Bug 437513 - libvirt-0.4.1-2 selinux and kernel trace issues
Summary: libvirt-0.4.1-2 selinux and kernel trace issues
Keywords:
Status: CLOSED RAWHIDE
Alias: None
Product: Fedora
Classification: Fedora
Component: libvirt
Version: 8
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Daniel Veillard
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-03-14 17:16 UTC by Kevin Fenzi
Modified: 2008-04-10 15:45 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-04-10 15:45:23 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Kevin Fenzi 2008-03-14 17:16:39 UTC
libvirt-0.4.1-2 doesn't seem to allow my networking to work. 

I am using the trick to make a 'peth0' thats the physical ethernet, then making
a eth0 and bonding it to that. Works fine with libvirt 0.4.0. 

On boot with 0.4.1 I get: 

tg3: peth0: Link is up at 100 Mbps, full duplex.
tg3: peth0: Flow control is on for TX and on for RX.
ADDRCONF(NETDEV_CHANGE): peth0: link becomes ready
eth0: port 1(peth0) entering learning state
audit(1205514425.902:16): avc:  denied  { read write } for  pid=2490
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.902:17): avc:  denied  { read write } for  pid=2490
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.904:18): avc:  denied  { read write } for  pid=2492
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.904:19): avc:  denied  { read write } for  pid=2492
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
ltspbr0: Dropping NETIF_F_UFO since no NETIF_F_HW_CSUM feature.
audit(1205514425.906:20): avc:  denied  { read write } for  pid=2493
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.906:21): avc:  denied  { read write } for  pid=2493
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.908:22): avc:  denied  { read write } for  pid=2498
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.908:23): avc:  denied  { read write } for  pid=2498
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.908:24): avc:  denied  { read write } for  pid=2498
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.909:25): avc:  denied  { read write } for  pid=2499
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.909:26): avc:  denied  { read write } for  pid=2499
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
audit(1205514425.909:27): avc:  denied  { read write } for  pid=2499
comm="brctl" path="/dev/console" dev=tmpfs ino=205
scontext=system_u:system_r:brctl_t:s0
tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file

and then later in dmesg: 

RTNL: assertion failed at net/core/fib_rules.c (627)
Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1

Call Trace:
 [<ffffffff81207445>] fib_rules_event+0x4e/0x119
 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c
 [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52
 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a
 [<ffffffff810fa199>] file_has_perm+0x94/0xa3
 [<ffffffff810ac039>] do_ioctl+0x55/0x6b
 [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c
 [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71
 [<ffffffff8100c005>] tracesys+0xd5/0xda

RTNL: assertion failed at net/ipv4/devinet.c (1054)
Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1

Call Trace:
 [<ffffffff8123f251>] inetdev_event+0x59/0x46a
 [<ffffffff8126949f>] _spin_lock_bh+0x9/0x19
 [<ffffffff81216944>] rt_run_flush+0x7f/0xb7
 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c
 [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52
 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a
 [<ffffffff810fa199>] file_has_perm+0x94/0xa3
 [<ffffffff810ac039>] do_ioctl+0x55/0x6b
 [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c
 [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71
 [<ffffffff8100c005>] tracesys+0xd5/0xda

device vnet0 entered promiscuous mode
eth0: port 2(vnet0) entering learning state
RTNL: assertion failed at net/core/fib_rules.c (627)
Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1

Call Trace:
 [<ffffffff81207445>] fib_rules_event+0x4e/0x119
 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c
 [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52
 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a
 [<ffffffff810ac039>] do_ioctl+0x55/0x6b
 [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c
 [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71
 [<ffffffff8100c005>] tracesys+0xd5/0xda

RTNL: assertion failed at net/ipv4/devinet.c (1054)
Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1

Call Trace:
 [<ffffffff8123f251>] inetdev_event+0x59/0x46a
 [<ffffffff8126949f>] _spin_lock_bh+0x9/0x19
 [<ffffffff81216944>] rt_run_flush+0x7f/0xb7
 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c
 [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52
 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a
 [<ffffffff810ac039>] do_ioctl+0x55/0x6b
 [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c
 [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71
 [<ffffffff8100c005>] tracesys+0xd5/0xda
device vnet1 entered promiscuous mode
eth0: port 3(vnet1) entering learning state
SIPI to vcpu 1 vector 0x10
vcpu 1 received sipi with vector # 10
RTNL: assertion failed at net/core/fib_rules.c (627)
Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1

Call Trace:
 [<ffffffff81207445>] fib_rules_event+0x4e/0x119
 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c
 [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52
 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a
 [<ffffffff810ac039>] do_ioctl+0x55/0x6b
 [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c
 [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71
 [<ffffffff8100c005>] tracesys+0xd5/0xda

RTNL: assertion failed at net/ipv4/devinet.c (1054)
Pid: 3206, comm: libvirtd Not tainted 2.6.24.3-34.fc8 #1

Call Trace:
 [<ffffffff8123f251>] inetdev_event+0x59/0x46a
 [<ffffffff8126949f>] _spin_lock_bh+0x9/0x19
 [<ffffffff81216944>] rt_run_flush+0x7f/0xb7
 [<ffffffff8126b3bd>] notifier_call_chain+0x29/0x4c
 [<ffffffff811fa46c>] dev_set_mac_address+0x4b/0x52
 [<ffffffff88310653>] :tun:tun_chr_ioctl+0x451/0x50a
 [<ffffffff810ac039>] do_ioctl+0x55/0x6b
 [<ffffffff810ac292>] vfs_ioctl+0x243/0x25c
 [<ffffffff810ac2fc>] sys_ioctl+0x51/0x71
 [<ffffffff8100c005>] tracesys+0xd5/0xda

device vnet2 entered promiscuous mode
eth0: port 4(vnet2) entering learning state
SIPI to vcpu 1 vector 0x10
SIPI to vcpu 2 vector 0x10
SIPI to vcpu 3 vector 0x10
vcpu 3 received sipi with vector # 10
vcpu 2 received sipi with vector # 10
vcpu 1 received sipi with vector # 10
SIPI to vcpu 1 vector 0x10
vcpu 1 received sipi with vector # 10
virbr0: no IPv6 routers present
vnet0: no IPv6 routers present
vnet1: no IPv6 routers present
kvm: emulating exchange as write
Ignoring de-assert INIT to vcpu 1
SIPI to vcpu 1 vector 0x06
vcpu 1 received sipi with vector # 6
SIPI to vcpu 1 vector 0x06
vnet2: no IPv6 routers present
eth0: topology change detected, propagating
eth0: port 2(vnet0) entering forwarding state
Ignoring de-assert INIT to vcpu 1
SIPI to vcpu 1 vector 0x03
vcpu 1 received sipi with vector # 3
SIPI to vcpu 1 vector 0x03
Ignoring de-assert INIT to vcpu 1
eth0: topology change detected, propagating
eth0: port 4(vnet2) entering forwarding state
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet0: received packet with  own address as source address
vnet1: received packet with  own address as source address
vnet1: received packet with  own address as source address

The host can reach the guests ok, but nothing else can. 

Happy to test, provide more info, etc.

Comment 1 Daniel Berrangé 2008-03-14 17:30:37 UTC
This is fixed in Fedora 9  rawhide in libvirt-0.4.0-4.fc9. The same patch needs
to be applied to F8

Comment 2 Kevin Fenzi 2008-03-14 18:24:13 UTC
I can confirm that the 0.4.1-4 version from rawhide recompiled for f8 works fine
here. You might want to add those patches to the 0.4.1 thats in updates-testing
for f8. 

Comment 3 Daniel Veillard 2008-04-10 15:45:23 UTC
Okay, fixed for Rawhide and Fedora 9, i have also pushed
libvirt-0.4.2-1.fc8 in Testing, hopefully this will CLOSE this,

Daniel


Note You need to log in before you can comment on or make changes to this bug.