Wireshark-bugs: [Wireshark-bugs] [Bug 8081] Label NFS Dissector
Date: Tue, 11 Dec 2012 23:01:46 +0000

Comment # 3 on bug 8081 from
Created attachment 9671 [details]
Two packets that will exercise the  new code

Here is what to look for:

Network File System, Ops(2): PUTFH GETATTR
    [Program Version: 4]
    [V4 Procedure: COMPOUND (1)]
    Status: NFS4_OK (0)
    Tag: <EMPTY>
        length: 0
        contents: <EMPTY>
    Operations (count: 2)
        Opcode: PUTFH (22)
        Opcode: GETATTR (9)
            Status: NFS4_OK (0)
            GETATTR4res
                resok4
                    obj_attributes
                        attrmask
                            bitmap[0] = 0x0010011a
                            bitmap[1] = 0x0030a23a
                            bitmap[2] = 0x00020000
                                [1 attribute requested]
>                               recc_attr: FATTR4_SECURITY_LABEL (81)
                        attr_vals
                            mand_attr: FATTR4_TYPE (1)
                            mand_attr: FATTR4_CHANGE (3)
                            mand_attr: FATTR4_SIZE (4)
                            mand_attr: FATTR4_FSID (8)
                            recc_attr: FATTR4_FILEID (20)
                            recc_attr: FATTR4_MODE (33)
                            recc_attr: FATTR4_NUMLINKS (35)
                            recc_attr: FATTR4_OWNER (36)
                            recc_attr: FATTR4_OWNER_GROUP (37)
                            recc_attr: FATTR4_RAWDEV (41)
                            recc_attr: FATTR4_SPACE_USED (45)
                            recc_attr: FATTR4_TIME_ACCESS (47)
                            recc_attr: FATTR4_TIME_METADATA (52)
                            recc_attr: FATTR4_TIME_MODIFY (53)
                            recc_attr: FATTR4_SECURITY_LABEL (81)
>                               label_format: 0
>                               policy_id: 0
>                               context: system_u:object_r:home_root_t:s0
>                                   length: 33
>                                   contents: system_u:object_r:home_root_t:s0
>                                   fill bytes: opaque data
        [Main Opcode: GETATTR (9)]


You are receiving this mail because:
  • You are watching all bug changes.