On Tue, Jun 26, 2018 at 09:39:25AM -0500, Daniel Jurgens wrote: > > On 6/26/2018 3:04 AM, Vasiliy Tolstov wrote: > > вт, 26 июн. 2018 г. в 5:26, Jason Gunthorpe <jgg@xxxxxxxxxxxx>: > >> On Tue, Jun 26, 2018 at 03:24:00AM +0300, Vasiliy Tolstov wrote: > >>> I'm debug this and i think that this is selinux problem, after i set > >>> permissive selinux i have: > >>> type=AVC msg=audit(1529969961.770:111): avc: denied { access } for > >>> pid=932 comm="systemd-network" pkey=0xffff subnet_prefix=0:0:0:80fe:: > >>> scontext=system_u:system_r:systemd_modules_load_t:s0 > >>> tcontext=system_u:object_r:unlabeled_t:s0 tclass=infiniband_pkey > >>> permissive=0 > > The upstream refpolicy doesn't define systemd_modules_load_t, I > think this will require an update to the fedora selinux policy to > allow access to unlabeled pkeys for that type. I've added Paul > Moore, hopefully he knows how to make that happen. No, this is not module loading. The ipoib module is already loaded. The issue is that somehow selinux is blocking an in-kernel user's modify_qp that should not be blocked. > >> It shouldn't hang, that seems like some other kind of bug.. What about this? > >> And it shouldn't print the subnet prefx in the wrong endian-ness > >> (subnet_prefix=0:0:0:80fe::) > This is a bug. You will send a patch? Jason -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html