Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2010:0419 - Bug Fix Advisory
Issued:
2010-05-18
Updated:
2010-05-18

RHBA-2010:0419 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

kvm bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kvm packages that address several issues are now available.

Description

KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for
the standard Red Hat Enterprise Linux kernel. KVM can run multiple
unmodified, virtualized guest Windows and Linux operating systems.

These updated packages fix the following bugs:

  • when run on SMP systems, 64-bit Windows 2003 Server and 64-bit Windows

2008 Server only use the boot CPU for time-keeping, despite configuring the
RTC interrupt for broadcast. KVM cannot tell, therefore, if the RTC
interrupt can be used for time-keeping purposes or not. Consequently,
64-bit Windows 2003 Server and 64-bit Windows 2008 Server showed
significant clock drift when run as guests on SMP systems. With this
update, KVM now checks the RTC interrupt only on vcpu0, the 64-bit Windows
2003 Server and 64-bit Windows 2008 Server boot CPU when they run as SMP
guests under KVM. (BZ#577266)

  • some Linux-based para-virtualised guests (eg Fedora 11 and Fedora 12)

which accessed para-virtualised (PV) MMU page tables crashed during startup
when launched on AMD-based hosts which had Rapid Virtualization Indexing
(RVI, formerly known as Nested Page Tables or NPT) disabled. (RVI is AMD's
hardware-assisted virtualization technology for allowing guests to modify
their own MMU page tables. It was called NPT during development.)

The crash occurred because a system call made by such guests (via the
hypercall driver) attempted to write to a read-only page. With this update,
the PV MMU reporting capability was disabled and Linux-based guests which
make these calls no longer cause KVM to inject a page fault and crash.
(BZ#578579)

  • an error in irq_source_id size verification meant guest operating systems

with eight assigned virtual functions (VF) hung on boot. This update
corrects the error: verification is now done using bit numbers, not bytes
and guests with eight VFs bound to the pci-stub driver boot (and can use
the assigned virtual devices) as expected. (BZ#579863)

  • in some circumstances, memory was reported as still SwapCached and Cached

even after all virtual machines were quit and all the processes whose
memory had been swapped out were no longer running. Although this memory is
eventually reclaimed by the system, available free memory is a factor in
deciding which host to use when launching a virtual machine: inaccurately
reported memory could result in sub-optimal host allocation. With this
update, kvm explicitly removes old pages from swapcache if they are the
last mapped page, ensuring reported free memory is accurate. (BZ#581764)

  • as part of the qcow2 image format, each cluster has an associate

reference count (refcount) that takes two values: zero (free) and not-zero
(in use). These refcounts are stored in a refcount block which, itself, has
a refcount. Previously, the refcount of this refcount block was only
updated after cluster refcount allocation had finished. If an I/O error
occurred during refcount allocation, however, the not updated refcount
block refcount could cause the qcow2 image to corrupt. With this update,
the refcount block's refcount is automatically changed as cluster refcount
allocation occurs, ensuring it is always accurate and protecting the qcow2
image in the event of I/O errors. (BZ#581766)

  • an abort() call was incorrectly added to an I/O error condition. As a

consequence, in some circumstances, if a guest was writing a file and an
I/O error occurred, the entire guest would crash. This update removes the
call and corrects this regression. If the equivalent I/O error now occurs,
the guest stops trying to write the file (and a "free_clusters failed"
error is logged) but otherwise continues unaffected. (BZ#586246)

All KVM users should upgrade to these updated packages, which contain
backported patches to resolve these issues.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 x86_64

Fixes

  • BZ - 577266 - Time drift in win2k3-64bit and win2k8-64bit smp guest
  • BZ - 578579 - Linux pvmmu guests (FC11, FC12, etc) crash on boot on AMD hosts with NPT disabled
  • BZ - 579863 - SR-IOV -- Guest exit and host hang on if boot VM with 8 VFs assigned
  • BZ - 581764 - memory reported as used (by SwapCache and by Cache) though no process holds it.
  • BZ - 581766 - qcow2 corruption with I/O error during refcount block allocation
  • BZ - 586246 - Guest aborted when make guest stop on write error

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kvm-83-164.el5_5.9.src.rpm SHA-256: 675b513cf56e6f72b6f29d20cbf69fb4ed2b835ae2e06651931f747988ad8a54
x86_64
kmod-kvm-83-164.el5_5.9.x86_64.rpm SHA-256: 5769429645edf60d7ee8f38a203b21dc49011e1410d6dfa871be0218c6c23e6e
kvm-83-164.el5_5.9.x86_64.rpm SHA-256: 753e1aef4781a1f28346ed590f49fb94ce31e8654d8d55c7a5dff74bf7e4cd67
kvm-qemu-img-83-164.el5_5.9.x86_64.rpm SHA-256: 14ddfbfd0bc7bb66bd30d4521d7d0efade13b7983e573e992e122121459e93e7
kvm-tools-83-164.el5_5.9.x86_64.rpm SHA-256: 1d8fa796a56ed830459796e4e6d325c321cf89f806c6204a1d7d370283733b9f

Red Hat Enterprise Linux Workstation 5

SRPM
kvm-83-164.el5_5.9.src.rpm SHA-256: 675b513cf56e6f72b6f29d20cbf69fb4ed2b835ae2e06651931f747988ad8a54
x86_64
kmod-kvm-83-164.el5_5.9.x86_64.rpm SHA-256: 5769429645edf60d7ee8f38a203b21dc49011e1410d6dfa871be0218c6c23e6e
kvm-83-164.el5_5.9.x86_64.rpm SHA-256: 753e1aef4781a1f28346ed590f49fb94ce31e8654d8d55c7a5dff74bf7e4cd67
kvm-qemu-img-83-164.el5_5.9.x86_64.rpm SHA-256: 14ddfbfd0bc7bb66bd30d4521d7d0efade13b7983e573e992e122121459e93e7
kvm-tools-83-164.el5_5.9.x86_64.rpm SHA-256: 1d8fa796a56ed830459796e4e6d325c321cf89f806c6204a1d7d370283733b9f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility