[prev in list] [next in list] [prev in thread] [next in thread]
List: wireshark-bugs
Subject: [Wireshark-bugs] [Bug 9710] New: allow tshark to read from pipe
From: bugzilla-daemon () wireshark ! org
Date: 2014-01-30 9:23:35
Message-ID: bug-9710-15 () https ! bugs ! wireshark ! org/bugzilla/
[Download RAW message or body]
--1391073818.Caedf2071.20658
Date: Thu, 30 Jan 2014 09:23:38 +0000
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id—10
Bug ID: 9710
Summary: allow tshark to read from pipe
Classification: Unclassified
Product: Wireshark
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: Major
Priority: Low
Component: TShark
Assignee: bugzilla-admin@wireshark.org
Reporter: phatina@redhat.com
Created attachment 12521
--> https://bugs.wireshark.org/bugzilla/attachment.cgi?id521&actioníit
Proposed patch for reading from pipes
Build Information:
TShark 1.11.3 (SVN Rev 54974 from /trunk)
Copyright 1998-2014 Gerald Combs <gerald@wireshark.org> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GLib 2.38.2, with libpcap, with libz 1.2.8, with POSIX
capabilities (Linux), without libnl, with SMI 0.4.8, with c-ares 1.10.0, with
Lua 5.2, without Python, with GnuTLS 3.1.18, with Gcrypt 1.5.3, with MIT
Kerberos, with GeoIP.
Running on Linux 3.12.8-300.fc20.x86_64, with locale en_US.UTF-8, with libpcap
version 1.5.3, with libz 1.2.8.
Intel(R) Core(TM) i7-3520M CPU @ 2.90GHz
Built using gcc 4.8.2 20131212 (Red Hat 4.8.2-7).
--
Tshark currently can't read from a pipe. E.g., when using process substitution,
this crashes: tshark -r <(xzcat large_file.pcapng.xz)
Proposed patch makes tshark work, when reading from pipe.
--
You are receiving this mail because:
You are watching all bug changes.
--1391073818.Caedf2071.20658
Date: Thu, 30 Jan 2014 09:23:38 +0000
MIME-Version: 1.0
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
<html>
<head>
<base href="https://bugs.wireshark.org/bugzilla/" />
<style>
body, th, td {
font-size: 12px;
font-family: Arial, Helvetica, sans-serif; }
p, pre { margin-top: 1em; }
pre {
font-family: Bitstream Vera Sans Mono, Consolas, Lucida Console, \
monospace; white-space: pre-wrap;
}
table { border: 0; border-spacing: 0; border-collapse: collapse; }
th, td {
padding: 0.25em;
padding-left: 0.5em;
padding-right: 0.5em;
}
th { background: rgb(240, 240, 240); }
th.th_top { border-bottom: 1px solid rgb(116, 126, 147); }
th.th_left { border-right: 1px solid rgb(116, 126, 147); }
td.removed { background-color: #ffcccc; }
td.added { background-color: #e4ffc7; }
</style>
</head>
<body><table>
<tr>
<th class="th_left">Bug ID</th>
<td><a class="bz_bug_link
bz_status_UNCONFIRMED "
title="UNCONFIRMED - allow tshark to read from pipe"
href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9710">9710</a>
</td>
</tr>
<tr>
<th class="th_left">Summary</th>
<td>allow tshark to read from pipe
</td>
</tr>
<tr>
<th class="th_left">Classification</th>
<td>Unclassified
</td>
</tr>
<tr>
<th class="th_left">Product</th>
<td>Wireshark
</td>
</tr>
<tr>
<th class="th_left">Version</th>
<td>unspecified
</td>
</tr>
<tr>
<th class="th_left">Hardware</th>
<td>All
</td>
</tr>
<tr>
<th class="th_left">OS</th>
<td>All
</td>
</tr>
<tr>
<th class="th_left">Status</th>
<td>UNCONFIRMED
</td>
</tr>
<tr>
<th class="th_left">Severity</th>
<td>Major
</td>
</tr>
<tr>
<th class="th_left">Priority</th>
<td>Low
</td>
</tr>
<tr>
<th class="th_left">Component</th>
<td>TShark
</td>
</tr>
<tr>
<th class="th_left">Assignee</th>
<td>bugzilla-admin@wireshark.org
</td>
</tr>
<tr>
<th class="th_left">Reporter</th>
<td>phatina@redhat.com
</td>
</tr></table>
<p>
<div>
<pre>Created <span class=""><a href="attachment.cgi?id=12521&action=diff" \
name="attach_12521" title="Proposed patch for reading from pipes">attachment \
12521</a> <a href="attachment.cgi?id=12521&action=edit" title="Proposed patch for \
reading from pipes">[details]</a></span> Proposed patch for reading from pipes
Build Information:
TShark 1.11.3 (SVN<a \
href="http://anonsvn.wireshark.org/viewvc?view=revision&revision=54974">Rev 54974</a> \
from /trunk)
Copyright 1998-2014 Gerald Combs <<a \
href="mailto:gerald@wireshark.org">gerald@wireshark.org</a>> and \
contributors. This is free software; see the source for copying conditions. There is \
NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GLib 2.38.2, with libpcap, with libz 1.2.8, with POSIX
capabilities (Linux), without libnl, with SMI 0.4.8, with c-ares 1.10.0, with
Lua 5.2, without Python, with GnuTLS 3.1.18, with Gcrypt 1.5.3, with MIT
Kerberos, with GeoIP.
Running on Linux 3.12.8-300.fc20.x86_64, with locale en_US.UTF-8, with libpcap
version 1.5.3, with libz 1.2.8.
Intel(R) Core(TM) i7-3520M CPU @ 2.90GHz
Built using gcc 4.8.2 20131212 (Red Hat 4.8.2-7).
--
Tshark currently can't read from a pipe. E.g., when using process substitution,
this crashes: tshark -r <(xzcat large_file.pcapng.xz)
Proposed patch makes tshark work, when reading from pipe.</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>
--1391073818.Caedf2071.20658--
___________________________________________________________________________
Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives: http://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://wireshark.org/mailman/options/wireshark-bugs
mailto:wireshark-bugs-request@wireshark.org?subject=unsubscribe
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic