Ethereal-dev: [Ethereal-dev] Buildbot crash output

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

Date: Tue, 31 Jan 2006 00:37:01 -0600 (CST)
Problems have been found with the following capture file(s):

http://www.ethereal.com/distribution/buildbot-builds/randpkt/editcap.43df04ba.pcap


Error information:
Core was generated by `lt-tethereal'.
Program terminated with signal 11, Segmentation fault.
#0  pdu_store_sequencenumber_of_next_pdu (pinfo=0x2000000000589420, 
    seq=3048761067, nxtpdu=36352, tcpd=0xc0) at packet-tcp.c:444
444		tnp->next=tcpd->fwd->pdu_seq;
#0  pdu_store_sequencenumber_of_next_pdu (pinfo=0x2000000000589420, 
    seq=3048761067, nxtpdu=36352, tcpd=0xc0) at packet-tcp.c:444
	tnp = (struct tcp_next_pdu *) 0x200000000116b8b8
#1  0x200000004139f010 in process_tcp_payload (tvb=0x2000000001ae40e0, 
    offset=20, pinfo=0x2000000000589410, tree=0x2000000001ae3230, 
    tcp_tree=0x2000000001ae28d0, src_port=692, dst_port=2049, seq=3048761067, 
    nxtseq=0, is_tcp_segment=1, tcpd=0x0) at packet-tcp.c:2212
	except_sn = {except_down = 0x9fffffffffffda00, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffd030, except_cleanup = 0x9fffffffffffd030}}
	except_ch = {except_id = 0x20000000418b5e10, except_size = 1, 
  except_obj = {except_id = {except_group = 4, except_code = 0}, 
    except_message = 0x9fffffffffffd19c "", except_dyndata = 0x0}, 
  except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 
        0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 
        0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	__PRETTY_FUNCTION__ = "process_tcp_payload"
#2  0x200000004139f420 in dissect_tcp_payload (tvb=0x2000000001ae40e0, 
    pinfo=0x2000000000589410, offset=20, seq=3048761067, nxtseq=0, sport=692, 
    dport=2049, tree=0x2000000001ae3230, tcp_tree=0x2000000001ae28d0, 
    tcpd=0x200000000116b8d8) at packet-tcp.c:2273
	save_fragmented = 1
#3  0x20000000413a1d30 in dissect_tcp (tvb=0x2000000001ae40e0, 
    pinfo=0x2000000000589410, tree=0x2000000001ae3230) at packet-tcp.c:2739
	th_sum = 160
	th_urp = 25648
	tcp_tree = (proto_tree *) 0x2000000001ae28d0
	field_tree = (proto_tree *) 0xa0
	ti = (proto_item *) 0x2000000001ae28d0
	tf = (proto_item *) 0x200000000116b8b8
	offset = 20
	flags = (gchar *) 0x20000000006b0298 "PSH, ACK"
	fstr = {0x20000000416491c0 "FIN", 0x2000000041811300 "SYN", 
  0x20000000418176b8 "RST", 0x20000000418b4748 "PSH", 
  0x2000000041657718 "ACK", 0x20000000418b4750 "URG", 
  0x2000000041869da8 "ECN", 0x2000000041869ab0 "CWR"}
	fpos = 8
	returned_length = 2305843009231960248
	i = 1107911728
	bpos = 4294961952
	optlen = 1107911728
	nxtseq = 0
	reported_len = 180
	cksum_vec = {{ptr = 0x9fffffffffffd400 "6bd0", len = 4}, {
    ptr = 0x9fffffffffffd403 "0", len = 1}, {ptr = 0x9fffffffffffd370 "", 
    len = 4}, {
    ptr = 0x2000000001b0c022 "\002�\b\001��f�(�\024�P\030\"8\205\224", 
    len = 180}}
	phdr = {3019900416, 0}
	computed_cksum = 47288
	real_window = 8760
	length_remaining = 160
	desegment_ok = 18266328
	tcpinfo = {seq = 3048761067, nxtseq = 0, is_reassembled = 0, 
  urgent = 0, urgent_pointer = 1430}
	tcphstruct = {{th_seq = 355772, th_ack = 26344, th_have_seglen = 1, 
    th_seglen = 1024, th_win = 64240, th_sport = 2049, th_dport = 692, 
    th_hlen = 20 '\024', th_flags = 24 '\030', ip_src = {type = AT_IPv4, 
      len = 4, 
      data = 0x2000000001b0c01a "f�g\v��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01e "��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}}, {th_seq = 0, th_ack = 0, th_have_seglen = 1, th_seglen = 160, 
    th_win = 8760, th_sport = 692, th_dport = 2049, th_hlen = 20 '\024', 
    th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01a "f�g\v��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01e "��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}}, {th_seq = 3048761067, th_ack = 685774049, th_have_seglen = 0, 
    th_seglen = 0, th_win = 8760, th_sport = 692, th_dport = 2049, 
    th_hlen = 20 '\024', th_flags = 24 '\030', ip_src = {type = AT_IPv4, 
      len = 4, 
      data = 0x2000000001b0c01a "f�g\v��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01e "��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}}, {th_seq = 354312, th_ack = 26344, th_have_seglen = 1, th_seglen = 1460, 
    th_win = 64240, th_sport = 2049, th_dport = 692, th_hlen = 20 '\024', 
    th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01a "f�g\v��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01e "��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}}}
	tcph = (struct tcpheader *) 0x20000000420b1508
	tcph_count = 2
	tf_syn = (proto_item *) 0x2000000001af1110
	tf_fin = (proto_item *) 0x2000000001af0e40
	tf_rst = (proto_item *) 0x2000000001af1290
	tcpd = (struct tcp_analysis *) 0x0
#4  0x2000000040a7b610 in call_dissector_through_handle (
    handle=0x20000000005c7680, tvb=0x2000000001ae40e0, 
    pinfo=0x2000000000589410, tree=0x2000000001ae3230) at packet.c:386
	saved_proto = 0x200000004180fb48 "TCP"
	ret = 18266296
#5  0x2000000040a7c420 in call_dissector_work (handle=0x20000000005c7680, 
    tvb=0x2000000001ae40e0, pinfo_arg=0x2000000000589410, 
    tree=0x2000000001ae3230) at packet.c:561
	pinfo = (packet_info * volatile) 0x2000000000589410
	saved_proto = 0x2000000041767f98 "IP"
	saved_can_desegment = 0
	ret = 180
	save_writable = 536870912
	save_dl_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dl_dst = {type = AT_NONE, len = 0, data = 0x0}
	save_net_src = {type = 939524096, len = 0, data = 0x0}
	save_net_dst = {type = 822083584, len = 0, data = 0x0}
	save_src = {type = 872415232, len = 0, data = 0x0}
	save_dst = {type = 811885110, len = 0, data = 0x0}
	saved_layer_names_len = 6
	__PRETTY_FUNCTION__ = "call_dissector_work"
#6  0x2000000040a7cdb0 in dissector_try_port (
    sub_dissectors=0x20000000001c01a0, port=6, tvb=0x2000000001ae40e0, 
    pinfo=0x2000000000589410, tree=0x2000000001ae3230) at packet.c:836
	dtbl_entry = (dtbl_entry_t *) 0x200000000116b8b8
	handle = (struct dissector_handle *) 0x20000000005c7680
	saved_match_port = 2048
#7  0x2000000040f845f0 in dissect_ip (tvb=0x2000000001ae4088, 
    pinfo=0x2000000000589410, parent_tree=0x2000000001ae3230)
    at packet-ip.c:1180
	ip_tree = (proto_tree *) 0x2000000001af1140
	field_tree = (proto_tree *) 0x20000000005894ec
	ti = (proto_item *) 0x2000000001af1140
	tf = (proto_item *) 0x20000000420a96ae
	addr = 208075980
	offset = 20
	hlen = 20
	optlen = 1107990193
	flags = 6
	nxt = 6 '\006'
	ipsum = 186
	ipfd_head = (fragment_data *) 0x0
	next_tvb = (tvbuff_t *) 0x2000000001ae40e0
	update_col_info = 1
	save_fragmented = 0
	eip_arr = {{ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 200, 
    ip_id = 25167, ip_off = 24576, ip_ttl = 0 '\0', ip_p = 6 '\006', 
    ip_sum = 45519, ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01a "f�g\v��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01e "��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}}, {ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 1500, ip_id = 44055, 
    ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 25587, 
    ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01a "f�g\v��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01e "��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}}, {ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 1064, ip_id = 44056, 
    ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 26022, 
    ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01a "f�g\v��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01e "��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}}, {ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 200, ip_id = 25166, 
    ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 45520, 
    ip_src = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01a "f�g\v��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x2000000001b0c01e "��f\f\002�\b\001��f�(�\024�P\030\"8\205\224"}}}
	eip_current = 0
	iph = (e_ip *) 0x20000000420a96a8
	src_addr = (const guchar *) 0x2000000001ae40e0 "\001"
	dst_addr = (const guchar *) 0x2000000001ae40e0 "\001"
	src32 = 1727817483
	dst32 = 3439093260
	tree = (proto_tree *) 0x0
	item = (proto_item *) 0x200000000116b8b8
	checksum_tree = (proto_tree *) 0x20000000420a96b1
#8  0x2000000040a7b610 in call_dissector_through_handle (
    handle=0x20000000001c01e0, tvb=0x2000000001ae4088, 
    pinfo=0x2000000000589410, tree=0x2000000001ae3230) at packet.c:386
	saved_proto = 0x2000000041767f98 "IP"
	ret = 18266296
#9  0x2000000040a7c420 in call_dissector_work (handle=0x20000000001c01e0, 
    tvb=0x2000000001ae4088, pinfo_arg=0x2000000000589410, 
    tree=0x2000000001ae3230) at packet.c:561
	pinfo = (packet_info * volatile) 0x2000000000589410
	saved_proto = 0x20000000417360b8 "Ethernet"
	saved_can_desegment = 0
	ret = 200
	save_writable = 0
	save_dl_src = {type = 1299185789, len = 1866678857, 
  data = 0x65636e61696c706d <Address 0x65636e61696c706d out of bounds>}
	save_dl_dst = {type = AT_NONE, len = 0, data = 0x0}
	save_net_src = {type = AT_NONE, len = 0, 
  data = 0x3933373400000000 <Address 0x3933373400000000 out of bounds>}
	save_net_dst = {type = AT_NONE, len = 0, data = 0x0}
	save_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dst = {type = AT_NONE, len = 0, data = 0x0}
	saved_layer_names_len = 3
	__PRETTY_FUNCTION__ = "call_dissector_work"
#10 0x2000000040a7cdb0 in dissector_try_port (
    sub_dissectors=0x20000000000a9260, port=2048, tvb=0x2000000001ae4088, 
    pinfo=0x2000000000589410, tree=0x2000000001ae3230) at packet.c:836
	dtbl_entry = (dtbl_entry_t *) 0x200000000116b8b8
	handle = (struct dissector_handle *) 0x20000000001c01e0
	saved_match_port = 1
#11 0x2000000040dd1660 in ethertype (etype=2048, tvb=0x2000000001ae4030, 
    offset_after_etype=14, pinfo=0x2000000000589410, tree=0x2000000001ae3230, 
    fh_tree=0x2000000001ae2f00, etype_id=8241, trailer_id=8243, fcs_len=-1)
    at packet-ethertype.c:192
	except_sn = {except_down = 0x9fffffffffffe2d0, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffda20, except_cleanup = 0x9fffffffffffda20}}
	except_ch = {except_id = 0x200000004165d708, except_size = 1, 
  except_obj = {except_id = {except_group = 1, except_code = 2}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 
        0, <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	description = 0x200000000116b8b8 ""
	next_tvb = (tvbuff_t *) 0x2000000001ae4088
	length_before = 200
	dissector_found = 0
	saved_proto = 0x20000000417360b8 "Ethernet"
	__PRETTY_FUNCTION__ = "ethertype"
#12 0x2000000040dcd230 in dissect_eth_common (tvb=0x2000000001ae4030, 
    pinfo=0x2000000000589410, parent_tree=0x2000000001ae3230, fcs_len=-1)
    at packet-eth.c:311
	ehdr = (eth_hdr * volatile) 0x20000000420a54b8
	is_802_2 = 1
	fh_tree = (proto_tree * volatile) 0x2000000001ae2f00
	src_addr = (const guint8 *) 0x2000000001b0c006 "\b� !;�\b"
	dst_addr = (const guint8 *) 0x2000000001b0c000 ""
	ehdrs = {{dst = {type = AT_ETHER, len = 6, 
      data = 0x2000000001b0c000 ""}, src = {type = AT_ETHER, len = 6, 
      data = 0x2000000001b0c006 "\b� !;�\b"}, type = 2048}, {dst = {
      type = AT_ETHER, len = 6, data = 0x2000000001b0c000 ""}, src = {
      type = AT_ETHER, len = 6, data = 0x2000000001b0c006 "\b� !;�\b"}, 
    type = 2048}, {dst = {type = AT_ETHER, len = 6, 
      data = 0x2000000001b0c000 ""}, src = {type = AT_ETHER, len = 6, 
      data = 0x2000000001b0c006 "\b� !;�\b"}, type = 2048}, {dst = {
      type = AT_ETHER, len = 6, data = 0x2000000001b0c000 ""}, src = {
      type = AT_ETHER, len = 6, data = 0x2000000001b0c006 "\b� !;�\b"}, 
    type = 2048}}
	ehdr_num = 1
	tree = (proto_tree * volatile) 0x2000000001ae3230
#13 0x2000000040dcd580 in dissect_eth_maybefcs (tvb=0x2000000001ae4030, 
    pinfo=0x2000000000589410, tree=0x2000000001ae3230) at packet-eth.c:407
No locals.
#14 0x2000000040a7b610 in call_dissector_through_handle (
    handle=0x200000000057f440, tvb=0x2000000001ae4030, 
    pinfo=0x2000000000589410, tree=0x2000000001ae3230) at packet.c:386
	saved_proto = 0x20000000417360b8 "Ethernet"
	ret = 18266296
#15 0x2000000040a7c420 in call_dissector_work (handle=0x200000000057f440, 
    tvb=0x2000000001ae4030, pinfo_arg=0x2000000000589410, 
    tree=0x2000000001ae3230) at packet.c:561
	pinfo = (packet_info * volatile) 0x2000000000589410
	saved_proto = 0x2000000041647fa0 "Frame"
	saved_can_desegment = 0
	ret = 214
	save_writable = 0
	save_dl_src = {type = 538976288, len = 538976288, 
  data = 0x7473655466692020 <Address 0x7473655466692020 out of bounds>}
	save_dl_dst = {type = 1701707776, len = 540876914, 
  data = 0x612d50492d796d27 <Address 0x612d50492d796d27 out of bounds>}
	save_net_src = {type = 1701995620, len = 690451315, 
  data = 0x4c494146203d3d20 <Address 0x4c494146203d3d20 out of bounds>}
	save_net_dst = {type = 4294901968, len = -1610612737, data = 0x0}
	save_src = {type = 875639347, len = 536870912, 
  data = 0x1 <Address 0x1 out of bounds>}
	save_dst = {type = 875639345, len = 536870912, 
  data = 0x20000000400de200 "z�P�"}
	saved_layer_names_len = 0
	__PRETTY_FUNCTION__ = "call_dissector_work"
#16 0x2000000040a7cdb0 in dissector_try_port (
    sub_dissectors=0x20000000000a9580, port=1, tvb=0x2000000001ae4030, 
    pinfo=0x2000000000589410, tree=0x2000000001ae3230) at packet.c:836
	dtbl_entry = (dtbl_entry_t *) 0x200000000116b8b8
	handle = (struct dissector_handle *) 0x200000000057f440
	saved_match_port = 0
#17 0x2000000040e0ea00 in dissect_frame (tvb=0x2000000001ae4030, 
    pinfo=0x2000000000589410, parent_tree=0x2000000001ae3230)
    at packet-frame.c:276
	except_sn = {except_down = 0x9fffffffffffe870, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffe2f0, except_cleanup = 0x9fffffffffffe2f0}}
	except_ch = {except_id = 0x2000000041677668, except_size = 1, 
  except_obj = {except_id = {except_group = 1, except_code = 1}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 
        0, <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 0, 0, 
        <invalid float value>}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	fh_tree = (proto_tree *) 0x2000000001ae2510
	ti = (proto_item * volatile) 0x2000000001af0de0
	ts = {secs = 227, nsecs = 601225000}
	cap_len = 214
	pkt_len = 214
	tree = (proto_tree *) 0x2000000001ae3230
	item = (proto_item *) 0x200000000116b8b8
#18 0x2000000040a7b610 in call_dissector_through_handle (
    handle=0x20000000000a95a0, tvb=0x2000000001ae4030, 
    pinfo=0x2000000000589410, tree=0x2000000001ae3230) at packet.c:386
	saved_proto = 0x2000000041647fa0 "Frame"
	ret = 18266296
#19 0x2000000040a7c420 in call_dissector_work (handle=0x20000000000a95a0, 
    tvb=0x2000000001ae4030, pinfo_arg=0x2000000000589410, 
    tree=0x2000000001ae3230) at packet.c:561
	pinfo = (packet_info * volatile) 0x2000000000589410
	saved_proto = 0x200000004149d5e8 "<Missing Protocol Name>"
	saved_can_desegment = 0
	ret = 214
	save_writable = 0
	save_dl_src = {type = 879362048, len = 0, 
  data = 0x3537323632ffe5a0 <Address 0x3537323632ffe5a0 out of bounds>}
	save_dl_dst = {type = 875639347, len = 0, 
  data = 0x3230303036000011 <Address 0x3230303036000011 out of bounds>}
	save_net_src = {type = 875639352, len = -1610612737, data = 0x0}
	save_net_dst = {type = 1099170024, len = 536870912, 
  data = 0x15 <Address 0x15 out of bounds>}
	save_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dst = {type = AT_NONE, len = 0, 
  data = 0x1 <Address 0x1 out of bounds>}
	saved_layer_names_len = 0
	__PRETTY_FUNCTION__ = "call_dissector_work"
#20 0x2000000040a7f420 in call_dissector (handle=0x20000000000a95a0, 
    tvb=0x2000000001ae4030, pinfo=0x2000000000589410, tree=0x2000000001ae3230)
    at packet.c:1704
	ret = 18266296
	__PRETTY_FUNCTION__ = "call_dissector"
#21 0x2000000040a7b1e0 in dissect_packet (edt=0x2000000000589400, 
    pseudo_header=0x2000000000589410, pd=0x2000000001b0c000 "", 
    fd=0x9fffffffffffeaf0, cinfo=0x0) at packet.c:325
	except_sn = {except_down = 0x0, except_type = XCEPT_CATCHER, 
  except_info = {except_catcher = 0x9fffffffffffe890, 
    except_cleanup = 0x9fffffffffffe890}}
	except_ch = {except_id = 0x200000004149d7d8, except_size = 1, 
  except_obj = {except_id = {except_group = 0, except_code = 0}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 
        0, <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 
        <invalid float value>, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	__PRETTY_FUNCTION__ = "dissect_packet"
#22 0x2000000040a74c50 in epan_dissect_run (edt=0x2000000000589400, 
    pseudo_header=0x2000000000588e48, data=0x2000000001b0c000 "", 
    fd=0x9fffffffffffeaf0, cinfo=0x0) at epan.c:161
No locals.
#23 0x200000000003b1b0 in process_packet (cf=0x20000000000951d8, pdh=0x0, 
    offset=2305843009219499008, whdr=0x2000000000588e28, 
    pseudo_header=0x2000000000588e48, pd=0x2000000001b0c000 "", 
    err=0x9fffffffffffeb60) at tethereal.c:2137
	fdata = {next = 0x0, prev = 0x0, pfd = 0x0, num = 3055, 
  pkt_len = 214, cap_len = 214, cum_bytes = 692525, abs_ts = {
    secs = 873657914, nsecs = 263888000}, rel_ts = {secs = 227, 
    nsecs = 601225000}, del_ts = {secs = 0, nsecs = 1135000}, 
  file_off = 741215, lnk_t = 1, flags = {passed_dfilter = 0, encoding = 0, 
    visited = 0, marked = 0, ref_time = 0}, color_filter = 0x0}
	create_proto_tree = 5805056
	edt = (epan_dissect_t *) 0x2000000000589400
	passed = 18266296
#24 0x200000000003a710 in load_cap_file (cf=0x20000000000951d8, 
    save_file=0x0, out_file_type=610864) at tethereal.c:1958
	linktype = 5803560
	snapshot_length = 5803560
	pdh = (wtap_dumper *) 0x0
	err = 1462964150
	err_info = (gchar *) 0x1003e <Address 0x1003e out of bounds>
	data_offset = 741215
	save_file_string = 0x0
#25 0x2000000000038860 in main (argc=6, argv=0x28) at tethereal.c:1349
	opt = 18266296
	i = 6
	gpf_path = 0x0
	pf_path = 0x0
	gdp_path = 0x0
	dp_path = 0x0
	gpf_open_errno = 0
	gpf_read_errno = -2147483648
	pf_open_errno = 0
	pf_read_errno = -2147483648
	gdp_open_errno = 65598
	gdp_read_errno = 0
	dp_open_errno = 65516
	dp_read_errno = 0
	err = 0
	capture_filter_specified = 6733032
	list_link_layer_types = 0
	start_capture = 0
	quiet = 0
	out_file_type = 2
	cf_name = (
    gchar *) 0x200000000066bb80 "/home/buildbot/ethereal/random/editcap.out"
	rfilter = (gchar *) 0x0
	fcode = {bf_len = 4026531840, bf_insns = 0x10003}
	rfcode = (dfilter_t *) 0x0
	prefs = (e_prefs *) 0x20000000420b3220
	optstring = "a:b:c:d:Df:F:hi:lLnN:o:pqr:R:s:St:T:vVw:xy:z:"
	__PRETTY_FUNCTION__ = "main"


(no stderr output)


Bug 721 posted.