Bug 694378
Summary: | Core dump occurs when ballooning memory to 0 | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Mike Cao <bcao> |
Component: | qemu-kvm | Assignee: | Amit Shah <amit.shah> |
Status: | CLOSED ERRATA | QA Contact: | Virtualization Bugs <virt-bugs> |
Severity: | medium | Docs Contact: | |
Priority: | high | ||
Version: | 6.2 | CC: | bcao, ehabkost, juzhang, michen, mkenneth, rhod, virt-maint, xfu |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | qemu-kvm-0.12.1.2-2.179.el6 | Doc Type: | Bug Fix |
Doc Text: |
Invalid balloon values, like 0, used to crash QEMU. The fix is to validate input. After the fix, QEMU doesn't crash on invalid input.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2011-12-06 15:51:50 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Mike Cao
2011-04-07 07:28:36 UTC
Since RHEL 6.1 External Beta has begun, and this bug remains unresolved, it has been rejected as it is not proposed as exception or blocker. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. Hello Mike, I have two questions: - who is the guest, - what is the entire command line? Best regards, Vadim. (In reply to comment #4) > Hello Mike, > > I have two questions: > - who is the guest, RHEL5.7 64 bit guest I think all the linux guest with -device virtio-balloon-pci,id=balloon0 will hit the issue > - what is the entire command line? /usr/libexec/qemu-kvm -M rhel6.1.0 -enable-kvm -m 512 -smp 1,sockets=1,cores=1,threads=1 -name RHEL5u7 -uuid d1356948-d6b2-c328-75c0-5746606f5f34 -rtc base=utc -boot c -drive file=/home/RHEL-Server-5.7-64-virtio.qcow2,if=none,id=drive-virtio-disk0,format=qcow2,cache=none,aio=threads -device virtio-blk-pci,drive=drive-virtio-disk0,id=virtio-disk0 -netdev tap,id=hostnet0,vhost=on -device virtio-net-pci,netdev=hostnet0,id=net0,mac=52:54:00:62:64:55 -chardev pty,id=charserial0 -device isa-serial,chardev=charserial0,id=serial0 -usb -vnc 0:0 -vga cirrus -device virtio-balloon-pci,id=balloon0 -monitor stdio > > Best regards, > Vadim. (In reply to comment #5) > (In reply to comment #4) > > Hello Mike, > > > > I have two questions: > > - who is the guest, > RHEL5.7 64 bit guest > I think all the linux guest with -device virtio-balloon-pci,id=balloon0 will > hit the issue > Will check it. Thank you, Vadim. Patches posted upstream. reproduce on qemu-kvm-0.12.1.2-2.159.el6.x86_64 verify on qemu-kvm-0.12.1.2-2.182.el6.x86_64 steps to reproduce 1. /usr/libexec/qemu-kvm -enable-kvm -m 6G -smp 4 -name rhel6 -uuid ddcbfb49-3411-1701-3c36-6bdbc00bedb9 -rtc base=utc,clock=host,driftfix=slew -boot c -drive file=/dev/migrate/data3,if=none,id=drive-ide0-0-0,boot=on,format=qcow2,cache=none -device ide-drive,bus=ide.0,unit=0,drive=drive-ide0-0-0,id=ide0-0-0,physical_block_size=4096,logical_block_size=4096 -netdev tap,id=hostnet0 -device virtio-net-pci,netdev=hostnet0,id=net0,mac=52:54:50:a4:c2:c2 -chardev pty,id=serial0 -device isa-serial,chardev=serial0 -usb -device usb-tablet,id=input0 -spice id=on,disable-ticketing,port=5912 -monitor stdio -device virtio-balloon-pci,id=balloon0 2. (qemu) balloon 0 actual results: on qemu-kvm-0.12.1.2-2.159.el6.x86_64 (qemu) balloon 0 *** glibc detected *** /usr/libexec/qemu-kvm: corrupted double-linked list: 0x000000000312f0b0 *** on qemu-kvm-0.12.1.2-2.182.el6.x86_64 (qemu) balloon 0 Parameter 'target' expects a size and guest work well Based on above ,this issue has been fixed.
> 2. (qemu) balloon 0
>
> actual results:
> on qemu-kvm-0.12.1.2-2.159.el6.x86_64
> (qemu) balloon 0
> *** glibc detected *** /usr/libexec/qemu-kvm: corrupted double-linked list:
> 0x000000000312f0b0 ***
>
> on qemu-kvm-0.12.1.2-2.182.el6.x86_64
> (qemu) balloon 0
> Parameter 'target' expects a size and guest work well
>
> Based on above ,this issue has been fixed.
Also tried "negative number" and supper max number.
result:
Parameter 'target' expects a size
Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: Invalid balloon values, like 0, used to crash QEMU. The fix is to validate input. After the fix, QEMU doesn't crash on invalid input. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2011-1531.html |