File too large
(Summarize the bug encountered concisely)
Steps to reproduce
(How one can reproduce the issue - this is very important) Monitoring wlan0 for ssh connections
What is the current bug behavior?
(What actually happens) Bug report notified
What is the expected correct behavior?
(What you should see instead)
Sample capture file
(If possible attach a sample capture file showing this issue)
Relevant logs and/or screenshots
(Paste any relevant logs) ``An error occurred while writing to the file to which the capture was being saved ("/tmp/wireshark_wlan0_20210319094606_neZfrd.pcapng"): File too large.` ## Build information
(In Wireshark, select Help->About Wireshark from the main menu and use the button "Copy To Clipboard". Please paste the complete output here. Or from the command line, run
tshark -v or
Copyright 1998-2019 Gerald Combs <email@example.com> and contributors. License GPLv2+: GNU GPL version 2 or later <http://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Compiled (32-bit) with Qt 5.11.3, with libpcap, with POSIX capabilities (Linux), with libnl 3, with GLib 2.58.3, with zlib 1.2.11, with SMI 0.4.8, with c-ares 1.14.0, with Lua 5.2.4, with GnuTLS 3.6.6, with Gcrypt 1.8.4, with MIT Kerberos, with MaxMind DB resolver, with nghttp2 1.36.0, with LZ4, with Snappy, with libxml2 2.9.4, with QtMultimedia, with SBC, with SpanDSP, without bcg729. Running on Linux 5.4.79-v7l+, with 3776 MB of physical memory, with locale en_GB, with libpcap version 1.8.1, with GnuTLS 3.6.7, with Gcrypt 1.8.4, with zlib 1.2.11, binary plugins supported (0 loaded). Built using gcc 8.2.0.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information