Commits on Source (15)
-
Add checks for illegal message lengths which could possibly cause an infinite loop in malformed packets with message size = 0.
-
Gerald Combs authored
Use "host" to match libsinsp.
-
Gerald Combs authored
-
Guy Harris authored
The joys of dealing with history....
-
Gerald Combs authored
Make sure we check our minimum macOS version when we check our Qt version so that we don't clobber the value set by CMAKE_OSX_DEPLOYMENT_TARGET.
-
John Thacker authored
In many grammatical contexts fields are only tested for existence instead of loading the values into a register, because that's all that is needed to determine if a filter passes or not. Add a dfilter option to load the field values from the tree and return them when a field (including field at a certain protocol layer) is the root of the filter syntax tree. This is useful for columns, especially for parsing columns defined with the layer operator, but it can't completely replace the current custom column handling because we don't yet return exactly which hfinfo was present, if more than one has the same abbreviation, and it's possible for fields with the same abbreviation to have different strings, and hence different "resolved" values. $ ./run/dftest -s "@ip.proto#1" Filter: @ip.proto#1 Syntax tree: 0 FIELD(@ip.proto#[1:1] <FT_BYTES>) Instructions: 0000 CHECK_EXISTS_R ip.proto#[1:1] 0001 RETURN $ ./run/dftest -s "@ip.proto#1" --return-vals Filter: @ip.proto#1 Syntax tree: 0 FIELD(@ip.proto#[1:1] <FT_BYTES>) Instructions: 0000 READ_TREE_R @ip.proto#[1:1] -> R0 0001 NO_OP 0002 RETURN R0 Related to #18588
-
Guy Harris authored
They do the same thing, but this makes it clear that we're taking a value in host byte order and converting it to network byte order.
-
Gerald Combs authored
Run `launchctl bootout` prior to running `launchctl bootstrap`. This should hopefully avoid the error Bootstrap failed: 5: Input/output error if we're already bootstrapped and keep the postinstall script from failing. Fixes #19527
-
Guy Harris authored
WTAP_ENCAP_SOCKETCAN suffices, and doesn't add a bunch of upper PDU tags that provide no additional information. While we're at it, rename candump_write_packet() to candump_gen_packet(), as it doesn't write anything to a file.
-
The X11 dissector was manually updated to static-ify some symbols, but this was done without updating the scripts used to generate that dissector. Let's temporarily roll back those changes so we can cleanly update the X11 dissector.
-
mesa version 24.0-branchpoint-1188-gc3062e3402f xcbproto version xcb-proto-1.16.0-2-g1388374 Add GestureClass to the unused structures list.
-
Many of the generated "const" fields can be made static. For local variables, this means that the compiler will no longer emit code to allocate the structure on the stack and initialize it upon each function entry -- 29 kBytes of code in total gets removed by this change -- which is surely a performance win when dissecting this protocol. Interestingly, libwireshark.so ends up growing overall due to the addition of 52 kBytes of relocation entries to patch up references within the relocatable read-only data section. Clearly the generated code was more space-efficient than the relocation entries...
-
Martin Mathieson authored
-
-
Since DRBD 9.2.6, a load-balancing transport is available for DRBD. This is called "lb-tcp". Add support for dissecting this format. This transport is a wrapper around the plain DRBD format. Each lb-tcp packet contains part of this DRBD stream. The DRBD packets may be broken across multiple lb-tcp packets. Conversely, one lb-tcp packet may contain multiple DRBD packets. One lb-tcp connection consists of multiple TCP streams. We cannot rely on having all of these streams in the capture. Even when we do, it is difficult to associate them with each other. Hence we decode each TCP stream separately and accept that we may not be able to dissect every DRBD packet fully. In practice, most lb-tcp payloads do start on a DRBD packet boundary, so the result is still very usable.
Showing
- CMakeLists.txt 4 additions, 4 deletionsCMakeLists.txt
- dftest.c 9 additions, 1 deletiondftest.c
- epan/dfilter/dfilter.h 3 additions, 0 deletionsepan/dfilter/dfilter.h
- epan/dfilter/gencode.c 23 additions, 1 deletionepan/dfilter/gencode.c
- epan/dissectors/packet-drbd.c 164 additions, 23 deletionsepan/dissectors/packet-drbd.c
- epan/dissectors/packet-kafka.c 1 addition, 1 deletionepan/dissectors/packet-kafka.c
- epan/dissectors/packet-ocp1.c 34 additions, 10 deletionsepan/dissectors/packet-ocp1.c
- epan/dissectors/packet-socketcan.c 11 additions, 2 deletionsepan/dissectors/packet-socketcan.c
- epan/dissectors/packet-umts_fp.c 3 additions, 3 deletionsepan/dissectors/packet-umts_fp.c
- epan/dissectors/x11-declarations.h 83 additions, 0 deletionsepan/dissectors/x11-declarations.h
- epan/dissectors/x11-enum.h 12 additions, 1 deletionepan/dissectors/x11-enum.h
- epan/dissectors/x11-extension-errors.h 23 additions, 18 deletionsepan/dissectors/x11-extension-errors.h
- epan/dissectors/x11-extension-implementation.h 749 additions, 266 deletionsepan/dissectors/x11-extension-implementation.h
- epan/dissectors/x11-glx-render-enum.h 1 addition, 3 deletionsepan/dissectors/x11-glx-render-enum.h
- epan/dissectors/x11-register-info.h 83 additions, 0 deletionsepan/dissectors/x11-register-info.h
- packaging/macosx/ChmodBPF/install-scripts/postinstall 5 additions, 0 deletionspackaging/macosx/ChmodBPF/install-scripts/postinstall
- plugins/epan/falco_bridge/packet-falco-bridge.c 3 additions, 1 deletionplugins/epan/falco_bridge/packet-falco-bridge.c
- tools/check_spelling.py 29 additions, 10 deletionstools/check_spelling.py
- tools/process-x11-xcb.pl 4 additions, 3 deletionstools/process-x11-xcb.pl
- wiretap/busmaster.c 2 additions, 2 deletionswiretap/busmaster.c
This diff is collapsed.