Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 712884 - RHEL6.1 32bit xen hvm guest crash randomly
RHEL6.1 32bit xen hvm guest crash randomly
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: kernel-xen (Show other bugs)
5.7
Unspecified Unspecified
urgent Severity high
: rc
: ---
Assigned To: Phillip Lougher
Virtualization Bugs
: ZStream
Depends On: 700565
Blocks:
  Show dependency treegraph
 
Reported: 2011-06-13 09:29 EDT by RHEL Product and Program Management
Modified: 2011-08-31 12:43 EDT (History)
12 users (show)

See Also:
Fixed In Version: kernel-2.6.18-238.20.1.el5
Doc Type: Bug Fix
Doc Text:
A bug was found in the way the x86_emulate() function handled the IMUL instruction in the Xen hypervisor. On systems that have no support for hardware assisted paging (such as those running CPUs that do not have support for Intel Extended Page Tables or AMD Rapid Virtualization Indexing), or have it disabled, this bug could cause fully-virtualized guests to crash or lead to silent memory corruption. In reported cases, this issue occurred when booting fully-virtualized Red Hat Enterprise Linux 6.1 guests with memory cgroups enabled.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2011-08-16 14:34:26 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:1163 normal SHIPPED_LIVE Important: kernel security and bug fix update 2011-08-16 14:34:09 EDT

  None (edit)
Description RHEL Product and Program Management 2011-06-13 09:29:35 EDT
This bug has been copied from bug #700565 and has been proposed
to be backported to 5.6 z-stream (EUS).
Comment 4 Phillip Lougher 2011-07-27 18:02:47 EDT
in kernel-2.6.18-238.20.1.el5

xen-fix-x86_emulate-handling-of-imul-with-immediate-operands.patch
Comment 6 Qixiang Wan 2011-08-02 02:26:57 EDT
Verified with kernel-xen-2.6.18-238.20.1.el5. The 32 bit HVM guest works well after 100+ times of rebooting testing on the host which can reproduce the original issue (by ~10 times of guest rebooting). So change this bug to VERIFIED.
Comment 7 errata-xmlrpc 2011-08-16 14:34:26 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-1163.html
Comment 8 Martin Prpič 2011-08-31 12:03:33 EDT
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
A bug was found in the way the x86_emulate() function handled the IMUL
instruction in the Xen hypervisor. On systems without support for hardware
assisted paging (HAP), such as those running CPUs that do not have support
for (or those that have it disabled) Intel Extended Page Tables (EPT) or
AMD Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), this bug
could cause fully-virtualized guests to crash or lead to silent memory
corruption. In reported cases, this issue occurred when booting
fully-virtualized Red Hat Enterprise Linux 6.1 guests with memory cgroups
enabled.
Comment 10 Paolo Bonzini 2011-08-31 12:43:12 EDT
    Technical note updated. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    Diffed Contents:
@@ -1,9 +1,2 @@
-A bug was found in the way the x86_emulate() function handled the IMUL
+A bug was found in the way the x86_emulate() function handled the IMUL instruction in the Xen hypervisor. On systems that have no support for hardware assisted paging (such as those running CPUs that do not have support
-instruction in the Xen hypervisor. On systems without support for hardware
+for Intel Extended Page Tables or AMD Rapid Virtualization Indexing), or have it disabled, this bug could cause fully-virtualized guests to crash or lead to silent memory corruption. In reported cases, this issue occurred when booting fully-virtualized Red Hat Enterprise Linux 6.1 guests with memory cgroups enabled.-assisted paging (HAP), such as those running CPUs that do not have support
-for (or those that have it disabled) Intel Extended Page Tables (EPT) or
-AMD Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), this bug
-could cause fully-virtualized guests to crash or lead to silent memory
-corruption. In reported cases, this issue occurred when booting
-fully-virtualized Red Hat Enterprise Linux 6.1 guests with memory cgroups
-enabled.

Note You need to log in before you can comment on or make changes to this bug.