diff options
author | Jeff Morriss <jeff.morriss.ws@gmail.com> | 2016-04-27 15:46:25 -0400 |
---|---|---|
committer | Michael Mann <mmann78@netscape.net> | 2016-04-27 21:43:08 +0000 |
commit | ab6c9f2e2b8898a1592dafacd34cf1fff7ef20b3 (patch) | |
tree | 823c0d5554dc8644e40a8a4352de0475b9dd552f | |
parent | ac6fdef87af5b60fcbcb7002a2485ddb8c1b1682 (diff) |
Fix "Follow TCP stream" when TCP desegmentation is disabled.
Bug: 12382
Change-Id: I52a4c78cd0d901b8c28106bf33627a3f956b5e48
Reviewed-on: https://code.wireshark.org/review/15133
Reviewed-by: Michael Mann <mmann78@netscape.net>
-rw-r--r-- | epan/dissectors/packet-tcp.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/epan/dissectors/packet-tcp.c b/epan/dissectors/packet-tcp.c index b53729a71e..e43150d897 100644 --- a/epan/dissectors/packet-tcp.c +++ b/epan/dissectors/packet-tcp.c @@ -5159,7 +5159,7 @@ dissect_tcp_payload(tvbuff_t *tvb, packet_info *pinfo, int offset, guint32 seq, /* Give the follow tap what we've currently dissected */ if(have_tap_listener(tcp_follow_tap)) { - tap_queue_packet(tcp_follow_tap, pinfo, tvb_new_subset_length(tvb, 0, offset)); + tap_queue_packet(tcp_follow_tap, pinfo, tvb_new_subset_remaining(tvb, offset)); } process_tcp_payload(tvb, offset, pinfo, tree, tcp_tree, sport, dport, |