Bug 438013
| Summary: | [RHEL5.2] avahi-daemon spewing messages to /var/log/message | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 5 | Reporter: | Jeff Burke <jburke> |
| Component: | avahi | Assignee: | Lennart Poettering <lpoetter> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | low | ||
| Version: | 5.2 | CC: | amposborne, dkovalsk, herrold, igeorgex, pjs1, riek, syeghiay |
| Target Milestone: | rc | Keywords: | Regression |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2009-06-22 18:13:53 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Jeff Burke
2008-03-18 17:45:29 UTC
AFAIK, avahi wasn't touched in 5.2. Are we sure this is a regression? Does this happen on all machines? I did not see this issue with my local system until upgrading to 5.2 Beta. It may be a side effect from another change, But avahi-daemon is the one yelling about it. I have seen it on all the system I have looked at so far. Hmm, these messages are generated because some other mDNS stack in the network is generating invalid packets. You get one message on every packet. I am not sure what to do about this... I am not sure what the benefit is of the current message is. It is more noise in the logs. Should the message be modified to also give the ip address of the host where the packet came from. This may help in finding out why a response with an invalid source port was sent? This bugzilla has Keywords: Regression. Since no regressions are allowed between releases, it is also being proposed as a blocker for this release. Please resolve ASAP. This bugzilla was reviewed by QE as a non-FasTrack request. It has since been proposed for FasTrack. The qa_ack has been reset. QE needs to re-review this bugzilla for FasTrack. avahi-0.6.22-12.fc10 has been submitted as an update for Fedora 10. http://admin.fedoraproject.org/updates/avahi-0.6.22-12.fc10 avahi-0.6.22-12.fc10 has been pushed to the Fedora 10 testing repository. If problems still persist, please make note of it in this bug report. If you want to test the update, you can install it with su -c 'yum --enablerepo=updates-testing update avahi'. You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F10/FEDORA-2008-11351 avahi-0.6.22-12.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report. (In reply to comment #12) > avahi-0.6.22-12.fc10 has been pushed to the Fedora 10 stable repository. If > problems still persist, please make note of it in this bug rep problem still persist Apr 28 13:01:27 powickks1 avahi-daemon[3163]: Invalid legacy unicast query packet. Apr 28 13:01:27 powickks1 avahi-daemon[3163]: Invalid legacy unicast query packet. Apr 28 13:01:28 powickks1 avahi-daemon[3163]: Invalid legacy unicast query packet. Apr 28 13:01:28 powickks1 avahi-daemon[3163]: Received response from host 10.14.132.4 with invalid source port 58961 on interface 'eth2.0' Apr 28 13:01:29 powickks1 avahi-daemon[3163]: Received response from host 10.14.132.4 with invalid source port 58961 on interface 'eth2.0' Apr 28 13:01:31 powickks1 avahi-daemon[3163]: Received response from host 10.14.132.4 with invalid source port 58961 on interface 'eth2.0' Apr 28 13:01:35 powickks1 avahi-daemon[3163]: Received response from host 10.14.132.4 with invalid source port 58961 on interface 'eth2.0' Apr 28 13:01:43 powickks1 avahi-daemon[3163]: Received response from host 10.14.132.4 with invalid source port 58961 on interface 'eth2.0' Apr 28 13:01:59 powickks1 avahi-daemon[3163]: Received response from host 10.14.132.4 with invalid source port 58961 on interface 'eth2.0' Apr 28 13:02:31 powickks1 avahi-daemon[3163]: Received response from host 10.14.132.4 with invalid source port 58961 on interface 'eth2.0' An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2009-1119.html Avahi now logs the IP address and everything as suggested in #4. I am strictly against removing these log messages altogether, given that they point to an existing error. I am not sure what else we should be doing. |