Ethereal-dev: [Ethereal-dev] Buildbot crash output

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

Date: Tue, 28 Feb 2006 19:02:01 -0600 (CST)
Problems have been found with the following capture file(s):

http://www.ethereal.com/distribution/buildbot-builds/randpkt/editcap.4404f1cb.pcap


Error information:
Core was generated by `lt-tethereal'.
Program terminated with signal 11, Segmentation fault.
#0  desegment_tcp (tvb=0x20000000007020e0, pinfo=0x20000000005a9c10, 
    offset=32, seq=3421, nxtseq=3485, sport=65533, dport=3225, 
    tree=0x2000000000700f60, tcp_tree=0x2000000000700390, 
    tcpd=0x9fffffffffffd280) at packet-tcp.c:1472
1472						new_tsk->tot_len = tsk->tot_len;
#0  desegment_tcp (tvb=0x20000000007020e0, pinfo=0x20000000005a9c10, 
    offset=32, seq=3421, nxtseq=3485, sport=65533, dport=3225, 
    tree=0x2000000000700f60, tcp_tree=0x2000000000700390, 
    tcpd=0x9fffffffffffd280) at packet-tcp.c:1472
	new_tsk = (tcp_segment_key *) 0x2000000000699620
	next_tvb = (tvbuff_t *) 0x20000000420f68d8
	old_len = 7422520
	ipfd = (fragment_data *) 0x2000000000714238
	tcpinfo = (struct tcpinfo *) 0x200000000071a200
	ipfd_head = (fragment_data *) 0x2000000000714210
	old_tsk = {src = 0x20000000005a9c78, dst = 0x20000000005a9c88, 
  seq = 3394, sport = 65533, dport = 3225, start_seq = 0, tot_len = 0, 
  first_frame = 0}
	tsk = (tcp_segment_key *) 0x200000000071a1e8
	must_desegment = 0
	called_dissector = 1
	deseg_offset = 32
	deseg_seq = 32
	nbytes = 28
	item = (proto_item *) 0x1c
	frag_tree_item = (proto_item *) 0x0
	tcp_tree_item = (proto_item *) 0x1c
#1  0x20000000413dbb50 in dissect_tcp_payload (tvb=0x20000000007020e0, 
    pinfo=0x20000000005a9c10, offset=32, seq=3421, nxtseq=3485, sport=65533, 
    dport=3225, tree=0x2000000000700f60, tcp_tree=0xd9d, 
    tcpd=0x200000000071c0d0) at packet-tcp.c:2267
	save_fragmented = 7342144
#2  0x20000000413de4c0 in dissect_tcp (tvb=0x20000000007020e0, 
    pinfo=0x20000000005a9c10, tree=0x2000000000700f60) at packet-tcp.c:2741
	th_sum = 64
	th_urp = 26872
	tcp_tree = (proto_tree *) 0x2000000000700390
	field_tree = (proto_tree *) 0x40
	ti = (proto_item *) 0x2000000000700390
	tf = (proto_item *) 0x1c
	offset = 32
	flags = (gchar *) 0x200000004523e298 "PSH, ACK"
	fstr = {0x2000000041687a98 "FIN", 0x200000004184f778 "SYN", 
  0x2000000041855b60 "RST", 0x20000000418fc260 "PSH", 
  0x2000000041695fe0 "ACK", 0x20000000418fc268 "URG", 
  0x20000000418b0ce0 "ECN", 0x20000000418b09e8 "CWR"}
	fpos = 8
	returned_length = 28
	i = 1108306168
	bpos = 2
	optlen = 1108306168
	nxtseq = 3485
	reported_len = 96
	cksum_vec = {{
    ptr = 0x20000000005cd81a "\n\001\001\001\n\001\001\002��\f\231A1�߳��b\200\030\200", len = 4}, {
    ptr = 0x20000000005cd81e "\n\001\001\002��\f\231A1�߳��b\200\030\200", 
    len = 4}, {ptr = 0x9fffffffffffd360 "", len = 4}, {
    ptr = 0x20000000005cd822 "��\f\231A1�߳��b\200\030\200", len = 96}}
	phdr = {1610614272, 0}
	computed_cksum = 28
	real_window = 32768
	length_remaining = 64
	desegment_ok = 7454928
	tcpinfo = {seq = 3394, nxtseq = 3485, is_reassembled = 1, urgent = 0, 
  urgent_pointer = 96}
	tcphstruct = {{th_seq = 3421, th_ack = 4284210825, 
    th_have_seglen = 1, th_seglen = 0, th_win = 262144, th_sport = 65533, 
    th_dport = 3225, th_hlen = 32 ' ', th_flags = 16 '\020', ip_src = {
      type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81a "\n\001\001\001\n\001\001\002��\f\231A1�߳��b\200\030\200"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81e "\n\001\001\002��\f\231A1�߳��b\200\030\200"}}, {th_seq = 3421, th_ack = 4294958729, th_have_seglen = 1, th_seglen = 64, 
    th_win = 262144, th_sport = 65533, th_dport = 3225, th_hlen = 32 ' ', 
    th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81a "\n\001\001\001\n\001\001\002��\f\231A1�߳��b\200\030\200"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81e "\n\001\001\002��\f\231A1�߳��b\200\030\200"}}, {th_seq = 4294958645, th_ack = 3421, th_have_seglen = 1, th_seglen = 0, 
    th_win = 262144, th_sport = 3225, th_dport = 65533, th_hlen = 32 ' ', 
    th_flags = 16 '\020', ip_src = {type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81a "\n\001\001\001\n\001\001\002��\f\231A1�߳��b\200\030\200"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81e "\n\001\001\002��\f\231A1�߳��b\200\030\200"}}, {th_seq = 0, th_ack = 0, th_have_seglen = 1, th_seglen = 84, th_win = 32838, 
    th_sport = 3225, th_dport = 65501, th_hlen = 32 ' ', 
    th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81a "\n\001\001\001\n\001\001\002��\f\231A1�߳��b\200\030\200"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81e "\n\001\001\002��\f\231A1�߳��b\200\030\200"}}}
	tcph = (struct tcpheader *) 0x20000000421119c0
	tcph_count = 1
	tf_syn = (proto_item *) 0x200000000070eab0
	tf_fin = (proto_item *) 0x200000000070f020
	tf_rst = (proto_item *) 0x2000000000700600
	tcpd = (struct tcp_analysis *) 0x2000000045c4f770
#3  0x2000000040a9c180 in call_dissector_through_handle (
    handle=0x20000000005e8700, tvb=0x20000000007020e0, 
    pinfo=0x20000000005a9c10, tree=0x2000000000700f60) at packet.c:386
	saved_proto = 0x200000004184dfc0 "TCP"
	ret = 28
#4  0x2000000040a9cf90 in call_dissector_work (handle=0x20000000005e8700, 
    tvb=0x20000000007020e0, pinfo_arg=0x20000000005a9c10, 
    tree=0x2000000000700f60) at packet.c:561
	pinfo = (packet_info * volatile) 0x20000000005a9c10
	saved_proto = 0x20000000417a7590 "IP"
	saved_can_desegment = 0
	ret = 32
	save_writable = 536870912
	save_dl_src = {type = AT_NONE, len = 0, 
  data = 0x1003e <Address 0x1003e out of bounds>}
	save_dl_dst = {type = 1431655765, len = -715827883, 
  data = 0x15556 <Address 0x15556 out of bounds>}
	save_net_src = {type = 1717982549, len = -715827883, 
  data = 0x15556 <Address 0x15556 out of bounds>}
	save_net_dst = {type = 859124394, len = -1431655766, 
  data = 0x2aaab <Address 0x2aaab out of bounds>}
	save_src = {type = 875692202, len = -1431655766, 
  data = 0x2aaab <Address 0x2aaab out of bounds>}
	save_dst = {type = 909718326, len = 622668, 
  data = 0x2000000040df5790 "\v\b�\031\005!\020"}
	saved_layer_names_len = 6
	__PRETTY_FUNCTION__ = "call_dissector_work"
#5  0x2000000040a9d920 in dissector_try_port (
    sub_dissectors=0x20000000001c21a0, port=6, tvb=0x20000000007020e0, 
    pinfo=0x20000000005a9c10, tree=0x2000000000700f60) at packet.c:836
	dtbl_entry = (dtbl_entry_t *) 0x1c
	handle = (struct dissector_handle *) 0x20000000005e8700
	saved_match_port = 2048
#6  0x2000000040fad7b0 in dissect_ip (tvb=0x2000000000702088, 
    pinfo=0x20000000005a9c10, parent_tree=0x2000000000700f60)
    at packet-ip.c:1180
	ip_tree = (proto_tree *) 0x2000000000700e40
	field_tree = (proto_tree *) 0x20000000005a9cec
	ti = (proto_item *) 0x2000000000700e40
	tf = (proto_item *) 0x2000000042109b86
	addr = 33620234
	offset = 20
	hlen = 20
	optlen = 1108384649
	flags = 6
	nxt = 6 '\006'
	ipsum = 0
	ipfd_head = (fragment_data *) 0x0
	next_tvb = (tvbuff_t *) 0x20000000007020e0
	update_col_info = 1
	save_fragmented = 0
	eip_arr = {{ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 116, 
    ip_id = 234, ip_off = 0, ip_ttl = 0 '\0', ip_p = 6 '\006', 
    ip_sum = 25494, ip_src = {type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81a "\n\001\001\001\n\001\001\002��\f\231A1�߳��b\200\030\200"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81e "\n\001\001\002��\f\231A1�߳��b\200\030\200"}}, {ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 52, ip_id = 231, ip_off = 0, 
    ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 25561, ip_src = {
      type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81a "\n\001\001\001\n\001\001\002��\f\231A1�߳��b\200\030\200"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81e "\n\001\001\002��\f\231A1�߳��b\200\030\200"}}, {ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 136, ip_id = 232, ip_off = 0, 
    ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 25476, ip_src = {
      type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81a "\n\001\001\001\n\001\001\002��\f\231A1�߳��b\200\030\200"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81e "\n\001\001\002��\f\231A1�߳��b\200\030\200"}}, {ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 52, ip_id = 233, ip_off = 0, 
    ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 25559, ip_src = {
      type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81a "\n\001\001\001\n\001\001\002��\f\231A1�߳��b\200\030\200"}, ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005cd81e "\n\001\001\002��\f\231A1�߳��b\200\030\200"}}}
	eip_current = 0
	iph = (e_ip *) 0x2000000042109b80
	src_addr = (const guchar *) 0x20000000007020e0 "\001"
	dst_addr = (const guchar *) 0x20000000007020e0 "\001"
	src32 = 167837953
	dst32 = 167837954
	tree = (proto_tree *) 0x0
	item = (proto_item *) 0x1c
	checksum_tree = (proto_tree *) 0x2000000042109b89
#7  0x2000000040a9c180 in call_dissector_through_handle (
    handle=0x20000000001c21e0, tvb=0x2000000000702088, 
    pinfo=0x20000000005a9c10, tree=0x2000000000700f60) at packet.c:386
	saved_proto = 0x20000000417a7590 "IP"
	ret = 28
#8  0x2000000040a9cf90 in call_dissector_work (handle=0x20000000001c21e0, 
    tvb=0x2000000000702088, pinfo_arg=0x20000000005a9c10, 
    tree=0x2000000000700f60) at packet.c:561
	pinfo = (packet_info * volatile) 0x20000000005a9c10
	saved_proto = 0x2000000041774e50 "Ethernet"
	saved_can_desegment = 0
	ret = 52
	save_writable = 0
	save_dl_src = {type = 7536755, len = 29555, 
  data = 0x1003e <Address 0x1003e out of bounds>}
	save_dl_dst = {type = AT_NONE, len = 0, data = 0x0}
	save_net_src = {type = AT_NONE, len = 0, 
  data = 0x3861623900000000 <Address 0x3861623900000000 out of bounds>}
	save_net_dst = {type = AT_NONE, len = 0, data = 0x0}
	save_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dst = {type = AT_NONE, len = 0, data = 0x0}
	saved_layer_names_len = 3
	__PRETTY_FUNCTION__ = "call_dissector_work"
#9  0x2000000040a9d920 in dissector_try_port (
    sub_dissectors=0x20000000000ab260, port=2048, tvb=0x2000000000702088, 
    pinfo=0x20000000005a9c10, tree=0x2000000000700f60) at packet.c:836
	dtbl_entry = (dtbl_entry_t *) 0x1c
	handle = (struct dissector_handle *) 0x20000000001c21e0
	saved_match_port = 1
#10 0x2000000040dfaac0 in ethertype (etype=2048, tvb=0x2000000000702030, 
    offset_after_etype=14, pinfo=0x20000000005a9c10, tree=0x2000000000700f60, 
    fh_tree=0x2000000000701200, etype_id=8319, trailer_id=8321, fcs_len=-1)
    at packet-ethertype.c:192
	except_sn = {except_down = 0x9fffffffffffe2d0, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffda10, except_cleanup = 0x9fffffffffffda10}}
	except_ch = {except_id = 0x200000004169c0d8, except_size = 1, 
  except_obj = {except_id = {except_group = 1, except_code = 2}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 
        0, <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	description = 0x1c <Address 0x1c out of bounds>
	next_tvb = (tvbuff_t *) 0x2000000000702088
	length_before = 116
	dissector_found = 0
	saved_proto = 0x2000000041774e50 "Ethernet"
	__PRETTY_FUNCTION__ = "ethertype"
#11 0x2000000040df6690 in dissect_eth_common (tvb=0x2000000000702030, 
    pinfo=0x20000000005a9c10, parent_tree=0x2000000000700f60, fcs_len=-1)
    at packet-eth.c:344
	ehdr = (eth_hdr * volatile) 0x2000000042105968
	is_802_2 = 1
	fh_tree = (proto_tree * volatile) 0x2000000000701200
	src_addr = (const guint8 *) 0x20000000005cd806 ""
	dst_addr = (const guint8 *) 0x20000000005cd800 ""
	ehdrs = {{dst = {type = AT_ETHER, len = 6, 
      data = 0x20000000005cd800 ""}, src = {type = AT_ETHER, len = 6, 
      data = 0x20000000005cd806 ""}, type = 2048}, {dst = {type = AT_ETHER, 
      len = 6, data = 0x20000000005cd800 ""}, src = {type = AT_ETHER, 
      len = 6, data = 0x20000000005cd806 ""}, type = 2048}, {dst = {
      type = AT_ETHER, len = 6, data = 0x20000000005cd800 ""}, src = {
      type = AT_ETHER, len = 6, data = 0x20000000005cd806 ""}, type = 2048}, {
    dst = {type = AT_ETHER, len = 6, data = 0x20000000005cd800 ""}, src = {
      type = AT_ETHER, len = 6, data = 0x20000000005cd806 ""}, type = 2048}}
	ehdr_num = 0
	tree = (proto_tree * volatile) 0x2000000000700f60
	addr_item = (proto_item *) 0x1c
	addr_tree = (proto_tree *) 0x2000000000700f90
#12 0x2000000040df69e0 in dissect_eth_maybefcs (tvb=0x2000000000702030, 
    pinfo=0x20000000005a9c10, tree=0x2000000000700f60) at packet-eth.c:440
No locals.
#13 0x2000000040a9c180 in call_dissector_through_handle (
    handle=0x20000000005b04e0, tvb=0x2000000000702030, 
    pinfo=0x20000000005a9c10, tree=0x2000000000700f60) at packet.c:386
	saved_proto = 0x2000000041774e50 "Ethernet"
	ret = 28
#14 0x2000000040a9cf90 in call_dissector_work (handle=0x20000000005b04e0, 
    tvb=0x2000000000702030, pinfo_arg=0x20000000005a9c10, 
    tree=0x2000000000700f60) at packet.c:561
	pinfo = (packet_info * volatile) 0x20000000005a9c10
	saved_proto = 0x2000000041686878 "Frame"
	saved_can_desegment = 0
	ret = 66
	save_writable = 0
	save_dl_src = {type = 538976288, len = 538976288, 
  data = 0x7473655466692020 <Address 0x7473655466692020 out of bounds>}
	save_dl_dst = {type = 1701707776, len = 540876914, 
  data = 0x612d50492d796d27 <Address 0x612d50492d796d27 out of bounds>}
	save_net_src = {type = 1701995620, len = 690451315, 
  data = 0x4c494146203d3d20 <Address 0x4c494146203d3d20 out of bounds>}
	save_net_dst = {type = 4294901968, len = -1610612737, data = 0x0}
	save_src = {type = 808661264, len = 536870912, 
  data = 0x1 <Address 0x1 out of bounds>}
	save_dst = {type = 808661248, len = 536870912, 
  data = 0x20000000400e0200 "z�P�"}
	saved_layer_names_len = 0
	__PRETTY_FUNCTION__ = "call_dissector_work"
#15 0x2000000040a9d920 in dissector_try_port (
    sub_dissectors=0x20000000000ab5a0, port=1, tvb=0x2000000000702030, 
    pinfo=0x20000000005a9c10, tree=0x2000000000700f60) at packet.c:836
	dtbl_entry = (dtbl_entry_t *) 0x1c
	handle = (struct dissector_handle *) 0x20000000005b04e0
	saved_match_port = 0
#16 0x2000000040e37ef0 in dissect_frame (tvb=0x2000000000702030, 
    pinfo=0x20000000005a9c10, parent_tree=0x2000000000700f60)
    at packet-frame.c:265
	except_sn = {except_down = 0x9fffffffffffe870, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffe2f0, except_cleanup = 0x9fffffffffffe2f0}}
	except_ch = {except_id = 0x20000000416b60f0, except_size = 1, 
  except_obj = {except_id = {except_group = 2305843010288354304, 
      except_code = 65598}, 
    except_message = 0xc9dffffff3620000 <Address 0xc9dffffff3620000 out of bounds>, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 
        0, <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 
        <invalid float value>, 0, <invalid float value>}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	fh_tree = (proto_tree *) 0x2000000000700810
	ti = (proto_item * volatile) 0x2000000000701230
	ts = {secs = 32, nsecs = 380000000}
	cap_len = 130
	pkt_len = 130
	tree = (proto_tree *) 0x2000000000700f60
	item = (proto_item *) 0x1c
#17 0x2000000040a9c180 in call_dissector_through_handle (
    handle=0x20000000000ab5e0, tvb=0x2000000000702030, 
    pinfo=0x20000000005a9c10, tree=0x2000000000700f60) at packet.c:386
	saved_proto = 0x2000000041686878 "Frame"
	ret = 28
#18 0x2000000040a9cf90 in call_dissector_work (handle=0x20000000000ab5e0, 
    tvb=0x2000000000702030, pinfo_arg=0x20000000005a9c10, 
    tree=0x2000000000700f60) at packet.c:561
	pinfo = (packet_info * volatile) 0x20000000005a9c10
	saved_proto = 0x20000000414da238 "<Missing Protocol Name>"
	saved_can_desegment = 0
	ret = 66
	save_writable = 0
	save_dl_src = {type = 1154220032, len = 536870912, 
  data = 0x3537313439ffe5a0 <Address 0x3537313439ffe5a0 out of bounds>}
	save_dl_dst = {type = 808661304, len = 536870912, 
  data = 0x3030303833cc1400 <Address 0x3030303833cc1400 out of bounds>}
	save_net_src = {type = 808661296, len = -1610612737, data = 0x0}
	save_net_dst = {type = AT_NONE, len = 0, 
  data = 0x19 <Address 0x19 out of bounds>}
	save_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dst = {type = AT_NONE, len = 0, 
  data = 0x1 <Address 0x1 out of bounds>}
	saved_layer_names_len = 0
	__PRETTY_FUNCTION__ = "call_dissector_work"
#19 0x2000000040a9ff90 in call_dissector (handle=0x20000000000ab5e0, 
    tvb=0x2000000000702030, pinfo=0x20000000005a9c10, tree=0x2000000000700f60)
    at packet.c:1704
	ret = 28
	__PRETTY_FUNCTION__ = "call_dissector"
#20 0x2000000040a9bd50 in dissect_packet (edt=0x20000000005a9c00, 
    pseudo_header=0x20000000005a9c10, pd=0x20000000005cd800 "", 
    fd=0x9fffffffffffeaf0, cinfo=0x0) at packet.c:325
	except_sn = {except_down = 0x0, except_type = XCEPT_CATCHER, 
  except_info = {except_catcher = 0x9fffffffffffe890, 
    except_cleanup = 0x9fffffffffffe890}}
	except_ch = {except_id = 0x20000000414da428, except_size = 1, 
  except_obj = {except_id = {except_group = 0, except_code = 0}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 
        0, <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 
        <invalid float value>, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	__PRETTY_FUNCTION__ = "dissect_packet"
#21 0x2000000040a94b50 in epan_dissect_run (edt=0x20000000005a9c00, 
    pseudo_header=0x20000000005a9648, data=0x20000000005cd800 "", 
    fd=0x9fffffffffffeaf0, cinfo=0x0) at epan.c:161
No locals.
#22 0x200000000003baf0 in process_packet (cf=0x2000000000095f18, pdh=0x0, 
    offset=2305843009219632128, whdr=0x20000000005a9628, 
    pseudo_header=0x20000000005a9648, pd=0x20000000005cd800 "", 
    err=0x9fffffffffffeb60) at tethereal.c:2151
	fdata = {next = 0x0, prev = 0x0, pfd = 0x0, num = 194, pkt_len = 130, 
  cap_len = 130, cum_bytes = 20498, abs_ts = {secs = 1034273586, 
    nsecs = 941758000}, rel_ts = {secs = 32, nsecs = 380000000}, del_ts = {
    secs = 0, nsecs = 0}, file_off = 23496, lnk_t = 1, flags = {
    passed_dfilter = 0, encoding = 0, visited = 0, marked = 0, ref_time = 0}, 
  color_filter = 0x0}
	create_proto_tree = 5938176
	edt = (epan_dissect_t *) 0x20000000005a9c00
	passed = 28
#23 0x200000000003b050 in load_cap_file (cf=0x2000000000095f18, 
    save_file=0x0, out_file_type=614256) at tethereal.c:1972
	linktype = 5936680
	snapshot_length = 5936680
	pdh = (wtap_dumper *) 0x0
	err = 1462964150
	err_info = (gchar *) 0x1003e <Address 0x1003e out of bounds>
	data_offset = 23496
	save_file_string = 0x0
#24 0x20000000000391e0 in main (argc=6, argv=0x28) at tethereal.c:1364
	opt = 28
	i = 6
	gpf_path = 0x0
	pf_path = 0x0
	gdp_path = 0x0
	dp_path = 0x0
	gpf_open_errno = 0
	gpf_read_errno = -2147483648
	pf_open_errno = 0
	pf_read_errno = -2147483648
	gdp_open_errno = 65598
	gdp_read_errno = 0
	dp_open_errno = 65516
	dp_read_errno = 0
	err = 0
	capture_filter_specified = 6851112
	list_link_layer_types = 0
	start_capture = 0
	quiet = 0
	out_file_type = 2
	cf_name = (
    gchar *) 0x20000000006888c0 "/home/buildbot/ethereal/random/editcap.out"
	rfilter = (gchar *) 0x0
	fcode = {bf_len = 4026531840, bf_insns = 0x10003}
	rfcode = (dfilter_t *) 0x0
	prefs = (e_prefs *) 0x2000000042113718
	status = 28
	optstring = "a:b:c:d:Df:F:hi:lLnN:o:pqr:R:s:St:T:vVw:xX:y:z:"
	__PRETTY_FUNCTION__ = "main"


(no stderr output)


Bug 778 posted.