Bug 502672
Summary: | [RHEL5] wireshark start-up very slow when forwarding X11 over ssh | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | Jeff Bastian <jbastian> | ||||||
Component: | wireshark | Assignee: | Jan Safranek <jsafrane> | ||||||
Status: | CLOSED CURRENTRELEASE | QA Contact: | BaseOS QE <qe-baseos-auto> | ||||||
Severity: | medium | Docs Contact: | |||||||
Priority: | high | ||||||||
Version: | 5.3 | CC: | ksrot, spoyarek | ||||||
Target Milestone: | rc | ||||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2012-04-16 06:50:28 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | |||||||||
Bug Blocks: | 743405, 807971 | ||||||||
Attachments: |
|
Description
Jeff Bastian
2009-05-26 20:37:13 UTC
Created attachment 345518 [details]
patch to increase update interval to 1 second
Created attachment 345519 [details]
patch to increase update interval to 1 second for non-local $DISPLAY
Also from Siddhesh, a slow network can be simulated with cbq (provided by iproute) on the local system (the system displaying Wireshark, not running it). 1. Create an /etc/sysconfig/cbq/cbq-0010.rules file with contents similar to the following. Make adjustments to DEVICE and RULE as necessary. DEVICE=eth0,100Mbit,10Mbit RATE=20Kbit WEIGHT=2Kbit PRIO=5 RULE=192.168.1.0/24 2. su -c '/sbin/cbq restart' Thanks for your report. THis has been resolved upstream but I'll keep this bug open so it can be mentioned in next wireshark update. This request was evaluated by Red Hat Product Management for inclusion, but this component is not scheduled to be updated in the current Red Hat Enterprise Linux release. If you would like this request to be reviewed for the next minor release, ask your support representative to set the next rhel-x.y flag to "?". This request was evaluated by Red Hat Product Management for inclusion in the current release of Red Hat Enterprise Linux. Because the affected component is not scheduled to be updated in the current release, Red Hat is unfortunately unable to address this request at this time. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. This request was evaluated by Red Hat Product Management for inclusion in the current release of Red Hat Enterprise Linux. Because the affected component is not scheduled to be updated in the current release, Red Hat is unfortunately unable to address this request at this time. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. This request was evaluated by Red Hat Product Management for inclusion in the current release of Red Hat Enterprise Linux. Because the affected component is not scheduled to be updated in the current release, Red Hat is unfortunately unable to address this request at this time. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux release for currently deployed products. This request is not yet committed for inclusion in a release. Since this has been already fixed upstream and we have the fixes applied in wireshark-1.0.15, is there any reason for keeping this bug open? This probably should have been closed with the rebase to 1.0.15 in bug 612239 |