RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 735727 - Login screen: Virtualization hardware is unavailable when virtualization is enable.
Summary: Login screen: Virtualization hardware is unavailable when virtualization is e...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: ovirt-node
Version: 6.2
Hardware: x86_64
OS: Linux
medium
medium
Target Milestone: rc
: 6.2
Assignee: Alan Pevec
QA Contact: Virtualization Bugs
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-09-05 08:20 UTC by cshao
Modified: 2011-12-06 19:27 UTC (History)
7 users (show)

Fixed In Version: ovirt-node-2.0.2-0.5.git83340dd.el6
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-12-06 19:27:16 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
virtualization hardware is unavailable (19.70 KB, image/jpeg)
2011-09-05 08:51 UTC, cshao
no flags Details


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2011:1783 0 normal SHIPPED_LIVE rhev-hypervisor6 bug fix and enhancement update 2011-12-06 15:10:54 UTC

Description cshao 2011-09-05 08:20:20 UTC
Description of problem:
Login screen: Virtualization hardware is unavailable when virtualization is enable.

Version-Release number of selected component (if applicable):
rhev-hypervisor-6.2-0.15.el6

How reproducible:
100%

Steps to Reproduce:
1. Install RHEV-H.
2. Login RHEV-H.
3.
  
Actual results:
RHEV-H shows Virtualization hardware is unavailable when virtualization is enable.

#cat /etc/issue
Red Hat Enterprise Virtualization Hypervisor release 6.2 (0.15.el6)
Kernel \r on an \m (\l)
Virtualization hardware is unavailable.
(Virtualization hardware was detected but is disabled)

Please login as 'admin' to configure the node
[root@localhost admin]# cat /proc/cpuinfo | grep vmx
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr pdcm sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority


Expected results:
Virtualization hardware is unavailable shouldn't show when virtualization is enable.

Additional info:

Comment 4 cshao 2011-09-05 08:51:45 UTC
Created attachment 521452 [details]
virtualization hardware is unavailable

Comment 5 Mike Burns 2011-09-05 12:28:01 UTC
The intro text is added by the ovirt-post service.  We look for "kvm" in the output of virsh --readonly capabilities.  This seems to fail with:

Fatal: no entropy gathering module detected

full output of re-running ovirt-post with set -x

# /etc/init.d/ovirt-post reload
+ local count=0post:                                       [  OK  ]
+ true
+ '[' -r /var/run/libvirt/libvirt-sock-ro ']'
+ break
++ mktemp
+ BACKUP=/tmp/tmp.PJ5vLx6iLv
+ ISSUE=/etc/issue
+ ISSUE_NET=/etc/issue.net
+ egrep -v '[Vv]irtualization hardware' /etc/issue
+ cp -f /tmp/tmp.PJ5vLx6iLv /etc/issue
++ virsh --readonly capabilities
Fatal: no entropy gathering module detected
+ hwvirt=
+ [[ '' =~ kvm ]]
+ log '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'
++ date '+%b %d %H:%M:%S'
+ printf 'Sep 05 12:23:27 '
Sep 05 12:23:27 + '[' 1 = 1 ']'
+ echo '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
+ log '!!! Hardware Virtualization Is Unavailable !!!'
++ date '+%b %d %H:%M:%S'
+ printf 'Sep 05 12:23:27 '
Sep 05 12:23:27 + '[' 1 = 1 ']'
+ echo '!!! Hardware Virtualization Is Unavailable !!!'
!!! Hardware Virtualization Is Unavailable !!!
+ log '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'
++ date '+%b %d %H:%M:%S'
+ printf 'Sep 05 12:23:27 '
Sep 05 12:23:27 + '[' 1 = 1 ']'
+ echo '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
+ echo 'Virtualization hardware is unavailable.'
++ cat /proc/cpuinfo
++ grep '^flags'
+ flags='flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority'
+ [[ flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags		: fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority =~ vmx ]]
+ echo '(Virtualization hardware was detected but is disabled)'
+ is_local_storage_configured
+ lvs HostVG/Config
+ return 0
+ echo ''
+ echo 'Please login as '\''admin'\'' to configure the node'
+ cp -f /etc/issue /etc/issue.net
+ is_standalone
+ is_managed
+ return 1
+ return 0
+ return 0

Comment 6 Alan Pevec 2011-09-07 11:09:54 UTC
> Fatal: no entropy gathering module detected

selinux policy changed for /dev/*random
As a quickfix, ovirt-post will be made run unconfined, like ovirt-firstboot:

--- a/recipe/rhevh6-post.ks
+++ b/recipe/rhevh6-post.ks
@@ -147,6 +147,7 @@ init_daemon_domain(unconfined_t,ovirt_exec_t)
 EOF_OVIRT_TE
 cat > ovirt.fc << \EOF_OVIRT_FC
 /etc/rc\.d/init\.d/ovirt-firstboot             -- gen_context(system_u:object_r
+/etc/rc\.d/init\.d/ovirt-post             -- gen_context(system_u:object_r:ovir
 EOF_OVIRT_FC
 make NAME=targeted -f /usr/share/selinux/devel/Makefile
 semodule -v -i ovirt.pp

Comment 7 Alan Pevec 2011-09-07 11:14:22 UTC
Hmm, that won't help, it's actually virsh which runs in xm_t domain and it's denied access do /dev/random:

type=AVC msg=audit(1315393214.581:204): avc:  denied  { read } for  pid=7069 comm="virsh" name="random" dev=devtmpfs ino=3615 scontext=unconfined_u:system_r:xm_t:s0 tcontext=system_u:object_r:random_device_t:s0 tclass=chr_file

Comment 8 Alan Pevec 2011-09-07 11:23:50 UTC
Ignore above: when ovirt-post is unconfined, virsh stays unconfined.

Comment 9 Alan Pevec 2011-09-07 20:34:47 UTC
Not a regression in ovirt-node

Comment 10 Alan Pevec 2011-09-09 07:06:56 UTC
While at it, clean of temp file was missing:
--- a/scripts/ovirt-post
+++ b/scripts/ovirt-post
@@ -39,6 +39,7 @@ start_ovirt_post() {
     ISSUE_NET=/etc/issue.net
     egrep -v "[Vv]irtualization hardware" $ISSUE > $BACKUP
     cp -f $BACKUP $ISSUE
+    rm $BACKUP
     hwvirt=$(virsh --readonly capabilities)
     if [[ $hwvirt =~ kvm ]]; then
         log "Hardware virtualization detected"

Comment 13 errata-xmlrpc 2011-12-06 19:27:16 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2011-1783.html


Note You need to log in before you can comment on or make changes to this bug.