Ethereal-dev: [Ethereal-dev] Buildbot crash output
Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.
From: Buildbot <buildbot-do-not-reply@xxxxxxxxxxxx>
Date: Thu, 19 Jan 2006 08:12:02 -0600 (CST)
Problems have been found with the following capture file(s): http://www.ethereal.com/distribution/buildbot-builds/randpkt/editcap.43cf9e0f.pcap Error information: Core was generated by `lt-tethereal'. Program terminated with signal 11, Segmentation fault. #0 dissect_t38_Data_Field_field_type (tvb=0x2000000001ae4138, offset=60, pinfo=0x2000000000589410, tree=0x2000000001ae0a20) at packet-t38.c:1641 1641 frag_msg = fragment_add_seq(tvb, offset, pinfo, #0 dissect_t38_Data_Field_field_type (tvb=0x2000000001ae4138, offset=60, pinfo=0x2000000000589410, tree=0x2000000001ae0a20) at packet-t38.c:1641 frag_msg = (fragment_data *) 0x9fffffffffffcc70 new_tvb = (tvbuff_t *) 0x0 save_fragmented = 1 #1 0x2000000041181b00 in dissect_per_sequence (tvb=0x2000000001ae4138, offset=57, pinfo=0x2000000000589410, parent_tree=0x0, hf_index=-13192, ett_index=-13200, sequence=0x2000000041f8fef0) at packet-per.c:1160 extension_flag = 0 optional_field_flag = 1 item = (proto_item *) 0x2000000001ae0a20 tree = (proto_tree *) 0x2000000001ae0a20 old_offset = 56 i = 0 num_opts = 1 optional_mask = 1 pi = (proto_item *) 0x0 #2 0x2000000041383480 in dissect_t38_Data_Field_item (tvb=0x2000000001ae4138, offset=0, pinfo=0x2000000000589410, tree=0x2000000001ae0f90) at packet-t38.c:1790 No locals. #3 0x200000004117dc40 in dissect_per_sequence_of_helper ( tvb=0x2000000001ae4138, offset=56, pinfo=0x2000000000589410, tree=0x2000000007bd2e70, func=0x2000000042c33370, length=100) at packet-per.c:239 lold_offset = 56 litem = (proto_item *) 0x2000000001ae0f90 i = 0 #4 0x200000004117de90 in dissect_per_sequence_of (tvb=0x2000000001ae4138, offset=56, pinfo=0x2000000000589410, parent_tree=0x2000000007bd2e70, hf_index=36607, ett_index=11391, seq=0x2000000041f8ff38) at packet-per.c:270 item = (proto_item *) 0x2000000007bd2e70 old_offset = 47 length = 100 #5 0x2000000041383520 in dissect_t38_Data_Field (tvb=0x2000000001ae4138, offset=47, pinfo=0x2000000000589410, tree=0x2000000007bd2870, hf_index=36607) at packet-t38.c:1805 No locals. #6 0x2000000041383580 in dissect_data_field (tvb=0x2000000001ae4138, offset=47, pinfo=0x2000000000589410, tree=0x2000000007bd2870) at packet-t38.c:1811 No locals. #7 0x2000000041181b00 in dissect_per_sequence (tvb=0x2000000001ae4138, offset=47, pinfo=0x2000000000589410, parent_tree=0x1, hf_index=-13112, ett_index=-13120, sequence=0x2000000041f8ff50) at packet-per.c:1160 extension_flag = 0 optional_field_flag = 1 item = (proto_item *) 0x2000000007bd2870 tree = (proto_tree *) 0x2000000007bd2870 old_offset = 40 i = 1 num_opts = 0 optional_mask = 1 pi = (proto_item *) 0x0 #8 0x2000000041383600 in dissect_t38_IFPPacket (tvb=0x2000000001ae4138, offset=40, pinfo=0x2000000000589410, tree=0x2000000001ae1200) at packet-t38.c:1823 No locals. #9 0x2000000041384c60 in dissect_t38_tcp_pdu (tvb=0x2000000001ae4138, pinfo=0x2000000000589410, tree=0x2000000000589418) at packet-t38.c:2195 tr = (proto_tree *) 0x2000000001ae1200 offset = 40 ifp_packet_number = 5 #10 0x2000000041384f30 in dissect_t38_tcp (tvb=0x2000000001ae4138, pinfo=0x2000000000589410, tree=0x2000000001ae0750) at packet-t38.c:2232 No locals. #11 0x2000000040a780c0 in call_dissector_through_handle ( handle=0x20000000005c7580, tvb=0x2000000001ae4138, pinfo=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:386 saved_proto = 0x20000000418a70c8 "T.38" ret = 0 #12 0x2000000040a78ed0 in call_dissector_work (handle=0x20000000005c7580, tvb=0x2000000001ae4138, pinfo_arg=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:561 pinfo = (packet_info * volatile) 0x2000000000589410 saved_proto = 0x2000000041807c68 "TCP" saved_can_desegment = 0 ret = 14 save_writable = 536870912 save_dl_src = {type = 842018872, len = 14, data = 0x3100000000000000 <Address 0x3100000000000000 out of bounds>} save_dl_dst = {type = 842018872, len = 1, data = 0x0} save_net_src = {type = AT_NONE, len = 0, data = 0x0} save_net_dst = {type = AT_NONE, len = 16, data = 0x1e00000001 <Address 0x1e00000001 out of bounds>} save_src = {type = 4294901840, len = -1610612737, data = 0x200000000000000d <Address 0x200000000000000d out of bounds>} save_dst = {type = AT_NONE, len = 14, data = 0x1 <Address 0x1 out of bounds>} saved_layer_names_len = 10 __PRETTY_FUNCTION__ = "call_dissector_work" #13 0x2000000040a79860 in dissector_try_port ( sub_dissectors=0x20000000003cb400, port=6004, tvb=0x2000000001ae4138, pinfo=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:836 dtbl_entry = (dtbl_entry_t *) 0x0 handle = (struct dissector_handle *) 0x20000000005c7580 saved_match_port = 6 #14 0x2000000041398910 in decode_tcp_ports (tvb=0x2000000001ae4138, offset=20, pinfo=0x2000000000589410, tree=0x2000000001ae0750, src_port=1129, dst_port=6004) at packet-tcp.c:2549 next_tvb = (tvbuff_t *) 0x2000000001ae4138 low_port = 6004 high_port = 6004 #15 0x2000000041398db0 in process_tcp_payload (tvb=0x2000000001ae40e0, offset=20, pinfo=0x2000000000589410, tree=0x2000000001ae0750, tcp_tree=0x2000000001ae05a0, src_port=1129, dst_port=6004, seq=0, nxtseq=1310, is_tcp_segment=1) at packet-tcp.c:2591 except_sn = {except_down = 0x9fffffffffffd9f0, except_type = XCEPT_CATCHER, except_info = { except_catcher = 0x9fffffffffffd030, except_cleanup = 0x9fffffffffffd030}} except_ch = {except_id = 0x20000000418ade40, except_size = 1, except_obj = {except_id = {except_group = 1, except_code = 1}, except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}} exc = (except_t *) 0x0 except_state = 0 catch_spec = {{except_group = 1, except_code = 0}} __PRETTY_FUNCTION__ = "process_tcp_payload" #16 0x20000000413992e0 in dissect_tcp_payload (tvb=0x2000000001ae40e0, pinfo=0x2000000000589410, offset=20, seq=0, nxtseq=1310, sport=1129, dport=6004, tree=0x2000000001ae0750, tcp_tree=0x2000000001ae05a0) at packet-tcp.c:2664 save_fragmented = 0 #17 0x200000004139bbc0 in dissect_tcp (tvb=0x2000000001ae40e0, pinfo=0x2000000000589410, tree=0x2000000001ae0750) at packet-tcp.c:3125 th_sum = 14 th_urp = 48536 tcp_tree = (proto_tree *) 0x2000000001ae05a0 field_tree = (proto_tree *) 0xe ti = (proto_item *) 0x2000000001ae05a0 tf = (proto_item *) 0x0 offset = 20 flags = (gchar *) 0x20000000006b0298 "ACK" fstr = {0x2000000041642978 "FIN", 0x2000000041809420 "SYN", 0x200000004180f7d8 "RST", 0x20000000418ac750 "PSH", 0x200000004164fda8 "ACK", 0x20000000418ac758 "URG", 0x2000000041861dd8 "ECN", 0x2000000041861ae0 "CWR"} fpos = 3 returned_length = 0 i = 1107869080 bpos = 0 optlen = 1107869080 nxtseq = 1310 reported_len = 1330 cksum_vec = {{ptr = 0x9fffffffffffd3f0 "e1ab", len = 4}, { ptr = 0x9fffffffffffd3f3 "b", len = 1}, {ptr = 0x0, len = 0}, {ptr = 0x0, len = 0}} phdr = {0, 0} computed_cksum = 0 real_window = 16060 length_remaining = 14 desegment_ok = 1084581760 tcpinfo = {seq = 0, nxtseq = 1310, is_reassembled = 0, urgent = 0, urgent_pointer = 20} tcphstruct = {{th_seq = 0, th_ack = 0, th_have_seglen = 1, th_seglen = 1310, th_win = 16060, th_sport = 1129, th_dport = 6004, th_hlen = 20 '\024', th_flags = 16 '\020', ip_src = {type = AT_IPv4, len = 4, data = 0x20000000005a581a "\n0¢î\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x20000000005a581e "\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}}, { th_seq = 31493, th_ack = 0, th_have_seglen = 1, th_seglen = 588, th_win = 16060, th_sport = 1129, th_dport = 6000, th_hlen = 20 '\024', th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, data = 0x20000000005a581a "\n0¢î\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x20000000005a581e "\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}}, { th_seq = 53, th_ack = 133, th_have_seglen = 1, th_seglen = 104, th_win = 7983, th_sport = 139, th_dport = 4449, th_hlen = 20 '\024', th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, data = 0x20000000005a581a "\n0¢î\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x20000000005a581e "\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}}, { th_seq = 133, th_ack = 157, th_have_seglen = 1, th_seglen = 74, th_win = 63821, th_sport = 4449, th_dport = 139, th_hlen = 20 '\024', th_flags = 24 '\030', ip_src = {type = AT_IPv4, len = 4, data = 0x20000000005a581a "\n0¢î\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x20000000005a581e "\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}}} tcph = (struct tcpheader *) 0x20000000420a6d98 tcph_count = 0 tf_syn = (proto_item *) 0x2000000007bd2a80 tf_fin = (proto_item *) 0x2000000001ae0ea0 tf_rst = (proto_item *) 0x2000000001ae0090 #18 0x2000000040a780c0 in call_dissector_through_handle ( handle=0x20000000005c7620, tvb=0x2000000001ae40e0, pinfo=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:386 saved_proto = 0x2000000041807c68 "TCP" ret = 0 #19 0x2000000040a78ed0 in call_dissector_work (handle=0x20000000005c7620, tvb=0x2000000001ae40e0, pinfo_arg=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:561 pinfo = (packet_info * volatile) 0x2000000000589410 saved_proto = 0x2000000041760110 "IP" saved_can_desegment = 0 ret = 20 save_writable = 536870912 save_dl_src = {type = AT_NONE, len = 0, data = 0x0} save_dl_dst = {type = AT_NONE, len = 0, data = 0x0} save_net_src = {type = 1633195024, len = 536870912, data = 0x26 <Address 0x26 out of bounds>} save_net_dst = {type = 808583168, len = 0, data = 0x0} save_src = {type = 842203136, len = 0, data = 0x0} save_dst = {type = 1650536805, len = 0, data = 0x0} saved_layer_names_len = 6 __PRETTY_FUNCTION__ = "call_dissector_work" #20 0x2000000040a79860 in dissector_try_port ( sub_dissectors=0x20000000001c0160, port=6, tvb=0x2000000001ae40e0, pinfo=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:836 dtbl_entry = (dtbl_entry_t *) 0x0 handle = (struct dissector_handle *) 0x20000000005c7620 saved_match_port = 2048 #21 0x2000000040f7f090 in dissect_ip (tvb=0x2000000001ae4088, pinfo=0x2000000000589410, parent_tree=0x2000000001ae0750) at packet-ip.c:1180 ip_tree = (proto_tree *) 0x2000000007bd2c60 field_tree = (proto_tree *) 0x20000000005894ec ti = (proto_item *) 0x2000000007bd2c60 tf = (proto_item *) 0x200000004209f01e addr = 972435722 offset = 20 hlen = 20 optlen = 1107947553 flags = 6 nxt = 6 '\006' ipsum = 38400 ipfd_head = (fragment_data *) 0x0 next_tvb = (tvbuff_t *) 0x2000000001ae40e0 update_col_info = 1 save_fragmented = 0 eip_arr = {{ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 90, ip_id = 64339, ip_off = 0, ip_ttl = 0 '\0', ip_p = 17 '\021', ip_sum = 13005, ip_src = {type = AT_IPv4, len = 4, data = 0x20000000005a581a "\n0¢î\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x20000000005a581e "\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}}, { ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 114, ip_id = 33354, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 29908, ip_src = {type = AT_IPv4, len = 4, data = 0x20000000005a581a "\n0¢î\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x20000000005a581e "\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}}, { ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 1350, ip_id = 60797, ip_off = 0, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 57621, ip_src = { type = AT_IPv4, len = 4, data = 0x20000000005a581a "\n0¢î\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x20000000005a581e "\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}}, { ip_v_hl = 69 'E', ip_tos = 0 '\0', ip_len = 144, ip_id = 33585, ip_off = 16384, ip_ttl = 0 '\0', ip_p = 6 '\006', ip_sum = 30671, ip_src = {type = AT_IPv4, len = 4, data = 0x20000000005a581a "\n0¢î\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}, ip_dst = {type = AT_IPv4, len = 4, data = 0x20000000005a581e "\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"}}} eip_current = 2 iph = (e_ip *) 0x200000004209f018 src_addr = (const guchar *) 0x2000000001ae40e0 "\001" dst_addr = (const guchar *) 0x2000000001ae40e0 "\001" src32 = 170959598 dst32 = 171046457 tree = (proto_tree *) 0x0 item = (proto_item *) 0x0 checksum_tree = (proto_tree *) 0x200000004209f021 #22 0x2000000040a780c0 in call_dissector_through_handle ( handle=0x20000000001c01a0, tvb=0x2000000001ae4088, pinfo=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:386 saved_proto = 0x2000000041760110 "IP" ret = 0 #23 0x2000000040a78ed0 in call_dissector_work (handle=0x20000000001c01a0, tvb=0x2000000001ae4088, pinfo_arg=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:561 pinfo = (packet_info * volatile) 0x2000000000589410 saved_proto = 0x200000004172e120 "Ethernet" saved_can_desegment = 0 ret = 40 save_writable = 6 save_dl_src = {type = 1299185789, len = 1866678857, data = 0x65636e61696c706d <Address 0x65636e61696c706d out of bounds>} save_dl_dst = {type = AT_NONE, len = 0, data = 0x0} save_net_src = {type = AT_NONE, len = 0, data = 0x6433356400000000 <Address 0x6433356400000000 out of bounds>} save_net_dst = {type = AT_NONE, len = 0, data = 0x0} save_src = {type = AT_NONE, len = 0, data = 0x0} save_dst = {type = AT_NONE, len = 0, data = 0x0} saved_layer_names_len = 3 __PRETTY_FUNCTION__ = "call_dissector_work" #24 0x2000000040a79860 in dissector_try_port ( sub_dissectors=0x20000000000a9260, port=2048, tvb=0x2000000001ae4088, pinfo=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:836 dtbl_entry = (dtbl_entry_t *) 0x0 handle = (struct dissector_handle *) 0x20000000001c01a0 saved_match_port = 1 #25 0x2000000040dcccc0 in ethertype (etype=2048, tvb=0x2000000001ae4030, offset_after_etype=14, pinfo=0x2000000000589410, tree=0x2000000001ae0750, fh_tree=0x2000000001ae00c0, etype_id=8229, trailer_id=8231, fcs_len=-1) at packet-ethertype.c:192 except_sn = {except_down = 0x9fffffffffffe2c0, except_type = XCEPT_CATCHER, except_info = { except_catcher = 0x9fffffffffffda10, except_cleanup = 0x9fffffffffffda10}} except_ch = {except_id = 0x2000000041655d98, except_size = 1, except_obj = {except_id = {except_group = 1, except_code = 1}, except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, <invalid float value>, <invalid float value>, 0, 0, 0, 0}}}} exc = (except_t *) 0x0 except_state = 0 catch_spec = {{except_group = 1, except_code = 0}} description = 0x0 next_tvb = (tvbuff_t *) 0x2000000001ae4088 length_before = 1500 dissector_found = 0 saved_proto = 0x200000004172e120 "Ethernet" __PRETTY_FUNCTION__ = "ethertype" #26 0x2000000040dc8890 in dissect_eth_common (tvb=0x2000000001ae4030, pinfo=0x2000000000589410, parent_tree=0x2000000001ae0750, fcs_len=-1) at packet-eth.c:311 ehdr = (eth_hdr * volatile) 0x200000004209ae48 is_802_2 = 1 fh_tree = (proto_tree * volatile) 0x2000000001ae00c0 src_addr = (const guint8 *) 0x20000000005a5806 "" dst_addr = (const guint8 *) 0x20000000005a5800 "" ehdrs = {{dst = {type = AT_ETHER, len = 6, data = 0x20000000005a5800 ""}, src = {type = AT_ETHER, len = 6, data = 0x20000000005a5806 ""}, type = 2048}, {dst = {type = AT_ETHER, len = 6, data = 0x20000000005a5800 ""}, src = {type = AT_ETHER, len = 6, data = 0x20000000005a5806 ""}, type = 2048}, {dst = {type = AT_ETHER, len = 6, data = 0x20000000005a5800 ""}, src = {type = AT_ETHER, len = 6, data = 0x20000000005a5806 ""}, type = 2048}, {dst = {type = AT_ETHER, len = 6, data = 0x20000000005a5800 ""}, src = {type = AT_ETHER, len = 6, data = 0x20000000005a5806 ""}, type = 2048}} ehdr_num = 2 tree = (proto_tree * volatile) 0x2000000001ae0750 #27 0x2000000040dc8be0 in dissect_eth_maybefcs (tvb=0x2000000001ae4030, pinfo=0x2000000000589410, tree=0x2000000001ae0750) at packet-eth.c:407 No locals. #28 0x2000000040a780c0 in call_dissector_through_handle ( handle=0x200000000057f3e0, tvb=0x2000000001ae4030, pinfo=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:386 saved_proto = 0x200000004172e120 "Ethernet" ret = 0 #29 0x2000000040a78ed0 in call_dissector_work (handle=0x200000000057f3e0, tvb=0x2000000001ae4030, pinfo_arg=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:561 pinfo = (packet_info * volatile) 0x2000000000589410 saved_proto = 0x2000000041641758 "Frame" saved_can_desegment = 0 ret = 68 save_writable = 0 save_dl_src = {type = AT_ETHER, len = 6, data = 0x20000000005a5806 ""} save_dl_dst = {type = AT_ETHER, len = 6, data = 0x20000000005a5800 ""} save_net_src = {type = AT_IPv4, len = 4, data = 0x20000000005a581a "\n0¢î\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"} save_net_dst = {type = AT_IPv4, len = 4, data = 0x38000000005a581e <Address 0x38000000005a581e out of bounds>} save_src = {type = 943076657, len = 4, data = 0x20000000005a581a "\n0¢î\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"} save_dst = {type = 943076657, len = 4, data = 0x20000000005a581e "\n1ö9\004i\027t1Ì#ñ¼ËÉ`P\020>¼i¶"} saved_layer_names_len = 0 __PRETTY_FUNCTION__ = "call_dissector_work" #30 0x2000000040a79860 in dissector_try_port ( sub_dissectors=0x20000000000a9580, port=1, tvb=0x2000000001ae4030, pinfo=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:836 dtbl_entry = (dtbl_entry_t *) 0x0 handle = (struct dissector_handle *) 0x200000000057f3e0 saved_match_port = 0 #31 0x2000000040e09f30 in dissect_frame (tvb=0x2000000001ae4030, pinfo=0x2000000000589410, parent_tree=0x2000000001ae0750) at packet-frame.c:256 except_sn = {except_down = 0x9fffffffffffe860, except_type = XCEPT_CATCHER, except_info = { except_catcher = 0x9fffffffffffe2e0, except_cleanup = 0x9fffffffffffe2e0}} except_ch = {except_id = 0x200000004166fc20, except_size = 1, except_obj = {except_id = {except_group = 1, except_code = 1}, except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, <invalid float value>, <invalid float value>, 0, <invalid float value>, 0, <invalid float value>}}}} exc = (except_t *) 0x0 except_state = 0 catch_spec = {{except_group = 1, except_code = 0}} fh_tree = (proto_tree *) 0x2000000007bd2d20 ti = (proto_item * volatile) 0x2000000007bd3200 ts = {secs = 26, nsecs = 646680000} cap_len = 68 pkt_len = 1514 tree = (proto_tree *) 0x2000000001ae0750 item = (proto_item *) 0x0 #32 0x2000000040a780c0 in call_dissector_through_handle ( handle=0x20000000000a95a0, tvb=0x2000000001ae4030, pinfo=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:386 saved_proto = 0x2000000041641758 "Frame" ret = 0 #33 0x2000000040a78ed0 in call_dissector_work (handle=0x20000000000a95a0, tvb=0x2000000001ae4030, pinfo_arg=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:561 pinfo = (packet_info * volatile) 0x2000000000589410 saved_proto = 0x2000000041496fe8 "<Missing Protocol Name>" saved_can_desegment = 0 ret = 68 save_writable = 0 save_dl_src = {type = 1074593792, len = 536870912, data = 0x37383233ffffe590 <Address 0x37383233ffffe590 out of bounds>} save_dl_dst = {type = 943075378, len = 536870912, data = 0x363835343632ea00 <Address 0x363835343632ea00 out of bounds>} save_net_src = {type = 943063168, len = -1610612737, data = 0x0} save_net_dst = {type = 1098449072, len = 536870912, data = 0x17 <Address 0x17 out of bounds>} save_src = {type = AT_NONE, len = 0, data = 0x0} save_dst = {type = AT_NONE, len = 0, data = 0x1 <Address 0x1 out of bounds>} saved_layer_names_len = 0 __PRETTY_FUNCTION__ = "call_dissector_work" #34 0x2000000040a7bed0 in call_dissector (handle=0x20000000000a95a0, tvb=0x2000000001ae4030, pinfo=0x2000000000589410, tree=0x2000000001ae0750) at packet.c:1704 ret = 0 __PRETTY_FUNCTION__ = "call_dissector" #35 0x2000000040a77c90 in dissect_packet (edt=0x2000000000589400, pseudo_header=0x2000000000589410, pd=0x20000000005a5800 "", fd=0x9fffffffffffeae0, cinfo=0x0) at packet.c:325 except_sn = {except_down = 0x0, except_type = XCEPT_CATCHER, except_info = {except_catcher = 0x9fffffffffffe880, except_cleanup = 0x9fffffffffffe880}} except_ch = {except_id = 0x20000000414971d8, except_size = 1, except_obj = {except_id = {except_group = 0, except_code = 0}, except_message = 0x0, except_dyndata = 0x0}, except_jmp = {{buf = {0, 0, <invalid float value>, <invalid float value>, 0, -inf, <invalid float value>, 0, 0, <invalid float value>, 0, 0, 0, 0, -0, 0, <invalid float value>, -nan(0x4928824398483892), -inf, <invalid float value>, 0, <invalid float value>, inf, inf, -0, -0, <invalid float value>, <invalid float value>, 0, <invalid float value>, 0, 0}}}} exc = (except_t *) 0x0 except_state = 0 catch_spec = {{except_group = 1, except_code = 0}} __PRETTY_FUNCTION__ = "dissect_packet" #36 0x2000000040a71700 in epan_dissect_run (edt=0x2000000000589400, pseudo_header=0x2000000000588e48, data=0x20000000005a5800 "", fd=0x9fffffffffffeae0, cinfo=0x0) at epan.c:161 No locals. #37 0x200000000003b1a0 in process_packet (cf=0x20000000000951d8, pdh=0x0, offset=2305843009219499008, whdr=0x2000000000588e28, pseudo_header=0x2000000000588e48, pd=0x20000000005a5800 "", err=0x9fffffffffffeb50) at tethereal.c:2136 fdata = {next = 0x0, prev = 0x0, pfd = 0x0, num = 83251, pkt_len = 1514, cap_len = 68, cum_bytes = 36207858, abs_ts = { secs = 1127228572, nsecs = 33732000}, rel_ts = {secs = 26, nsecs = 646680000}, del_ts = {secs = 0, nsecs = 860000}, file_off = 6771179, lnk_t = 1, flags = {passed_dfilter = 0, encoding = 0, visited = 0, marked = 0, ref_time = 0}, color_filter = 0x1000c} create_proto_tree = 5805056 edt = (epan_dissect_t *) 0x2000000000589400 passed = 0 #38 0x200000000003a710 in load_cap_file (cf=0x20000000000951d8, save_file=0x0, out_file_type=610864) at tethereal.c:1958 linktype = 5803560 snapshot_length = 5803560 pdh = (wtap_dumper *) 0x0 err = 1462964150 err_info = (gchar *) 0x1003e <Address 0x1003e out of bounds> data_offset = 6771179 save_file_string = 0x0 #39 0x2000000000038860 in main (argc=6, argv=0x28) at tethereal.c:1349 opt = 0 i = 6 gpf_path = 0x0 pf_path = 0x0 gdp_path = 0x0 dp_path = 0x0 gpf_open_errno = 0 gpf_read_errno = -2147483648 pf_open_errno = 0 pf_read_errno = -2147483648 gdp_open_errno = 65598 gdp_read_errno = 0 dp_open_errno = 65516 dp_read_errno = 0 err = 0 capture_filter_specified = 6724776 list_link_layer_types = 0 start_capture = 0 quiet = 0 out_file_type = 2 cf_name = ( gchar *) 0x2000000000669b40 "/home/buildbot/ethereal/random/editcap.out" rfilter = (gchar *) 0x0 fcode = {bf_len = 4026531840, bf_insns = 0x10003} rfcode = (dfilter_t *) 0x0 prefs = (e_prefs *) 0x20000000420a8b30 optstring = "a:b:c:d:Df:F:hi:lLnN:o:pqr:R:s:St:T:vVw:xy:z:" __PRETTY_FUNCTION__ = "main" (no stderr output) Bug 704 posted.
- Follow-Ups:
- Re: [Ethereal-dev] Buildbot crash output
- From: Jaap Keuter
- Re: [Ethereal-dev] Buildbot crash output
- Prev by Date: Re: [Ethereal-dev] SSL decryption
- Next by Date: Re: [Ethereal-dev] SSL decryption
- Previous by thread: [Ethereal-dev] Buildbot crash output
- Next by thread: Re: [Ethereal-dev] Buildbot crash output
- Index(es):