Bug 618562
| Summary: | P2p migrate fail with error 'Unknown failure'. | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | wangyimiao <yimwang> |
| Component: | libvirt | Assignee: | Eric Blake <eblake> |
| Status: | CLOSED DUPLICATE | QA Contact: | Virtualization Bugs <virt-bugs> |
| Severity: | high | Docs Contact: | |
| Priority: | low | ||
| Version: | 6.0 | CC: | dallan, ddumas, dyuan, eblake, llim, phineas, xen-maint, yoyzhang |
| Target Milestone: | rc | Keywords: | RHELNAK |
| Target Release: | 6.1 | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-06-21 01:53:24 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
wangyimiao
2010-07-27 09:34:06 UTC
This issue has been proposed when we are only considering blocker issues in the current Red Hat Enterprise Linux release. ** If you would still like this issue considered for the current release, ask your support representative to file as a blocker on your behalf. Otherwise ask that it be considered for the next Red Hat Enterprise Linux release. ** > Jul 27 07:31:13 dhcp-93-211 libvirtd: 07:31:13.552: error : > qemuDomainWaitForMigrationComplete:5371 : operation failed: Migration > unexpectedly failed This indicates that qemu's 'info migrate' command reported a failure. QEMU doesn't give us any further information on this, unless there is some in its stderr logfile. > Jul 27 07:31:13 dhcp-93-211 libvirtd: 07:31:13.855: error : remoteIO:9888 : > Unknown failure This is likely just libvirt overwriting the original error message during cleanup after failure. I'm looking for a bit more information in an effort to reproduce this particular error message. Did you run 'iptables -F' and 'setenforce 0' on the source (10.66.93.211), destination (10.66.93.98), or both machines? Does the failure still happen with the latest nightly snapshots of each of the packages? Do you need to run 'iptables -F', or is it sufficient to use system-config-firewall to allow traffic on ports 49152-49215)? Did you get any SELinux AVC denial messages from setroubleshoot, or is disabling SELinux not necessary? If it is just a quality of error message, then I'm inclined to defer any fix to 6.1. If it is a real bug in migration, then we need to figure out if it is a bug in qemu or in libvirt. At any rate, I still have to convince myself whether I've found the real cause of the error message, and I haven't been able to get to that point yet. I am seeing an issue where iptables is not accurately reflecting the firewall settings of system-config-firewall; but that may be due to bug 617505. Ultimately, the firewall should not need to be relaxed if iptables is configured to allow tcp ports 49152-49215 through, but I'm having a hard time getting that configuration to stick in my setup. In the meantime, the action of 'iptables -F' works around this issue. I was able to successfully migrate between two rhel hosts, with 'iptables -F' and 'setenforcing 1', and these versions: kernel-2.6.32-59.1.el6.x86_64 iptables-1.4.7-3.el6.x86_64 qemu-kvm-0.12.1.2-2.108.el6.x86_64 libvirt-0.8.1-21.el6.x86_64 Since 6.0 can perform a migration (provided all the configuration is correct), it is more of a documentation issue at this late stage in the game, rather than any further software improvements. As for the quality of error messages, fixing that should be deferred to 6.1. *** Bug 622960 has been marked as a duplicate of this bug. *** Chris identified two bugs with upstream patches: https://www.redhat.com/archives/libvir-list/2010-August/msg00215.html https://www.redhat.com/archives/libvir-list/2010-August/msg00218.html Actually, Chris's patches fix --tunnelled, not --p2p; the two use slightly different code paths. And the work-around for --tunnelled if Chris's patches are not backported is to run qemu-kvm as root:root instead of qemu:qemu, but that has its own set of drawbacks. Since RHEL 6.1 External Beta has begun, and this bug remains unresolved, it has been rejected as it is not proposed as an exception or blocker. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. *** This bug has been marked as a duplicate of bug 615941 *** |