Bug 2178216

Summary: Kernel tracepoints using _sockaddr FAIL TO PARSE
Product: [Fedora] Fedora Reporter: Chuck Lever <chuck.lever>
Component: libtraceeventAssignee: Zamir SUN <sztsian>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: unspecified    
Version: 37CC: jforbes, jmarchan, skozina, sztsian
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: libtraceevent-1.7.2-1.fc37 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-04-14 01:05:11 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Chuck Lever 2023-03-14 14:59:16 UTC
Description of problem:
Any kernel trace point that uses the _sockaddr macros cannot be parsed by "trace-cmd report".

Version-Release number of selected component (if applicable):
libtraceevent 1.5.3-3.fc37

How reproducible:
100%

Steps to Reproduce:
1. On a Linux NFS server, "trace-cmd record -e sunrpc"
2. Mount the server and run a light workload

Actual results:
         <idle>-0     [004]  1016.727319: svc_xprt_enqueue:     [FAILED TO PARSE] server=ARRAY[02, 00, 08, 01, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00] client=<CE>mn flags=0x4c83 netns_ino=4026531840 pid=1302
           nfsd-1302  [005]  1016.727358: svc_xprt_dequeue:     [FAILED TO PARSE] server=ARRAY[02, 00, 08, 01, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00] client=<88><AC>K flags=0x4c83 netns_ino=4026531840 wakeup=0x2d
           nfsd-1302  [005]  1016.727513: svcsock_new_socket:   type=STREAM family=AF_INET
           nfsd-1302  [005]  1016.727526: svc_xprt_enqueue:     [FAILED TO PARSE] server=ARRAY[02, 00, 08, 01, c0, a8, 01, 33, 00, 00, 00, 00, 00, 00, 00, 00] client=ARRAY[02, 00, 02, bc, c0, a8, 01, c6, 00, 00, 00, 00, 00, 00, 00, 00] flags=0x4819 netns_ino=4026531840 pid=1300
           nfsd-1302  [005]  1016.727529: svc_xprt_accept:      [FAILED TO PARSE] server=ARRAY[02, 00, 08, 01, c0, a8, 01, 33, 00, 00, 00, 00, 00, 00, 00, 00] client=ARRAY[02, 00, 02, bc, c0, a8, 01, c6, 00, 00, 00, 00, 00, 00, 00, 00] flags=0x4819 netns_ino=4026531840 protocol=tcp service=nfsd

Expected results:
The fields marked ARRAY above contain IPv4 addresses. These are supposed to be displayed as typical network presentation addresses.

Additional info:
I'm told that libtraceevent version 1.7.1 can display the addresses correctly.

Comment 1 Zamir SUN 2023-04-05 07:58:19 UTC
I have reproduced this issue, and cannot figure out a clear patchset for the fix.

I've confirmed that update libtraceevent fixes the issues. So I decide to simply update it.

Comment 2 Fedora Update System 2023-04-05 08:14:56 UTC
FEDORA-2023-f7147c6ebf has been submitted as an update to Fedora 37. https://bodhi.fedoraproject.org/updates/FEDORA-2023-f7147c6ebf

Comment 3 Fedora Update System 2023-04-06 02:51:59 UTC
FEDORA-2023-f7147c6ebf has been pushed to the Fedora 37 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2023-f7147c6ebf`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2023-f7147c6ebf

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 4 Fedora Update System 2023-04-14 01:05:11 UTC
FEDORA-2023-f7147c6ebf has been pushed to the Fedora 37 stable repository.
If problem still persists, please make note of it in this bug report.