Tyson Key
changed
bug 8818
What |
Removed |
Added |
CC |
|
tyson.key@gmail.com
|
Comment # 3
on bug 8818
from Tyson Key
Even if some folks disagree about Wireshark being the "right place" for it,
this is pretty cool in terms of presentation (better than objdump). Might
sort-of make sense for dissecting (malicious?) ELF payloads in (T)FTP/HTTP
streams, or things like firmware update sessions, FWIW.
The only snag that I can find is that the over-zealous error checking in the
build scripts causes the process to trip up with:
CC libdissectors_la-packet-elf-file.lo
packet-elf-file.c: In function 'dissect_elf':
packet-elf-file.c:993:22: error: 'dynstr_offset' may be used uninitialized in
this function [-Werror=maybe-uninitialized]
packet-elf-file.c:992:22: error: 'strtab_offset' may be used uninitialized in
this function [-Werror=maybe-uninitialized]
cc1: all warnings being treated as errors
make[5]: *** [libdissectors_la-packet-elf-file.lo] エラー 1
Was easy to work around by initialising those variables to 0, though.
Seems to load a 32-bit x86 Linux executable ("/bin/ls"), a random 32-bit MIPS
PlayStation 2 executable, and a random 64-bit PowerPC executable fine.
You are receiving this mail because:
- You are watching all bug changes.