Wireshark-bugs: [Wireshark-bugs] [Bug 12251] New: Crash reloading "dissector.lua" from the wires
Date: Fri, 11 Mar 2016 09:20:34 +0000
Bug ID 12251
Summary Crash reloading "dissector.lua" from the wireshark website
Product Wireshark
Version 2.0.2
Hardware x86
OS Mac OS X 10.11
Status UNCONFIRMED
Severity Major
Priority Low
Component Qt UI
Assignee bugzilla-admin@wireshark.org
Reporter t.engelmeier+wireshark@gmail.com

Created attachment 14410 [details]
dissector.lua

Build Information:
Version 2.0.2 (v2.0.2-0-ga16e22e from master-2.0)
--
Steps to reproduce: 

1. Place the "dissector.lua" from the sample wiki in the wireshark plugins
folder
2. Open Wireshark
3. Analyze -> "reload lua plugins"

Expected:
Wireshark running

Real:
crash 

Application Specific Information:
Performing @selector(itemFired:) from sender NSMenuItem 0x7fc33e361a90

Thread 0 Crashed:: Dispatch queue: com.apple.main-thread
0   libglib-2.0.0.dylib               0x000000010431405b g_logv + 1371
1   libglib-2.0.0.dylib               0x00000001043142dd g_log + 381
2   libwireshark.6.0.2.dylib          0x0000000104495f60 heur_dissector_add +
336
3   libwireshark.6.0.2.dylib          0x0000000104514db6 0x104473000 + 662966
4   libwireshark.6.0.2.dylib          0x0000000105103275 luaD_precall + 357
5   libwireshark.6.0.2.dylib          0x0000000105110de6 luaV_execute + 3958
6   libwireshark.6.0.2.dylib          0x0000000105103586 luaD_call + 70
7   libwireshark.6.0.2.dylib          0x0000000105102dd6 luaD_rawrunprotected +
86
8   libwireshark.6.0.2.dylib          0x0000000105103a4f luaD_pcall + 63
9   libwireshark.6.0.2.dylib          0x00000001050fed95 lua_pcallk + 229
10  libwireshark.6.0.2.dylib          0x0000000104521598 0x104473000 + 714136
11  libwireshark.6.0.2.dylib          0x0000000104521704 0x104473000 + 714500
12  libwireshark.6.0.2.dylib          0x00000001045218fa 0x104473000 + 715002
13  libwireshark.6.0.2.dylib          0x0000000104521d06 0x104473000 + 716038
14  org.wireshark.Wireshark           0x000000010332ff9f
MainWindow::on_actionAnalyzeReloadLuaPlugins_triggered() + 43
15  org.wireshark.Wireshark           0x00000001034ecf02
MainWindow::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 5690
16  org.wireshark.Wireshark           0x00000001034ee64a
MainWindow::qt_metacall(QMetaObject::Call, int, void**) + 78
17  QtCore                            0x00000001084e496f
QMetaObject::activate(QObject*, int, int, void**) + 1359
18  QtWidgets                         0x0000000103b601d4
QAction::activate(QAction::ActionEvent) + 260
19  QtWidgets                         0x0000000103b6065f 0x103b3b000 + 153183
20  QtCore                            0x00000001084e4b6f
QMetaObject::activate(QObject*, int, int, void**) + 1871
21  libqcocoa.dylib                   0x000000010ad3c38f 0x10ad19000 + 144271
22  libsystem_trace.dylib             0x00007fff914df07a _os_activity_initiate
+ 75
23  com.apple.AppKit                  0x00007fff8ab4351d -[NSApplication
sendAction:to:from:] + 460
24  com.apple.AppKit                  0x00007fff8ab432b7 -[NSMenuItem
_corePerformAction] + 336
25  com.apple.AppKit                  0x00007fff8ab43017 -[NSCarbonMenuImpl
performActionWithHighlightingForItemAtIndex:] + 114
26  libsystem_trace.dylib             0x00007fff914df07a _os_activity_initiate
+ 75
27  com.apple.AppKit                  0x00007fff8ab41f05 -[NSMenu
performKeyEquivalent:] + 357
28  com.apple.AppKit                  0x00007fff8ab410aa -[NSApplication
_handleKeyEquivalent:] + 920
29  com.apple.AppKit                  0x00007fff8aa5950f -[NSApplication
sendEvent:] + 4274
30  libqcocoa.dylib                   0x000000010ad3bf6e 0x10ad19000 + 143214
31  com.apple.AppKit                  0x00007fff8a98c03a -[NSApplication run] +
796
32  libqcocoa.dylib                   0x000000010ad385e4 0x10ad19000 + 128484
33  QtCore                            0x00000001084ad9ad
QEventLoop::exec(QFlags<QEventLoop::ProcessEventsFlag>) + 381
34  QtCore                            0x00000001084b0ee7
QCoreApplication::exec() + 359
35  org.wireshark.Wireshark           0x0000000103195af5 main + 5445
36  org.wireshark.Wireshark           0x0000000103193f54 start + 52


You are receiving this mail because:
  • You are watching all bug changes.