Bug 2178216 - Kernel tracepoints using _sockaddr FAIL TO PARSE
Summary: Kernel tracepoints using _sockaddr FAIL TO PARSE
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: libtraceevent
Version: 37
Hardware: All
OS: Linux
unspecified
medium
Target Milestone: ---
Assignee: Zamir SUN
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-03-14 14:59 UTC by Chuck Lever
Modified: 2023-04-14 01:05 UTC (History)
4 users (show)

Fixed In Version: libtraceevent-1.7.2-1.fc37
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-04-14 01:05:11 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Chuck Lever 2023-03-14 14:59:16 UTC
Description of problem:
Any kernel trace point that uses the _sockaddr macros cannot be parsed by "trace-cmd report".

Version-Release number of selected component (if applicable):
libtraceevent 1.5.3-3.fc37

How reproducible:
100%

Steps to Reproduce:
1. On a Linux NFS server, "trace-cmd record -e sunrpc"
2. Mount the server and run a light workload

Actual results:
         <idle>-0     [004]  1016.727319: svc_xprt_enqueue:     [FAILED TO PARSE] server=ARRAY[02, 00, 08, 01, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00] client=<CE>mn flags=0x4c83 netns_ino=4026531840 pid=1302
           nfsd-1302  [005]  1016.727358: svc_xprt_dequeue:     [FAILED TO PARSE] server=ARRAY[02, 00, 08, 01, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00] client=<88><AC>K flags=0x4c83 netns_ino=4026531840 wakeup=0x2d
           nfsd-1302  [005]  1016.727513: svcsock_new_socket:   type=STREAM family=AF_INET
           nfsd-1302  [005]  1016.727526: svc_xprt_enqueue:     [FAILED TO PARSE] server=ARRAY[02, 00, 08, 01, c0, a8, 01, 33, 00, 00, 00, 00, 00, 00, 00, 00] client=ARRAY[02, 00, 02, bc, c0, a8, 01, c6, 00, 00, 00, 00, 00, 00, 00, 00] flags=0x4819 netns_ino=4026531840 pid=1300
           nfsd-1302  [005]  1016.727529: svc_xprt_accept:      [FAILED TO PARSE] server=ARRAY[02, 00, 08, 01, c0, a8, 01, 33, 00, 00, 00, 00, 00, 00, 00, 00] client=ARRAY[02, 00, 02, bc, c0, a8, 01, c6, 00, 00, 00, 00, 00, 00, 00, 00] flags=0x4819 netns_ino=4026531840 protocol=tcp service=nfsd

Expected results:
The fields marked ARRAY above contain IPv4 addresses. These are supposed to be displayed as typical network presentation addresses.

Additional info:
I'm told that libtraceevent version 1.7.1 can display the addresses correctly.

Comment 1 Zamir SUN 2023-04-05 07:58:19 UTC
I have reproduced this issue, and cannot figure out a clear patchset for the fix.

I've confirmed that update libtraceevent fixes the issues. So I decide to simply update it.

Comment 2 Fedora Update System 2023-04-05 08:14:56 UTC
FEDORA-2023-f7147c6ebf has been submitted as an update to Fedora 37. https://bodhi.fedoraproject.org/updates/FEDORA-2023-f7147c6ebf

Comment 3 Fedora Update System 2023-04-06 02:51:59 UTC
FEDORA-2023-f7147c6ebf has been pushed to the Fedora 37 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2023-f7147c6ebf`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2023-f7147c6ebf

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 4 Fedora Update System 2023-04-14 01:05:11 UTC
FEDORA-2023-f7147c6ebf has been pushed to the Fedora 37 stable repository.
If problem still persists, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.