_tree=0x2000000001b52f90, src_port=51168, dst_port=445, seq=158, nxtseq=424, is_tcp_segment=1) at packet-tcp.c:2591 except_sn = {except_down = 0x9fffffffffffd900, except_type = XCEPT_CATCHER, except_info = { except_catcher = 0x9fffffffffffcf40, except_cleanup = 0x9fffffffffffcf40}} except_ch = {except_id = 0x20000000417a4a48, except_size = 1, except_obj = {except_id = {except_group = 11529215046068457628, except_code = 1236933650528}, except_message = 0xffff0208 <Address 0xffff0208 out of bounds>, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}} exc = (except_t *) 0x0 except_state = 0 catch_spec = {{except_group = 1, except_code = 0}} __PRETTY_FUNCTION__ = "process_tcp_payload" #15 0x20000000412b8df0 in dissect_tcp_payload (tvb=0x20000000007198e0, pinfo=0x2000000000607410, offset=32, seq=158, nxtseq=424, sport=51168, dport=445, tree=0x2000000001b52d20, tcp_tree=0x2000000001b52f90) at packet-tcp.c:2664 save_fragmented = 0 #16 0x20000000412bb620 in dissect_tcp (tvb=0x20000000007198e0, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet-tcp.c:3116 th_sum = 266 th_urp = 62040 tcp_tree = (proto_tree *) 0x2000000001b52f90 field_tree = (proto_tree *) 0x10a ti = (proto_item *) 0x2000000001b52f90 tf = (proto_item *) 0x0 offset = 32 flags = (gchar *) 0x2000000000750208 "PSH, ACK" fstr = {0x200000004155a738 "FIN", 0x200000004171d9a8 "SYN", 0x2000000041723d60 "RST", 0x20000000417a3368 "PSH", 0x2000000041567928 "ACK", 0x20000000417a3370 "URG", 0x200000004175b790 "ECN", 0x200000004175b498 "CWR"} fpos = 8 i = 1106309720 bpos = 1106128184 optlen = 1106309720 nxtseq = 424 reported_len = 298 cksum_vec = {{ ptr = 0x200000000071901a "��r\001��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s", len = 4}, { ptr = 0x200000000071901e "��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s", len = 4}, {ptr = 0x9fffffffffffd270 "", len = 4}, { ptr = 0x2000000000719022 "��\001�T\023P�\035_�\216\200\030\ą\230%s", len = 298}} phdr = {704710144, 0} computed_cksum = 0 real_window = 1996 length_remaining = 266 desegment_ok = 1116713952 tcpinfo = {seq = 158, nxtseq = 424, is_reassembled = 0, urgent = 0, urgent_pointer = 32} tcphstruct = {{th_seq = 158, th_ack = 451, th_have_seglen = 1, th_seglen = 266, th_win = 7984, th_sport = 51168, th_dport = 445, th_hlen = 32 ' ', th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, data = 0x200000000071901a "��r\001��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x200000000071901e "��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}}, {th_seq = 0, th_ack = 0, th_have_seglen = 1, th_seglen = 0, th_win = 1728, th_sport = 51168, th_dport = 445, th_hlen = 32 ' ', th_flags = 16 '\020', ip_src = {type = AT_IPv4, len = 4, data = 0x200000000071901a "��r\001��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x200000000071901e "��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}}, {th_seq = 0, th_ack = 196, th_have_seglen = 1, th_seglen = 158, th_win = 6912, th_sport = 51168, th_dport = 445, th_hlen = 32 ' ', th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, data = 0x200000000071901a "��r\001��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x200000000071901e "��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}}, {th_seq = 196, th_ack = 158, th_have_seglen = 1, th_seglen = 255, th_win = 67, th_sport = 445, th_dport = 51168, th_hlen = 32 ' ', th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, data = 0x200000000071901a "��r\001��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x200000000071901e "��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}}} tcph = (struct tcpheader *) 0x2000000041f29db0 tcph_count = 0 tf_syn = (proto_item *) 0x2000000001b530e0 tf_fin = (proto_item *) 0x2000000001b60e40 tf_rst = (proto_item *) 0x2000000001b60c60 #17 0x20000000409f7c40 in call_dissector_through_handle ( handle=0x2000000000689480, tvb=0x20000000007198e0, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:386 saved_proto = 0x200000004171c1e0 "TCP" ret = 0 #18 0x20000000409f8a50 in call_dissector_work (handle=0x2000000000689480, tvb=0x20000000007198e0, pinfo_arg=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:561 pinfo = (packet_info * volatile) 0x2000000000607410 saved_proto = 0x20000000413b3ae0 "IP" saved_can_desegment = 0 ret = 287 save_writable = 536870912 save_dl_src = {type = 1635123301, len = 1936029036, data = 0x7461687420666f20 <Address 0x7461687420666f20 out of bounds>} save_dl_dst = {type = 1650553888, len = 1931961708, data = 0x202020202020200a <Address 0x202020202020200a out of bounds>} save_net_src = {type = 929243168, len = 538976288, data = 0x7065636e6f632020 <Address 0x7065636e6f632020 out of bounds>} save_net_dst = {type = 858927732, len = 2003792416, data = 0x6261206572612073 <Address 0x6261206572612073 out of bounds>} save_src = {type = 942735468, len = 1700929647, data = 0x65696669646f6d20 <Address 0x65696669646f6d20 out of bounds>} save_dst = {type = 892811573, len = -1610612737, data = 0x1400000031 <Address 0x1400000031 out of bounds>} saved_layer_names_len = 6 __PRETTY_FUNCTION__ = "call_dissector_work" #19 0x20000000409f93e0 in dissector_try_port ( sub_dissectors=0x20000000001e0060, port=6, tvb=0x20000000007198e0, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:836 dtbl_entry = (dtbl_entry_t *) 0x0 handle = (struct dissector_handle *) 0x2000000000689480 saved_match_port = 2048 #20 0x2000000040ef5b70 in dissect_ip (tvb=0x2000000000719888, pinfo=0x2000000000607410, parent_tree=0x2000000001b52d20) at packet-ip.c:1179 ip_tree = (proto_tree *) 0x2000000001b521b0 field_tree = (proto_tree *) 0x20000000006074ec ti = (proto_item *) 0x2000000001b521b0 tf = (proto_item *) 0x6 addr = 2171775168 offset = 20 hlen = 20 optlen = 6321392 flags = 0 nxt = 6 '\006' ipsum = 0 ipfd_head = (fragment_data *) 0x0 next_tvb = (tvbuff_t *) 0x20000000007198e0 update_col_info = 1 save_fragmented = 0 eip_arr = {{ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 307, ip_id = 25643, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 12230, ip_src = {type = AT_IPv4, len = 4, data = 0x200000000071901a "��r\001��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x200000000071901e "��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}}, {ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 318, ip_id = 31345, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 22901, ip_src = {type = AT_IPv4, len = 4, data = 0x200000000071901a "��r\001��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x200000000071901e "��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}}, {ip_v_hl = 69 'E', ip_tos = 128 '\200', ip_len = 52, ip_id = 31341, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 23171, ip_src = {type = AT_IPv4, len = 4, data = 0x200000000071901a "��r\001��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x200000000071901e "��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}}, {ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 210, ip_id = 31343, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 23011, ip_src = {type = AT_IPv4, len = 4, data = 0x200000000071901a "��r\001��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x200000000071901e "��r\201��\001�T\023P�\035_�\216\200\030\ą\230%s"}}} eip_current = 1 iph = (e_ip *) 0x2000000041f22478 src_addr = (const guchar *) 0x20000000007198e0 "\001" dst_addr = (const guchar *) 0x20000000007198e0 "\001" src32 = 3232264705 dst32 = 3232264833 tree = (proto_tree *) 0x2000000001b52d20 item = (proto_item *) 0x0 checksum_tree = (proto_tree *) 0x20000000006074f0 #21 0x20000000409f7c40 in call_dissector_through_handle ( handle=0x20000000001e00a0, tvb=0x2000000000719888, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:386 saved_proto = 0x20000000413b3ae0 "IP" ret = 0 #22 0x20000000409f8a50 in call_dissector_work (handle=0x20000000001e00a0, tvb=0x2000000000719888, pinfo_arg=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:561 pinfo = (packet_info * volatile) 0x2000000000607410 saved_proto = 0x20000000416438f0 "Ethernet" saved_can_desegment = 0 ret = 307 save_writable = 6 save_dl_src = {type = 1299185789, len = 1866678857, data = 0x65636e61696c706d <Address 0x65636e61696c706d out of bounds>} save_dl_dst = {type = 3435921523, len = 214748364, data = 0x1003e <Address 0x1003e out of bounds>} save_net_src = {type = 3368026110, len = -858993460, data = 0x353133390001003a <Address 0x353133390001003a out of bounds>} save_net_dst = {type = 892428592, len = -1577058288, data = 0x10018 <Address 0x10018 out of bounds>} save_src = {type = AT_NONE, len = -1879048192, data = 0xffec <Address 0xffec out of bounds>} save_dst = {type = 4294967295, len = 2147483647, data = 0x1003e <Address 0x1003e out of bounds>} saved_layer_names_len = 3 __PRETTY_FUNCTION__ = "call_dissector_work" #23 0x20000000409f93e0 in dissector_try_port ( sub_dissectors=0x20000000000a7140, port=2048, tvb=0x2000000000719888, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:836 dtbl_entry = (dtbl_entry_t *) 0x0 handle = (struct dissector_handle *) 0x20000000001e00a0 saved_match_port = 1 #24 0x2000000040d47d30 in ethertype (etype=2048, tvb=0x2000000000719830, offset_after_etype=14, pinfo=0x2000000000607410, tree=0x2000000001b52d20, fh_tree=0x2000000001b61080, etype_id=8173, trailer_id=8175, fcs_len=-1) at packet-ethertype.c:189 except_sn = {except_down = 0x9fffffffffffe1d0, except_type = XCEPT_CATCHER, except_info = { except_catcher = 0x9fffffffffffd920, except_cleanup = 0x9fffffffffffd920}} except_ch = {except_id = 0x200000004156d558, except_size = 1, except_obj = {except_id = {except_group = 7309940803695376244, except_code = 7809639177543117101}, except_message = 0x20000000400da000 "z�P�", except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}} exc = (except_t *) 0x0 except_state = 0 catch_spec = {{except_group = 1, except_code = 0}} description = 0x0 next_tvb = (tvbuff_t *) 0x2000000000719888 length_before = 318 dissector_found = 0 saved_proto = 0x20000000416438f0 "Ethernet" __PRETTY_FUNCTION__ = "ethertype" #25 0x2000000040d43900 in dissect_eth_common (tvb=0x2000000000719830, pinfo=0x2000000000607410, parent_tree=0x2000000001b52d20, fcs_len=-1) at packet-eth.c:311 ehdr = (eth_hdr * volatile) 0x2000000041f1e2d8 is_802_2 = 1970037110 fh_tree = (proto_tree * volatile) 0x2000000001b61080 src_addr = (const guint8 *) 0x2000000000719006 "" dst_addr = (const guint8 *) 0x2000000000719000 "" ehdrs = {{dst = {type = AT_ETHER, len = 6, data = 0x2000000000719000 ""}, src = {type = AT_ETHER, len = 6, data = 0x2000000000719006 ""}, type = 2048}, {dst = {type = AT_ETHER, len = 6, data = 0x2000000000719000 ""}, src = {type = AT_ETHER, len = 6, data = 0x2000000000719006 ""}, type = 2048}, {dst = { type = AT_ETHER, len = 6, data = 0x2000000000719000 ""}, src = { type = AT_ETHER, len = 6, data = 0x2000000000719006 ""}, type = 2048}, { dst = {type = AT_ETHER, len = 6, data = 0x2000000000719000 ""}, src = { type = AT_ETHER, len = 6, data = 0x2000000000719006 ""}, type = 2048}} ehdr_num = 2 tree = (proto_tree * volatile) 0x2000000001b52d20 #26 0x2000000040d43c50 in dissect_eth_maybefcs (tvb=0x2000000000719830, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet-eth.c:407 No locals. #27 0x20000000409f7c40 in call_dissector_through_handle ( handle=0x20000000006032e0, tvb=0x2000000000719830, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:386 saved_proto = 0x20000000416438f0 "Ethernet" ret = 0 #28 0x20000000409f8a50 in call_dissector_work (handle=0x20000000006032e0, tvb=0x2000000000719830, pinfo_arg=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:561 pinfo = (packet_info * volatile) 0x2000000000607410 saved_proto = 0x2000000041559518 "Frame" saved_can_desegment = 0 ret = 321 save_writable = 0 save_dl_src = {type = 538976288, len = 538976288, data = 0x7473655466692020 <Address 0x7473655466692020 out of bounds>} save_dl_dst = {type = 1701707776, len = 540876914, data = 0x612d50492d796d27 <Address 0x612d50492d796d27 out of bounds>} save_net_src = {type = 1701995620, len = 690451315, data = 0x4c494146203d3d20 <Address 0x4c494146203d3d20 out of bounds>} save_net_dst = {type = 4294901760, len = -1610612737, data = 0x0} save_src = {type = 842216208, len = 536870912, data = 0x6163323600000001 <Address 0x6163323600000001 out of bounds>} save_dst = {type = 842216240, len = -1610612737, data = 0x0} saved_layer_names_len = 0 __PRETTY_FUNCTION__ = "call_dissector_work" #29 0x20000000409f93e0 in dissector_try_port ( sub_dissectors=0x20000000000a74a0, port=1, tvb=0x2000000000719830, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:836 dtbl_entry = (dtbl_entry_t *) 0x0 handle = (struct dissector_handle *) 0x20000000006032e0 saved_match_port = 0 #30 0x2000000040d84ed0 in dissect_frame (tvb=0x2000000000719830, pinfo=0x2000000000607410, parent_tree=0x2000000001b52d20) at packet-frame.c:234 except_sn = {except_down = 0x9fffffffffffe770, except_type = XCEPT_CATCHER, except_info = { except_catcher = 0x9fffffffffffe1f0, except_cleanup = 0x9fffffffffffe1f0}} except_ch = {except_id = 0x20000000415873e8, except_size = 1, except_obj = {except_id = {except_group = 2314885530818453536, except_code = 2314885530818453536}, except_message = 0x2020202020202020 <Address 0x2020202020202020 out of bounds>, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}} exc = (except_t *) 0x0 except_state = 0 catch_spec = {{except_group = 1, except_code = 0}} fh_tree = (proto_tree *) 0x2000000001b60570 ti = (proto_item * volatile) 0x2000000001b609c0 ts = {secs = 0, nsecs = 393020000} cap_len = 332 pkt_len = 332 tree = (proto_tree *) 0x2000000001b52d20 item = (proto_item *) 0x0 #31 0x20000000409f7c40 in call_dissector_through_handle ( handle=0x20000000000a74c0, tvb=0x2000000000719830, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:386 saved_proto = 0x2000000041559518 "Frame" ret = 0 #32 0x20000000409f8a50 in call_dissector_work (handle=0x20000000000a74c0, tvb=0x2000000000719830, pinfo_arg=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:561 pinfo = (packet_info * volatile) 0x2000000000607410 saved_proto = 0x20000000413b3cc8 "<Missing Protocol Name>" saved_can_desegment = 0 ret = 1096042096 save_writable = 536870912 save_dl_src = {type = 1117021852, len = 536870912, data = 0x20000000429466a0 "\210\b\001"} save_dl_dst = {type = 842216360, len = 536870912, data = 0x4200 <Address 0x4200 out of bounds>} save_net_src = {type = 842216336, len = -1610612737, data = 0x0} save_net_dst = {type = 1162739795, len = 536891207, data = 0x2e <Address 0x2e out of bounds>} save_src = {type = AT_NONE, len = 0, data = 0x0} save_dst = {type = 4294960320, len = -1610612737, data = 0x1 <Address 0x1 out of bounds>} saved_layer_names_len = 0 __PRETTY_FUNCTION__ = "call_dissector_work" #33 0x20000000409fba50 in call_dissector (handle=0x20000000000a74c0, tvb=0x2000000000719830, pinfo=0x2000000000607410, tree=0x2000000001b52d20) at packet.c:1704 ret = 0 __PRETTY_FUNCTION__ = "call_dissector" #34 0x20000000409f7810 in dissect_packet (edt=0x2000000000607400, pseudo_header=0x2000000000607410, pd=0x2000000000719000 "", fd=0x9fffffffffffe9f0, cinfo=0x0) at packet.c:325 except_sn = {except_down = 0x0, except_type = XCEPT_CATCHER, except_info = {except_catcher = 0x9fffffffffffe790, except_cleanup = 0x9fffffffffffe790}} except_ch = {except_id = 0x20000000413b3eb8, except_size = 1, except_obj = {except_id = {except_group = 0, except_code = 0}, except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, <invalid float value>, <invalid float value>, 0, <invalid float value>, 0, 0}}}} exc = (except_t *) 0x0 except_state = 0 catch_spec = {{except_group = 1, except_code = 0}} __PRETTY_FUNCTION__ = "dissect_packet" #35 0x20000000409f12a0 in epan_dissect_run (edt=0x2000000000607400, pseudo_header=0x2000000000606e48, data=0x2000000000719000 "", fd=0x9fffffffffffe9f0, cinfo=0x0) at epan.c:161 No locals. #36 0x2000000000036e50 in process_packet (cf=0x200000000008fcb8, pdh=0x0, offset=2305843009220015104, whdr=0x2000000000606e28, pseudo_header=0x2000000000606e48, pd=0x2000000000719000 "", err=0x9fffffffffffea60) at tethereal.c:2411 fdata = {next = 0x0, prev = 0x0, pfd = 0x2000000000718ee0, num = 186, pkt_len = 332, cap_len = 332, cum_bytes = 34917, abs_ts = { secs = 1132317395, nsecs = 834219000}, rel_ts = {secs = 0, nsecs = 393020000}, del_ts = {secs = 0, nsecs = 680000}, file_off = 37585, lnk_t = 1, flags = {passed_dfilter = 0, encoding = 0, visited = 0, marked = 0, ref_time = 0}, color_filter = 0x1000c} create_proto_tree = 6321152 edt = (epan_dissect_t *) 0x2000000000607400 passed = 0 #37 0x2000000000036400 in load_cap_file (cf=0x200000000008fcb8, save_file=0x0, out_file_type=589072) at tethereal.c:2236 linktype = 6319656 snapshot_length = 6319656 pdh = (wtap_dumper *) 0x0 err = 1462964150 err_info = (gchar *) 0x1003e <Address 0x1003e out of bounds> data_offset = 37585 #38 0x2000000000033640 in main (argc=6, argv=0x28) at tethereal.c:1393 opt = 0 i = 6 arg_error = 654872 gpf_path = 0x0 pf_path = 0x0 gdp_path = 0x0 dp_path = 0x0 gpf_open_errno = 0 gpf_read_errno = -2147483648 pf_open_errno = 0 pf_read_errno = -2147483648 gdp_open_errno = 65598 gdp_read_errno = 0 dp_open_errno = 65516 dp_read_errno = 0 err = 2147483647 capture_filter_specified = 654880 if_list = (GList *) 0x2000000000738c28 if_entry = (GList *) 0x200000000009fe18 if_info = (if_info_t *) 0x1 adapter_index = 1 p = 0x20000000400d6170 "" err_str = "\000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\r@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000�\016@\000\000\000 \000\000\000\000\000\000\000\000\026]\001\000\000\000\000\000\000��\232\000\000\000\000>\000\001\000\000\000\000\000p������\237\025\000\000\000\024\000\000\000\000�\016@\000\000\000 "... cant_get_if_list_errstr = (gchar *) 0x1 <Address 0x1 out of bounds> list_link_layer_types = 0 quiet = 0 save_file = (gchar *) 0x0 out_file_type = 2 cf_name = ( gchar *) 0x2000000000672a00 "/home/buildbot/ethereal/random/editcap.out" rfilter = (gchar *) 0x0 start_capture = 0 if_text = (gchar *) 0x0 lt_list = (GList *) 0x2000000000738c28 lt_entry = (GList *) 0x1 data_link_info = (data_link_info_t *) 0x2000000041e8b2c8 fcode = {bf_len = 4026531840, bf_insns = 0x10003} rfcode = (dfilter_t *) 0x0 prefs = (e_prefs *) 0x2000000041f2b908 optstring = "a:b:c:d:Df:F:hi:lLnN:o:pqr:R:s:St:T:vVw:xy:z:" __PRETTY_FUNCTION__ = "main" (no stderr output) Bug 617 posted.
- Prev by Date: Re: [Ethereal-dev] Exception on windows version
- Next by Date: [Ethereal-dev] Sequence numbers in TCP segments
- Previous by thread: [Ethereal-dev] Buildbot crash output
- Next by thread: [Ethereal-dev] Buildbot crash output
- Index(es):