Ethereal-users: Re: {* -BIG- *} [Ethereal-users] Clicking on our SIP protocol entries kills the
Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.
From: Richard Urwin <richard@xxxxxxxxxxxxxxx>
Date: Tue, 13 Apr 2004 09:05:45 +0100
On Monday 12 Apr 2004 9:59 pm, charles_r_smith@xxxxxxxxxx wrote: > Don't know what is going on here, but it sure puts a downer on an > otherwise cool looking tool if one is analyzing SIP transactions. > Any ideas or suggestion are certainly welcome. > > Captured file: > > Error screen: Recreated on Linux with Ethereal 0.10.3: Enclosed: backtrace.txt: gdb backtrace fail.cap: a single SIP packet (packet 8 in original file) sip.binary: The TCP payload from that packet whole.binary: The whole frame of that packet .binary files are created by "export selected packet bytes" I suspect sip.binary can be read with a text editor - seems to work here, but I don't know SIP. HTH -- Richard Urwin
#0 dfilter_sip_request_line (tvb=0x82a9c44, tree=0x8323c10, meth_len=9) at ../packet-sip.c:837 #1 0x403b4871 in dissect_sip_common (tvb=0x82a9c44, pinfo=0x83584c8, tree=0x8324150, dissect_other_as_continuation=0) at ../packet-sip.c:498 #2 0x403b4238 in dissect_sip_heur (tvb=0x82a9c44, pinfo=0x83584c8, tree=0x8324150) at ../packet-sip.c:407 #3 0x4016a53f in dissector_try_heuristic (sub_dissectors=0x81c2500, tvb=0x82a9c44, pinfo=0x83584c8, tree=0x8324150) at packet.c:1448 #4 0x4040919c in decode_tcp_ports (tvb=0x82a9c10, offset=20, pinfo=0x83584c8, tree=0x8324150, src_port=3367, dst_port=5070) at ../packet-tcp.c:2367 #5 0x40409326 in process_tcp_payload (tvb=0x82a9c10, offset=20, pinfo=0x83584c8, tree=0x8324150, tcp_tree=0x8323e20, src_port=3367, dst_port=5070, seq=1, nxtseq=402, is_tcp_segment=1) at ../packet-tcp.c:2401 #6 0x404094e5 in dissect_tcp_payload (tvb=0x82a9c10, pinfo=0x83584c8, offset=20, seq=1, nxtseq=20, sport=3367, dport=1087902696, tree=0x8256ba0, tcp_tree=0x8323e20) at ../packet-tcp.c:2481 #7 0x4040a272 in dissect_tcp (tvb=0x82a9c10, pinfo=0x83584c8, tree=0x8324150) at ../packet-tcp.c:2871 #8 0x401690cd in call_dissector_through_handle (handle=0x8324150, tvb=0x82a9c10, pinfo=0x14, tree=0x8324150) at packet.c:363 #9 0x40169335 in call_dissector_work (handle=0x81e9380, tvb=0x82a9c10, pinfo=0x83584c8, tree=0x8324150) at packet.c:513 #10 0x40169865 in dissector_try_port (sub_dissectors=0x8166100, port=6, ---Type <return> to continue, or q <return> to quit--- tvb=0x82a9c10, pinfo=0x83584c8, tree=0x8324150) at packet.c:776 #11 0x402d31a9 in dissect_ip (tvb=0x82a9bdc, pinfo=0x83584c8, tree=0x8324150) at ../packet-ip.c:1096 #12 0x401690cd in call_dissector_through_handle (handle=0x8166220, tvb=0x82a9bdc, pinfo=0x83584c8, tree=0x8324150) at packet.c:363 #13 0x40169335 in call_dissector_work (handle=0x8166220, tvb=0x82a9bdc, pinfo=0x83584c8, tree=0x8324150) at packet.c:513 #14 0x40169865 in dissector_try_port (sub_dissectors=0x81389f0, port=2048, tvb=0x82a9bdc, pinfo=0x83584c8, tree=0x8324150) at packet.c:776 #15 0x4024ce2b in ethertype (etype=2048, tvb=0x82a9ba8, offset_after_etype=14, pinfo=0x83584c8, tree=0x8324150, fh_tree=0x8324180, etype_id=3230, trailer_id=3232, fcs_len=-1) at ../packet-ethertype.c:176 #16 0x4024c3d5 in dissect_eth_common (tvb=0x82a9ba8, pinfo=0x83584c8, tree=0x8324150, fcs_len=-1) at ../packet-eth.c:292 #17 0x4024c84c in dissect_eth_maybefcs (tvb=0x82a9ba8, pinfo=0x40d813e8, tree=0x8324150) at ../packet-eth.c:387 #18 0x401690cd in call_dissector_through_handle (handle=0x81c5a08, tvb=0x82a9ba8, pinfo=0x83584c8, tree=0x8324150) at packet.c:363 #19 0x40169335 in call_dissector_work (handle=0x81c5a08, tvb=0x82a9ba8, pinfo=0x83584c8, tree=0x8324150) at packet.c:513 #20 0x40169865 in dissector_try_port (sub_dissectors=0x8144280, port=1, tvb=0x82a9ba8, pinfo=0x83584c8, tree=0x8324150) at packet.c:776 #21 0x4026a122 in dissect_frame (tvb=0x82a9ba8, pinfo=0x83584c8, ---Type <return> to continue, or q <return> to quit--- tree=0x8324150) at ../packet-frame.c:184 #22 0x401690cd in call_dissector_through_handle (handle=0x81442e8, tvb=0x82a9ba8, pinfo=0x83584c8, tree=0x8324150) at packet.c:363 #23 0x40169335 in call_dissector_work (handle=0x81442e8, tvb=0x82a9ba8, pinfo=0x83584c8, tree=0x8324150) at packet.c:513 #24 0x4016aa5a in call_dissector (handle=0x81442e8, tvb=0x82a9ba8, pinfo=0x83584c8, tree=0x8324150) at packet.c:1614 #25 0x40169052 in dissect_packet (edt=0x83584c0, pseudo_header=0x8324150, pd=0x810ee38 "", fd=0x82e239c, cinfo=0x83584c8) at packet.c:311 #26 0x40166e3c in epan_dissect_run (edt=0x83584c0, pseudo_header=0x810eda8, data=0x810ee38 "", fd=0x82e239c, cinfo=0x0) at epan.c:133 #27 0x08065bfa in select_packet (cf=0x810ed20, row=135327144) at file.c:2475 #28 0x0807724d in packet_list_select_cb (w=0x8281468, row=5, col=-1, evt=0x0) at packet_list.c:261 #29 0x40a1d2ff in gtk_marshal_NONE__INT_INT_POINTER () from /usr/lib/libgtk-1.2.so.0
REGISTER sip:ibm.com SIP/2.0 Content-Length: 0 Require: simple Max-Forwards: 70 From: <sip:sandywilson1@xxxxxxxxxx>;tag=3366473565269881 Expires: 3600 Contact: <sip:[email protected]:5061;transport=tcp> To: <sip:sandywilson1@xxxxxxxxxx> Allow-Events: presence Via: SIP/2.0/TCP 9.33.135.84:5061;branch=z9hG4bK9722035566033456 CSeq: 1 REGISTER Call-ID: [email protected]
Attachment:
fail.cap
Description: Binary data
Attachment:
whole.binary
Description: Binary data
- References:
- [Ethereal-users] Clicking on our SIP protocol entries kills the program
- From: charles_r_smith
- [Ethereal-users] Clicking on our SIP protocol entries kills the program
- Prev by Date: Re: [Ethereal-users] Newbie question about creating input to text2pcap
- Next by Date: RE: [Ethereal-users] Problems with Ethereal 0.10.3 decoding packe ts with MMS v1.2 headers
- Previous by thread: [Ethereal-users] Clicking on our SIP protocol entries kills the program
- Next by thread: [Ethereal-users] Newbie question about creating input to text2pcap
- Index(es):