ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Ethereal-dev: [Ethereal-dev] Buildbot crash output

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

Date: Thu, 19 Jan 2006 18:57:01 -0600 (CST)
Problems have been found with the following capture file(s):

http://www.ethereal.com/distribution/buildbot-builds/randpkt/editcap.43d03542.pcap


Error information:
Core was generated by `lt-tethereal'.
Program terminated with signal 11, Segmentation fault.
#0  dissect_t38_Data_Field_field_type (tvb=0x2000000001ae4240, offset=60, 
    pinfo=0x2000000000589410, tree=0x200000000dc370b0) at packet-t38.c:1641
1641				frag_msg = fragment_add_seq(tvb, offset, pinfo,
#0  dissect_t38_Data_Field_field_type (tvb=0x2000000001ae4240, offset=60, 
    pinfo=0x2000000000589410, tree=0x200000000dc370b0) at packet-t38.c:1641
	frag_msg = (fragment_data *) 0x9fffffffffffcc70
	new_tvb = (tvbuff_t *) 0x0
	save_fragmented = 1
#1  0x2000000041181ea0 in dissect_per_sequence (tvb=0x2000000001ae4240, 
    offset=57, pinfo=0x2000000000589410, parent_tree=0x0, hf_index=-13192, 
    ett_index=-13200, sequence=0x2000000041f906b0) at packet-per.c:1160
	extension_flag = 0
	optional_field_flag = 1
	item = (proto_item *) 0x200000000dc370b0
	tree = (proto_tree *) 0x200000000dc370b0
	old_offset = 56
	i = 0
	num_opts = 1
	optional_mask = 1
	pi = (proto_item *) 0x0
#2  0x20000000413838f0 in dissect_t38_Data_Field_item (tvb=0x2000000001ae4240, 
    offset=0, pinfo=0x2000000000589410, tree=0x200000000dc370e0)
    at packet-t38.c:1790
No locals.
#3  0x200000004117dfe0 in dissect_per_sequence_of_helper (
    tvb=0x2000000001ae4240, offset=56, pinfo=0x2000000000589410, 
    tree=0x200000000dc37110, func=0x2000000042c33370, length=100)
    at packet-per.c:239
	lold_offset = 56
	litem = (proto_item *) 0x200000000dc370e0
	i = 0
#4  0x200000004117e230 in dissect_per_sequence_of (tvb=0x2000000001ae4240, 
    offset=56, pinfo=0x2000000000589410, parent_tree=0x200000000dc37110, 
    hf_index=36615, ett_index=11393, seq=0x2000000041f906f8)
    at packet-per.c:270
	item = (proto_item *) 0x200000000dc37110
	old_offset = 47
	length = 100
#5  0x2000000041383990 in dissect_t38_Data_Field (tvb=0x2000000001ae4240, 
    offset=47, pinfo=0x2000000000589410, tree=0x200000000dc37290, 
    hf_index=36615) at packet-t38.c:1805
No locals.
#6  0x20000000413839f0 in dissect_data_field (tvb=0x2000000001ae4240, 
    offset=47, pinfo=0x2000000000589410, tree=0x200000000dc37290)
    at packet-t38.c:1811
No locals.
#7  0x2000000041181ea0 in dissect_per_sequence (tvb=0x2000000001ae4240, 
    offset=47, pinfo=0x2000000000589410, parent_tree=0x1, hf_index=-13112, 
    ett_index=-13120, sequence=0x2000000041f90710) at packet-per.c:1160
	extension_flag = 0
	optional_field_flag = 1
	item = (proto_item *) 0x200000000dc37290
	tree = (proto_tree *) 0x200000000dc37290
	old_offset = 40
	i = 1
	num_opts = 0
	optional_mask = 1
	pi = (proto_item *) 0xffe5
#8  0x2000000041383a70 in dissect_t38_IFPPacket (tvb=0x2000000001ae4240, 
    offset=40, pinfo=0x2000000000589410, tree=0x2000000001ae31a0)
    at packet-t38.c:1823
No locals.
#9  0x20000000413850d0 in dissect_t38_tcp_pdu (tvb=0x2000000001ae4240, 
    pinfo=0x2000000000589410, tree=0x2000000000589418) at packet-t38.c:2195
	tr = (proto_tree *) 0x2000000001ae31a0
	offset = 40
	ifp_packet_number = 6
#10 0x20000000413853a0 in dissect_t38_tcp (tvb=0x2000000001ae4240, 
    pinfo=0x2000000000589410, tree=0x2000000001ae2c60) at packet-t38.c:2232
No locals.
#11 0x2000000040a78460 in call_dissector_through_handle (
    handle=0x20000000005c7580, tvb=0x2000000001ae4240, 
    pinfo=0x2000000000589410, tree=0x2000000001ae2c60) at packet.c:386
	saved_proto = 0x20000000418a7558 "T.38"
	ret = 0
#12 0x2000000040a79270 in call_dissector_work (handle=0x20000000005c7580, 
    tvb=0x2000000001ae4240, pinfo_arg=0x2000000000589410, 
    tree=0x2000000001ae2c60) at packet.c:561
	pinfo = (packet_info * volatile) 0x2000000000589410
	saved_proto = 0x20000000418080c8 "TCP"
	saved_can_desegment = 0
	ret = 14
	save_writable = 536870912
	save_dl_src = {type = 239, len = 0, data = 0x0}
	save_dl_dst = {type = AT_ATALK, len = -1610612737, 
  data = 0x2000000001ae6ff0 "\210\222�A"}
	save_net_src = {type = AT_ATALK, len = 0, 
  data = 0x200000004162d770 "s"}
	save_net_dst = {type = AT_NONE, len = 16, 
  data = 0x6 <Address 0x6 out of bounds>}
	save_src = {type = AT_ETHER, len = 6, 
  data = 0x9fffffffffffcd80 "\020������\237\001"}
	save_dst = {type = AT_NONE, len = 14, data = 0x20000000005a5800 ""}
	saved_layer_names_len = 10
	__PRETTY_FUNCTION__ = "call_dissector_work"
#13 0x2000000040a79c00 in dissector_try_port (
    sub_dissectors=0x20000000003cb400, port=6004, tvb=0x2000000001ae4240, 
    pinfo=0x2000000000589410, tree=0x2000000001ae2c60) at packet.c:836
	dtbl_entry = (dtbl_entry_t *) 0x0
	handle = (struct dissector_handle *) 0x20000000005c7580
	saved_match_port = 6
#14 0x2000000041398d80 in decode_tcp_ports (tvb=0x2000000001ae4240, offset=20, 
    pinfo=0x2000000000589410, tree=0x2000000001ae2c60, src_port=1129, 
    dst_port=6004) at packet-tcp.c:2549
	next_tvb = (tvbuff_t *) 0x2000000001ae4240
	low_port = 6004
	high_port = 6004
#15 0x2000000041399220 in process_tcp_payload (tvb=0x2000000001ae4298, 
    offset=20, pinfo=0x2000000000589410, tree=0x2000000001ae2c60, 
    tcp_tree=0x2000000001ae30b0, src_port=1129, dst_port=6004, seq=0, 
    nxtseq=1460, is_tcp_segment=1) at packet-tcp.c:2591
	except_sn = {except_down = 0x9fffffffffffd9f0, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffd030, except_cleanup = 0x9fffffffffffd030}}
	except_ch = {except_id = 0x20000000418ae2d0, except_size = 1, 
  except_obj = {except_id = {except_group = 11529215046068457903, 
      except_code = 1082331758593}, 
    except_message = 0xffff0208 <Address 0xffff0208 out of bounds>, 
    except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, 
        <invalid float value>, 0, -inf, <invalid float value>, 0, 0, 
        <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, 
        -nan(0x4928824398483892), -inf, <invalid float value>, 0, 
        <invalid float value>, inf, inf, -0, -0, <invalid float value>, 
        <invalid float value>, 0, 0, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	__PRETTY_FUNCTION__ = "process_tcp_payload"
#16 0x2000000041399750 in dissect_tcp_payload (tvb=0x2000000001ae4298, 
    pinfo=0x2000000000589410, offset=20, seq=0, nxtseq=1460, sport=1129, 
    dport=6004, tree=0x2000000001ae2c60, tcp_tree=0x2000000001ae30b0)
    at packet-tcp.c:2664
	save_fragmented = 0
#17 0x200000004139c030 in dissect_tcp (tvb=0x2000000001ae4298, 
    pinfo=0x2000000000589410, tree=0x2000000001ae2c60) at packet-tcp.c:3125
	th_sum = 14
	th_urp = 50600
	tcp_tree = (proto_tree *) 0x2000000001ae30b0
	field_tree = (proto_tree *) 0xe
	ti = (proto_item *) 0x2000000001ae30b0
	tf = (proto_item *) 0x0
	offset = 20
	flags = (gchar *) 0x20000000006b0298 "ACK"
	fstr = {0x2000000041642dd8 "FIN", 0x2000000041809880 "SYN", 
  0x200000004180fc38 "RST", 0x20000000418acbe0 "PSH", 
  0x2000000041650208 "ACK", 0x20000000418acbe8 "URG", 
  0x2000000041862268 "ECN", 0x2000000041861f70 "CWR"}
	fpos = 3
	returned_length = 0
	i = 1107871144
	bpos = 0
	optlen = 1107871144
	nxtseq = 1460
	reported_len = 1480
	cksum_vec = {{ptr = 0x9fffffffffffd3f0 "df6a", len = 4}, {
    ptr = 0x9fffffffffffd3f3 "a", len = 1}, {ptr = 0x9fffffffffffd360 "", 
    len = 4}, {ptr = 0x20000000005a5822 "\004i\027t1��M��ɠP\020>��Y", 
    len = 20}}
	phdr = {335545856, 0}
	computed_cksum = 0
	real_window = 16060
	length_remaining = 14
	desegment_ok = 1084582688
	tcpinfo = {seq = 0, nxtseq = 1460, is_reassembled = 0, urgent = 0, 
  urgent_pointer = 43690}
	tcphstruct = {{th_seq = 6678, th_ack = 3450926, th_have_seglen = 1, 
    th_seglen = 0, th_win = 64240, th_sport = 4941, th_dport = 445, 
    th_hlen = 20 '\024', th_flags = 16 '\020', ip_src = {type = AT_IPv4, 
      len = 4, 
      data = 0x20000000005a581a "\n0��\n1�9\004i\027t1��M��ɠP\020>��Y"}, 
    ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005a581e "\n1�9\004i\027t1��M��ɠP\020>��Y"}}, {
    th_seq = 1694217974, th_ack = 4111834902, th_have_seglen = 1, 
    th_seglen = 1460, th_win = 64464, th_sport = 445, th_dport = 4941, 
    th_hlen = 20 '\024', th_flags = 16 '\020', ip_src = {type = AT_IPv4, 
      len = 4, 
      data = 0x20000000005a581a "\n0��\n1�9\004i\027t1��M��ɠP\020>��Y"}, 
    ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005a581e "\n1�9\004i\027t1��M��ɠP\020>��Y"}}, {
    th_seq = 0, th_ack = 0, th_have_seglen = 1, th_seglen = 1460, 
    th_win = 16060, th_sport = 1129, th_dport = 6004, th_hlen = 20 '\024', 
    th_flags = 16 '\020', ip_src = {type = AT_IPv4, len = 4, 
      data = 0x20000000005a581a "\n0��\n1�9\004i\027t1��M��ɠP\020>��Y"}, 
    ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005a581e "\n1�9\004i\027t1��M��ɠP\020>��Y"}}, {
    th_seq = 1694216514, th_ack = 4111834902, th_have_seglen = 1, 
    th_seglen = 1460, th_win = 64464, th_sport = 445, th_dport = 4941, 
    th_hlen = 20 '\024', th_flags = 16 '\020', ip_src = {type = AT_IPv4, 
      len = 4, 
      data = 0x20000000005a581a "\n0��\n1�9\004i\027t1��M��ɠP\020>��Y"}, 
    ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005a581e "\n1�9\004i\027t1��M��ɠP\020>��Y"}}}
	tcph = (struct tcpheader *) 0x20000000420a7628
	tcph_count = 2
	tf_syn = (proto_item *) 0x2000000001ae2960
	tf_fin = (proto_item *) 0x2000000001ae20c0
	tf_rst = (proto_item *) 0x2000000001ae25d0
#18 0x2000000040a78460 in call_dissector_through_handle (
    handle=0x20000000005c7620, tvb=0x2000000001ae4298, 
    pinfo=0x2000000000589410, tree=0x2000000001ae2c60) at packet.c:386
	saved_proto = 0x20000000418080c8 "TCP"
	ret = 0
#19 0x2000000040a79270 in call_dissector_work (handle=0x20000000005c7620, 
    tvb=0x2000000001ae4298, pinfo_arg=0x2000000000589410, 
    tree=0x2000000001ae2c60) at packet.c:561
	pinfo = (packet_info * volatile) 0x2000000000589410
	saved_proto = 0x2000000041760570 "IP"
	saved_can_desegment = 0
	ret = 34
	save_writable = 536870912
	save_dl_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dl_dst = {type = AT_NONE, len = 0, data = 0x0}
	save_net_src = {type = 878220304, len = 536870912, data = 0x0}
	save_net_dst = {type = 959512576, len = 0, data = 0x0}
	save_src = {type = 875692032, len = 0, data = 0x0}
	save_dst = {type = 1630955108, len = 0, data = 0x0}
	saved_layer_names_len = 6
	__PRETTY_FUNCTION__ = "call_dissector_work"
#20 0x2000000040a79c00 in dissector_try_port (
    sub_dissectors=0x20000000001c0160, port=6, tvb=0x2000000001ae4298, 
    pinfo=0x2000000000589410, tree=0x2000000001ae2c60) at packet.c:836
	dtbl_entry = (dtbl_entry_t *) 0x0
	handle = (struct dissector_handle *) 0x20000000005c7620
	saved_match_port = 2048
#21 0x2000000040f7f430 in dissect_ip (tvb=0x2000000001ae41e8, 
    pinfo=0x2000000000589410, parent_tree=0x2000000001ae2c60)
    at packet-ip.c:1180
	ip_tree = (proto_tree *) 0x2000000001ae22a0
	field_tree = (proto_tree *) 0x20000000005894ec
	ti = (proto_item *) 0x2000000001ae22a0
	tf = (proto_item *) 0x200000004209f7fe
	addr = 972435722
	offset = 20
	hlen = 20
	optlen = 1107949569
	flags = 6
	nxt = 6 '\006'
	ipsum = 0
	ipfd_head = (fragment_data *) 0x0
	next_tvb = (tvbuff_t *) 0x2000000001ae4298
	update_col_info = 1
	save_fragmented = 0
	eip_arr = {{ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 1500, 
    ip_id = 36544, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', 
    ip_sum = 47970, ip_src = {type = AT_IPv4, len = 4, 
      data = 0x20000000005a581a "\n0��\n1�9\004i\027t1��M��ɠP\020>��Y"}, 
    ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005a581e "\n1�9\004i\027t1��M��ɠP\020>��Y"}}, {
    ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 1500, ip_id = 61224, 
    ip_off = 0, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 57194, ip_src = {
      type = AT_IPv4, len = 4, 
      data = 0x20000000005a581a "\n0��\n1�9\004i\027t1��M��ɠP\020>��Y"}, 
    ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005a581e "\n1�9\004i\027t1��M��ɠP\020>��Y"}}, {
    ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 1500, ip_id = 36543, 
    ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 47971, 
    ip_src = {type = AT_IPv4, len = 4, 
      data = 0x20000000005a581a "\n0��\n1�9\004i\027t1��M��ɠP\020>��Y"}, 
    ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005a581e "\n1�9\004i\027t1��M��ɠP\020>��Y"}}, {
    ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 40, ip_id = 23442, 
    ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 50756, 
    ip_src = {type = AT_IPv4, len = 4, 
      data = 0x20000000005a581a "\n0��\n1�9\004i\027t1��M��ɠP\020>��Y"}, 
    ip_dst = {type = AT_IPv4, len = 4, 
      data = 0x20000000005a581e "\n1�9\004i\027t1��M��ɠP\020>��Y"}}}
	eip_current = 1
	iph = (e_ip *) 0x200000004209f7f8
	src_addr = (const guchar *) 0x2000000001ae4298 "\001"
	dst_addr = (const guchar *) 0x2000000001ae4298 "\001"
	src32 = 170959598
	dst32 = 171046457
	tree = (proto_tree *) 0x0
	item = (proto_item *) 0x0
	checksum_tree = (proto_tree *) 0x200000004209f801
#22 0x2000000040a78460 in call_dissector_through_handle (
    handle=0x20000000001c01a0, tvb=0x2000000001ae41e8, 
    pinfo=0x2000000000589410, tree=0x2000000001ae2c60) at packet.c:386
	saved_proto = 0x2000000041760570 "IP"
	ret = 0
#23 0x2000000040a79270 in call_dissector_work (handle=0x20000000001c01a0, 
    tvb=0x2000000001ae41e8, pinfo_arg=0x2000000000589410, 
    tree=0x2000000001ae2c60) at packet.c:561
	pinfo = (packet_info * volatile) 0x2000000000589410
	saved_proto = 0x200000004172e580 "Ethernet"
	saved_can_desegment = 0
	ret = 54
	save_writable = 6
	save_dl_src = {type = 1299185789, len = 1866678857, 
  data = 0x65636e61696c706d <Address 0x65636e61696c706d out of bounds>}
	save_dl_dst = {type = AT_NONE, len = 0, data = 0x0}
	save_net_src = {type = AT_NONE, len = 0, 
  data = 0x6238613500000000 <Address 0x6238613500000000 out of bounds>}
	save_net_dst = {type = AT_NONE, len = 0, data = 0x0}
	save_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dst = {type = AT_NONE, len = 0, data = 0x0}
	saved_layer_names_len = 3
	__PRETTY_FUNCTION__ = "call_dissector_work"
#24 0x2000000040a79c00 in dissector_try_port (
    sub_dissectors=0x20000000000a9260, port=2048, tvb=0x2000000001ae41e8, 
    pinfo=0x2000000000589410, tree=0x2000000001ae2c60) at packet.c:836
	dtbl_entry = (dtbl_entry_t *) 0x0
	handle = (struct dissector_handle *) 0x20000000001c01a0
	saved_match_port = 1
#25 0x2000000040dcd060 in ethertype (etype=2048, tvb=0x2000000001ae4190, 
    offset_after_etype=14, pinfo=0x2000000000589410, tree=0x2000000001ae2c60, 
    fh_tree=0x2000000001ae2240, etype_id=8229, trailer_id=8231, fcs_len=-1)
    at packet-ethertype.c:192
	except_sn = {except_down = 0x9fffffffffffe2c0, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffda10, except_cleanup = 0x9fffffffffffda10}}
	except_ch = {except_id = 0x20000000416561f8, except_size = 1, 
  except_obj = {except_id = {except_group = 1, except_code = 1}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, 
        <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	description = 0x0
	next_tvb = (tvbuff_t *) 0x2000000001ae41e8
	length_before = 1500
	dissector_found = 0
	saved_proto = 0x200000004172e580 "Ethernet"
	__PRETTY_FUNCTION__ = "ethertype"
#26 0x2000000040dc8c30 in dissect_eth_common (tvb=0x2000000001ae4190, 
    pinfo=0x2000000000589410, parent_tree=0x2000000001ae2c60, fcs_len=-1)
    at packet-eth.c:311
	ehdr = (eth_hdr * volatile) 0x200000004209b680
	is_802_2 = 1
	fh_tree = (proto_tree * volatile) 0x2000000001ae2240
	src_addr = (const guint8 *) 0x20000000005a5806 ""
	dst_addr = (const guint8 *) 0x20000000005a5800 ""
	ehdrs = {{dst = {type = AT_ETHER, len = 6, 
      data = 0x20000000005a5800 ""}, src = {type = AT_ETHER, len = 6, 
      data = 0x20000000005a5806 ""}, type = 2048}, {dst = {type = AT_ETHER, 
      len = 6, data = 0x20000000005a5800 ""}, src = {type = AT_ETHER, len = 6, 
      data = 0x20000000005a5806 ""}, type = 2048}, {dst = {type = AT_ETHER, 
      len = 6, data = 0x20000000005a5800 ""}, src = {type = AT_ETHER, len = 6, 
      data = 0x20000000005a5806 ""}, type = 2048}, {dst = {type = AT_ETHER, 
      len = 6, data = 0x20000000005a5800 ""}, src = {type = AT_ETHER, len = 6, 
      data = 0x20000000005a5806 ""}, type = 2048}}
	ehdr_num = 3
	tree = (proto_tree * volatile) 0x2000000001ae2c60
#27 0x2000000040dc8f80 in dissect_eth_maybefcs (tvb=0x2000000001ae4190, 
    pinfo=0x2000000000589410, tree=0x2000000001ae2c60) at packet-eth.c:407
No locals.
#28 0x2000000040a78460 in call_dissector_through_handle (
    handle=0x200000000057f3e0, tvb=0x2000000001ae4190, 
    pinfo=0x2000000000589410, tree=0x2000000001ae2c60) at packet.c:386
	saved_proto = 0x200000004172e580 "Ethernet"
	ret = 0
#29 0x2000000040a79270 in call_dissector_work (handle=0x200000000057f3e0, 
    tvb=0x2000000001ae4190, pinfo_arg=0x2000000000589410, 
    tree=0x2000000001ae2c60) at packet.c:561
	pinfo = (packet_info * volatile) 0x2000000000589410
	saved_proto = 0x2000000041641bb8 "Frame"
	saved_can_desegment = 0
	ret = 68
	save_writable = 0
	save_dl_src = {type = AT_ETHER, len = 6, data = 0x20000000005a5806 ""}
	save_dl_dst = {type = AT_ETHER, len = 6, data = 0x20000000005a5800 ""}
	save_net_src = {type = AT_IPv4, len = 4, 
  data = 0x20000000005a581a "\n0��\n1�9\004i\027t1��M��ɠP\020>��Y"}
	save_net_dst = {type = AT_IPv4, len = 4, 
  data = 0x39000000005a581e <Address 0x39000000005a581e out of bounds>}
	save_src = {type = 943076657, len = 4, 
  data = 0x20000000005a581a "\n0��\n1�9\004i\027t1��M��ɠP\020>��Y"}
	save_dst = {type = 943076657, len = 4, 
  data = 0x20000000005a581e "\n1�9\004i\027t1��M��ɠP\020>��Y"}
	saved_layer_names_len = 0
	__PRETTY_FUNCTION__ = "call_dissector_work"
#30 0x2000000040a79c00 in dissector_try_port (
    sub_dissectors=0x20000000000a9580, port=1, tvb=0x2000000001ae4190, 
    pinfo=0x2000000000589410, tree=0x2000000001ae2c60) at packet.c:836
	dtbl_entry = (dtbl_entry_t *) 0x0
	handle = (struct dissector_handle *) 0x200000000057f3e0
	saved_match_port = 0
#31 0x2000000040e0a2d0 in dissect_frame (tvb=0x2000000001ae4190, 
    pinfo=0x2000000000589410, parent_tree=0x2000000001ae2c60)
    at packet-frame.c:256
	except_sn = {except_down = 0x9fffffffffffe860, 
  except_type = XCEPT_CATCHER, except_info = {
    except_catcher = 0x9fffffffffffe2e0, except_cleanup = 0x9fffffffffffe2e0}}
	except_ch = {except_id = 0x2000000041670080, except_size = 1, 
  except_obj = {except_id = {except_group = 1, except_code = 1}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, 
        <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 
        <invalid float value>, 0, <invalid float value>}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	fh_tree = (proto_tree *) 0x2000000001ae2300
	ti = (proto_item * volatile) 0x2000000001ae29f0
	ts = {secs = 29, nsecs = 945116000}
	cap_len = 68
	pkt_len = 1514
	tree = (proto_tree *) 0x2000000001ae2c60
	item = (proto_item *) 0x0
#32 0x2000000040a78460 in call_dissector_through_handle (
    handle=0x20000000000a95a0, tvb=0x2000000001ae4190, 
    pinfo=0x2000000000589410, tree=0x2000000001ae2c60) at packet.c:386
	saved_proto = 0x2000000041641bb8 "Frame"
	ret = 0
#33 0x2000000040a79270 in call_dissector_work (handle=0x20000000000a95a0, 
    tvb=0x2000000001ae4190, pinfo_arg=0x2000000000589410, 
    tree=0x2000000001ae2c60) at packet.c:561
	pinfo = (packet_info * volatile) 0x2000000000589410
	saved_proto = 0x2000000041497448 "<Missing Protocol Name>"
	saved_can_desegment = 0
	ret = 68
	save_writable = 0
	save_dl_src = {type = AT_NONE, len = 0, 
  data = 0x3138313333ffe590 <Address 0x3138313333ffe590 out of bounds>}
	save_dl_dst = {type = 943075379, len = 0, 
  data = 0x3637343439320006 <Address 0x3637343439320006 out of bounds>}
	save_net_src = {type = 943063168, len = -1610612737, data = 0x0}
	save_net_dst = {type = 1098448912, len = 536870912, 
  data = 0x17 <Address 0x17 out of bounds>}
	save_src = {type = AT_NONE, len = 0, data = 0x0}
	save_dst = {type = AT_NONE, len = 0, 
  data = 0x1 <Address 0x1 out of bounds>}
	saved_layer_names_len = 0
	__PRETTY_FUNCTION__ = "call_dissector_work"
#34 0x2000000040a7c270 in call_dissector (handle=0x20000000000a95a0, 
    tvb=0x2000000001ae4190, pinfo=0x2000000000589410, tree=0x2000000001ae2c60)
    at packet.c:1704
	ret = 0
	__PRETTY_FUNCTION__ = "call_dissector"
#35 0x2000000040a78030 in dissect_packet (edt=0x2000000000589400, 
    pseudo_header=0x2000000000589410, pd=0x20000000005a5800 "", 
    fd=0x9fffffffffffeae0, cinfo=0x0) at packet.c:325
	except_sn = {except_down = 0x0, except_type = XCEPT_CATCHER, 
  except_info = {except_catcher = 0x9fffffffffffe880, 
    except_cleanup = 0x9fffffffffffe880}}
	except_ch = {except_id = 0x2000000041497638, except_size = 1, 
  except_obj = {except_id = {except_group = 0, except_code = 0}, 
    except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, 
        <invalid float value>, <invalid float value>, 0, -inf, 
        <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, 
        <invalid float value>, -nan(0x4928824398483892), -inf, 
        <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, 
        <invalid float value>, <invalid float value>, 0, 
        <invalid float value>, 0, 0}}}}
	exc = (except_t *) 0x0
	except_state = 0
	catch_spec = {{except_group = 1, except_code = 0}}
	__PRETTY_FUNCTION__ = "dissect_packet"
#36 0x2000000040a71aa0 in epan_dissect_run (edt=0x2000000000589400, 
    pseudo_header=0x2000000000588e48, data=0x20000000005a5800 "", 
    fd=0x9fffffffffffeae0, cinfo=0x0) at epan.c:161
No locals.
#37 0x200000000003b1a0 in process_packet (cf=0x20000000000951d8, pdh=0x0, 
    offset=2305843009219499008, whdr=0x2000000000588e28, 
    pseudo_header=0x2000000000588e48, pd=0x20000000005a5800 "", 
    err=0x9fffffffffffeb50) at tethereal.c:2136
	fdata = {next = 0x0, prev = 0x0, pfd = 0x0, num = 96701, 
  pkt_len = 1514, cap_len = 68, cum_bytes = 44475968, abs_ts = {
    secs = 1127228575, nsecs = 332168000}, rel_ts = {secs = 29, 
    nsecs = 945116000}, del_ts = {secs = 0, nsecs = 355000}, 
  file_off = 7863212, lnk_t = 1, flags = {passed_dfilter = 0, encoding = 0, 
    visited = 0, marked = 0, ref_time = 0}, color_filter = 0x1000c}
	create_proto_tree = 5805056
	edt = (epan_dissect_t *) 0x2000000000589400
	passed = 0
#38 0x200000000003a710 in load_cap_file (cf=0x20000000000951d8, save_file=0x0, 
    out_file_type=610864) at tethereal.c:1958
	linktype = 5803560
	snapshot_length = 5803560
	pdh = (wtap_dumper *) 0x0
	err = 1462964150
	err_info = (gchar *) 0x1003e <Address 0x1003e out of bounds>
	data_offset = 7863212
	save_file_string = 0x0
#39 0x2000000000038860 in main (argc=6, argv=0x28) at tethereal.c:1349
	opt = 0
	i = 6
	gpf_path = 0x0
	pf_path = 0x0
	gdp_path = 0x0
	dp_path = 0x0
	gpf_open_errno = 0
	gpf_read_errno = -2147483648
	pf_open_errno = 0
	pf_read_errno = -2147483648
	gdp_open_errno = 65598
	gdp_read_errno = 0
	dp_open_errno = 65516
	dp_read_errno = 0
	err = 0
	capture_filter_specified = 6724776
	list_link_layer_types = 0
	start_capture = 0
	quiet = 0
	out_file_type = 2
	cf_name = (
    gchar *) 0x2000000000669b40 "/home/buildbot/ethereal/random/editcap.out"
	rfilter = (gchar *) 0x0
	fcode = {bf_len = 4026531840, bf_insns = 0x10003}
	rfcode = (dfilter_t *) 0x0
	prefs = (e_prefs *) 0x20000000420a9340
	optstring = "a:b:c:d:Df:F:hi:lLnN:o:pqr:R:s:St:T:vVw:xy:z:"
	__PRETTY_FUNCTION__ = "main"


(no stderr output)


Bug 705 posted.