Bug 2174447
Summary: | Logs are spammed with ' Domain id=7 is tainted: custom-ga-command' message | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Peter Krempa <pkrempa> | |
Component: | libvirt | Assignee: | Peter Krempa <pkrempa> | |
Status: | CLOSED ERRATA | QA Contact: | Lili Zhu <lizhu> | |
Severity: | unspecified | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 8.4 | CC: | jdenemar, jsuchane, lmen, pgm-rhel-tools, virt-bugs, virt-maint, ymankad | |
Target Milestone: | rc | Keywords: | Triaged, ZStream | |
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | libvirt-8.0.0-20.module+el8.9.0+18894+a91bbb94 | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | ||
Clone Of: | 2174446 | |||
: | 2176898 2180030 2180031 2180032 (view as bug list) | Environment: | ||
Last Closed: | 2023-11-14 15:33:25 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | 2174446 | |||
Bug Blocks: | 2176898, 2180030, 2180031, 2180032 |
Description
Peter Krempa
2023-03-01 16:19:48 UTC
Verify this bug with: libvirt-8.0.0-19.module+el8.8.0+18370+e5872f90.x86_64 1. prepare a guest with guest agent # virsh domtime vm1 Time: 1678521142 2. check the dominfo # virsh dominfo vm1 Id: 2 Name: vm1 UUID: ba63a682-90de-4816-a527-25d2ed542311 OS Type: hvm State: running CPU(s): 2 CPU time: 2.5s Max memory: 3145728 KiB Used memory: 3145728 KiB Persistent: yes Autostart: disable Managed save: no Security model: selinux Security DOI: 0 Security label: system_u:system_r:svirt_t:s0:c339,c702 (enforcing) 3. check the some info about guest using qemu-agent-command # virsh qemu-agent-command vm1 '{"execute":"guest-get-fsinfo"}' {"return":[{"name":"vda1","total-bytes":1063256064, 4. check the dominfo again # virsh dominfo vm1 Id: 2 Name: vm1 UUID: ba63a682-90de-4816-a527-25d2ed542311 OS Type: hvm State: running CPU(s): 2 CPU time: 32.7s Max memory: 3145728 KiB Used memory: 3145728 KiB Persistent: yes Autostart: disable Managed save: no Security model: selinux Security DOI: 0 Security label: system_u:system_r:svirt_t:s0:c339,c702 (enforcing) Messages: tainted: custom guest agent control commands issued 5. check the log 1327:2023-03-16 07:49:38.592+0000: 55730: warning : qemuDomainObjTaintMsg:6401 : Domain id=2 name='vm1' uuid=ba63a682-90de-4816-a527-25d2ed542311 is tainted: custom-ga-command 1329:2023-03-16 07:49:38.592+0000: 55730: debug : qemuDomainLogAppendMessage:6766 : Append log message (vm='vm1' message='2023-03-16 07:49:38.592+0000: Domain id=2 is tainted: custom-ga-command 6. repeat step 2 for 100 times # for i in {1..100}; do virsh qemu-agent-command vm1 '{"execute":"guest-get-fsinfo"}'; done .... 7. check the log again # grep -ni tainted /var/log/libvirt/libvirtd.log 1327:2023-03-16 07:49:38.592+0000: 55730: warning : qemuDomainObjTaintMsg:6401 : Domain id=2 name='vm1' uuid=ba63a682-90de-4816-a527-25d2ed542311 is tainted: custom-ga-command 1329:2023-03-16 07:49:38.592+0000: 55730: debug : qemuDomainLogAppendMessage:6766 : Append log message (vm='vm1' message='2023-03-16 07:49:38.592+0000: Domain id=2 is tainted: custom-ga-command (The tainted message is printed when invoking guest-agent-command for the first time. And no new logs about tainted messages printed for the later invoking, logs are not spammed) *** Bug 2176898 has been marked as a duplicate of this bug. *** Tested this bug with: libvirt-8.0.0-20.module+el8.9.0+18894+a91bbb94.x86_64 The testing steps are the same with those in Comment #6, testing passed Verify this bug with: libvirt-8.0.0-21.module+el8.9.0+19166+e262ca96.x86_64 The verification steps are the same with those in Comment #6. As the result matches with the expected result, mark the bug as verified. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:6980 |