Bug 2043122 - KVM Fedora 35 guest x86 programs randomly crash in signal handler [rhel-av-8.5z]
Summary: KVM Fedora 35 guest x86 programs randomly crash in signal handler [rhel-av-8.5z]
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux Advanced Virtualization
Classification: Red Hat
Component: qemu-kvm
Version: 8.5
Hardware: Unspecified
OS: Unspecified
medium
high
Target Milestone: rc
: 8.5
Assignee: Dr. David Alan Gilbert
QA Contact: liunana
URL:
Whiteboard:
Depends On: 2031795 2065230
Blocks: 2052199
TreeView+ depends on / blocked
 
Reported: 2022-01-20 16:41 UTC by RHEL Program Management Team
Modified: 2022-03-17 14:15 UTC (History)
12 users (show)

Fixed In Version: qemu-kvm-6.0.0-33.module+el8.5.0+14188+8c5ecfdd.3
Doc Type: If docs needed, set a value
Doc Text:
Clone Of: 2031795
: 2052199 (view as bug list)
Environment:
Last Closed: 2022-03-16 14:08:05 UTC
Type: ---
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Gitlab redhat/rhel/src/qemu-kvm qemu-kvm merge_requests 100 0 None None None 2022-01-20 18:38:03 UTC
Red Hat Issue Tracker RHELPLAN-109009 0 None None None 2022-01-20 16:44:15 UTC

Comment 7 Yanan Fu 2022-02-15 06:17:07 UTC
QE bot(pre verify): Set 'Verified:Tested,SanityOnly' as gating/tier1 test pass.

Comment 8 liunana 2022-02-22 04:48:57 UTC
Test PASS on rhel-av-8.5z without crash.

Test Env:
    4.18.0-348.12.2.el8_5.x86_64
    qemu-kvm-6.0.0-33.module+el8.5.0+14188+8c5ecfdd.3.x86_64
    libvirt-6.0.0-37.1.module+el8.5.0+13858+39fdc467.x86_64

Guest: 4.18.0-348.el8.x86_64


CPU configuration xml:

  <cpu mode='custom' match='exact' check='full'>
    <model fallback='forbid'>EPYC-Milan</model>
    <vendor>AMD</vendor>
    <feature policy='require' name='x2apic'/>
    <feature policy='require' name='tsc-deadline'/>
    <feature policy='require' name='hypervisor'/>
    <feature policy='require' name='tsc_adjust'/>
    <feature policy='require' name='vaes'/>
    <feature policy='require' name='vpclmulqdq'/>
    <feature policy='require' name='spec-ctrl'/>
    <feature policy='require' name='stibp'/>
    <feature policy='require' name='arch-capabilities'/>
    <feature policy='require' name='ssbd'/>
    <feature policy='require' name='cmp_legacy'/>
    <feature policy='require' name='virt-ssbd'/>
    <feature policy='require' name='rdctl-no'/>
    <feature policy='require' name='skip-l1dfl-vmentry'/>
    <feature policy='require' name='mds-no'/>
    <feature policy='require' name='pschange-mc-no'/>
    <feature policy='disable' name='erms'/>
    <feature policy='disable' name='fsrm'/>
    <feature policy='require' name='xsaves'/>
    <feature policy='disable' name='svm'/>
    <feature policy='require' name='topoext'/>
    <feature policy='disable' name='npt'/>
    <feature policy='disable' name='nrip-save'/>
    <feature policy='disable' name='svme-addr-chk'/>
  </cpu>


Move this bug to verified now.

Comment 10 errata-xmlrpc 2022-03-16 14:08:05 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: virt:av and virt-devel:av security and bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:0949


Note You need to log in before you can comment on or make changes to this bug.