https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6078
Summary: Tweaked NFSv4 packet dissectors for wireshark
Product: Web sites
Version: N/A
Platform: Other
OS/Version: All
Status: NEW
Severity: Major
Priority: Low
Component: Source code repository - anonsvn.wireshark.org
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: steved@xxxxxxxxxx
Created an attachment (id=6594)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=6594)
Proposed Patch to tweek the NFSv4 dissectors
Build Information:
$ ./tshark -v
TShark 1.7.0 (SVN Rev 37301 from /trunk)
Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GLib 2.28.6, with libpcap 1.1.1, without libz, with
POSIX
capabilities (Linux), without libpcre, with SMI 0.4.8, without c-ares, without
ADNS, with Lua 5.1, with Python, with GnuTLS 2.10.5, with Gcrypt 1.4.6, with
MIT
Kerberos, with GeoIP.
Running on Linux 2.6.38.8-32.fc15.x86_64, with libpcap version 1.1.1.
Built using gcc 4.6.0 20110428 (Red Hat 4.6.0-6).
--
Hello,
Here are a couple tweaks to the NFSv4 dissectors
that will show all the ops and their status on in the
packet detail window. Showing all the ops in that
window I think works well the new configuration
of only showing 'significant' v4 opts in the packet
list window. Plus there is plenty of real estate
on that line.
I also put NFS4_OP_SEQUENCE on the same tier as NFS4_OP_PUTFH
since when NFSv4.1 is used, the SEQUENCE will in every
compound like PUTFHs are.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.