- Issued:
- 2009-10-08
- Updated:
- 2009-10-08
RHBA-2009:1488 - Bug Fix Advisory
Synopsis
kvm bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kvm packages that resolved two issues are now available.
Description
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on x86 hardware. KVM can run multiple virtual machines running
unmodified Linux or Windows images. Each virtual machine has private
virtualized hardware: a network card, disk, graphics adapter, etc.
These updated packages fix the following bugs:
- the pthread_cond_timedwait time out was not properly handled.
Consequently, under some loads, some KVM guests stopped responding to
commands from the management interface. (Note: the reproducer was a host
running around 300 KVM guests with each guest consuming around 50% of their
virtual CPU. On this setup, some guests became non-responsive after several
hours.) With this update the time outs are handled properly and KVM guests
remain responsive, as expected. (BZ#526244)
- some Linux-based guests that used virtio virtual block devices aborted
during installation, returning the error message: "unhandled vm exit: 0x31
vcpu_id 0".
Using an interface other than virtio for the guest virtual disk was a work
around documented in the Red Hat Enterprise Linux 5.4 Technical Notes Known
Issues for KVM. The work around was associated with BZ#518081, the original
Bugzilla report for this issue.
With this update, the underlying issue (stale EPTP-tagged mappings possibly
being used when a virtual CPU or vcpu migrated to a different Physical CPU
or pcpu) has been addressed and the work around is no longer necessary:
Linux-based guests using virtio virtual block devices no longer abort
during installation. (BZ#527192)
All users of kvm are advised to upgrade to these updated packages, which
resolve this issue.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
The update is available via the Red Hat Network (RHN). To apply package
updates via the RHN see http://kbase.redhat.com/faq/docs/DOC-11259
After installation, use the following procedure to ensure the fixes take
effect.
1. Stop all KVM guest virtual machines (VMs).
2. Reboot the host (hypervisor) system.
3. Restart the KVM guest VMs.
If re-booting the host system is not possible, an alternative to step 2
above is as follows:
2a. Determine which of the following modules are running using the "lsmod"
command: kvm, ksm, kvm-intel or kvm-amd.
2b. Remove each running module using the "modprobe -r [module]" command.
(If kvm is running, for example, the "modprobe -r kvm" command removes it.)
2c. Reload each running module using the "modprobe [module]" command. (For
example, to reload kvm, use the "modprobe kvm" command.)
Note: removing and reloading a running module can only be done as the
superuser.
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
- Red Hat Enterprise Linux Workstation 5 x86_64
Fixes
- BZ - 526244 - KVM QEMU:RHEL OS VM's became not-responding and stopped answering monitor Commands.
- BZ - 527192 - vmentry fails with ept misconfig
CVEs
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
kvm-83-105.el5_4.9.src.rpm | SHA-256: ec762938d2ed63fa0472d4a855510f45e573a71b578c4bc88a47a72da19f2584 |
x86_64 | |
kmod-kvm-83-105.el5_4.9.x86_64.rpm | SHA-256: e48297551b14d214adbd9aef10d5fcd6330139eb858693b0a3f897257e5bdfee |
kvm-83-105.el5_4.9.x86_64.rpm | SHA-256: 2f2c4633ecf1cf12f0cfe6072d2ea36b18d4366b9bb89e6f2ce0cc868508107b |
kvm-qemu-img-83-105.el5_4.9.x86_64.rpm | SHA-256: bfe084ce2f86bfca3fc8078cea77069f16b61e053b950d6bcf1e0255fa5f615d |
kvm-tools-83-105.el5_4.9.x86_64.rpm | SHA-256: a529fee0d58aa4c22ae391acadf2197ccd245864632d62e0379ee3dc471ad859 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4
SRPM | |
---|---|
x86_64 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
kvm-83-105.el5_4.9.src.rpm | SHA-256: ec762938d2ed63fa0472d4a855510f45e573a71b578c4bc88a47a72da19f2584 |
x86_64 | |
kmod-kvm-83-105.el5_4.9.x86_64.rpm | SHA-256: e48297551b14d214adbd9aef10d5fcd6330139eb858693b0a3f897257e5bdfee |
kvm-83-105.el5_4.9.x86_64.rpm | SHA-256: 2f2c4633ecf1cf12f0cfe6072d2ea36b18d4366b9bb89e6f2ce0cc868508107b |
kvm-qemu-img-83-105.el5_4.9.x86_64.rpm | SHA-256: bfe084ce2f86bfca3fc8078cea77069f16b61e053b950d6bcf1e0255fa5f615d |
kvm-tools-83-105.el5_4.9.x86_64.rpm | SHA-256: a529fee0d58aa4c22ae391acadf2197ccd245864632d62e0379ee3dc471ad859 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.