Bug 1558922
Summary: | virt-v2v: error: libguestfs error: aug_get: no matching node [rhel-7.5.z] | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Oneata Mircea Teodor <toneata> |
Component: | libguestfs | Assignee: | Richard W.M. Jones <rjones> |
Status: | CLOSED ERRATA | QA Contact: | Virtualization Bugs <virt-bugs> |
Severity: | medium | Docs Contact: | |
Priority: | high | ||
Version: | 7.4 | CC: | cnagarka, jherrman, jsuchane, kuwei, linl, mtessun, mxie, mzhan, ptoscano, tzheng, xchen |
Target Milestone: | rc | Keywords: | ZStream |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | V2V | ||
Fixed In Version: | libguestfs-1.36.10-6.el7_5.1 | Doc Type: | Bug Fix |
Doc Text: |
Previously, converting a Linux guest that did not have the SELINUXTYPE key in the SELinux configuration caused the virt-v2v utility to fail. With this update, virt-v2v handles a missing SELINUXTYPE key properly, and the affected guests can be converted as expected.
|
Story Points: | --- |
Clone Of: | 1541525 | Environment: | |
Last Closed: | 2018-05-14 16:10:32 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1541525 | ||
Bug Blocks: |
Description
Oneata Mircea Teodor
2018-03-21 10:16:43 UTC
I can reproduce the bug with below builds: virt-v2v-1.36.10-6.el7.x86_64 qemu-kvm-rhev-2.10.0-21.el7.x86_64 libvirt-3.9.0-14.el7.x86_64 libguestfs-1.36.10-6.el7.x86_64 Try to verify it with below builds: virt-v2v-1.36.10-6.el7_5.1.x86_64 qemu-kvm-rhev-2.10.0-21.el7_5.1.x86_64 libvirt-3.9.0-14.el7_5.2.x86_64 libguestfs-1.36.10-6.el7_5.1.x86_64 Steps: Scenario 1: 1.Prepare a rhel7.4 guest on ESXi6.5 which /etc/selinux/config is: #cat /etc/selinux/config # This file controls the state of SELinux on the system. # SELINUX=enforcing # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUX=enforcing # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUX=enforcing 2.Convert the guest from Vmware to RHV4.2 by virt-v2v. # virt-v2v -ic vpx://root.199.71/data/10.73.196.89/?no_verify=1 esx6.5-rhel7.4-x86_64 --password-file /tmp/passwd -o rhv -os 10.66.144.40:/home/nfs_export [ 0.0] Opening the source -i libvirt -ic vpx://root.199.71/data/10.73.196.89/?no_verify=1 esx6.5-rhel7.4-x86_64 [ 1.6] Creating an overlay to protect the source from being modified [ 2.3] Initializing the target -o rhv -os 10.66.144.40:/home/nfs_export [ 2.5] Opening the overlay [ 32.8] Inspecting the overlay [ 152.0] Checking for sufficient free disk space in the guest [ 152.0] Estimating space required on target for each disk [ 152.0] Converting Red Hat Enterprise Linux Server 7.4 (Maipo) to run on KVM virt-v2v: This guest has virtio drivers installed. [1172.0] Mapping filesystem data to avoid copying unused and blank areas [1173.5] Closing the overlay [1173.8] Checking if the guest needs BIOS or UEFI to boot [1173.8] Assigning disks to buses [1173.8] Copying disk 1/1 to /tmp/v2v.bDEYss/6f2055e4-b776-4ffd-94e6-f444e4931b76/images/1e2b200d-d3d9-4b1d-a3e7-b35693ccaa09/2bfa4b64-54eb-40a4-b0dc-4b7b801ecba6 (raw) (100.00/100%) [1597.9] Creating output metadata [1598.0] Finishing off 3.After conversion, guest could boot into OS and all checkpoints passed Scenario 2: 1.Prepare a rhel6.9 guest on ESXi6.5 which /etc/selinux/config is: #cat /etc/selinux/config # This file controls the state of SELinux on the system. # SELINUX=enforcing # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUX=enforcing # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. #SELINUXTYPE=targeted 2.Convert the guest from Vmware to RHV4.2 by virt-v2v 3.After successful conversion, guest could boot into OS and all checkpoints passed Scenario 3: 1.Prepare a rhel7.4 guest on ESXi6.5 which /etc/selinux/config is: #cat /etc/selinux/config # This file controls the state of SELinux on the system. # SELINUX=enforcing # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. #SELINUX=enforcing # SELINUX=enforcing # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. #SELINUX=enforcing 2.Convert the guest from Vmware to RHV4.2 by virt-v2v 3.After successful conversion, guest could boot into OS and all checkpoints passed Result: The v2v conversion could be finished without error when the file "/etc/selinux/config" was modified: "SELINUXTYPE=targeted" is disabled(scenario 2) or double "SELINUX=enforcing" (scenario 1) or "SELINUXTYPE=targeted,SELINUX=enforcing " all disabled, so the bug has been fixed with latest v2v builds,then move this bug from ON_QA to VERIFIED To verify it with below builds: virt-v2v-1.36.10-6.el7_5.2.x86_64 qemu-kvm-rhev-2.10.0-21.el7_5.2.x86_64 libvirt-3.9.0-14.el7_5.4.x86_64 libguestfs-1.36.10-6.el7_5.2.x86_64 Steps: Scenario 1: 1.Prepare a rhel7.4 guest on ESXi6.5 which /etc/selinux/config is default: 2.Convert the guest from Vmware to RHV4.2 by virt-v2v. # virt-v2v -ic vpx://root.199.71/data/10.73.196.89/?no_verify=1 esx6.5-rhel7.4-x86_64 --password-file /tmp/passwd -o rhv -os 10.66.144.40:/home/nfs_export 3.After conversion, guest could boot into OS and all checkpoints passed Scenario 2: 1.Prepare a rhel7.4/6.9 guest on ESXi6.5 which /etc/selinux/config is: #cat /etc/selinux/config # This file controls the state of SELinux on the system. # SELINUX=enforcing # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUX=enforcing # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. #SELINUXTYPE=targeted SELINUX=enforcing 2.Convert the guest from Vmware to RHV4.2 by virt-v2v 3.After successful conversion, guest could boot into OS and all checkpoints passed Scenario 3: 1.Prepare a rhel7.4 guest on ESXi6.5 which /etc/selinux/config is: #cat /etc/selinux/config # This file controls the state of SELinux on the system. # SELINUX=enforcing # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. #SELINUX=enforcing # SELINUX=enforcing # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. #SELINUXTYPE=targeted 2.Convert the guest from Vmware to RHV4.2 by virt-v2v 3.After successful conversion, guest could boot into OS and all checkpoints passed So, from all the result move this bug from ON_QA to VERIFIED Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2018:1385 |