Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

High CPU usage when scrolling, or when a lot of packets get received #153

Open
3 tasks done
ghost opened this issue Jun 4, 2023 · 0 comments
Open
3 tasks done

High CPU usage when scrolling, or when a lot of packets get received #153

ghost opened this issue Jun 4, 2023 · 0 comments

Comments

@ghost
Copy link

ghost commented Jun 4, 2023

Prerequisites

Please verify these before submitting an issue.

  • I am running the latest versions of Termshark and Wireshark.
  • I checked the README and User Guide and found no answer
  • I searched issues and this has not yet been filed

Problem

Current Behavior

I am currently working on a stress testing toolkit, on Void Linux (musl build) and I was testing one of the attack vectors.
While viewing the packets in termshark, I noticed my device was beginning to get hot, and the CPU usage spiked to about 80%.

This happens when I scroll (altough it uses less CPU, it still uses a lot) and when a lot of packets come flying in

Expected Behavior

A low CPU usage when scrolling, and a medium CPU usage when viewing packets as they come in

Screenshots as applicable

  • Termshark and htop:
    Screenshot_2023-06-04_18-14-25
    Screenshot_2023-06-04_18-14-04
  • htop:
    Screenshot_2023-06-04_18-13-09
  • auto-cpufreq showing high CPU usage:
    Screenshot_2023-06-04_18-14-49
  • sensors displaying temperatures (dropped before I took a screenshot)
    Screenshot_2023-06-04_18-26-15

Steps to Reproduce

  1. Run a simple python script that sends UDP packets to a random host (or localhost)
  2. Monitor the interface in termshark: sudo termshark -i wlp1s0 -Y 'udp && udp.port == someport && ip.addr == somehost'
    3.1 Watch the packets, and monitor the CPU usage through htop (or whatever you use)
    3.2 Scroll through the packets, and monitor the CPU usage

Context

Please provide the complete output of these commands:

  • termshark -v
    termshark v2.4.0
  • termshark -vv
    termshark v2.4.0
    using tshark 4.0.4 (from /bin/tshark)
  • termshark -v | cat
    TShark (Wireshark) 4.0.4 (Git commit ea14d468d9ca).

Copyright 1998-2023 Gerald Combs gerald@wireshark.org and contributors.
Licensed under the terms of the GNU General Public License (version 2 or later).
This is free software; see the file named COPYING in the distribution. There is
NO WARRANTY; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) using GCC 12.2.0, with GLib 2.74.0, with PCRE2, with zlib
1.2.13, with libpcap, with POSIX capabilities (Linux), with libnl 3, with Lua
5.2.4, with GnuTLS 3.7.8 and PKCS #11 support, with Gcrypt 1.10.1, with Kerberos
(MIT), with MaxMind, with nghttp2 1.52.0, with brotli, with LZ4, with Zstandard,
without Snappy, with libxml2 2.9.13, without libsmi, with binary plugins.

Running on Linux 6.1.31_1, with AMD Ryzen 5 5500U with Radeon Graphics (with
SSE4.2), with 7331 MB of physical memory, with GLib 2.76.1, with PCRE2 10.39
2021-10-29, with zlib 1.2.13, with libpcap 1.10.3 (with TPACKET_V3), with c-ares
1.19.1, with GnuTLS 3.8.0, with Gcrypt 1.10.2, with nghttp2 1.53.0, with brotli
1.0.9, with LZ4 1.9.4, with Zstandard 1.5.5, with LC_TYPE=en_US.UTF-8, binary
plugins supported

Please also provide any relevant information about your environment (OS, VM, pi,...):

OS: Void Linux x86_64 
Host: VivoBook_ASUSLaptop X515UA_M515UA 1.0 
Kernel: 6.1.31_1 
Shell: bash 5.1.16 
CPU: AMD Ryzen 5 5500U with Radeon Graphics (6) @ 2.100GHz 
GPU: AMD ATI 03:00.0 Lucienne 
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

0 participants