Skip to navigation

Bug Fix Advisory kvm bug fix update

Advisory: RHBA-2013:0007-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)

Details

Updated kvm packages that fix various bugs are now available for Red Hat
Enterprise Linux 5.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux
on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for the
standard Red Hat Enterprise Linux kernel.

This update fixes the following bugs:

* Under certain circumstances, the qemu-kvm utility tried to invalidate an
incorrect physical memory block, which resulted in qemu-kvm to terminate
unexpectedly with a segmentation fault. The code has been fixed and the crashes
no longer occur. (BZ#814096)

* Previously, when an I/O error occurred on a KVM host, the guest running on it
became paused. After the guest was migrated to another host, the guest could not
be properly resumed. Consequently, it was impossible to log in to the guest via
SSH or a console. This bug has been fixed and migrated guests can now be resumed
as expected. (BZ#684745)

* Due to an accounting error in the QEMU I/O thread subsystem, I/O delays were
occurring on guests, which were observed as unresponsive for the time of the
delay. This bug has been fixed and the delays no longer occur. (BZ#782631)

* Due to an incompatibility between previously used encryption modes and FIPS
mode, it was impossible to start KVM guests when running kernel in FIPS mode.
With this update, VNC password authentication is disabled when the host system
is operating in FIPS mode, and QEMU exits and returns an error message if it is
configured to run as a password-authenticated VNC server. If QEMU is configured
to run as an unauthenticated VNC server, it will work as expected. (BZ#805676)

* Previously, the typeperf command of the virtualized Microsoft Windows Server
2008 Service Pack 2 for the x86 architecture with the SQL Server 2005 Service
Pack 3 installed returned an invalid value for the Processor Time. This bug has
been fixed and typeperf now returns a correct value. (BZ#838466)

* Previously, a simple counter was used to track GSIs (Global System Interrupts)
that were given to devices. Consequently, when a hot plug or unplug operation
was performed approximately 30 times on certain Ethernet controllers in a
Microsoft Windows Server 2008 guest on the AMD64 and Intel 64 architectures, the
controller driver returned a large number of error messages on incorrectly
deallocated MSI-X table entries. This update uses a bitmap to track GSIs and the
errors no longer occur. (BZ#761350)

* Previously, KVM did not provide receive overrun status information, which is
used for virtual serial devices. Consequently, virtual machines using a serial
console redirection became unresponsive on startup. This update implements
receive overrun status and the hangs no longer occur. (BZ#843683)

* Due to a coding bug, the masking in the device assignment function was
invalid. Consequently, the KVM device assignment bridge test could break virtual
function of certain devices that implement BAR (Base Address Register)
resources. This bug has been fixed and the test now works as expected.
(BZ#829040)

* Under certain circumstances, implementation of the Realtek 8139 Ethernet
driver allowed the qemu-kvm utility to attempt to allocate unlimited buffer
size. If it happened, qemu-kvm terminated unexpectedly with a glib error, unable
to allocate such a buffer. This update limits the transmission buffer size of
the driver, thus fixing this bug. (BZ#781922)

* Previously, it was possible to shut down a guest using the system_powerdown
command even if the "-no-shutdown" option was specified on the command line.
This bug has been fixed and "-no-shutdown" is now handled properly. (BZ#819413)

Users of KVM are advised to upgrade to these updated packages, which fix these
bugs. Note that the procedure in the Solution section must be performed before
this update will take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

The following procedure must be performed before this update will take
effect:

1) Stop all KVM guest virtual machines.

2) Either reboot the hypervisor machine or, as the root user, remove (using
"modprobe -r [module]") and reload (using "modprobe [module]") all of the
following modules which are currently running (determined using "lsmod"):
kvm, ksm, kvm-intel or kvm-amd.

3) Restart the KVM guest virtual machines.

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
kvm-83-262.el5.src.rpm
File outdated by:  RHSA-2014:0163
    MD5: 42b5a19f07ccb880f0ab8033ebab1f95
SHA-256: 7c5fda126a010232da42b2b8c46b364793e2bff2cb39833693de1b27737553ec
 
x86_64:
kmod-kvm-83-262.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 77cdb0656c7c44d658e35f8203e11cb5
SHA-256: c68ddf86352fb7c1fccdc9c992264fdca85513314c1cd3598249ce4937238bb1
kmod-kvm-debug-83-262.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: a9130e4113d2c59def91e2bed9ed930f
SHA-256: 849acb191cacbe22586554f34e8e8950ec3da801306b7cd49b74a00e1932ddee
kvm-83-262.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: b566fae57b3261a2b6c91a01812fa06c
SHA-256: 4caf202839877020e57684c3a928dae0ed1355932a72000b435e147472e7b3ea
kvm-debuginfo-83-262.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: a14e7b00980c2dc28f7c92b2dde1bea2
SHA-256: 838a9b0de924c04e05d8441e67805cbddb40b4274a28fd7c9ee43fe9e6a689fc
kvm-qemu-img-83-262.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 4d2a936440cd02884736f7f741c4e871
SHA-256: 9c1fc9c2af220eed80be6c7383a935bcb7544f0d480015fbd3be8c269b171940
kvm-tools-83-262.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 5849f1dfb3ca8404d5e64d56828b6bca
SHA-256: 09906b190407e5dbb24aaf4002f52d6b402a934c3a73276b37d58ae577642dff
 
RHEL Virtualization (v. 5 server)

SRPMS:
kvm-83-262.el5.src.rpm
File outdated by:  RHSA-2014:0163
    MD5: 42b5a19f07ccb880f0ab8033ebab1f95
SHA-256: 7c5fda126a010232da42b2b8c46b364793e2bff2cb39833693de1b27737553ec
 
x86_64:
kmod-kvm-83-262.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 77cdb0656c7c44d658e35f8203e11cb5
SHA-256: c68ddf86352fb7c1fccdc9c992264fdca85513314c1cd3598249ce4937238bb1
kmod-kvm-debug-83-262.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: a9130e4113d2c59def91e2bed9ed930f
SHA-256: 849acb191cacbe22586554f34e8e8950ec3da801306b7cd49b74a00e1932ddee
kvm-83-262.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: b566fae57b3261a2b6c91a01812fa06c
SHA-256: 4caf202839877020e57684c3a928dae0ed1355932a72000b435e147472e7b3ea
kvm-debuginfo-83-262.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: a14e7b00980c2dc28f7c92b2dde1bea2
SHA-256: 838a9b0de924c04e05d8441e67805cbddb40b4274a28fd7c9ee43fe9e6a689fc
kvm-qemu-img-83-262.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 4d2a936440cd02884736f7f741c4e871
SHA-256: 9c1fc9c2af220eed80be6c7383a935bcb7544f0d480015fbd3be8c269b171940
kvm-tools-83-262.el5.x86_64.rpm
File outdated by:  RHSA-2014:0163
    MD5: 5849f1dfb3ca8404d5e64d56828b6bca
SHA-256: 09906b190407e5dbb24aaf4002f52d6b402a934c3a73276b37d58ae577642dff
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

761350 - "assigned_dev_update_msix_mmio: No such device or address" when repeatedly hot plug/unplug PF
781922 - rtl8139: prevernt unlimited buffer allocated for guest descriptors.
805676 - FIPS 140-2 kernel and KVM
829040 - Fix KVM device assignment bridge test



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/