Bug ID |
11654
|
Summary |
NLM v4 statistics crash
|
Product |
Wireshark
|
Version |
1.12.8
|
Hardware |
x86
|
OS |
Windows 8.1
|
Status |
UNCONFIRMED
|
Severity |
Normal
|
Priority |
Low
|
Component |
GTK+ UI
|
Assignee |
bugzilla-admin@wireshark.org
|
Reporter |
dbaril@panasas.com
|
Created attachment 13957 [details]
NLM packets that reproduce Service Response Time crash
Build Information:
Version 1.12.8 (v1.12.8-0-g5b6e543 from master-1.12)
Copyright 1998-2015 Gerald Combs <gerald@wireshark.org> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GTK+ 2.24.23, with Cairo 1.10.2, with Pango 1.34.0, with
GLib 2.38.0, with WinPcap (4_1_3), with libz 1.2.5, with SMI 0.4.8, with c-ares
1.9.1, with Lua 5.2, without Python, with GnuTLS 3.2.15, with Gcrypt 1.6.2,
without Kerberos, with GeoIP, with PortAudio V19-devel (built Oct 14 2015),
with
AirPcap.
Running on 64-bit Windows 8.1, build 9600, with WinPcap version 4.1.3
(packet.dll version 4.1.0.2980), based on libpcap version 1.0 branch 1_0_rel0b
(20091008), GnuTLS 3.2.15, Gcrypt 1.6.2, without AirPcap.
Intel(R) Core(TM) i5-4310U CPU @ 2.00GHz, with 16289MB of physical memory.
Built using Microsoft Visual C++ 10.0 build 40219
Wireshark is Open Source Software released under the GNU General Public
License.
Check the man page and http://www.wireshark.org for more information.
--
Troubleshooting NFS V3, with lockd/statd
Lockd is using NLM v4, statd is using STAT v1.
Selecting
Statistics->Service Response Time-> ONC-RPC
Program->NLM
Version->4
Crashes. Input pcap file from a Mac OS X tcpdump. There ARE NLM v4 packets in
the capture file. If you select v1 or v2, the statistics are run, finding no
packets (correct). Wireshark crashes if version = 3 (with no matches in
capture). Wireshark crashes if version = 4, with matches in capture file.
The filter
ip.proto==17 && rpc.program==100021 && rpc.programversion==4 will filter the
capture file and show all the NLM v4 packets, but you can not run the
"Statistics" function to generate a report.
You CAN use Statistics->Service Response Time with ONC-RPC, NFS V3 correctly.
You can also use Statistics->Service Response Time with STAT v1 correctly which
is very similar to NLM
The filter:
ip.proto==17 && rpc.program==100024 && rpc.programversion==1 displays the STAT
packets (of which there are very few).
This appears to be a bug in the ONC-RPC/NLM statistics reporting, for version 3
or 4.
The attached pcap file, with just NLM packets will reproduce the problem.
The Windows event log shows the following information.
Log Name: Application
Source: Application Error
Date: 10/29/2015 6:21:36 PM
Event ID: 1000
Task Category: (100)
Level: Error
Keywords: Classic
User: N/A
Computer: dbaril-e5440.int.panasas.com
Description:
Faulting application name: Wireshark.exe, version: 1.12.8.0, time stamp:
0x561e90db
Faulting module name: libglib-2.0-0.dll, version: 2.38.0.0, time stamp:
0xbabababa
Exception code: 0x40000015
Fault offset: 0x00000000000372df
Faulting process id: 0x1b4
Faulting application start time: 0x01d1129812104c09
Faulting application path: C:\Program Files\Wireshark\Wireshark.exe
Faulting module path: C:\Program Files\Wireshark\libglib-2.0-0.dll
Report Id: 6a71aada-7e8b-11e5-82b0-4851b708a5a7
Faulting package full name:
Faulting package-relative application ID:
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Application Error" />
<EventID Qualifiers="0">1000</EventID>
<Level>2</Level>
<Task>100</Task>
<Keywords>0x80000000000000</Keywords>
<TimeCreated SystemTime="2015-10-29T22:21:36.000000000Z" />
<EventRecordID>104847</EventRecordID>
<Channel>Application</Channel>
<Computer>dbaril-e5440.int.panasas.com</Computer>
<Security />
</System>
<EventData>
<Data>Wireshark.exe</Data>
<Data>1.12.8.0</Data>
<Data>561e90db</Data>
<Data>libglib-2.0-0.dll</Data>
<Data>2.38.0.0</Data>
<Data>babababa</Data>
<Data>40000015</Data>
<Data>00000000000372df</Data>
<Data>1b4</Data>
<Data>01d1129812104c09</Data>
<Data>C:\Program Files\Wireshark\Wireshark.exe</Data>
<Data>C:\Program Files\Wireshark\libglib-2.0-0.dll</Data>
<Data>6a71aada-7e8b-11e5-82b0-4851b708a5a7</Data>
<Data>
</Data>
<Data>
</Data>
</EventData>
</Event>
You are receiving this mail because:
- You are watching all bug changes.