Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1498135 - Hot-unplugging a vhost network device leaks references to VFIOPCIDevice's [OSP 11]
Hot-unplugging a vhost network device leaks references to VFIOPCIDevice's [OS...
Status: CLOSED ERRATA
Product: Red Hat OpenStack
Classification: Red Hat
Component: qemu-kvm-rhev (Show other bugs)
11.0 (Ocata)
x86_64 Unspecified
high Severity high
: async
: 11.0 (Ocata)
Assigned To: Virtualization Maintenance
Shai Revivo
: Triaged, ZStream
Depends On: 1490742
Blocks:
  Show dependency treegraph
 
Reported: 2017-10-03 10:34 EDT by Jason Joyce
Modified: 2017-12-14 17:31 EST (History)
20 users (show)

See Also:
Fixed In Version: qemu-kvm-rhev-2.9.0-16.el7_4.7
Doc Type: Bug Fix
Doc Text:
Hot-unplugging Virtual Function I/O (VFIO) devices previously failed when performed after hot-unplugging a vhost network device. This update fixes the underlying code, and the VFIO device is unplugged correctly in the described circumstances.
Story Points: ---
Clone Of: 1490742
Environment:
Last Closed: 2017-12-14 17:31:17 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Bugzilla 1371930 None None None 2017-10-03 10:34 EDT
Red Hat Product Errata RHSA-2017:3466 normal SHIPPED_LIVE Moderate: qemu-kvm-rhev security and bug fix update 2017-12-14 22:11:38 EST

  None (edit)
Comment 10 errata-xmlrpc 2017-12-14 17:31:17 EST
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2017:3466

Note You need to log in before you can comment on or make changes to this bug.