Producent oprogramowania do wirtualizacji VMware opublikował właśnie kolejną wersję oprogramowania VMware vSphere Hypervisor (ESXi) 7.0U1. W najnowszej aktualizacji wprowadzono masę nowości oraz rozwiązano wiele błędów. Zachęcamy do zapoznania się z artykułem.
Nowości:
Ulepszone wstępne testy zgodności sprzętowej vSphere Lifecycle Manager dla środowisk vSAN: ESXi 7.0 Update 1 dodaje testy wstępne zgodności sprzętu vSphere Lifecycle Manager. Testy uruchamiają się automatycznie po pewnych zdarzeniach, takich jak modyfikacja żądanego obrazu klastra lub dodanie nowego hosta ESXi w środowiskach vSAN. Ponadto platforma zgodności sprzętu automatycznie sonduje w bazie danych listy zgodności sprzętu w określonych odstępach czasu pod kątem zmian, które w razie potrzeby wyzwalają wstępne testy.
Zwiększona liczba współbieżnych operacji vSphere Lifecycle Manager na klastrach: dzięki ESXi 7.0 Update 1, jeśli zainicjujesz działania zaradcze na poziomie centrum danych, liczba klastrów, na których można równolegle wykonywać środki zaradcze, wzrośnie z 15 do 64 klastrów.
Rozszerzona lista obsługiwanych wersji Red Hat Enterprise Linux i Ubuntu dla usługi pobierania VMware vSphere Update Manager (UMDS): ESXi 7.0 Update 1 dodaje nowe wersje Red Hat Enterprise Linux i Ubuntu obsługiwane przez UMDS.
Lepsza kontrola synchronizacji czasu VMware Tools: dzięki ESXi 7.0 Update 1 możesz wybrać tryb synchronizacji czasu VMware Tools z klienta vSphere zamiast korzystać z wiersza poleceń. Po przejściu do opcji VMware> Narzędzia VMware> Synchronizuj czas z hostem, możesz wybrać opcję Synchronizuj przy uruchamianiu i wznowieniu (zalecane), Synchronizuj czas okresowo lub, jeśli żadna opcja nie jest wybrana, możesz zapobiec synchronizacji.
Zwiększona obsługa maksymalnej tolerancji błędów wieloprocesorowych (SMP-FT): dzięki ESXi 7.0 Update 1 można skonfigurować więcej maszyn wirtualnych SMP-FT i więcej procesorów wirtualnych SMP-FT łącznie na hoście ESXi lub w klastrze.
Virtual Hardware w wersji 18: ESXi Update 7.0 Update 1 wprowadza virtual hardware w wersji 18, aby umożliwić obsługę maszyn wirtualnych z wyższymi maksymalnymi zasobami oraz:
-Bezpieczna szyfrowana wirtualizacja – stan zaszyfrowany (SEV-ES)
-Natywne punkty końcowe wirtualnego zdalnego bezpośredniego dostępu do pamięci (vRDMA) Tryb graficzny EVC (vSGA).
Zwiększone limity zasobów dla maszyn wirtualnych i ulepszenia wydajności: Dzięki ESXi 7.0 Update 1 możesz tworzyć maszyny wirtualne z trzykrotnie większą liczbą wirtualnych procesorów i czterokrotnie większą ilością pamięci, aby umożliwić aplikacjom z większą pamięcią i obciążeniem procesora skalowanie w sposób niemal liniowy, porównywalny z fizycznym systemem.
Udoskonalenia wydajności w ESXi, które obsługują maszyny wirtualne w większej skali, obejmują poszerzenie adresu fizycznego, optymalizację przestrzeni adresowej, lepszą świadomość NUMA dla maszyn wirtualnych gości i bardziej skalowalne techniki synchronizacji. vSphere vMotion jest również zoptymalizowany do pracy z większymi konfiguracjami maszyn wirtualnych. Hosty ESXi z procesorami AMD mogą obsługiwać maszyny wirtualne z dwukrotnie większą liczbą procesorów wirtualnych, 256 i do 8 TB pamięci RAM. Obsługa pamięci trwałej (PMEM) zwiększa się dwukrotnie do 12 TB z 6 TB zarówno dla trybu pamięci, jak i trybu App Direct.
Rozwiązane problemy:
ESXi_7.0.1-0.0.16850804
Patch Category | General |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | 2086530, 2226245, 2495261, 2156103 |
CVE numbers | N/A |
The ESXi and esx-update bulletins are dependent on each other. Always include both in a single ESXi host patch baseline or include the rollup bulletin in the baseline to avoid failure during host patching.
Updates the esx-dvfilter-generic-fastpath, vsanhealth, esx-ui, vdfs, vsan, esx-base, crx, native-misc-drivers, esx-xserver, gc
and cpu-microcode
VIBs to resolve the following issues:
- PR 2086530: Setting the loglevel for the nvme_pcie driver fails with an errorWhen you set the loglevel for the nvme_pcie driver with the command
esxcli nvme driver loglevel set -l <log level>
, the action fails with the error message:Failed to set log level 0x2.
This command was retained for compatibility consideration with the NVMe driver, but it is not supported for the nvme_pcie driver.This issue is resolved in this release. You can modify the log level by using the VMkernel system information shell.
- PR 2226245: When a host profile is copied from an ESXi host or a host profile is edited, the user input values are lostSome of the host profile keys are generated from hash calculation even when explicit rules for key generation are provided. As a result, when you copy settings from a host or edit a host profile, the user input values in the answer file are lost.This issue is resolved in this release.
- PR 2495261: Checking the compliance state of an ESXi 7.0 host against a host profile with version 6.5 or 6.7 results in an error for vmhba and vmrdma devicesWhen checking the compliance of a ESXi 7.0 host that uses a
nmlx5_core
ornvme_pcie
driver against a host profile with version 6.5 or 6.7, you might observe the following errors, whereaddress1
andaddress2
are specific to the affected system.- A vmhba device with bus type logical,
address1
is not present on your host. - A vmrdma device with bus type logical,
address2
is not present on your host.
The error is due to a mismatch between device addresses generated by the
nmlx5_core
ornvme_pcie
driver in ESXi version 7.0 and earlier.This issue is resolved in this release.
- A vmhba device with bus type logical,
- PR 2156103: SNMP dynamic firewall ruleset is modified by Host Profiles during a remediation processThe SNMP firewall ruleset is a dynamic state, which is handled during runtime. When a host profile is applied, the configuration of the ruleset is managed simultaneously by Host Profiles and SNMP, which can modify the firewall settings unexpectedly.This issue is resolved in this release.
Patch Category | General |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs I
ncluded |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the loadesx
and esx-update
VIBs.
VMware-nvmxnet3-ens_2.0.0.22-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the nvmxnet3-ens
VIB.Mellanox-nmlx4_3.19.16.8-2vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the nmlx4-core
, nmlx4-rdma
, and nmlx4
VIBs.
Broadcom-elxiscsi_12.0.1200.0-2vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the elxiscsi
VIB.
Cisco-nfnic_4.0.0.44-2vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the nfnic
VIB.
MRVL-E3-Ethernet_1.1.0.11-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the qflge
VIB.
VMware-icen_1.0.0.9-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the icen
VIB.
Intel-ne1000_0.8.4-11vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the ne1000
VIB.
Intel-Volume-Mgmt-Device_2.0.0.1055-5vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the iavmd
VIB.
Broadcom-ELX-brcmnvmefc_12.6.278.10-3vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the brcmnvmefc
VIB.
Broadcom-ntg3_4.1.5.0-0vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the ntg3
VIB.
HPE-hpv2-hpsa-plugin_1.0.0-3vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the lsuv2-hpv2-hpsa-plugin
VIB.
Broadcom-lsi-msgpt3_17.00.10.00-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the lsi-msgpt3
VIB.
Intel-SCU-rste_2.0.2.0088-7vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the rste
VIB.
Intel-ixgben_1.7.1.28-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the ixgben
VIB.
Intel-NVMe-Vol-Mgmt-Dev-Plugin_1.0.0-2vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the lsuv2-intelv2-nvme-vmd-plugin
VIB.
VMware-iser_1.1.0.1-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the iser
VIB.
Broadcom-lpnic_11.4.62.0-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the lpnic
VIB.
VMware-NVMe-PCIe_1.2.3.9-2vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the nvme-pcie
VIB.
Microchip-smartpqi_70.4000.0.100-3vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the smartpqi
VIB.
VMware-NVMeoF-RDMA_1.0.1.2-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the nvmerdma
VIB.
VMware-oem-lenovo-plugin_1.0.0-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the lsuv2-oem-lenovo-plugin
VIB.
Intel-igbn_0.1.1.0-7vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the igbn
VIB.
VMware-vmkata_0.1-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the vmkata
VIB.
VMware-vmkfcoe_1.0.0.2-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the vmkfcoe
VIB.
VMware-oem-hp-plugin_1.0.0-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the lsuv2-oem-hp-plugin
VIB.
Cisco-nenic_1.0.29.0-2vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the nenic
VIB.
Broadcom-ELX-brcmfcoe_12.0.1500.0-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the brcmfcoe
VIB.
HPE-nhpsa_70.0050.0.100-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the nhpsa
VIB.
Mellanox-nmlx5_4.19.16.8-2vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the nmlx5-rdma
and nmlx5-core
VIBs.
Broadcom-ELX-IMA-plugin_12.0.1200.0-3vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the elx-esx-libelxima.so
VIB.
Microchip-smartpqiv2-plugin_1.0.0-4vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the
lsuv2-smartpqiv2-plugin
VIB.
VMware-nvme-pcie-plugin_1.0.0-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the lsuv2-nvme-pcie-plugin
VIB.
MRVL-E4-CNA-Driver-Bundle_1.0.0.0-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the
qedentv
VIB.
VMware-oem-dell-plugin_1.0.0-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the lsuv2-oem-dell-plugin
VIB.
VMware-nvmxnet3_2.0.0.30-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the nvmxnet3
VIB.
VMware-ahci_2.0.5-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the vmw-ahci
VIB.
Intel-i40iwn_1.1.2.6-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the i40iwn
VIB.
Broadcom-bnxt-Net-RoCE_216.0.0.0-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the bnxtnet
and bnxtroce
VIBs.
Broadcom-lsiv2-drivers-plugin_1.0.0-4vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the lsuv2-lsiv2-drivers-plugin
VIB.
Micron-mtip32xx-native_3.9.8-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the mtip32xx-native
VIB.
VMware-nvme-plugin_1.2.0.38-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | No |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the vmware-esx-esxcli-nvme-plugin
VIB.
MRVL-QLogic-FC_4.0.3.0-17vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the qlnativefc
VIB.
VMware-vmkusb_0.1-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the vmkusb
VIB.
VMware-VM-Tools_11.1.1.16303738-16850804
Patch Category | General |
Patch Severity | Important |
Host Reboot Required | No |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the tools-light
VIB.
Solarflare-NIC_2.4.0.0010-15vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | No |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the sfvmk
VIB.
Intel-i40en_1.8.1.123-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the i40en
VIB.
Broadcom-ELX-lpfc_12.6.278.10-8vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the lpfc
VIB.
MRVL-E3-Ethernet-iSCSI-FCoE_1.0.0.0-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the qcnic
, qfle3f
, qfle3i
, and qfle3
VIBs.
Broadcom-lsi-msgpt35_13.00.13.00-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the lsi-msgpt35
VIB.
VMware-pvscsi_0.1-2vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the pvscsi
VIB.
Broadcom-lsi-msgpt2_20.00.06.00-2vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the lsi-msgpt2
VIB.
Broadcom-elxnet_12.0.1250.0-5vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the elxnet
VIB.
Broadcom-lsi-mr3_7.712.51.00-1vmw.701.0.0.16850804
Patch Category | Enhancement |
Patch Severity | Important |
Host Reboot Required | Yes |
Virtual Machine Migration or Shutdown Required | Yes |
Affected Hardware | N/A |
Affected Software | N/A |
VIBs Included |
|
PRs Fixed | N/A |
CVE numbers | N/A |
Updates the lsi-mr3
VIB.
Znane Problemy:
Networking Issues
- One or more I/O devices do not generate interrupts when the AMD IOMMU is in useIf the I/O devices on your ESXi host provide more than a total of 512 distinct interrupt sources, some sources are erroneously assigned an interrupt-remapping table entry (IRTE) index in the AMD IOMMU that is greater than the maximum value. Interrupts from such a source are lost, so the corresponding I/O device behaves as if interrupts are disabled.Workaround: Use the ESXCLI command
esxcli system settings kernel set -s iovDisableIR -v true
to disable the AMD IOMMU interrupt remapper. Reboot the ESXi host so that the command takes effect.
- If you run the ESXCLI command to unload the firewall module, the hostd service fails and ESXi hosts lose connectivityIf you automate the firewall configuration in an environment that includes multiple ESXi hosts, and run the ESXCLI command
esxcli network firewall unload
that destroys filters and unloads the firewall module, the hostd service fails and ESXi hosts lose connectivity.Workaround: Unloading the firewall module is not recommended at any time. If you must unload the firewall module, use the following steps:- Stop the hostd service by using the command:
/etc/init.d/hostd stop.
- Unload the firewall module by using the command:
esxcli network firewall unload.
- Perform the required operations.
- Load the firewall module by using the command:
esxcli network firewall load.
- Start the hostd service by using the command:
/etc/init.d/hostd start.
- Stop the hostd service by using the command:
- vSphere Storage vMotion operations might fail in a vSAN environment due to an unauthenticated session of the Network File Copy (NFC) managerMigrations to a vSAN datastore by using vSphere Storage vMotion of virtual machines that have at least one snapshot and more than one virtual disk with different storage policy might fail. The issue occurs due to an unauthenticated session of the NFC manager because the Simple Object Access Protocol (SOAP) body exceeds the allowed size.Workaround: First migrate the VM home namespace and just one of the virtual disks. After the operation completes, perform a disk only migration of the remaining 2 disks.
- Changes in the properties and attributes of the devices and storage on an ESXi host might not persist after a rebootIf the device discovery routine during a reboot of an ESXi host times out, the jumpstart plug-in might not receive all configuration changes of the devices and storage from all the registered devices on the host. As a result, the process might restore the properties of some devices or storage to the default values after the reboot.Workaround: Manually restore the changes in the properties of the affected device or storage.
- If you use a beta build of ESXi 7.0, ESXi hosts might fail with a purple diagnostic screen during some lifecycle operationsIf you use a beta build of ESXi 7.0, ESXi hosts might fail with a purple diagnostic screen during some lifecycle operations such as unloading a driver or switching between ENS mode and native driver mode. For example, if you try to change the ENS mode, in the backtrace you see an error message similar to:
case ENS::INTERRUPT::NoVM_DeviceStateWithGracefulRemove hit BlueScreen: ASSERT bora/vmkernel/main/dlmalloc.c:2733
This issue is specific for beta builds and does not affect release builds such as ESXi 7.0.Workaround: Update to ESXi 7.0 GA.
- A VMFS datastore backed by an NVMe over Fabrics namespace or device might become permanently inaccessible after recovering from an APD or PDL failureIf a VMFS datastore on an ESXi host is backed by an NVMe over Fabrics namespace or device, in case of an all paths down (APD) or permanent device loss (PDL) failure, the datastore might be inaccessible even after recovery. You cannot access the datastore from either the ESXi host or the vCenter Server system.Workaround: To recover from this state, perform a rescan on a host or cluster level. For more information, see Perform Storage Rescan.
Virtual Machines Management Issues
- Virtual machines with enabled AMD Secure Encrypted Virtualization-Encrypted State (SEV-ES) cannot create Virtual Machine Communication Interface (VMCI) socketsPerformance and functionality of features that require VMCI might be affected on virtual machines with enabled AMD SEV-ES, because such virtual machines cannot create VMCI sockets.Workaround: None.
- You cannot PXE boot an ESXi host by using vSphere Auto Deploy due to a network errorFor ESXi hosts with Emulex and Qlogic host bus adapters (HBA), attempts to PXE boot the host by using vSphere Auto Deploy might fail due to a network error. For some Emulex adapters, in the PXE Boot console you see a message such as:
Could not open net0: Input/output error http://ipxe.org/1d6a4a98'
Emulex HBA adapters that persistently face the issue are:
Network error encountered while PXE booting.
Scanning the local disk for cached image.
If no image is found, the system will reboot in 20 seconds ……
Could not boot. No such device (http://ipxe.org/2c048087)- HPE StoreFabric CN1200E-T 10Gb Converged Network Adapter
- HPE StoreFabric CN1200E 10Gb Converged Network Adapter
- HP FlexFabric 20Gb 2-port 650FLB Adapter
- HP FlexFabric 20Gb 2-port 650M Adapter
For ESXi hosts with QLogic HBAs, attempts to PXE boot the host by using vSphere Auto Deploy do not always fail.
If the ESX host encounters the issue, in the PXE Boot console you see a message such as:
Configuring (net0 f4:03:43:b4:88:d0)......
No configuration methods succeeded (http://ipxe.org/040ee186)
Network error encountered while PXE booting.The affected Qlogic HBA adapter is HP Ethernet 10Gb 2-port 530T.
Workaround: None
Installation, Upgrade and Migration Issues
- Installation of 7.0 Update 1 drivers on ESXi 7.0 hosts might failYou cannot install drivers applicable to ESXi 7.0 Update 1 on hosts that run ESXi 7.0 or 7.0b.
The operation fails with an error, such as:
VMW_bootbank_qedrntv_3.40.4.0-12vmw.701.0.0.xxxxxxx requires vmkapi_2_7_0_0, but the requirement cannot be satisfied within the ImageProfile.
Workaround: Update the ESXi host to 7.0 Update 1. Retry the driver installation.
Please refer to the log file for more details.
Notatki producenta-KLIK
Pozdrawiamy,
Zespół B&B
Bezpieczeństwo w biznesie