Wireshark-bugs: [Wireshark-bugs] [Bug 10760] New: giop dissector produces Lua Error "C stack ove

Date: Sat, 06 Dec 2014 20:38:31 +0000
Bug ID 10760
Summary giop dissector produces Lua Error "C stack overflow"
Product Wireshark
Version 1.10.11
Hardware x86
OS All
Status UNCONFIRMED
Severity Normal
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Build Information:
Compiled (64-bit) with GTK+ 3.14.5, with Cairo 1.14.0, with Pango 1.36.8, with
GLib 2.42.1, with libpcap, with libz 1.2.8, with POSIX capabilities (Linux),
with libnl 3, with SMI 0.4.8, with c-ares 1.10.0, with Lua 5.2, without Python,
with GnuTLS 3.3.8, with Gcrypt 1.6.2, with MIT Kerberos, with GeoIP, with
PortAudio V19-devel (built Feb 15 2014 23:28:00), without AirPcap.

Running on Linux 3.17.4, with locale de_DE.UTF-8, with libpcap version 1.6.2,
with libz 1.2.8, GnuTLS 3.3.8, Gcrypt 1.6.2.

--
I am using the following Lua dissector to add GIOP to another Ethertype:

local myEthType = 0x89ab
do
   p_myProto = Proto("myProto", "MyProt")
   local g = Dissector.get("giop")
   function p_rus_rmp.dissector(buffer, pkt, root)
      g:call(buffer(36):tvb(), pkt, root)
   end

   -- Register our dissector
   DissectorTable.get("ethertype"):add(myEthType, p_myProto)
end

I get a "C stack overflow" when the trace files are larger (for example 50000
packets). Smaller samples (5 packets) do the job.

It used to work with Wireshark 1.8.15.
It stopped working with Wireshark 1.9.0. The versions 1.10.x and 1.12.x do not
work, too.

If I replace the "giop" with "ip" it works with the newer WS versions and large
packet numbers, too. So it must be something with GIOP.


You are receiving this mail because:
  • You are watching all bug changes.