FS#46536 - [avahi] daemon is spamming the logs.
Attached to Project:
Arch Linux
Opened by Francisco Pina (Stunts) - Friday, 02 October 2015, 12:25 GMT
Last edited by freswa (frederik) - Monday, 28 September 2020, 20:54 GMT
Opened by Francisco Pina (Stunts) - Friday, 02 October 2015, 12:25 GMT
Last edited by freswa (frederik) - Monday, 28 September 2020, 20:54 GMT
|
Details
Description:
Avahi daemon is spamming the logs with about 20-30 lines per second with the following message: Out 02 13:06:07 VoidCaster avahi-daemon[423]: Invalid response packet from host 10.100.230.123. The IP address changes on every message. This has only started to occur as of avahi 0.6.31-17 (at least as far as I can tell. My logs have rotated a lot today since they grow huge very quickly) Additional info: Seems to be present on other distros too[1], but a little extra weight from arch should help "persuade" upstream to apply a patch that has been floating around for a while[2]. Or maybe (and I know this is against "the arch way") the arch package could be patched? Thanks! Steps to reproduce: Run avahi daemon when there is a machine running OSX in your network and you will get this spammed in your logs. [1] https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1342400 [2] http://lists.freedesktop.org/archives/avahi/2012-July/002171.html |
This task depends upon
Closed by freswa (frederik)
Monday, 28 September 2020, 20:54 GMT
Reason for closing: Fixed
Additional comments about closing: avahi 0.6.32rc-1
Monday, 28 September 2020, 20:54 GMT
Reason for closing: Fixed
Additional comments about closing: avahi 0.6.32rc-1
https://github.com/lathiat/avahi/issues/10
Just in case.
oct. 20 18:37:57 hostname sudo[3981]: neitsab : TTY=pts/1 ; PWD=/home/neitsab ; USER=root ; COMMAND=/usr/bin/systemctl stop avahi-daemon.service avahi-daemon.socket
oct. 20 18:37:57 hostname sudo[3981]: pam_unix(sudo:session): session opened for user root by (uid=0)
oct. 20 18:37:57 hostname polkitd[776]: Registered Authentication Agent for unix-process:3982:1434368 (system bus name :1.128 [/usr/bin/pkttyagent --notify-fd 4 --fallback], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale fr_FR.utf8)
oct. 20 18:37:57 hostname avahi-daemon[3953]: Got SIGTERM, quitting.
oct. 20 18:37:57 hostname systemd[1]: Stopping avahi-daemon.service...
oct. 20 18:37:57 hostname avahi-daemon[3953]: Leaving mDNS multicast group on interface virbr0.IPv4 with address 192.168.122.1.
oct. 20 18:37:57 hostname systemd[1]: Closed avahi-daemon.socket.
oct. 20 18:37:57 hostname avahi-daemon[3953]: Leaving mDNS multicast group on interface wlp2s0.IPv6 with address 2001:41d0:xxxx:xxxx::.
oct. 20 18:37:57 hostname systemd[1]: Stopped avahi-daemon.service.
oct. 20 18:37:57 hostname avahi-daemon[3953]: Leaving mDNS multicast group on interface wlp2s0.IPv4 with address 192.168.1.80.
oct. 20 18:37:57 hostname avahi-daemon[3953]: avahi-daemon 0.6.31 exiting.
oct. 20 18:37:57 hostname sudo[3981]: pam_unix(sudo:session): session closed for user root
oct. 20 18:37:57 hostname dbus[712]: [system] Activating via systemd: service name='org.freedesktop.Avahi' unit='dbus-org.freedesktop.Avahi.service'
oct. 20 18:37:57 hostname systemd[1]: Starting Avahi mDNS/DNS-SD Stack...
And then the flood resumes. I've tried masking both units (service and socket), to no avail.
[1] https://github.com/lathiat/avahi/commit/de7cde877e4daa5d9d4fb5b1a349299eaa94969d
[2] https://github.com/archlinux/svntogit-packages/commit/d39a606f47b68707c9df59d9474d063a47a0ce61