SHA256
1
0
forked from pool/wireshark
wireshark/wireshark-nfsv4-opts.patch
Pavol Rusnak dbddd0d7b0 - updated to 1.4.3
- security fixes:
     o MAC-LTE dissector could overflow a buffer
     o ENTTEC dissector could overflow a buffer
     o ASN.1 BER dissector could assert and make Wireshark exit prematurely
  - bug fixes:
     o AMQP failed assertion
     o Reassemble.c leaks memory for GLIB > 2.8
     o Fuzz testing reports possible dissector bug: TCP
     o Wrong length calculation in new_octet_aligned_subset_bits()
     o Function dissect_per_bit_string_display might read more bytes
       than available
     o Wireshark crashes with Copy -> Description on date/time fields
     o DHCPv6 OPTION_CLIENT_FQDN parse error
     o Information element Error for supported channels
     o Assert when using ASN.1 dissector with loading a 'type table'
     o Bug with RWH parsing in Infiniband dissector
     o Help->About Wireshark mis-reports OS
     o Delegated-IPv6-Prefix(123) is shown incorrect as
       X-Ascend-Call-Attempt-Limit(123)
     o "tshark -r file -T fields" is truncating exported data
     o gsm_a_dtap: incorrect "Extraneous Data" when decoding Packet
       Flow Identifier
     o Improper decode of TLS 1.2 packet containing both
       CertificateRequest and ServerHelloDone messages
     o LTE-PDCP UL and DL problem
     o CIGI 3.2/3.3 support broken
     o Prepare Filter in RTP Streams dialog does not work correctly.
     o Wrong decode at ethernet OAM Y.1731 ETH-CC

OBS-URL: https://build.opensuse.org/package/show/network:utilities/wireshark?expand=0&rev=34
2011-02-15 13:04:22 +00:00

66 lines
2.1 KiB
Diff

Index: wireshark-1.4.3/epan/dissectors/packet-nfs.c
===================================================================
--- wireshark-1.4.3.orig/epan/dissectors/packet-nfs.c
+++ wireshark-1.4.3/epan/dissectors/packet-nfs.c
@@ -8795,6 +8795,8 @@ dissect_nfs_argop4(tvbuff_t *tvb, int of
ftree = proto_item_add_subtree(fitem, ett_nfs_argop4);
}
+ proto_item_append_text(tree, ", Ops(%d):", ops);
+
for (ops_counter=0; ops_counter<ops; ops_counter++)
{
opcode = tvb_get_ntohl(tvb, offset);
@@ -8824,6 +8826,15 @@ dissect_nfs_argop4(tvbuff_t *tvb, int of
break;
}
+ if (opcode != NFS4_OP_PUTFH) {
+ if (check_col(pinfo->cinfo, COL_INFO)) {
+ col_append_fstr(pinfo->cinfo, COL_INFO, " %s",
+ names_nfsv4_operation[opcode - 3].strptr);
+ }
+ }
+ proto_item_append_text(tree, " %s",
+ names_nfsv4_operation[opcode - 3].strptr);
+
switch(opcode)
{
case NFS4_OP_ACCESS:
@@ -9290,6 +9301,8 @@ dissect_nfs_resop4(tvbuff_t *tvb, int of
ftree = proto_item_add_subtree(fitem, ett_nfs_resop4);
}
+ proto_item_append_text(tree, ", Ops(%d):", ops);
+
for (ops_counter = 0; ops_counter < ops; ops_counter++)
{
opcode = tvb_get_ntohl(tvb, offset);
@@ -9321,6 +9334,17 @@ dissect_nfs_resop4(tvbuff_t *tvb, int of
offset = dissect_nfs_nfsstat4(tvb, offset, newftree, &status);
+ if (check_col(pinfo->cinfo, COL_INFO)) {
+ if (status != NFS4_OK) {
+ col_append_fstr(pinfo->cinfo, COL_INFO, " %s(%d)",
+ names_nfsv4_operation[opcode - 3].strptr, status);
+ } else if (opcode != NFS4_OP_PUTFH) {
+ col_append_fstr(pinfo->cinfo, COL_INFO, " %s",
+ names_nfsv4_operation[opcode - 3].strptr);
+ }
+ }
+ proto_item_append_text(tree, " %s(%d)",
+ names_nfsv4_operation[opcode - 3].strptr, status);
/*
* With the exception of NFS4_OP_LOCK, NFS4_OP_LOCKT, and
* NFS4_OP_SETATTR, all other ops do *not* return data with the
@@ -9665,7 +9689,7 @@ static const value_string nfsv3_proc_val
static const vsff nfs4_proc[] = {
{ 0, "NULL",
dissect_nfs3_null_call, dissect_nfs3_null_reply },
- { 1, "COMPOUND",
+ { 1, "COMP",
dissect_nfs4_compound_call, dissect_nfs4_compound_reply },
{ 0, NULL, NULL, NULL }
};