Wireshark-users: Re: [Wireshark-users] tshark overrun?
From: Eric Ewanco <Eric.Ewanco@xxxxxxxxxxx>
Date: Thu, 17 Nov 2011 13:08:08 +0000
Ah. That makes sense now that you say it but I didn't make the connection. Thanks for clarifying; I'll pursue that. Sorry for the confusion. Eric -----Original Message----- From: wireshark-users-bounces@xxxxxxxxxxxxx [mailto:wireshark-users-bounces@xxxxxxxxxxxxx] On Behalf Of Jaap Keuter Sent: Wednesday, November 16, 2011 5:51 PM To: Community support list for Wireshark Subject: Re: [Wireshark-users] tshark overrun? Hi, You are aware that it's libpcap that does the actual capturing? See the keynote given by Steve McCanne, 'the guy who made it', at SharkFest'11: http://sharkfest.wireshark.org/sharkfest.11/ Dive into that stuff to see what intricate details come into play here. Thanks, Jaap On Wed, 16 Nov 2011 14:51:42 +0000, Eric Ewanco wrote: > I'm seeing a very strange problem and I'm curious to see if anyone has > run across it. > > We're trying to do a simple loopback test: Generate 1000 UDP packets > using pacgen at 50 pps, loop them back, and count them with tshark > (1.4.2-1.1-1). > > The problem is under most circumstances tshark ignores about 379 > packets, that is to say, it counts 621 packets and stops, even though > the packets are received at the interface. Often it will work one > time, and then have trouble on subsequent runs. > > The problem appears to be timing related (see below). My version of > tshark can't seem to handle bursts of tightly-spaced packets under > some circumstances. Is there a known bug with a source patch that > doesn't require upgrading our Linux distribution (OpenSuSE 11.1)? > > The "lost" packets are counted by ifconfig and not accounted for by > any of the dropped counters in /proc/net/snmp or other places in > /proc/net, but tshark doesn't recognize them. The capture file > corresponds to the printed counts; the lost packets do not show up > there. I can even do a capture on the transmit side and find more > packets received on the receive side than are counted by tshark on the > transmit side. However, if I monitor both transmit and receive, the > dynamics change and it almost works; I lose only about a dozen > packets. > > If I use tcpdump instead of tshark, everything is copacetic. It also > works fine when I transmit an identical packet to tshark using a > different program (hping3). Dumpcap works better but still loses > packets on several runs (drops of 28, 12, 70 out of five runs of 1000 > packets). > > Command line: > > tshark -i eth5 udp -c 1000 -w /tmp/eth5.cap > > It seems to be there has to be some sort of timing issue. According to > the capture log, the first 50 packets are received over the course of > 470 us about 5-15 us apart. Then the pacgen transmitter waits about > one second 100 us and transmits another 50. When I do a flood ping > (which works fine), the rate is much lower, every 200 ms or so. If I > do a flood ping with hping3 (which works, at least until I get to > hundreds of thousands of packets, and then it loses only 0.05%), it > sometimes has a similar gap to pacgen, but it doesn't sustain it and > leaves large gaps pacgen does not leave. I did notice that if I slow > pacgen down to 25 or 10 pps, it works more reliably, although even at > ten pps I've occasionally seen a loss. > > Platform is a customized OpenSuSE 11.1 on Intel. I verified this using > stock Wireshark on a stock OpenSuSE 11.3 laptop with similar results. > > We've tested 0.10.13, 1.2.4, 1.2.8, and 1.4.4-0.2-1 in addition to > 1.4.2-1.1-1. Because of its dependencies we can't use a later > wireshark; but if we can cherry-pick a fix we may do that. Using > 0.10.13 and 1.2.4 seems to work fine; the other two fail. > > I checked the bug database for bugs in any state with summary or > comment with search terms "burst", "drops", "dropped", "overrun", > "loses", and "lost". If you can suggest any others (I find this is a > difficult bug to come up with keywords for) feel free to do so. > > Thanks for any help. > > bl-s1r1-24:~/hardware_test # tshark -v > > TShark 1.4.2 > > Copyright 1998-2010 Gerald Combs and contributors. > > This is free software; see the source for copying conditions. There is > NO > > warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR > PURPOSE. > > Compiled (64-bit) with GLib 2.18.2, with libpcap 0.9-PRE-CVS, with > libz 1.2.3, > > with POSIX capabilities (Linux), with libpcre (version unknown), > without SMI, > > without c-ares, with ADNS, with Lua 5.1, without Python, with GnuTLS > 2.4.1, with > > Gcrypt 1.4.1, with MIT Kerberos, without GeoIP. > > Running on Linux 2.6.34.4-gb05, with libpcap version 0.9-PRE-CVS, with > libz > > 1.2.3. > > Built using gcc 4.3.2 [gcc-4_3-branch revision 141291]. > ___________________________________________________________________________ Sent via: Wireshark-users mailing list <wireshark-users@xxxxxxxxxxxxx> Archives: http://www.wireshark.org/lists/wireshark-users Unsubscribe: https://wireshark.org/mailman/options/wireshark-users mailto:wireshark-users-request@xxxxxxxxxxxxx?subject=unsubscribe
- References:
- [Wireshark-users] tshark overrun?
- From: Eric Ewanco
- Re: [Wireshark-users] tshark overrun?
- From: Jaap Keuter
- [Wireshark-users] tshark overrun?
- Prev by Date: [Wireshark-users] what precision can one expect in wireshark generation the statistic?
- Next by Date: Re: [Wireshark-users] tshark overrun?
- Previous by thread: Re: [Wireshark-users] tshark overrun?
- Next by thread: Re: [Wireshark-users] tshark overrun?
- Index(es):