Skip to navigation

Bug Fix Advisory xen bug fix and enhancement update

Advisory: RHBA-2008:0305-5
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2008-05-21
Last updated on: 2008-05-21
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated xen packages that fix several bugs and add enhancements are now
available.

The xen packages contain tools for managing the virtual machine monitor
in Red Hat Enterprise Linux Virtualization.

These updated packages fix the following bugs:

* hypervisor kernels were unable to see more than 3GB of memory.

* it was possible to create domains with a virtual block device used by
another domain.

* the "xm create" documentation has been updated to remove the "nics"
option.

* if errors occurred while extracting the kernel and initrd, stale vmlinuz
and initrd files were left in /var/lib/xen/.

* using USB tablet devices caused Microsoft Windows guests to hang.

* the network-bridge script was unable to handle alias addresses, leaving
networking in a broken state.

* the kernel and initrd files were not removed after running "xm create" in
"dry-run" mode.

* the para-virtualized framebuffer (PVFB) was not always updated after
installing a 32-bit guest on a 64-bit host.

* it was not possible to boot OpenSolaris guests.

* pygrub may have reported "unaligned access" messages for libfsimage
FAT16.

* running "xm dump-core" may have crashed xend on Itanium systems.

* in certain situations, when guests on Itanium systems were accessed via
VNC Viewer, "xen-vncfb unaligned access" messages were logged.

* pygrub incorrectly handled "elilo.conf" on Itanium systems, which may
have prevented Red Hat Enterprise Linux 5.1 guests from booting. Such
guests failed with a "Kernel panic - not syncing: Attempted to kill init!"
error.

* using the "xm reboot --all" command to reboot multiple domains may have
caused the guest operating systems to panic.

* configuring a fully-virtualized guest without "type=ioemu" still
presented a Realtek RTL8139 device to the fully-virtualized guest kernel,
when started with virt-manager or "virsh start". This caused PV-on-HVM to
fail.

* the crash utility could not analyze hypervisor vmcores that were created
on machines with more than 4GB of memory.

* it was not possible to use PCI pass-through.

* autoconfigured IPv6 addresses caused conflicts, which may have resulted
in packet loss, and commands such as "ping6" failing.

* a corrupt /var/lib/xenstored/tdb caused xenstored to die.

* the xm man page has been updated to clarify "xm vcpu-set" and "xm
mem-set" for fully-virtualized guests.

* it was not possible to use "virsh attach-disk" to attach a disk to a
running domain.

* the nvram file was not released after rebooting a HVM domain, which may
have prevented domain creation after multiple HVM domain reboots.

* the calculation of sockets_per_node was incorrect for NUMA nodes, causing
an incorrect "nr_cpus".

* guests with 100GB or more of memory could not be created on Itanium
systems.

* a hypervisor hang or a Dom0 panic occurred after HVM domain creation
failed due to a memory shortage.

* writes to a fully-virtualized device were always cached in Dom0,
possibly causing data integrity issues.

* running "reboot" from within a guest caused a traceback.

* with certain hardware, SMP guests were unable to start more than one CPU.

* "xentop" caused a segmentation fault on Itanium systems.

* the SDL window did not appear when creating para-virtualized guests.

* when using a JP keyboard, it was not possible to input certain
characters.

These updated packages add the following enhancements:

* crash dumps for Microsoft Windows guests.

* time stamps in the hypervisor log.

* support for NUMA. The virsh "freecell" command checks the available heap
memory of NUMA cells. The virsh "capabilities" command exposes NUMA
topology.

* for more secure remote management, PVFB now uses the QEMU backend.

Users of xen are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
xen-3.0.3-64.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: feb569ce9290734e513206b23c873905
 
IA-32:
xen-3.0.3-64.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: d6e1207182ee02c32e1a373a611750d8
xen-devel-3.0.3-64.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5d529dc7592c99e8b3745844353e410c
 
x86_64:
xen-3.0.3-64.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: ccb5be8d5c86a7413d48d00968e00927
xen-devel-3.0.3-64.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5d529dc7592c99e8b3745844353e410c
xen-devel-3.0.3-64.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: c75f147f29bf39c431a6ab9860ec94f2
 
RHEL Virtualization (v. 5 server)

SRPMS:
xen-3.0.3-64.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: feb569ce9290734e513206b23c873905
 
IA-32:
xen-3.0.3-64.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: d6e1207182ee02c32e1a373a611750d8
xen-devel-3.0.3-64.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5d529dc7592c99e8b3745844353e410c
 
IA-64:
xen-3.0.3-64.el5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: daa74b2add8a731ef22dac3c112845fc
xen-devel-3.0.3-64.el5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 82da7f9e7835477660576fcfdcc65170
 
x86_64:
xen-3.0.3-64.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: ccb5be8d5c86a7413d48d00968e00927
xen-devel-3.0.3-64.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: 5d529dc7592c99e8b3745844353e410c
xen-devel-3.0.3-64.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: c75f147f29bf39c431a6ab9860ec94f2
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
xen-3.0.3-64.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: feb569ce9290734e513206b23c873905
 
IA-32:
xen-libs-3.0.3-64.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: d1cc679c35d7cc55e40521905c727a90
 
IA-64:
xen-libs-3.0.3-64.el5.ia64.rpm
File outdated by:  RHBA-2013:0846
    MD5: 021dc4f8dc830d2bef1840e8715bb371
 
x86_64:
xen-libs-3.0.3-64.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: d1cc679c35d7cc55e40521905c727a90
xen-libs-3.0.3-64.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: ad455439d450bf42db03aa6e7e65f7ff
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
xen-3.0.3-64.el5.src.rpm
File outdated by:  RHBA-2013:0846
    MD5: feb569ce9290734e513206b23c873905
 
IA-32:
xen-libs-3.0.3-64.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: d1cc679c35d7cc55e40521905c727a90
 
x86_64:
xen-libs-3.0.3-64.el5.i386.rpm
File outdated by:  RHBA-2013:0846
    MD5: d1cc679c35d7cc55e40521905c727a90
xen-libs-3.0.3-64.el5.x86_64.rpm
File outdated by:  RHBA-2013:0846
    MD5: ad455439d450bf42db03aa6e7e65f7ff
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

227858 - xen - man pages need reviewed for accuracy
231144 - pygrub can leave stale vmlinuz and initrd data around on error
245574 - [RHEL5.1][BUG][XEN] Windows guest hangs when using USB tablet device.
245866 - /etc/xen/scripts/network-bridge cannot handle aliased addresses
251225 - pygrub leaves initrd and vmlinuz images on dom0 after dryrun xm create
253221 - PVFB fails to update when installing 32-bit FC-6 guest in 64-bit host
253222 - OpenSolaris domUs will not boot on RHEL5
288371 - [RHEL5.1]: ia64 pygrub parses elilo.conf incorrectly/incompletely
350041 - dom0 and ipv6 autoconf conflict
356461 - Reboot should recover from corrupted xenstored tdb
372301 - [5.2] Cannot change the device by virsh attach-disk on RHEL5.1
428231 - Switch Xen PVFB over to use QEMU instead of libvncserver & merge TLS patches
435744 - SMP FV xen guests failing to start more than 1 CPU
436772 - xentop segmentation fault [regression]
438440 - SDL window does not appear for pv guest
439435 - [XEN][5.2][REG] PV domain can not use JP keyboard.



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/