Bug 2162569

Summary: [transitional device][virtio-rng-pci-transitional]Stable Guest ABI failed between RHEL 8.6 to RHEL 9.2
Product: Red Hat Enterprise Linux 9 Reporter: Min Deng <mdeng>
Component: qemu-kvmAssignee: Virtualization Maintenance <virt-maint>
qemu-kvm sub component: Live Migration QA Contact: Min Deng <mdeng>
Status: CLOSED ERRATA Docs Contact:
Severity: medium    
Priority: medium CC: coli, jinzhao, juzhang, lijin, nilal, virt-maint
Version: 9.2Keywords: Regression, Triaged
Target Milestone: rc   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: qemu-kvm-7.2.0-8.el9 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-09 07:23:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Min Deng 2023-01-20 02:15:10 UTC
Description of problem:
[transitional device][virtio-rng-pci-transitional]Stable Guest ABI failed between RHEL 8.6 to RHEL 9.2 

Version-Release number of selected component (if applicable):
RHEL8.6
kernel-4.18.0-372.41.1.el8_6.x86_64
qemu-kvm-6.2.0-28.module+el8.8.0+17721+63bacee8.x86_64
RHEL9.2
kenrel-5.14.0-234.el9.x86_64
qemu-kvm-7.2.0-5.el9.x86_64


How reproducible:
5/5
Steps to Reproduce:
1.
On src,
/usr/libexec/qemu-kvm -device virtio-rng-pci-transitional,id=rng0 -monitor stdio -cpu Icelake-Server -machine pc-q35-rhel8.6.0
On dst
/usr/libexec/qemu-kvm -device virtio-rng-pci-transitional,id=rng0 -monitor stdio -cpu Icelake-Server -machine pc-q35-rhel8.6.0 -incoming defer
2. migration vm 

Actual results:
(qemu) qemu-kvm: get_pci_config_device: Bad config data: i=0x34 read: 84 device: 98 cmask: ff wmask: 0 w1cmask:0
qemu-kvm: Failed to load PCIDevice:config
qemu-kvm: Failed to load virtio-rng:virtio
qemu-kvm: error while loading state for instance 0x0 of device '0000:00:03.0/virtio-rng'
qemu-kvm: load of migration failed: Invalid argument


Expected results:
Migration successfully 


Additional info:
Notes
it's not reproducible with -device virtio-rng-pci because it has been fixed in bug Bug 2155749

Comment 1 Dr. David Alan Gilbert 2023-02-07 17:51:08 UTC
Posted upstream: [PATCH] virtio-rng-pci: fix transitional migration compat for vectors

Comment 2 Dr. David Alan Gilbert 2023-02-07 18:41:17 UTC
Please try this build:

https://kojihub.stream.centos.org/koji/taskinfo?taskID=1914745

(hopefully the right bug this time...)

Comment 3 Min Deng 2023-02-09 10:20:42 UTC
Tried above build from comment2
RHEL9.2
qemu-kvm-7.2.0-7.el9.root202302071825.x86_64
RHEL8.6
qemu-kvm-6.2.0-11.module+el8.6.0+17576+33ee06a8.7.x86_64
...
--> Running case(5/17): RHEL-289325-POST-COPY-[stable guest abi][x86_q35]do post-copy migration with "-M rhel8.6.0" machine type (6 min 28 sec)--- PASS.
--> Running case(6/17): RHEL-289325-[stable guest abi][x86_q35]do forward and backward migration with "-M rhel8.6.0" machine type (8 min 36 sec)--- PASS.
...

The patch works well, thanks.

Comment 4 Dr. David Alan Gilbert 2023-02-09 12:20:15 UTC
Thanks for testing!

Comment 6 Yanan Fu 2023-02-13 08:55:28 UTC
QE bot(pre verify): Set 'Verified:Tested,SanityOnly' as gating/tier1 test pass.

Comment 9 Min Deng 2023-02-14 14:16:23 UTC
Verified the bug on the following builds
RHEL8.6
qemu-kvm-6.2.0-11.module+el8.6.0+18167+43cf40f3.8.x86_64
kernel-4.18.0-372.45.1.el8_6.x86_64
RHEL9.2
kernel-5.14.0-265.el9.x86_64
qemu-kvm-7.2.0-8.el9.x86_64

--> Running case(5/17): RHEL-289325-POST-COPY-[stable guest abi][x86_q35]do post-copy migration with "-M rhel8.6.0" machine type (6 min 20 sec)--- PASS.
--> Running case(6/17): RHEL-289325-[stable guest abi][x86_q35]do forward and backward migration with "-M rhel8.6.0" machine type (8 min 36 sec)--- PASS.

Comment 13 errata-xmlrpc 2023-05-09 07:23:43 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: qemu-kvm security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2023:2162