- Issued:
- 2011-06-08
- Updated:
- 2011-06-08
RHBA-2011:0853 - Bug Fix Advisory
Synopsis
xenpv-win bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated xenpv-win package that fixes various bugs is now available.
Description
The xenpv-win package contains installation images for para-virtualized drivers
for guests running Windows XP or later on Red Hat Enterprise Linux hosts.
Para-virtualized drivers provide significant network and disk I/O performance
improvements for fully virtualized guests over the same guests running with
fully virtualized drivers.
This updated package provides CD-ROM images containing the para-virtualized
network and disk drivers for instances of Windows XP or later, running on a Red
Hat Enterprise Linux host.
This updated xenpv-win package includes fixes for the following bugs:
- Running the "NDISTest 6.5 (MPE)" job from the Windows Logo Kit on a RHELNET
driver caused the Windows guest to crash. With this update, the RHELNET driver
passes the "NDISTest 6.5 (MPE)" job from the Windows Logo Kit. (BZ#656776)
- Shutting down a Windows guest through hibernation caused a crash of the guest.
With this update, the RHELSCSI driver behaves properly when guests are being
hibernated. (BZ#679144)
- Uninstalling a driver package on a Windows Server 2008 guest would cause the
guest to crash on every subsequent reboot. With this update, the guest will work
correctly after uninstalling the driver package. (BZ#679669)
- Applications that were submitting a large number of disk I/O requests directly
to the drivers could cause them to leak memory in the guest. In particular, this
happened when running the "Disk Stress" job from the Windows Logo kit on Windows
Server 2003 guests. With this update, the memory leak has been fixed and the
drivers pass the "Disk Stress" job on all supported versions of Windows.
(BZ#681440)
- Running the "NDISTest 6.0" job from the Windows Logo Kit failed on Windows XP
and Windows Server 2003 guests. With this update, the RHELNET driver passes the
"NDISTest 6.0" job on all supported versions of Windows. (BZ#681762)
- The RHELSCSI driver could fail to load on 32-bit Windows Server 2008 guests
after ~100 disable/enable cycles. With this update, the RHELSCSI driver sustains
a much higher number of disable/enable cycles. (BZ#689748)
- The binaries in this release of the xenpv-win driver are certified by the
Microsoft Windows Hardware Quality Labs ("WHQL"). WHQL certification ensures
that all components install and uninstall properly and do not interfere with
other system components, and that each component interoperates well with other
system components. (BZ#584249)
All users of xenpv-win are advised to upgrade to this updated package, which
resolves these issues.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
- Red Hat Enterprise Linux Server - AUS 5.6 x86_64
- Red Hat Enterprise Linux Server - AUS 5.6 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
Fixes
- BZ - 584249 - "Signed Driver Check(Server 2008)(Maunul)" in SVVP test failed
- BZ - 656776 - BSOD0x7E when running Ethernet-NDISTest6.5(MPE)
- BZ - 679144 - hibernation broken on Windows XP and Windows 2003
- BZ - 679669 - Win2k8-64 guest will BSOD after uninstall xenpv-win driver
- BZ - 681440 - xenpv-win drivers leak memory on (misaligned I/O && backend is busy)
- BZ - 681762 - XP-32bit fails when running Ethernet-NDISTest6.0
- BZ - 689748 - WHQL BLK 2k8-32bit Common Scenario Stress With IO fail
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
x86_64 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
i386 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6
SRPM | |
---|---|
x86_64 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
i386 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
Red Hat Enterprise Linux Server - AUS 5.6
SRPM | |
---|---|
x86_64 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
i386 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
x86_64 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
i386 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
x86_64 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
i386 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
x86_64 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
i386 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6
SRPM | |
---|---|
x86_64 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
i386 | |
xenpv-win-1.3.4-9.el5.noarch.rpm | SHA-256: fdf008fc4381e3313b79fd1f6d0cca0670bcf66cc178758fd10aa844f586c058 |
xenpv-win-debug-1.3.4-9.el5.noarch.rpm | SHA-256: 8dfe2812b77e213b8582e7b45643b0e9e6a174411e7656828363a491f251ded4 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.