libvirt-0.4.1-2 doesn't seem to allow my networking to work. I am using the trick to make a 'peth0' thats the physical ethernet, then making a eth0 and bonding it to that. Works fine with libvirt 0.4.0. On boot with 0.4.1 I get: tg3: peth0: Link is up at 100 Mbps, full duplex. tg3: peth0: Flow control is on for TX and on for RX. ADDRCONF(NETDEV_CHANGE): peth0: link becomes ready eth0: port 1(peth0) entering learning state audit(1205514425.902:16): avc: denied { read write } for pid=2490 comm="brctl" path="/dev/console" dev=tmpfs ino=205 scontext=system_u:system_r:brctl_t:s0 tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file audit(1205514425.902:17): avc: denied { read write } for pid=2490 comm="brctl" path="/dev/console" dev=tmpfs ino=205 scontext=system_u:system_r:brctl_t:s0 tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file audit(1205514425.904:18): avc: denied { read write } for pid=2492 comm="brctl" path="/dev/console" dev=tmpfs ino=205 scontext=system_u:system_r:brctl_t:s0 tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file audit(1205514425.904:19): avc: denied { read write } for pid=2492 comm="brctl" path="/dev/console" dev=tmpfs ino=205 scontext=system_u:system_r:brctl_t:s0 tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file ltspbr0: Dropping NETIF_F_UFO since no NETIF_F_HW_CSUM feature. audit(1205514425.906:20): avc: denied { read write } for pid=2493 comm="brctl" path="/dev/console" dev=tmpfs ino=205 scontext=system_u:system_r:brctl_t:s0 tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file audit(1205514425.906:21): avc: denied { read write } for pid=2493 comm="brctl" path="/dev/console" dev=tmpfs ino=205 scontext=system_u:system_r:brctl_t:s0 tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file audit(1205514425.908:22): avc: denied { read write } for pid=2498 comm="brctl" path="/dev/console" dev=tmpfs ino=205 scontext=system_u:system_r:brctl_t:s0 tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file audit(1205514425.908:23): avc: denied { read write } for pid=2498 comm="brctl" path="/dev/console" dev=tmpfs ino=205 scontext=system_u:system_r:brctl_t:s0 tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file audit(1205514425.908:24): avc: denied { read write } for pid=2498 comm="brctl" path="/dev/console" dev=tmpfs ino=205 scontext=system_u:system_r:brctl_t:s0 tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file audit(1205514425.909:25): avc: denied { read write } for pid=2499 comm="brctl" path="/dev/console" dev=tmpfs ino=205 scontext=system_u:system_r:brctl_t:s0 tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file audit(1205514425.909:26): avc: denied { read write } for pid=2499 comm="brctl" path="/dev/console" dev=tmpfs ino=205 scontext=system_u:system_r:brctl_t:s0 tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file audit(1205514425.909:27): avc: denied { read write } for pid=2499 comm="brctl" path="/dev/console" dev=tmpfs ino=205 scontext=system_u:system_r:brctl_t:s0 tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file and then later in dmesg: RTNL: assertion failed at net/core/fib_rules.c (627) Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1 Call Trace: [<ffffffff81207445>] fib_rules_event+0x4e/0x119 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a [<ffffffff810fa199>] file_has_perm+0x94/0xa3 [<ffffffff810ac039>] do_ioctl+0x55/0x6b [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71 [<ffffffff8100c005>] tracesys+0xd5/0xda RTNL: assertion failed at net/ipv4/devinet.c (1054) Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1 Call Trace: [<ffffffff8123f251>] inetdev_event+0x59/0x46a [<ffffffff8126949f>] _spin_lock_bh+0x9/0x19 [<ffffffff81216944>] rt_run_flush+0x7f/0xb7 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a [<ffffffff810fa199>] file_has_perm+0x94/0xa3 [<ffffffff810ac039>] do_ioctl+0x55/0x6b [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71 [<ffffffff8100c005>] tracesys+0xd5/0xda device vnet0 entered promiscuous mode eth0: port 2(vnet0) entering learning state RTNL: assertion failed at net/core/fib_rules.c (627) Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1 Call Trace: [<ffffffff81207445>] fib_rules_event+0x4e/0x119 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a [<ffffffff810ac039>] do_ioctl+0x55/0x6b [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71 [<ffffffff8100c005>] tracesys+0xd5/0xda RTNL: assertion failed at net/ipv4/devinet.c (1054) Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1 Call Trace: [<ffffffff8123f251>] inetdev_event+0x59/0x46a [<ffffffff8126949f>] _spin_lock_bh+0x9/0x19 [<ffffffff81216944>] rt_run_flush+0x7f/0xb7 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a [<ffffffff810ac039>] do_ioctl+0x55/0x6b [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71 [<ffffffff8100c005>] tracesys+0xd5/0xda device vnet1 entered promiscuous mode eth0: port 3(vnet1) entering learning state SIPI to vcpu 1 vector 0x10 vcpu 1 received sipi with vector # 10 RTNL: assertion failed at net/core/fib_rules.c (627) Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1 Call Trace: [<ffffffff81207445>] fib_rules_event+0x4e/0x119 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a [<ffffffff810ac039>] do_ioctl+0x55/0x6b [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71 [<ffffffff8100c005>] tracesys+0xd5/0xda RTNL: assertion failed at net/ipv4/devinet.c (1054) Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1 Call Trace: [<ffffffff8123f251>] inetdev_event+0x59/0x46a [<ffffffff8126949f>] _spin_lock_bh+0x9/0x19 [<ffffffff81216944>] rt_run_flush+0x7f/0xb7 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a [<ffffffff810ac039>] do_ioctl+0x55/0x6b [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71 [<ffffffff8100c005>] tracesys+0xd5/0xda device vnet2 entered promiscuous mode eth0: port 4(vnet2) entering learning state SIPI to vcpu 1 vector 0x10 SIPI to vcpu 2 vector 0x10 SIPI to vcpu 3 vector 0x10 vcpu 3 received sipi with vector # 10 vcpu 2 received sipi with vector # 10 vcpu 1 received sipi with vector # 10 SIPI to vcpu 1 vector 0x10 vcpu 1 received sipi with vector # 10 virbr0: no IPv6 routers present vnet0: no IPv6 routers present vnet1: no IPv6 routers present kvm: emulating exchange as write Ignoring de-assert INIT to vcpu 1 SIPI to vcpu 1 vector 0x06 vcpu 1 received sipi with vector # 6 SIPI to vcpu 1 vector 0x06 vnet2: no IPv6 routers present eth0: topology change detected, propagating eth0: port 2(vnet0) entering forwarding state Ignoring de-assert INIT to vcpu 1 SIPI to vcpu 1 vector 0x03 vcpu 1 received sipi with vector # 3 SIPI to vcpu 1 vector 0x03 Ignoring de-assert INIT to vcpu 1 eth0: topology change detected, propagating eth0: port 4(vnet2) entering forwarding state vnet0: received packet with own address as source address vnet0: received packet with own address as source address vnet0: received packet with own address as source address vnet0: received packet with own address as source address vnet0: received packet with own address as source address vnet0: received packet with own address as source address vnet0: received packet with own address as source address vnet0: received packet with own address as source address vnet0: received packet with own address as source address vnet1: received packet with own address as source address vnet1: received packet with own address as source address The host can reach the guests ok, but nothing else can. Happy to test, provide more info, etc.
This is fixed in Fedora 9 rawhide in libvirt-0.4.0-4.fc9. The same patch needs to be applied to F8
I can confirm that the 0.4.1-4 version from rawhide recompiled for f8 works fine here. You might want to add those patches to the 0.4.1 thats in updates-testing for f8.
Okay, fixed for Rawhide and Fedora 9, i have also pushed libvirt-0.4.2-1.fc8 in Testing, hopefully this will CLOSE this, Daniel