RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 674539 - slow guests block other guests on the same lan
Summary: slow guests block other guests on the same lan
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: qemu-kvm
Version: 6.0
Hardware: Unspecified
OS: Unspecified
unspecified
high
Target Milestone: rc
: ---
Assignee: Michael S. Tsirkin
QA Contact: Virtualization Bugs
URL:
Whiteboard:
Depends On:
Blocks: 580954
TreeView+ depends on / blocked
 
Reported: 2011-02-02 12:14 UTC by Michael S. Tsirkin
Modified: 2013-01-09 23:32 UTC (History)
7 users (show)

Fixed In Version: qemu-kvm-0.12.1.2-2.136.el6
Doc Type: Bug Fix
Doc Text:
Cause: qemu-kvm tap code default for 'sndbuf' can prevent another guest from transmitting any packets. Consequence: sending packets from guest to another guest that do not consume the packets can cause all networking from said guest to get blocked. Fix: default of 'sndbuf' option changed to 0, disabling sndbuf. Result: guest networking is not blocked even when it is sending packets to another guest that is not consuming the packets.
Clone Of:
Environment:
Last Closed: 2011-05-19 11:21:29 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:0534 0 normal SHIPPED_LIVE Important: qemu-kvm security, bug fix, and enhancement update 2011-05-19 11:20:36 UTC

Comment 4 Amos Kong 2011-02-19 10:42:27 UTC
I could not reproduce this bug with (qemu-kvm-0.12.1.2-2.129.el6.x86_64) by the steps in comment #0.

> Steps to Reproduce:
> 1. create multiple guests connected to a bridge: A,B,C,D
> 2. force arp in guest A to match guest B
> arp -i eth0 -s <ip for guest B> <mac for guest B>

execute in guest A ?
>   repeat for guests C, D

execute in guest C ?
> 3. ping guest B, we should get back packets
>    e.g. with -c 1

ping from guest A ?
>    repeat for C, D

ping from guest A ?
> 3. ifdown guest B

guest B) # ifconfig eth0 down
>     repeat for C,D

guest D) # ifconfig eth0 down
> 4. log into guest A
>  ping -f -c 2000 -s 1000 B_ip -i 0.01

ping from guest A?
>    repeat for C, D

ping from guest A?
> Actual results:
> outgoing networking from A is blocked.
> E.g. A does not reply to ping.

ping from host?
> Expected results:
> networking from A to C,D is blocked,
> networking from A to host works

qemu commandline
# qemu-kvm -name guesta -chardev socket,id=human_monitor_Knqg,path=/tmp/monitor-humanmonitor1-20110219-174500-2Nk6,server,nowait -mon chardev=human_monitor_Knqg,mode=readline -chardev socket,id=serial_2QM1,path=/tmp/s1,server,nowait -device isa-serial,chardev=serial_2QM1 -drive file=/home/autotest-devel/client/tests/kvm/images/RHEL-Server-6.0-64-virtio.qcow2,index=0,if=none,id=drive-virtio-disk1,media=disk,cache=none,snapshot=on,format=qcow2,aio=native -device virtio-blk-pci,bus=pci.0,addr=0x4,drive=drive-virtio-disk1,id=virtio-disk1 -device virtio-net-pci,netdev=idkZj2Gr,mac=9a:76:6e:ab:5c:3f,netdev=idkZj2Gr,id=ndev00idkZj2Gr,bus=pci.0,addr=0x3 -netdev tap,id=idkZj2Gr,vhost=on,ifname=t0-174500-2Nk6,script=/home/autotest-devel/client/tests/kvm/scripts/qemu-ifup-switch,downscript=no -m 512 -smp 2,cores=1,threads=1,sockets=2 -cpu cpu64-rhel6,+sse2,+x2apic -vnc :0 -rtc base=utc,clock=host,driftfix=none -boot order=cdn,once=c,menu=off -usbdevice tablet -no-kvm-pit-reinjection -enable-kvm

Comment 8 Eduardo Habkost 2011-05-03 19:26:06 UTC
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
Cause: qemu-kvm tap code default for 'sndbuf' can prevent another guest from transmitting any packets.

Consequence: sending packets from guest to another guest that do not consume the packets can cause all networking from said guest to get blocked.

Fix: default of 'sndbuf' option changed to 0, disabling sndbuf.

Result: guest networking is not blocked even when it is sending packets to another guest that is not consuming the packets.

Comment 9 errata-xmlrpc 2011-05-19 11:21:29 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0534.html

Comment 10 errata-xmlrpc 2011-05-19 13:01:24 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0534.html


Note You need to log in before you can comment on or make changes to this bug.