Wireshark-bugs: [Wireshark-bugs] [Bug 12251] New: Crash reloading "dissector.lua" from the wires
Bug ID |
12251
|
Summary |
Crash reloading "dissector.lua" from the wireshark website
|
Product |
Wireshark
|
Version |
2.0.2
|
Hardware |
x86
|
OS |
Mac OS X 10.11
|
Status |
UNCONFIRMED
|
Severity |
Major
|
Priority |
Low
|
Component |
Qt UI
|
Assignee |
bugzilla-admin@wireshark.org
|
Reporter |
t.engelmeier+wireshark@gmail.com
|
Created attachment 14410 [details]
dissector.lua
Build Information:
Version 2.0.2 (v2.0.2-0-ga16e22e from master-2.0)
--
Steps to reproduce:
1. Place the "dissector.lua" from the sample wiki in the wireshark plugins
folder
2. Open Wireshark
3. Analyze -> "reload lua plugins"
Expected:
Wireshark running
Real:
crash
Application Specific Information:
Performing @selector(itemFired:) from sender NSMenuItem 0x7fc33e361a90
Thread 0 Crashed:: Dispatch queue: com.apple.main-thread
0 libglib-2.0.0.dylib 0x000000010431405b g_logv + 1371
1 libglib-2.0.0.dylib 0x00000001043142dd g_log + 381
2 libwireshark.6.0.2.dylib 0x0000000104495f60 heur_dissector_add +
336
3 libwireshark.6.0.2.dylib 0x0000000104514db6 0x104473000 + 662966
4 libwireshark.6.0.2.dylib 0x0000000105103275 luaD_precall + 357
5 libwireshark.6.0.2.dylib 0x0000000105110de6 luaV_execute + 3958
6 libwireshark.6.0.2.dylib 0x0000000105103586 luaD_call + 70
7 libwireshark.6.0.2.dylib 0x0000000105102dd6 luaD_rawrunprotected +
86
8 libwireshark.6.0.2.dylib 0x0000000105103a4f luaD_pcall + 63
9 libwireshark.6.0.2.dylib 0x00000001050fed95 lua_pcallk + 229
10 libwireshark.6.0.2.dylib 0x0000000104521598 0x104473000 + 714136
11 libwireshark.6.0.2.dylib 0x0000000104521704 0x104473000 + 714500
12 libwireshark.6.0.2.dylib 0x00000001045218fa 0x104473000 + 715002
13 libwireshark.6.0.2.dylib 0x0000000104521d06 0x104473000 + 716038
14 org.wireshark.Wireshark 0x000000010332ff9f
MainWindow::on_actionAnalyzeReloadLuaPlugins_triggered() + 43
15 org.wireshark.Wireshark 0x00000001034ecf02
MainWindow::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 5690
16 org.wireshark.Wireshark 0x00000001034ee64a
MainWindow::qt_metacall(QMetaObject::Call, int, void**) + 78
17 QtCore 0x00000001084e496f
QMetaObject::activate(QObject*, int, int, void**) + 1359
18 QtWidgets 0x0000000103b601d4
QAction::activate(QAction::ActionEvent) + 260
19 QtWidgets 0x0000000103b6065f 0x103b3b000 + 153183
20 QtCore 0x00000001084e4b6f
QMetaObject::activate(QObject*, int, int, void**) + 1871
21 libqcocoa.dylib 0x000000010ad3c38f 0x10ad19000 + 144271
22 libsystem_trace.dylib 0x00007fff914df07a _os_activity_initiate
+ 75
23 com.apple.AppKit 0x00007fff8ab4351d -[NSApplication
sendAction:to:from:] + 460
24 com.apple.AppKit 0x00007fff8ab432b7 -[NSMenuItem
_corePerformAction] + 336
25 com.apple.AppKit 0x00007fff8ab43017 -[NSCarbonMenuImpl
performActionWithHighlightingForItemAtIndex:] + 114
26 libsystem_trace.dylib 0x00007fff914df07a _os_activity_initiate
+ 75
27 com.apple.AppKit 0x00007fff8ab41f05 -[NSMenu
performKeyEquivalent:] + 357
28 com.apple.AppKit 0x00007fff8ab410aa -[NSApplication
_handleKeyEquivalent:] + 920
29 com.apple.AppKit 0x00007fff8aa5950f -[NSApplication
sendEvent:] + 4274
30 libqcocoa.dylib 0x000000010ad3bf6e 0x10ad19000 + 143214
31 com.apple.AppKit 0x00007fff8a98c03a -[NSApplication run] +
796
32 libqcocoa.dylib 0x000000010ad385e4 0x10ad19000 + 128484
33 QtCore 0x00000001084ad9ad
QEventLoop::exec(QFlags<QEventLoop::ProcessEventsFlag>) + 381
34 QtCore 0x00000001084b0ee7
QCoreApplication::exec() + 359
35 org.wireshark.Wireshark 0x0000000103195af5 main + 5445
36 org.wireshark.Wireshark 0x0000000103193f54 start + 52
You are receiving this mail because:
- You are watching all bug changes.