Bug 2160028
Summary: | backport vsock patches for RHEL-9.2 | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | Stefano Garzarella <sgarzare> |
Component: | kernel | Assignee: | Stefano Garzarella <sgarzare> |
kernel sub component: | KVM | QA Contact: | Qinghua Cheng <qcheng> |
Status: | CLOSED ERRATA | Docs Contact: | |
Severity: | medium | ||
Priority: | medium | CC: | boyang, coli, jinzhao, juzhang, ldu, nilal, qcheng, vgoyal, virt-maint, yacao |
Version: | 9.2 | Keywords: | Triaged |
Target Milestone: | rc | ||
Target Release: | 9.2 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | kernel-5.14.0-243.el9 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2023-05-09 08:11:33 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Stefano Garzarella
2023-01-11 11:22:13 UTC
Updated the result from Virt QE team - RHEL in ESXi. Tested with 5.14.0-232.1869_744520832.el9 and passed the regression. Test Environment Host: ESXi 7.0 Guest: RHEL-9.2.0 with 5.14.0-232.1869_744520832.el9 Steps to Test 0. Upgraded the Guest with Repo URL based on above target Host. 1. Launched its regression with CI - https://ci-jenkins-csb-esxi.apps.ocp-c1.prod.psi.redhat.com/job/ESXi-Project/job/regression-trigger/31/, and checked cases status if failed. If you have any specific cases or steps to try, let me know. Pre-verify on rhel 9.2 kernel: 5.14.0-232.1869_744520832.el9.x86_64 qemu-kvm: qemu-kvm-7.2.0-3.el9.x86_64 vsock regression test PASS. Verified on rhel 9.2 kernel: 5.14.0-252.el9.x86_64 qemu-kvm: qemu-kvm-7.2.0-6.el9.x86_64 Vsock automation tests PASS SO_RCVLOWAT test case passes: 10 - SOCK_STREAM poll() + SO_RCVLOWAT...ok Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: kernel security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:2458 |