Took a look at the patch!
Looks like you have covered every FOP, other than compound? (which is not used anywhere now). Is there anything specific which you missed, where you need help to complete it?
On Fri, Jul 27, 2018 at 11:32 AM, Poornima Gurusiddaiah <pgurusid@xxxxxxxxxx> wrote:
PoornimaRegards,Hi,Here is the patch for dissecting Gluster 4.0 protocol in wireshark [1]. The initial tests for fops seem to be working. Request you all to add missing fops, fix/report any issues in decoding.
[1] https://code.wireshark.org/review/#/c/28871
_______________________________________________
Gluster-devel mailing list
Gluster-devel@xxxxxxxxxxx
https://lists.gluster.org/mailman/listinfo/gluster-devel
Amar Tumballi (amarts)
_______________________________________________ Gluster-devel mailing list Gluster-devel@xxxxxxxxxxx https://lists.gluster.org/mailman/listinfo/gluster-devel