Bug 712884 - RHEL6.1 32bit xen hvm guest crash randomly
Summary: RHEL6.1 32bit xen hvm guest crash randomly
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: kernel-xen
Version: 5.7
Hardware: Unspecified
OS: Unspecified
urgent
high
Target Milestone: rc
: ---
Assignee: Phillip Lougher
QA Contact: Virtualization Bugs
URL:
Whiteboard:
Depends On: 700565
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-06-13 13:29 UTC by RHEL Program Management
Modified: 2011-08-31 16:43 UTC (History)
12 users (show)

Fixed In Version: kernel-2.6.18-238.20.1.el5
Doc Type: Bug Fix
Doc Text:
A bug was found in the way the x86_emulate() function handled the IMUL instruction in the Xen hypervisor. On systems that have no support for hardware assisted paging (such as those running CPUs that do not have support for Intel Extended Page Tables or AMD Rapid Virtualization Indexing), or have it disabled, this bug could cause fully-virtualized guests to crash or lead to silent memory corruption. In reported cases, this issue occurred when booting fully-virtualized Red Hat Enterprise Linux 6.1 guests with memory cgroups enabled.
Clone Of:
Environment:
Last Closed: 2011-08-16 18:34:26 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:1163 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2011-08-16 18:34:09 UTC

Description RHEL Program Management 2011-06-13 13:29:35 UTC
This bug has been copied from bug #700565 and has been proposed
to be backported to 5.6 z-stream (EUS).

Comment 4 Phillip Lougher 2011-07-27 22:02:47 UTC
in kernel-2.6.18-238.20.1.el5

xen-fix-x86_emulate-handling-of-imul-with-immediate-operands.patch

Comment 6 Qixiang Wan 2011-08-02 06:26:57 UTC
Verified with kernel-xen-2.6.18-238.20.1.el5. The 32 bit HVM guest works well after 100+ times of rebooting testing on the host which can reproduce the original issue (by ~10 times of guest rebooting). So change this bug to VERIFIED.

Comment 7 errata-xmlrpc 2011-08-16 18:34:26 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-1163.html

Comment 8 Martin Prpič 2011-08-31 16:03:33 UTC
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
A bug was found in the way the x86_emulate() function handled the IMUL
instruction in the Xen hypervisor. On systems without support for hardware
assisted paging (HAP), such as those running CPUs that do not have support
for (or those that have it disabled) Intel Extended Page Tables (EPT) or
AMD Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), this bug
could cause fully-virtualized guests to crash or lead to silent memory
corruption. In reported cases, this issue occurred when booting
fully-virtualized Red Hat Enterprise Linux 6.1 guests with memory cgroups
enabled.

Comment 10 Paolo Bonzini 2011-08-31 16:43:12 UTC
    Technical note updated. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    Diffed Contents:
@@ -1,9 +1,2 @@
-A bug was found in the way the x86_emulate() function handled the IMUL
+A bug was found in the way the x86_emulate() function handled the IMUL instruction in the Xen hypervisor. On systems that have no support for hardware assisted paging (such as those running CPUs that do not have support
-instruction in the Xen hypervisor. On systems without support for hardware
+for Intel Extended Page Tables or AMD Rapid Virtualization Indexing), or have it disabled, this bug could cause fully-virtualized guests to crash or lead to silent memory corruption. In reported cases, this issue occurred when booting fully-virtualized Red Hat Enterprise Linux 6.1 guests with memory cgroups enabled.-assisted paging (HAP), such as those running CPUs that do not have support
-for (or those that have it disabled) Intel Extended Page Tables (EPT) or
-AMD Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), this bug
-could cause fully-virtualized guests to crash or lead to silent memory
-corruption. In reported cases, this issue occurred when booting
-fully-virtualized Red Hat Enterprise Linux 6.1 guests with memory cgroups
-enabled.


Note You need to log in before you can comment on or make changes to this bug.