Bug 2178216
| Summary: | Kernel tracepoints using _sockaddr FAIL TO PARSE | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Chuck Lever <chuck.lever> |
| Component: | libtraceevent | Assignee: | Zamir SUN <sztsian> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 37 | CC: | jforbes, jmarchan, skozina, sztsian |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | libtraceevent-1.7.2-1.fc37 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-04-14 01:05:11 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
I have reproduced this issue, and cannot figure out a clear patchset for the fix. I've confirmed that update libtraceevent fixes the issues. So I decide to simply update it. FEDORA-2023-f7147c6ebf has been submitted as an update to Fedora 37. https://bodhi.fedoraproject.org/updates/FEDORA-2023-f7147c6ebf FEDORA-2023-f7147c6ebf has been pushed to the Fedora 37 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2023-f7147c6ebf` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2023-f7147c6ebf See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2023-f7147c6ebf has been pushed to the Fedora 37 stable repository. If problem still persists, please make note of it in this bug report. |
Description of problem: Any kernel trace point that uses the _sockaddr macros cannot be parsed by "trace-cmd report". Version-Release number of selected component (if applicable): libtraceevent 1.5.3-3.fc37 How reproducible: 100% Steps to Reproduce: 1. On a Linux NFS server, "trace-cmd record -e sunrpc" 2. Mount the server and run a light workload Actual results: <idle>-0 [004] 1016.727319: svc_xprt_enqueue: [FAILED TO PARSE] server=ARRAY[02, 00, 08, 01, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00] client=<CE>mn flags=0x4c83 netns_ino=4026531840 pid=1302 nfsd-1302 [005] 1016.727358: svc_xprt_dequeue: [FAILED TO PARSE] server=ARRAY[02, 00, 08, 01, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00] client=<88><AC>K flags=0x4c83 netns_ino=4026531840 wakeup=0x2d nfsd-1302 [005] 1016.727513: svcsock_new_socket: type=STREAM family=AF_INET nfsd-1302 [005] 1016.727526: svc_xprt_enqueue: [FAILED TO PARSE] server=ARRAY[02, 00, 08, 01, c0, a8, 01, 33, 00, 00, 00, 00, 00, 00, 00, 00] client=ARRAY[02, 00, 02, bc, c0, a8, 01, c6, 00, 00, 00, 00, 00, 00, 00, 00] flags=0x4819 netns_ino=4026531840 pid=1300 nfsd-1302 [005] 1016.727529: svc_xprt_accept: [FAILED TO PARSE] server=ARRAY[02, 00, 08, 01, c0, a8, 01, 33, 00, 00, 00, 00, 00, 00, 00, 00] client=ARRAY[02, 00, 02, bc, c0, a8, 01, c6, 00, 00, 00, 00, 00, 00, 00, 00] flags=0x4819 netns_ino=4026531840 protocol=tcp service=nfsd Expected results: The fields marked ARRAY above contain IPv4 addresses. These are supposed to be displayed as typical network presentation addresses. Additional info: I'm told that libtraceevent version 1.7.1 can display the addresses correctly.