- Issued:
- 2008-05-21
- Updated:
- 2008-05-21
RHBA-2008:0305 - Bug Fix Advisory
Synopsis
xen bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated xen packages that fix several bugs and add enhancements are now
available.
Description
The xen packages contain tools for managing the virtual machine monitor
in Red Hat Enterprise Linux Virtualization.
These updated packages fix the following bugs:
- hypervisor kernels were unable to see more than 3GB of memory.
- it was possible to create domains with a virtual block device used by
another domain.
- the "xm create" documentation has been updated to remove the "nics"
option.
- if errors occurred while extracting the kernel and initrd, stale vmlinuz
and initrd files were left in /var/lib/xen/.
- using USB tablet devices caused Microsoft Windows guests to hang.
- the network-bridge script was unable to handle alias addresses, leaving
networking in a broken state.
- the kernel and initrd files were not removed after running "xm create" in
"dry-run" mode.
- the para-virtualized framebuffer (PVFB) was not always updated after
installing a 32-bit guest on a 64-bit host.
- it was not possible to boot OpenSolaris guests.
- pygrub may have reported "unaligned access" messages for libfsimage
FAT16.
- running "xm dump-core" may have crashed xend on Itanium systems.
- in certain situations, when guests on Itanium systems were accessed via
VNC Viewer, "xen-vncfb unaligned access" messages were logged.
- pygrub incorrectly handled "elilo.conf" on Itanium systems, which may
have prevented Red Hat Enterprise Linux 5.1 guests from booting. Such
guests failed with a "Kernel panic - not syncing: Attempted to kill init!"
error.
- using the "xm reboot --all" command to reboot multiple domains may have
caused the guest operating systems to panic.
- configuring a fully-virtualized guest without "type=ioemu" still
presented a Realtek RTL8139 device to the fully-virtualized guest kernel,
when started with virt-manager or "virsh start". This caused PV-on-HVM to
fail.
- the crash utility could not analyze hypervisor vmcores that were created
on machines with more than 4GB of memory.
- it was not possible to use PCI pass-through.
- autoconfigured IPv6 addresses caused conflicts, which may have resulted
in packet loss, and commands such as "ping6" failing.
- a corrupt /var/lib/xenstored/tdb caused xenstored to die.
- the xm man page has been updated to clarify "xm vcpu-set" and "xm
mem-set" for fully-virtualized guests.
- it was not possible to use "virsh attach-disk" to attach a disk to a
running domain.
- the nvram file was not released after rebooting a HVM domain, which may
have prevented domain creation after multiple HVM domain reboots.
- the calculation of sockets_per_node was incorrect for NUMA nodes, causing
an incorrect "nr_cpus".
- guests with 100GB or more of memory could not be created on Itanium
systems.
- a hypervisor hang or a Dom0 panic occurred after HVM domain creation
failed due to a memory shortage.
- writes to a fully-virtualized device were always cached in Dom0,
possibly causing data integrity issues.
- running "reboot" from within a guest caused a traceback.
- with certain hardware, SMP guests were unable to start more than one CPU.
- "xentop" caused a segmentation fault on Itanium systems.
- the SDL window did not appear when creating para-virtualized guests.
- when using a JP keyboard, it was not possible to input certain
characters.
These updated packages add the following enhancements:
- crash dumps for Microsoft Windows guests.
- time stamps in the hypervisor log.
- support for NUMA. The virsh "freecell" command checks the available heap
memory of NUMA cells. The virsh "capabilities" command exposes NUMA
topology.
- for more secure remote management, PVFB now uses the QEMU backend.
Users of xen are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 227858 - xen - man pages need reviewed for accuracy
- BZ - 231144 - pygrub can leave stale vmlinuz and initrd data around on error
- BZ - 245574 - [RHEL5.1][BUG][XEN] Windows guest hangs when using USB tablet device.
- BZ - 245866 - /etc/xen/scripts/network-bridge cannot handle aliased addresses
- BZ - 251225 - pygrub leaves initrd and vmlinuz images on dom0 after dryrun xm create
- BZ - 253221 - PVFB fails to update when installing 32-bit FC-6 guest in 64-bit host
- BZ - 253222 - OpenSolaris domUs will not boot on RHEL5
- BZ - 288371 - [RHEL5.1]: ia64 pygrub parses elilo.conf incorrectly/incompletely
- BZ - 350041 - dom0 and ipv6 autoconf conflict
- BZ - 356461 - Reboot should recover from corrupted xenstored tdb
- BZ - 372301 - [5.2] Cannot change the device by virsh attach-disk on RHEL5.1
- BZ - 428231 - Switch Xen PVFB over to use QEMU instead of libvncserver & merge TLS patches
- BZ - 435744 - SMP FV xen guests failing to start more than 1 CPU
- BZ - 436772 - xentop segmentation fault [regression]
- BZ - 438440 - SDL window does not appear for pv guest
- BZ - 439435 - [XEN][5.2][REG] PV domain can not use JP keyboard.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
xen-3.0.3-64.el5.src.rpm | SHA-256: 78b869cc809faf52937ee69bbfeae6c3d26bfd4f41ea387a33ee131cde3d54f7 |
x86_64 | |
xen-3.0.3-64.el5.x86_64.rpm | SHA-256: 7f7ae8dc92facbffbe354d7fa4292c3612fc832e4f8c05afd2255b4acea52cd0 |
xen-devel-3.0.3-64.el5.i386.rpm | SHA-256: 592fc643a0b448ad758f8af0c6a4340d055c516c4f5691031747b215ccbcb530 |
xen-devel-3.0.3-64.el5.x86_64.rpm | SHA-256: afc996ee9bbd5d4bede9016de0c391b40914000e3fdfdb9435941ae3093f6a16 |
xen-libs-3.0.3-64.el5.i386.rpm | SHA-256: c0c5716ce816c99f81b4a884f755e0cf1708d16e89fa5badc5ee9f35ef32fdae |
xen-libs-3.0.3-64.el5.x86_64.rpm | SHA-256: 74586d8c999958e4fe7a673669fbd315e7e6e50958647eb7e321e0e5127bbe4d |
ia64 | |
xen-3.0.3-64.el5.ia64.rpm | SHA-256: 76b1c2f3a7bcf0534ec70b3abc2371396a0642d5d2927a897587810b1ff3ef79 |
xen-devel-3.0.3-64.el5.ia64.rpm | SHA-256: 18c2a9f710e32ec26b35f57a38475a04b30aed914828b950bec813f36197826b |
xen-libs-3.0.3-64.el5.ia64.rpm | SHA-256: 6dc809ae846662fb71fa48eeb077ea49e87a259dafc4c115fdce619d1c880359 |
i386 | |
xen-3.0.3-64.el5.i386.rpm | SHA-256: 2f924bebecf75396338e1fc0badc775dd6f8d3ae4a13fec4a74cd148261c7fc7 |
xen-devel-3.0.3-64.el5.i386.rpm | SHA-256: 592fc643a0b448ad758f8af0c6a4340d055c516c4f5691031747b215ccbcb530 |
xen-libs-3.0.3-64.el5.i386.rpm | SHA-256: c0c5716ce816c99f81b4a884f755e0cf1708d16e89fa5badc5ee9f35ef32fdae |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
xen-3.0.3-64.el5.src.rpm | SHA-256: 78b869cc809faf52937ee69bbfeae6c3d26bfd4f41ea387a33ee131cde3d54f7 |
x86_64 | |
xen-3.0.3-64.el5.x86_64.rpm | SHA-256: 7f7ae8dc92facbffbe354d7fa4292c3612fc832e4f8c05afd2255b4acea52cd0 |
xen-devel-3.0.3-64.el5.i386.rpm | SHA-256: 592fc643a0b448ad758f8af0c6a4340d055c516c4f5691031747b215ccbcb530 |
xen-devel-3.0.3-64.el5.x86_64.rpm | SHA-256: afc996ee9bbd5d4bede9016de0c391b40914000e3fdfdb9435941ae3093f6a16 |
xen-libs-3.0.3-64.el5.i386.rpm | SHA-256: c0c5716ce816c99f81b4a884f755e0cf1708d16e89fa5badc5ee9f35ef32fdae |
xen-libs-3.0.3-64.el5.x86_64.rpm | SHA-256: 74586d8c999958e4fe7a673669fbd315e7e6e50958647eb7e321e0e5127bbe4d |
i386 | |
xen-3.0.3-64.el5.i386.rpm | SHA-256: 2f924bebecf75396338e1fc0badc775dd6f8d3ae4a13fec4a74cd148261c7fc7 |
xen-devel-3.0.3-64.el5.i386.rpm | SHA-256: 592fc643a0b448ad758f8af0c6a4340d055c516c4f5691031747b215ccbcb530 |
xen-libs-3.0.3-64.el5.i386.rpm | SHA-256: c0c5716ce816c99f81b4a884f755e0cf1708d16e89fa5badc5ee9f35ef32fdae |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
xen-3.0.3-64.el5.src.rpm | SHA-256: 78b869cc809faf52937ee69bbfeae6c3d26bfd4f41ea387a33ee131cde3d54f7 |
x86_64 | |
xen-libs-3.0.3-64.el5.i386.rpm | SHA-256: c0c5716ce816c99f81b4a884f755e0cf1708d16e89fa5badc5ee9f35ef32fdae |
xen-libs-3.0.3-64.el5.x86_64.rpm | SHA-256: 74586d8c999958e4fe7a673669fbd315e7e6e50958647eb7e321e0e5127bbe4d |
i386 | |
xen-libs-3.0.3-64.el5.i386.rpm | SHA-256: c0c5716ce816c99f81b4a884f755e0cf1708d16e89fa5badc5ee9f35ef32fdae |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
xen-3.0.3-64.el5.src.rpm | SHA-256: 78b869cc809faf52937ee69bbfeae6c3d26bfd4f41ea387a33ee131cde3d54f7 |
x86_64 | |
xen-libs-3.0.3-64.el5.i386.rpm | SHA-256: c0c5716ce816c99f81b4a884f755e0cf1708d16e89fa5badc5ee9f35ef32fdae |
xen-libs-3.0.3-64.el5.x86_64.rpm | SHA-256: 74586d8c999958e4fe7a673669fbd315e7e6e50958647eb7e321e0e5127bbe4d |
i386 | |
xen-libs-3.0.3-64.el5.i386.rpm | SHA-256: c0c5716ce816c99f81b4a884f755e0cf1708d16e89fa5badc5ee9f35ef32fdae |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.