Bug 437513

Summary: libvirt-0.4.1-2 selinux and kernel trace issues
Product: [Fedora] Fedora Reporter: Kevin Fenzi <kevin>
Component: libvirtAssignee: Daniel Veillard <veillard>
Status: CLOSED RAWHIDE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: low Docs Contact:
Priority: low    
Version: 8CC: berrange, bloch, mkanat
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-04-10 11:45:23 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:

Description Kevin Fenzi 2008-03-14 13:16:39 EDT
libvirt-0.4.1-2 doesn't seem to allow my networking to work. 

I am using the trick to make a 'peth0' thats the physical ethernet, then making
a eth0 and bonding it to that. Works fine with libvirt 0.4.0. 

On boot with 0.4.1 I get: 

tg3: peth0: Link is up at 100 Mbps, full duplex.
tg3: peth0: Flow control is on for TX and on for RX.
ADDRCONF(NETDEV_CHANGE): peth0: link becomes ready
eth0: port 1(peth0) entering learning state
audit(1205514425.902:16): avc:  denied  { read write } for  pid=2490
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.902:17): avc:  denied  { read write } for  pid=2490
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.904:18): avc:  denied  { read write } for  pid=2492
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.904:19): avc:  denied  { read write } for  pid=2492
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
ltspbr0: Dropping NETIF_F_UFO since no NETIF_F_HW_CSUM feature.
audit(1205514425.906:20): avc:  denied  { read write } for  pid=2493
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.906:21): avc:  denied  { read write } for  pid=2493
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.908:22): avc:  denied  { read write } for  pid=2498
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.908:23): avc:  denied  { read write } for  pid=2498
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.908:24): avc:  denied  { read write } for  pid=2498
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.909:25): avc:  denied  { read write } for  pid=2499
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.909:26): avc:  denied  { read write } for  pid=2499
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.909:27): avc:  denied  { read write } for  pid=2499
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file

and then later in dmesg: 

RTNL: assertion failed at net/core/fib_rules.c (627)
Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1

Call Trace:
 [<ffffffff81207445>] fib_rules_event+0x4e/0x119
 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c
 [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52
 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a
 [<ffffffff810fa199>] file_has_perm+0x94/0xa3
 [<ffffffff810ac039>] do_ioctl+0x55/0x6b
 [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c
 [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71
 [<ffffffff8100c005>] tracesys+0xd5/0xda

RTNL: assertion failed at net/ipv4/devinet.c (1054)
Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1

Call Trace:
 [<ffffffff8123f251>] inetdev_event+0x59/0x46a
 [<ffffffff8126949f>] _spin_lock_bh+0x9/0x19
 [<ffffffff81216944>] rt_run_flush+0x7f/0xb7
 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c
 [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52
 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a
 [<ffffffff810fa199>] file_has_perm+0x94/0xa3
 [<ffffffff810ac039>] do_ioctl+0x55/0x6b
 [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c
 [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71
 [<ffffffff8100c005>] tracesys+0xd5/0xda

device vnet0 entered promiscuous mode
eth0: port 2(vnet0) entering learning state
RTNL: assertion failed at net/core/fib_rules.c (627)
Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1

Call Trace:
 [<ffffffff81207445>] fib_rules_event+0x4e/0x119
 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c
 [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52
 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a
 [<ffffffff810ac039>] do_ioctl+0x55/0x6b
 [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c
 [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71
 [<ffffffff8100c005>] tracesys+0xd5/0xda

RTNL: assertion failed at net/ipv4/devinet.c (1054)
Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1

Call Trace:
 [<ffffffff8123f251>] inetdev_event+0x59/0x46a
 [<ffffffff8126949f>] _spin_lock_bh+0x9/0x19
 [<ffffffff81216944>] rt_run_flush+0x7f/0xb7
 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c
 [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52
 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a
 [<ffffffff810ac039>] do_ioctl+0x55/0x6b
 [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c
 [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71
 [<ffffffff8100c005>] tracesys+0xd5/0xda
device vnet1 entered promiscuous mode
eth0: port 3(vnet1) entering learning state
SIPI to vcpu 1 vector 0x10
vcpu 1 received sipi with vector # 10
RTNL: assertion failed at net/core/fib_rules.c (627)
Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1

Call Trace:
 [<ffffffff81207445>] fib_rules_event+0x4e/0x119
 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c
 [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52
 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a
 [<ffffffff810ac039>] do_ioctl+0x55/0x6b
 [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c
 [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71
 [<ffffffff8100c005>] tracesys+0xd5/0xda

RTNL: assertion failed at net/ipv4/devinet.c (1054)
Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1

Call Trace:
 [<ffffffff8123f251>] inetdev_event+0x59/0x46a
 [<ffffffff8126949f>] _spin_lock_bh+0x9/0x19
 [<ffffffff81216944>] rt_run_flush+0x7f/0xb7
 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c
 [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52
 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a
 [<ffffffff810ac039>] do_ioctl+0x55/0x6b
 [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c
 [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71
 [<ffffffff8100c005>] tracesys+0xd5/0xda

device vnet2 entered promiscuous mode
eth0: port 4(vnet2) entering learning state
SIPI to vcpu 1 vector 0x10
SIPI to vcpu 2 vector 0x10
SIPI to vcpu 3 vector 0x10
vcpu 3 received sipi with vector # 10
vcpu 2 received sipi with vector # 10
vcpu 1 received sipi with vector # 10
SIPI to vcpu 1 vector 0x10
vcpu 1 received sipi with vector # 10
virbr0: no IPv6 routers present
vnet0: no IPv6 routers present
vnet1: no IPv6 routers present
kvm: emulating exchange as write
Ignoring de-assert INIT to vcpu 1
SIPI to vcpu 1 vector 0x06
vcpu 1 received sipi with vector # 6
SIPI to vcpu 1 vector 0x06
vnet2: no IPv6 routers present
eth0: topology change detected, propagating
eth0: port 2(vnet0) entering forwarding state
Ignoring de-assert INIT to vcpu 1
SIPI to vcpu 1 vector 0x03
vcpu 1 received sipi with vector # 3
SIPI to vcpu 1 vector 0x03
Ignoring de-assert INIT to vcpu 1
eth0: topology change detected, propagating
eth0: port 4(vnet2) entering forwarding state
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet1: received packet with  own address as source address
vnet1: received packet with  own address as source address

The host can reach the guests ok, but nothing else can. 

Happy to test, provide more info, etc.
Comment 1 Daniel Berrange 2008-03-14 13:30:37 EDT
This is fixed in Fedora 9  rawhide in libvirt-0.4.0-4.fc9. The same patch needs
to be applied to F8
Comment 2 Kevin Fenzi 2008-03-14 14:24:13 EDT
I can confirm that the 0.4.1-4 version from rawhide recompiled for f8 works fine
here. You might want to add those patches to the 0.4.1 thats in updates-testing
for f8. 
Comment 3 Daniel Veillard 2008-04-10 11:45:23 EDT
Okay, fixed for Rawhide and Fedora 9, i have also pushed
libvirt-0.4.2-1.fc8 in Testing, hopefully this will CLOSE this,

Daniel