Skip to navigation

Bug Fix Advisory kvm bug fix update

Advisory: RHBA-2012:0398-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-03-21
Last updated on: 2012-05-16
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)

Details

Updated kvm packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

[Updated 16 May 2012]
This advisory has been updated with the correct description for bug 802429. The
packages included in this revised update have not been changed in any way from
the packages included in the original advisory.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux
on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for the
standard Red Hat Enterprise Linux kernel.

This update fixes the following bug:

* An accounting error in the I/O thread subsystem in QEMU could, under certain
circumstances, lead to I/O stalls on the guest. This would typically cause the
guest to become unresponsive. With this update, the accounting error has been
corrected, and I/O stalls no longer occur in this scenario. (BZ#802429)

All users of kvm are advised to upgrade to these updated packages, which fix
this bug. Note that the procedure in the Solution section must be performed
before this update will take effect.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

The following procedure must be performed before this update will take
effect:

1) Stop all KVM guest virtual machines.

2) Either reboot the hypervisor machine or, as the root user, remove (using
"modprobe -r [module]") and reload (using "modprobe [module]") all of the
following modules which are currently running (determined using "lsmod"):
kvm, ksm, kvm-intel or kvm-amd.

3) Restart the KVM guest virtual machines.

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
kvm-83-249.el5_8.src.rpm
File outdated by:  RHSA-2014:0163
    MD5: 8dff42e489aad40dfef357a6e1eadf42
SHA-256: 8a9cf272da2a28cc2bbd5cb79e42dc9281c07c53c1444ea5f203592d57280b9e
 
x86_64:
kmod-kvm-83-249.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 1e252979714dfb20336f2ce0342647b4
SHA-256: 5a3a299ced496b2f596564d6b683b01b2dfedf5a2845894a0c14dade5240f090
kmod-kvm-debug-83-249.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 3c226b3813978e3ce6ca09e1537e3454
SHA-256: ff8c5b42fb999fbc2792063342ed857058d74f5fd638f92ae8ad187c01b354cc
kvm-83-249.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 409f5b9b1352054a840fcfd0c32294a4
SHA-256: 28f70e2f7e2eb19a2d1df3f952d7602c985f82dbf5b15dfe3a4d80e3165d2838
kvm-debuginfo-83-249.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 8f82c412e516176dc4217aaf264f57d6
SHA-256: 5bae4c17a10f183b0b6f9d8a69984d32432d002c2ad70de67b74acc580b8a069
kvm-qemu-img-83-249.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 7d2c64b506fb42b25da3f8ba409d4be2
SHA-256: 76d5d78aca5c922a3d9bcbb0bbe52a6287a6e7ed2f567e29d22daa03983f36b1
kvm-tools-83-249.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 61a4de14882d8034bbbdb62f796d8ca3
SHA-256: c8ef6181f7aeb19b6d6dda460e6b9fcb0ea62224e6f782de91234ffc208a0f5e
 
RHEL Virtualization (v. 5 server)

SRPMS:
kvm-83-249.el5_8.src.rpm
File outdated by:  RHSA-2014:0163
    MD5: 8dff42e489aad40dfef357a6e1eadf42
SHA-256: 8a9cf272da2a28cc2bbd5cb79e42dc9281c07c53c1444ea5f203592d57280b9e
 
x86_64:
kmod-kvm-83-249.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 1e252979714dfb20336f2ce0342647b4
SHA-256: 5a3a299ced496b2f596564d6b683b01b2dfedf5a2845894a0c14dade5240f090
kmod-kvm-debug-83-249.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 3c226b3813978e3ce6ca09e1537e3454
SHA-256: ff8c5b42fb999fbc2792063342ed857058d74f5fd638f92ae8ad187c01b354cc
kvm-83-249.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 409f5b9b1352054a840fcfd0c32294a4
SHA-256: 28f70e2f7e2eb19a2d1df3f952d7602c985f82dbf5b15dfe3a4d80e3165d2838
kvm-debuginfo-83-249.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 8f82c412e516176dc4217aaf264f57d6
SHA-256: 5bae4c17a10f183b0b6f9d8a69984d32432d002c2ad70de67b74acc580b8a069
kvm-qemu-img-83-249.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 7d2c64b506fb42b25da3f8ba409d4be2
SHA-256: 76d5d78aca5c922a3d9bcbb0bbe52a6287a6e7ed2f567e29d22daa03983f36b1
kvm-tools-83-249.el5_8.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 61a4de14882d8034bbbdb62f796d8ca3
SHA-256: c8ef6181f7aeb19b6d6dda460e6b9fcb0ea62224e6f782de91234ffc208a0f5e
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/