Fwd: backing up to a Drobo CIFS VFS: Error -11 sending data on socket to server, Bufferbloat?

Robert Kudyba rkudyba at fordham.edu
Mon May 15 20:39:30 UTC 2017


>> Sorry still getting used to WS but I couldn't find (!smb2.request_in)
>> == but  (smb2.flags.response == 0) was there. Am I supposed to run
>> tshark on the exported results?
>
> Hmmm, in Wireshark it should have an area where you can enter a filter
> expression. I use the Windows version so it shows up under the icon
> bar. On Linux with the gtk version it shows up under the icon bar as
> well with the word Filter: to the left.

> In that text box enter (!smb2.request_in) && (smb2.flags.response == 0)

Yep that's what I thought here's the error:
(!smb2.request_in) && (smb2.flags.response == 0) isn't a valid display
filter: "smb2.request_in" is neither a field nor a protocol name.

> OK, you need to find the port numbers used in the early packets in the
> capture for SMB traffic. They should be 445 and another port. Use that
> other port for the expression above. If the two ports are 445 and
> 12743 then you want (tcp.port == 12743). That will isolate all packets
> on the first connection, and then you can look towards the end to see
> what is going wrong. You could even save just those packets and maybe
> send them to us (compressed).

So the filter should be this as the port # is 53854 when I just use the
"or" clause?

( (tcp.flags.reset == 1) || (tcp.flags.fin == 1) )&& (tcp.port == 53854)

Just exprting the one packet I see this:
No.     Time           Source                Destination           Protocol
Length Info
   7940 120.507576397  fedora-ws         drobo         TCP      66
53854 → 445 [FIN, ACK] Seq=277 Ack=1 Win=312 Len=0 TSval=831046843
TSecr=655916326

Frame 7940: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: HewlettP_25:8e:ee (2c:27:d7:25:8e:ee), Dst:
CheckPoi_3f:32:29 (00:1c:7f:3f:32:29)
    Destination: CheckPoi_3f:32:29 (00:1c:7f:3f:32:29)
    Source: HewlettP_25:8e:ee (2c:27:d7:25:8e:ee)
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: fedora-ws, Dst: drobo
Transmission Control Protocol, Src Port: 53854, Dst Port: 445, Seq: 277,
Ack: 1, Len: 0
    Source Port: 53854
    Destination Port: 445
    [Stream index: 3]
    [TCP Segment Len: 0]
    Sequence number: 277    (relative sequence number)
    Acknowledgment number: 1    (relative ack number)
    Header Length: 32 bytes
    Flags: 0x011 (FIN, ACK)
    Window size value: 312
    [Calculated window size: 312]
    [Window size scaling factor: -1 (unknown)]
    Checksum: 0xb14e [unverified]
    [Checksum Status: Unverified]
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
        No-Operation (NOP)
        No-Operation (NOP)
        Timestamps: TSval 831046843, TSecr 655916326

0000  00 1c 7f 3f 32 29 2c 27 d7 25 8e ee 08 00 45 00   ...?2),'.%....E.
0010  00 34 ef 97 40 00 40 06 9a 04 96 6c 40 38 96 6c   .4.. at .@....l at 8.l
0020  44 17 d2 5e 01 bd d3 ec 30 f3 9e 4b c6 91 80 11   D..^....0..K....
0030  01 38 b1 4e 00 00 01 01 08 0a 31 88 c4 bb 27 18   .8.N......1...'.
0040  7d 26                                             }&

63 MB gzipped pcap file uploaded here:
http://storm.cis.fordham.edu/rkudyba/wireshark-capture.pcap.gz


More information about the samba-technical mailing list