- Issued:
- 2009-09-02
- Updated:
- 2009-09-02
RHBA-2009:1422 - Bug Fix Advisory
Synopsis
ktune bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated ktune package that fixes a bug is now available.
Description
The ktune package includes settings for server performance-tuning.
This updated ktune package fixes the following bug:
- when running a Red Hat Enterprise Linux KVM guest under heavy load, the
guest's system clock had the tendency to drift by an amount correlated with
the system load. This ktune update provides an interactive Bourne shell
script, fix_clock_drift.sh, which, when run as the superuser, inspects
various system parameters to determine if the guest on which it is run is
susceptible to clock drift under load and, if so, then creates a new
"grub.conf.kvm" file in the /boot/grub/ directory. This file contains a
kernel boot line with additional kernel parameters that allow the kernel to
account for and prevent significant clock drift on the KVM guest. Note also
that the ntpd service must be running on the KVM guest for the clock drift
to be corrected.
Important: after running fix_clock_drift.sh as the superuser, and once the
script has created the "grub.conf.kvm" file, then the guest's current
"grub.conf" file should be backed up manually by the system administrator,
the new "grub.conf.kvm" file should be manually inspected to ensure that it
is identical to "grub.conf" with the exception of the additional boot line
parameters, the "grub.conf.kvm" file should finally be renamed "grub.conf",
and the guest should be rebooted. (BZ#518039)
Users of Red Hat Enterprise Linux KVM guests that are affected by
significant clock drift are advised to upgrade to this updated package,
which resolves this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 518039 - need script to set kernel parameters that fix clock drift
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
ktune-0.2-4.el5_4.3.src.rpm | SHA-256: 2858046d6cc0b739a16aa430f499f4640e958aae75548873e24e6e01b1efae68 |
x86_64 | |
ktune-0.2-4.el5_4.3.noarch.rpm | SHA-256: 6740a2c987e84a5da68c5a150f3d519acc9cf9a94f481bca96637a57d4f716e3 |
ia64 | |
ktune-0.2-4.el5_4.3.noarch.rpm | SHA-256: 6740a2c987e84a5da68c5a150f3d519acc9cf9a94f481bca96637a57d4f716e3 |
i386 | |
ktune-0.2-4.el5_4.3.noarch.rpm | SHA-256: 6740a2c987e84a5da68c5a150f3d519acc9cf9a94f481bca96637a57d4f716e3 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
ktune-0.2-4.el5_4.3.src.rpm | SHA-256: 2858046d6cc0b739a16aa430f499f4640e958aae75548873e24e6e01b1efae68 |
s390x | |
ktune-0.2-4.el5_4.3.noarch.rpm | SHA-256: 6740a2c987e84a5da68c5a150f3d519acc9cf9a94f481bca96637a57d4f716e3 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
ktune-0.2-4.el5_4.3.src.rpm | SHA-256: 2858046d6cc0b739a16aa430f499f4640e958aae75548873e24e6e01b1efae68 |
ppc | |
ktune-0.2-4.el5_4.3.noarch.rpm | SHA-256: 6740a2c987e84a5da68c5a150f3d519acc9cf9a94f481bca96637a57d4f716e3 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
ktune-0.2-4.el5_4.3.src.rpm | SHA-256: 2858046d6cc0b739a16aa430f499f4640e958aae75548873e24e6e01b1efae68 |
x86_64 | |
ktune-0.2-4.el5_4.3.noarch.rpm | SHA-256: 6740a2c987e84a5da68c5a150f3d519acc9cf9a94f481bca96637a57d4f716e3 |
i386 | |
ktune-0.2-4.el5_4.3.noarch.rpm | SHA-256: 6740a2c987e84a5da68c5a150f3d519acc9cf9a94f481bca96637a57d4f716e3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.