RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1085701 - Guest hits call trace migrate from RHEL6.5 to RHEL7.0 host with -M 6.1 & balloon & uhci device
Summary: Guest hits call trace migrate from RHEL6.5 to RHEL7.0 host with -M 6.1 & ball...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: qemu-kvm
Version: 7.0
Hardware: x86_64
OS: Linux
medium
high
Target Milestone: rc
: ---
Assignee: Laszlo Ersek
QA Contact: Virtualization Bugs
URL:
Whiteboard:
: 1085686 (view as bug list)
Depends On:
Blocks: RHEL7.0Virt-PostBeta(0-Day) 1090981 1103581
TreeView+ depends on / blocked
 
Reported: 2014-04-09 07:33 UTC by FuXiangChun
Modified: 2015-03-05 08:05 UTC (History)
12 users (show)

Fixed In Version: qemu-kvm-1.5.3-61.el7
Doc Type: Bug Fix
Doc Text:
Clone Of:
: 1103581 (view as bug list)
Environment:
Last Closed: 2015-03-05 08:05:33 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
full guest dmesg log in des host (49.43 KB, text/plain)
2014-04-09 07:44 UTC, FuXiangChun
no flags Details


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:0349 0 normal SHIPPED_LIVE Important: qemu-kvm security, bug fix, and enhancement update 2015-03-05 12:27:34 UTC

Description FuXiangChun 2014-04-09 07:33:51 UTC
Description of problem:
Boot RHEL7.0 guest with rhel6.1.0 machine type and balloon and uhci device on RHEL6.5 host. Guest show call trace in destination RHEL7.0 host after migrating.

QE tested qemu-kvm-1.5.3-60.el7.x86_64 & qemu-kvm-1.5.3-20.el7.x86_64. Both hit this bug. so it isn't a regression bug.


Version-Release number of selected component (if applicable):
RHEL6.5 host:
2.6.32-452.el6.x86_64
qemu-kvm-0.12.1.2-2.420.el6.x86_64
qemu-kvm-0.12.1.2-2.422.el6.x86_64

RHEL7.0 host:
3.10.0-121.el7.x86_64
qemu-kvm-1.5.3-60.el7.x86_64
qemu-kvm-1.5.3-20.el7.x86_64

How reproducible:
100%

Steps to Reproduce:
1.full qemu-kvm command line on rhel6.5 & rhel7.0 host

/usr/libexec/qemu-kvm -M rhel6.1.0 -cpu Opteron_G3,check,+kvm_pv_eoi,hv_relaxed,+ibs,+osvw,+3dnowprefetch,+cr8legacy,+extapic,+cmp_legacy,+3dnow,+3dnowext,+pdpe1gb,+fxsr_opt,+mmxext,+ht,+vme  -enable-kvm  -m 4096 -realtime mlock=off -smp 4,sockets=2,cores=2,threads=1,maxcpus=160 -numa node,cpus=0 -numa node,cpus=1 -numa node,cpus=2 -numa node,cpus=3 -nodefconfig -nodefaults -global PIIX4_PM.disable_s3=0 -global PIIX4_PM.disable_s4=0 -global ide-drive.physical_block_size=4096 -global ide-drive.logical_block_size=4096 -global virtio-blk-pci.physical_block_size=512 -global virtio-blk-pci.logical_block_size=512 -boot order=cdn,once=n,menu=on,strict=on,reboot-timeout=60000 -k en-us -soundhw ac97 -device virtio-balloon-pci,id=ballooning,bus=pci.0,addr=0x5,indirect_desc=on,event_idx=on,multifunction=on,rombar=100 -monitor stdio -name test-all-qemu-kvm-option -uuid `uuidgen` -drive file=/dev/sdb,if=none,id=drive-virtio-disk,format=qcow2,cache=none,aio=native,werror=stop,rerror=stop,media=disk,snapshot=off,bus=1,unit=1 -device virtio-blk-pci,scsi=off,drive=drive-virtio-disk,id=virtio-disk,bus=pci.0,addr=0x7,bootindex=1,physical_block_size=512,logical_block_size=512,multifunction=on,scsi=on,event_idx=on,indirect_desc=on,vectors=32,x-data-plane=off,ioeventfd=on,serial=fuxc,discard_granularity=1,min_io_size=4096,opt_io_size=4096 -usbdevice tablet -usbdevice mouse  -netdev tap,id=hostnet0,vhost=on,script=/etc/qemu-ifup,downscript=no,ifname=fuxc-net -device virtio-net-pci,netdev=hostnet0,id=virtio-net-pci0,mac=00:01:02:03:04:05,bus=pci.0,addr=0x9,multifunction=on,status=on,gso=on,ioeventfd=on,vectors=8,indirect_desc=off,event_idx=off,guest_tso4=off,guest_tso6=on,guest_ecn=off,guest_ufo=on,host_tso4=off,host_tso6=on,host_ecn=on,mrg_rxbuf=off,ctrl_vq=on,host_ufo=on,mrg_rxbuf=on,ctrl_rx=on,ctrl_vlan=on,ctrl_rx_extra=on,ctrl_mac_addr=on -netdev tap,id=hostnet1,vhost=off,script=/etc/qemu-ifup,downscript=no,ifname=fuxc-net1 -device e1000,netdev=hostnet1,id=virtio-net-pci1,mac=00:01:02:03:04:06,bus=pci.0,addr=0xa,multifunction=off -netdev tap,id=hostnet2,vhost=off,script=/etc/qemu-ifup,downscript=no,ifname=fuxc-net-rtl8139 -device rtl8139,netdev=hostnet2,id=virtio-net-pci2,mac=00:01:02:03:04:07,bus=pci.0,addr=0xb,multifunction=off -serial unix:/tmp/monitor2,server,nowait -rtc base=utc -no-shutdown -drive file=/mnt/ide-disk,if=none,id=drive-data-disk,format=raw,cache=none,aio=native,werror=stop,rerror=stop,copy-on-read=off,serial=fux-ide,media=disk -device ide-drive,drive=drive-data-disk,id=system-disk,wwn=0x5000c50015ea71ad,logical_block_size=512,physical_block_size=512,min_io_size=32,opt_io_size=64,discard_granularity=512,ver=fuxc-ver,bus=ide.0,unit=0  -chardev tty,id=serial1,path=/dev/ttyS0 -device isa-serial,chardev=serial1 -chardev socket,id=channel1,path=/tmp/helloworld1,server,nowait  -chardev socket,id=channel2,path=/tmp/helloworld2,server,nowait -device virtio-serial-pci,id=virtio-serial0,max_ports=16,vectors=0 -chardev file,id=channel3,path=/mnt/helloworld1.txt -device virtserialport,chardev=channel3,name=com.redhat.rhevm.vdsm1,bus=virtio-serial0.0,id=port1,nr=1 -chardev socket,id=isa-serial-1,path=/tmp/isa-serial-1,server,nowait -device isa-serial,chardev=isa-serial-1 -device ich9-usb-uhci1,id=usb1,addr=0x11 -device usb-tablet,id=input0 -device usb-mouse,id=input1 -global pvpanic.ioport=0x0505 -machine rhel6.1.0,dump-guest-core=off -drive file=/mnt/winutils.iso,if=none,media=cdrom,id=drive-ide0-1-0,readonly=on,format=raw -device ide-drive,bus=ide.1,unit=1,drive=drive-ide0-1-0,id=ide0-1-0,wwn=0x5000c50015ea71ade,logical_block_size=512,physical_block_size=512,min_io_size=32,opt_io_size=64,discard_granularity=512,unit=1,ver=fuxc-ver-cdrom,bus=ide.0,unit=1 -drive file=/mnt/virtio-scsi-disk,if=none,id=drive-scsi-disk,format=raw,cache=none,werror=stop,rerror=stop -device virtio-scsi-pci,id=scsi0,addr=0x13,vectors=16,indirect_desc=on,event_idx=off,hotplug=on,param_change=off,num_queues=1,max_sectors=512,cmd_per_lun=16,multifunction=on,rombar=64 -device scsi-hd,drive=drive-scsi-disk,bus=scsi0.0,scsi-id=0,lun=0,id=data-disk2,logical_block_size=1024,physical_block_size=1024,min_io_size=512,opt_io_size=512,discard_granularity=512,ver=fuxc-scsi,serial=fuxc-scsi-serial,removable=off,wwn=0x16,channel=0,scsi-id=2,lun=2 -device sga -spice port=5901,password=redhat-vga,disable-ticketing -vga qxl -global qxl-vga.vram_size=33554432 -device intel-hda,id=sound0,bus=pci.0 -device hda-duplex,id=sound0-codec0,bus=sound0.0,cad=0 -chardev socket,path=/tmp/foo,server,nowait,id=foo -drive file=/mnt/virtio-win_amd64.vfd,if=none,id=drive-fdc0-0-0,readonly=on,format=raw -global isa-fdc.driveA=drive-fdc0-0-0

2.do migration

3.

Actual results:
Guest can work but follow up call trace.

[  198.032009] Call Trace:
[  198.032009]  <IRQ>  [<ffffffff815ec0ba>] dump_stack+0x19/0x1b
[  198.032009]  [<ffffffff810f96e2>] __report_bad_irq+0x32/0xd0
[  198.032009]  [<ffffffff810f9b02>] note_interrupt+0x132/0x1f0
[  198.032009]  [<ffffffff810f7221>] handle_irq_event_percpu+0xe1/0x1e0
[  198.032009]  [<ffffffff810f735d>] handle_irq_event+0x3d/0x60
[  198.032009]  [<ffffffff810fa7ba>] handle_fasteoi_irq+0x5a/0x100
[  198.032009]  [<ffffffff81014c3f>] handle_irq+0xbf/0x150
[  198.032009]  [<ffffffff81067247>] ? irq_enter+0x17/0xa0
[  198.032009]  [<ffffffff815fea4f>] do_IRQ+0x4f/0xf0
[  198.032009]  [<ffffffff815f3bad>] common_interrupt+0x6d/0x6d
[  198.032009]  [<ffffffff8106fe8e>] ? update_process_times+0x6e/0x80
[  198.032009]  [<ffffffff81066ff0>] ? __do_softirq+0xa0/0x290
[  198.032009]  [<ffffffff81066f70>] ? __do_softirq+0x20/0x290
[  198.032009]  [<ffffffff810bd9a4>] ? tick_program_event+0x24/0x30
[  198.032009]  [<ffffffff815fe15c>] call_softirq+0x1c/0x30
[  198.032009]  [<ffffffff81014d25>] do_softirq+0x55/0x90
[  198.032009]  [<ffffffff810673e5>] irq_exit+0x115/0x120
[  198.032009]  [<ffffffff815feb35>] smp_apic_timer_interrupt+0x45/0x60
[  198.032009]  [<ffffffff815fd49d>] apic_timer_interrupt+0x6d/0x80
[  198.032009]  <EOI>  [<ffffffff81046346>] ? native_safe_halt+0x6/0x10
[  198.032009]  [<ffffffff8101b39f>] default_idle+0x1f/0xc0
[  198.032009]  [<ffffffff8101bc96>] arch_cpu_idle+0x26/0x30
[  198.032009]  [<ffffffff810b4725>] cpu_startup_entry+0xf5/0x290
[  198.032009]  [<ffffffff815ce027>] rest_init+0x77/0x80
[  198.032009]  [<ffffffff81a18fa7>] start_kernel+0x429/0x44a
[  198.032009]  [<ffffffff81a18987>] ? repair_env_string+0x5c/0x5c
[  198.032009]  [<ffffffff81a18120>] ? early_idt_handlers+0x120/0x120
[  198.032009]  [<ffffffff81a185ee>] x86_64_start_reservations+0x2a/0x2c
[  198.032009]  [<ffffffff81a18742>] x86_64_start_kernel+0x152/0x175
[  198.032009] handlers:
[  198.032009] [<ffffffffa00606d0>] vp_interrupt [virtio_pci]
[  198.032009] Disabling IRQ #10

Expected results:
Migration is successful and Guest works well

Additional info:
1. QE tested win7-64 guest. guest works well in des host.

2. In order to narrow down what's real problem. I remove the devices from qemu-kvm gradualy. At last, I find the we can easily reproduce this issue with balloon & uhci device. This is key command line.

/usr/libexec/qemu-kvm -M rhel6.1.0 -cpu Opteron_G3 -enable-kvm  -m 4096 -smp 4,sockets=2,cores=2,threads=1,maxcpus=160 -k en-us -device virtio-balloon-pci,id=ballooning,bus=pci.0,addr=0x5 -drive file=/dev/sdb,if=none,id=drive-virtio-disk,format=qcow2,cache=none,aio=native,werror=stop,rerror=stop,media=disk,snapshot=off,bus=1,unit=1 -device virtio-blk-pci,scsi=off,drive=drive-virtio-disk,id=virtio-disk,bus=pci.0,addr=0x7,bootindex=1 -device ich9-usb-uhci1,id=usb1,addr=0x11 -device usb-tablet,id=input0 -device usb-mouse,id=input1  -monitor stdio -serial unix:/tmp/monitor,server,nowait -net none -vnc :1

3. Machine type rhel6.2~rhel6.5 don't hit this issue.

Comment 1 FuXiangChun 2014-04-09 07:35:30 UTC
*** Bug 1085686 has been marked as a duplicate of this bug. ***

Comment 2 FuXiangChun 2014-04-09 07:44:59 UTC
Created attachment 884413 [details]
full guest dmesg log in des host

Comment 4 FuXiangChun 2014-04-09 08:41:30 UTC
QE tested both qemu-kvm-1.5.3-60.el7.x86_64 and qemu-kvm-1.5.3-20.el7.x86_64(verify bug 1029539 with this version). Both hit this bug. so may not be a regression bug.

Comment 5 Laszlo Ersek 2014-04-23 13:09:01 UTC
Please retest with the brew build linked in bug 1027565 comment 72. Thank you.

Comment 9 Laszlo Ersek 2014-04-24 00:27:11 UTC
This problem has been analyzed from bug 1027565 comment 64 to bug 1027565 comment 74. Patch in bug 1027565 comment 71, brew build linked in bug 1027565 comment 72.

Comment 10 huiqingding 2014-04-24 03:34:51 UTC
(In reply to Laszlo Ersek from comment #5)
> Please retest with the brew build linked in bug 1027565 comment 72. Thank
> you.

Use the brew build of bug 1027565 comment 72, miagrate a rhel6.5-64 guest from rhel6.5 host to rhel7.0 host, migation is successful and not hit call trace.

Description of problem:
Boot RHEL7.0 guest with rhel6.1.0 machine type and balloon and uhci device on RHEL6.5 host. Guest show call trace in destination RHEL7.0 host after migrating.

QE tested qemu-kvm-1.5.3-60.el7.x86_64 & qemu-kvm-1.5.3-20.el7.x86_64. Both hit this bug. so it isn't a regression bug.


Version-Release number of selected component (if applicable):
RHEL6.5 host:
2.6.32-459.el6.x86_64
qemu-kvm-0.12.1.2-2.424.el6.x86_64

RHEL7.0 host:
3.10.0-121.el7.x86_64
qemu-kvm-1.5.3-60.el7.bz1027565_cdef_seg_ich_uhci.x86_64

Test steps:
1.full qemu-kvm command line on rhel6.5 & rhel7.0 host
# /usr/libexec/qemu-kvm -M rhel6.1.0 -cpu SandyBridge  -enable-kvm  -m 4096 -realtime mlock=off -smp 4,sockets=2,cores=2,threads=1,maxcpus=160 -numa node,cpus=0 -numa node,cpus=1 -numa node,cpus=2 -numa node,cpus=3 -nodefconfig -nodefaults -global PIIX4_PM.disable_s3=0 -global PIIX4_PM.disable_s4=0 -global ide-drive.physical_block_size=4096 -global ide-drive.logical_block_size=4096 -global virtio-blk-pci.physical_block_size=512 -global virtio-blk-pci.logical_block_size=512 -boot order=cdn,once=n,menu=on,strict=on,reboot-timeout=60000 -k en-us -soundhw ac97 -device virtio-balloon-pci,id=ballooning,bus=pci.0,addr=0x5,indirect_desc=on,event_idx=on,multifunction=on,rombar=100 -monitor stdio -name test-all-qemu-kvm-option -uuid `uuidgen` -drive file=gluster://10.66.8.240:24007/gv0/rhel6.5-64.qcow2,if=none,id=drive-virtio-disk,format=qcow2,cache=none,aio=native,werror=stop,rerror=stop,media=disk,snapshot=off,bus=1,unit=1 -device virtio-blk-pci,scsi=off,drive=drive-virtio-disk,id=virtio-disk,bus=pci.0,addr=0x7,bootindex=1,physical_block_size=512,logical_block_size=512,multifunction=on,scsi=on,event_idx=on,indirect_desc=on,vectors=32,x-data-plane=off,ioeventfd=on,serial=fuxc,discard_granularity=1,min_io_size=4096,opt_io_size=4096 -usbdevice tablet -usbdevice mouse  -netdev tap,id=hostnet0,vhost=on,script=/etc/qemu-ifup,downscript=no,ifname=fuxc-net -device virtio-net-pci,netdev=hostnet0,id=virtio-net-pci0,mac=00:01:02:03:04:05,bus=pci.0,addr=0x9,multifunction=on,status=on,gso=on,ioeventfd=on,vectors=8,indirect_desc=off,event_idx=off,guest_tso4=off,guest_tso6=on,guest_ecn=off,guest_ufo=on,host_tso4=off,host_tso6=on,host_ecn=on,mrg_rxbuf=off,ctrl_vq=on,host_ufo=on,mrg_rxbuf=on,ctrl_rx=on,ctrl_vlan=on,ctrl_rx_extra=on,ctrl_mac_addr=on -netdev tap,id=hostnet1,vhost=off,script=/etc/qemu-ifup,downscript=no,ifname=fuxc-net1 -device e1000,netdev=hostnet1,id=virtio-net-pci1,mac=00:01:02:03:04:06,bus=pci.0,addr=0xa,multifunction=off -netdev tap,id=hostnet2,vhost=off,script=/etc/qemu-ifup,downscript=no,ifname=fuxc-net-rtl8139 -device rtl8139,netdev=hostnet2,id=virtio-net-pci2,mac=00:01:02:03:04:07,bus=pci.0,addr=0xb,multifunction=off -serial unix:/tmp/monitor2,server,nowait -rtc base=utc -no-shutdown -drive file=/mnt/ide-disk,if=none,id=drive-data-disk,format=raw,cache=none,aio=native,werror=stop,rerror=stop,copy-on-read=off,serial=fux-ide,media=disk -device ide-drive,drive=drive-data-disk,id=system-disk,wwn=0x5000c50015ea71ad,logical_block_size=512,physical_block_size=512,min_io_size=32,opt_io_size=64,discard_granularity=512,ver=fuxc-ver,bus=ide.0,unit=0  -chardev tty,id=serial1,path=/dev/ttyS0 -device isa-serial,chardev=serial1 -chardev socket,id=channel1,path=/tmp/helloworld1,server,nowait  -chardev socket,id=channel2,path=/tmp/helloworld2,server,nowait -device virtio-serial-pci,id=virtio-serial0,max_ports=16,vectors=0 -chardev file,id=channel3,path=/mnt/helloworld1.txt -device virtserialport,chardev=channel3,name=com.redhat.rhevm.vdsm1,bus=virtio-serial0.0,id=port1,nr=1 -chardev socket,id=isa-serial-1,path=/tmp/isa-serial-1,server,nowait -device isa-serial,chardev=isa-serial-1 -device ich9-usb-uhci1,id=usb1,addr=0x11 -device usb-tablet,id=input0 -device usb-mouse,id=input1 -global pvpanic.ioport=0x0505 -machine rhel6.1.0,dump-guest-core=off -drive file=/mnt/driver.iso,if=none,media=cdrom,id=drive-ide0-1-0,readonly=on,format=raw -device ide-drive,bus=ide.1,unit=1,drive=drive-ide0-1-0,id=ide0-1-0,wwn=0x5000c50015ea71ade,logical_block_size=512,physical_block_size=512,min_io_size=32,opt_io_size=64,discard_granularity=512,unit=1,ver=fuxc-ver-cdrom,bus=ide.0,unit=1 -drive file=/mnt/virtio-scsi-disk,if=none,id=drive-scsi-disk,format=raw,cache=none,werror=stop,rerror=stop -device virtio-scsi-pci,id=scsi0,addr=0x13,vectors=16,indirect_desc=on,event_idx=off,hotplug=on,param_change=off,num_queues=1,max_sectors=512,cmd_per_lun=16,multifunction=on,rombar=64 -device scsi-hd,drive=drive-scsi-disk,bus=scsi0.0,scsi-id=0,lun=0,id=data-disk2,logical_block_size=1024,physical_block_size=1024,min_io_size=512,opt_io_size=512,discard_granularity=512,ver=fuxc-scsi,serial=fuxc-scsi-serial,removable=off,wwn=0x16,channel=0,scsi-id=2,lun=2 -device sga -spice port=5901,password=redhat-vga,disable-ticketing -vga qxl -global qxl-vga.vram_size=33554432 -device intel-hda,id=sound0,bus=pci.0 -device hda-duplex,id=sound0-codec0,bus=sound0.0,cad=0 -chardev socket,path=/tmp/foo,server,nowait,id=foo -drive file=/usr/share/virtio-win/virtio-win_amd64.vfd,if=none,id=drive-fdc0-0-0,readonly=on,format=raw -global isa-fdc.driveA=drive-fdc0-0-0


2.do migration

3.

Actual results:
after migration, on dest host check serial console, not find call trace and guest can ping other external host. Reboot inside guest and do "system_reboot" on qemu-kvm, not find call trace.

Comment 14 Miroslav Rezanina 2014-05-02 09:01:36 UTC
Fix included in qemu-kvm-1.5.3-61.el7

Comment 15 huiqingding 2014-07-30 09:04:35 UTC
Test this issue on intel host:
RHEL6.6 host:
qemu-kvm-0.12.1.2-2.431.el6.x86_64
kernel-2.6.32-493.el6.x86_64

RHEL7.1 host:
qemu-kvm-1.5.3-66.el7.x86_64
kernel-3.10.0-140.el7.x86_64

RHEL7.1 guest:
kernel-3.10.0-138.el7.x86_64

Use the command line of comment 10, migrate the RHEL7.1 guest from RHEL6.6 host to RHEL7.1 host, the results are as following:

hosts                             -M        guest           Result
----------                      -------   -----------   ----------------
RHEL6.6 host -> RHEL7.1 host    rhel6.1.0  RHEL7.1         pass
RHEL6.6 host -> RHEL7.1 host    rhel6.5.0  RHEL7.1         pass

Comment 16 huiqingding 2014-07-30 09:47:03 UTC
Test this issue on intel host:
RHEL6.6 host:
qemu-kvm-0.12.1.2-2.431.el6.x86_64
kernel-2.6.32-493.el6.x86_64

RHEL7.1 host:
qemu-kvm-rhev-2.1.0-3.el7ev.preview.x86_64
kernel-3.10.0-140.el7.x86_64

RHEL7.1 guest:
kernel-3.10.0-138.el7.x86_64

Use the command line of comment 10, migrate the RHEL7.1 guest from RHEL6.6 host to RHEL7.1 host, the results are as following:

hosts                             -M        guest           Result
----------                      -------   -----------   ----------------
RHEL6.6 host -> RHEL7.1 host    rhel6.1.0  RHEL7.1         pass
RHEL6.6 host -> RHEL7.1 host    rhel6.5.0  RHEL7.1         pass

Comment 17 huiqingding 2014-07-31 08:42:35 UTC
Test this issue on amd host:
RHEL6.6 host:
qemu-kvm-0.12.1.2-2.431.el6.x86_64
kernel-2.6.32-493.el6.x86_64

RHEL7.1 host:
qemu-kvm-1.5.3-66.el7.x86_64
kernel-3.10.0-140.el7.x86_64

Guest:
Win7sp1 32bits


Use the command line of comment 10, migrate a win7sp1 32 bits guest from RHEL6.6 host to RHEL7.1 host, the results are as following:

hosts                             -M        guest           Result
----------                      -------   -----------   ----------------
RHEL6.6 host -> RHEL7.1 host    rhel6.1.0  win7sp1-32       pass
RHEL6.6 host -> RHEL7.1 host    rhel6.5.0  win7sp1-32       pass

Comment 18 huiqingding 2014-07-31 08:43:50 UTC
Test this issue on amd host:
RHEL6.6 host:
qemu-kvm-0.12.1.2-2.431.el6.x86_64
kernel-2.6.32-493.el6.x86_64

RHEL7.1 host:
qemu-kvm-common-rhev-2.1.0-3.el7ev.preview.x86_64
kernel-3.10.0-140.el7.x86_64

Guest:
Win7sp1 32bits


Use the command line of comment 10, migrate a win7sp1 32 bits guest from RHEL6.6 host to RHEL7.1 host, the results are as following:

hosts                             -M        guest           Result
----------                      -------   -----------   ----------------
RHEL6.6 host -> RHEL7.1 host    rhel6.1.0  win7sp1-32       pass
RHEL6.6 host -> RHEL7.1 host    rhel6.5.0  win7sp1-32       pass

Comment 22 errata-xmlrpc 2015-03-05 08:05:33 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2015-0349.html


Note You need to log in before you can comment on or make changes to this bug.