Bug 2043121 - KVM Fedora 35 guest x86 programs randomly crash in signal handler [rhel-av-8.4z]
Summary: KVM Fedora 35 guest x86 programs randomly crash in signal handler [rhel-av-8.4z]
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux Advanced Virtualization
Classification: Red Hat
Component: qemu-kvm
Version: 8.4
Hardware: Unspecified
OS: Unspecified
medium
high
Target Milestone: rc
: 8.5
Assignee: Dr. David Alan Gilbert
QA Contact: liunana
URL:
Whiteboard:
Depends On: 2031795 2065230
Blocks: 2052198
TreeView+ depends on / blocked
 
Reported: 2022-01-20 16:41 UTC by RHEL Program Management Team
Modified: 2022-03-21 07:52 UTC (History)
13 users (show)

Fixed In Version: qemu-kvm-5.2.0-16.module+el8.4.0+14193+48a3f5f5.15
Doc Type: If docs needed, set a value
Doc Text:
Clone Of: 2031795
: 2052198 (view as bug list)
Environment:
Last Closed: 2022-03-21 07:52:26 UTC
Type: ---
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Gitlab redhat/rhel/src/qemu-kvm qemu-kvm merge_requests 101 0 None None None 2022-01-24 11:53:22 UTC
Red Hat Issue Tracker RHELPLAN-109010 0 None None None 2022-01-20 16:44:20 UTC

Comment 6 Yanan Fu 2022-02-15 05:53:26 UTC
QE bot(pre verify): Set 'Verified:Tested,SanityOnly' as gating/tier1 test pass.

Comment 7 liunana 2022-02-22 03:48:42 UTC
Test PASS on rhel.8.4.0.z without carsh.


Test Env:
   dell-per7525-16.lab.eng.pek2.redhat.com
    4.18.0-305.25.1.el8_4.x86_64
    qemu-kvm-5.2.0-16.module+el8.4.0+14193+48a3f5f5.15.x86_64
    libvirt-6.0.0-35.1.module+el8.4.0+11273+64eb94ef.x86_64
BIOS Information
	Vendor: Dell Inc.
	Version: 2.5.6
	Release Date: 10/06/2021
	BIOS Revision: 2.5

Guest: 4.18.0-305.el8.x86_64



CPU configuration xml:

  <cpu mode='custom' match='exact' check='full'>
    <model fallback='forbid'>EPYC-Milan</model>
    <vendor>AMD</vendor>
    <feature policy='require' name='x2apic'/>
    <feature policy='require' name='tsc-deadline'/>
    <feature policy='require' name='hypervisor'/>
    <feature policy='require' name='tsc_adjust'/>
    <feature policy='require' name='vaes'/>
    <feature policy='require' name='vpclmulqdq'/>
    <feature policy='require' name='spec-ctrl'/>
    <feature policy='require' name='stibp'/>
    <feature policy='require' name='arch-capabilities'/>
    <feature policy='require' name='ssbd'/>
    <feature policy='require' name='cmp_legacy'/>
    <feature policy='require' name='virt-ssbd'/>
    <feature policy='require' name='rdctl-no'/>
    <feature policy='require' name='skip-l1dfl-vmentry'/>
    <feature policy='require' name='mds-no'/>
    <feature policy='require' name='pschange-mc-no'/>
    <feature policy='disable' name='erms'/>
    <feature policy='disable' name='fsrm'/>
    <feature policy='disable' name='svm'/>
    <feature policy='disable' name='npt'/>
    <feature policy='disable' name='nrip-save'/>
    <feature policy='disable' name='svme-addr-chk'/>
    <feature policy='require' name='xsaves'/>
    <feature policy='require' name='topoext'/>
  </cpu>




Move this bug to verified now.

Comment 9 errata-xmlrpc 2022-03-21 07:52:26 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: virt:av and virt-devel:av security and bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:0971


Note You need to log in before you can comment on or make changes to this bug.