Bug 2043121
| Summary: | KVM Fedora 35 guest x86 programs randomly crash in signal handler [rhel-av-8.4z] | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux Advanced Virtualization | Reporter: | RHEL Program Management Team <pgm-rhel-tools> | |
| Component: | qemu-kvm | Assignee: | Dr. David Alan Gilbert <dgilbert> | |
| qemu-kvm sub component: | CPU Models | QA Contact: | liunana <nanliu> | |
| Status: | CLOSED ERRATA | Docs Contact: | ||
| Severity: | high | |||
| Priority: | medium | CC: | ailan, cohuck, coli, dgilbert, jinzhao, juzhang, mlevitsk, nanliu, nilal, virt-bugs, virt-maint, wei.huang2, ymankad | |
| Version: | 8.4 | Keywords: | Triaged, ZStream | |
| Target Milestone: | rc | Flags: | pm-rhel:
mirror+
|
|
| Target Release: | 8.5 | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | qemu-kvm-5.2.0-16.module+el8.4.0+14193+48a3f5f5.15 | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | ||
| Clone Of: | 2031795 | |||
| : | 2052198 (view as bug list) | Environment: | ||
| Last Closed: | 2022-03-21 07:52:26 UTC | Type: | --- | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | 2031795, 2065230 | |||
| Bug Blocks: | 2052198 | |||
|
Comment 6
Yanan Fu
2022-02-15 05:53:26 UTC
Test PASS on rhel.8.4.0.z without carsh.
Test Env:
dell-per7525-16.lab.eng.pek2.redhat.com
4.18.0-305.25.1.el8_4.x86_64
qemu-kvm-5.2.0-16.module+el8.4.0+14193+48a3f5f5.15.x86_64
libvirt-6.0.0-35.1.module+el8.4.0+11273+64eb94ef.x86_64
BIOS Information
Vendor: Dell Inc.
Version: 2.5.6
Release Date: 10/06/2021
BIOS Revision: 2.5
Guest: 4.18.0-305.el8.x86_64
CPU configuration xml:
<cpu mode='custom' match='exact' check='full'>
<model fallback='forbid'>EPYC-Milan</model>
<vendor>AMD</vendor>
<feature policy='require' name='x2apic'/>
<feature policy='require' name='tsc-deadline'/>
<feature policy='require' name='hypervisor'/>
<feature policy='require' name='tsc_adjust'/>
<feature policy='require' name='vaes'/>
<feature policy='require' name='vpclmulqdq'/>
<feature policy='require' name='spec-ctrl'/>
<feature policy='require' name='stibp'/>
<feature policy='require' name='arch-capabilities'/>
<feature policy='require' name='ssbd'/>
<feature policy='require' name='cmp_legacy'/>
<feature policy='require' name='virt-ssbd'/>
<feature policy='require' name='rdctl-no'/>
<feature policy='require' name='skip-l1dfl-vmentry'/>
<feature policy='require' name='mds-no'/>
<feature policy='require' name='pschange-mc-no'/>
<feature policy='disable' name='erms'/>
<feature policy='disable' name='fsrm'/>
<feature policy='disable' name='svm'/>
<feature policy='disable' name='npt'/>
<feature policy='disable' name='nrip-save'/>
<feature policy='disable' name='svme-addr-chk'/>
<feature policy='require' name='xsaves'/>
<feature policy='require' name='topoext'/>
</cpu>
Move this bug to verified now.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: virt:av and virt-devel:av security and bug fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:0971 |