- Issued:
- 2009-09-02
- Updated:
- 2009-09-02
RHBA-2009:1328 - Bug Fix Advisory
Synopsis
xen bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated xen packages that fix several bugs and add enhancements are now
available.
Description
The xen packages contain tools for managing the virtual machine monitor in
Red Hat Enterprise Linux Virtualization.
These updated packages fix the following bugs:
- fix CPUs pinning in guest's configuration after save/restore sequence
(BZ#228890)
- kernel command line could not be edited in IA64 PV guests during boot
(BZ#249791)
- disallow migration for domains with attached PCI devices (BZ#334821)
- give memory back to dom0 if autoballooning failed (BZ#345271)
- credit scheduler parameters were not preserved during guest restart
(BZ#345321)
- exclusively used devices could be attached to more than one guest at a
time (BZ#345441)
- allow HVM guests creation under tight memory conditions (BZ#419771)
- migration of PV guests could hang on failure (BZ#428691)
- xend and xendomains init scripts returned wrong exit codes (BZ#430904)
- vfb and vkbd entries were not removed from xenstore after destroying a
guest (BZ#439182)
- saving a guest reported success even if the operation failed (BZ#451675)
- the "xm console" documentation was updated to mention Ctrl-] sequence
which escapes from xenconsole (BZ#454611)
- creating a guest could fail under heavy I/O in dom0 (BZ#456926)
- serialize iptables calls in hotplug scripts (BZ#460410)
- HVM guests suffered from missing clock interrupts (BZ#465116)
- P-V guests could not be rebooted after restarting xend
(BZ#468971,BZ#474579)
- Xen network-bridge script didn't work when source address was specified
for default route (BZ#475249)
- passing out-of-range identification of an IDE disk caused a guest to
misbehave or crash (BZ#475433)
- bogus MAC address was allowed to be specified for a virtual NIC
(BZ#476611)
- data corruption occurred on guests with virtual SCSI disks larger than
1TB (BZ#479339)
- HVM guests suffered from time skews (BZ#480689)
- avoid SCSI device data corruptions on HVM guests with >4GB RAM
(BZ#480843)
- flush Xen SCSI driver buffer to disk before returning from
scsi_write_data() function (BZ#481782)
- correctly handle device detach attempts for devices mounted in guest
(BZ#484110)
- "xm dump-core" didn't truncate existing files (BZ#484346)
- QCOW images were created with wrong byte order (BZ#485471)
- P-V guest didn't resume after failed save or migration (BZ#486157)
- xenconsole didn't work after failed save or migration (BZ#486291)
- QCOW images couldn't be used with PV guests or HVM guests with PV drivers
(BZ#486353)
- xend didn't stop in runlevels 0, 1, and 6 (BZ#490053)
- libxenstore would leak memory on every @domainIntroduced event
(BZ#490158)
- boot first entry in guest's grub.conf if default boot configuration is
invalid (BZ#490754)
- pygrub would ignore "default" and "timeout" options in elilo.conf
(BZ#491408)
- bridged network didn't work well when used together with bonding and
802.1q VLANs (BZ#492258)
These updated packages add the following enhancements:
- support for F11 and F12 keys in HVM BIOS (BZ#338321)
- support for Ctrk-Alt-Del in HVM BIOS (BZ#338331)
- support for global default keymap setting (BZ#345251)
- support for save, restore, migration and dump-core of 32b guests on a 64b
host (BZ#425411, BZ#480118)
- support for attaching PCI devices to HVM guests using VT-d (BZ#480520)
- support for virtual SCSI disks larger than 2TB (BZ#482780)
- support for local migrations (BZ#484967)
- support for 1GB host page tables (BZ#487342)
- support for relative mouse offset VNC extension (BZ#487559)
- support for INT13 LBA48 extensions in HVM BIOS (BZ#487907)
- fix PCIe NICs on Stoakley detach problem (BZ#507179)
- fix guest reboot with VT-d device assigned (BZ#507182)
- add BDFs duplicate check in HVM configure file (BZ#507195)
- fix MSI-X NIC hotplug removal (BZ#507198)
- fix `xm pci-list` BDF output on WeyBridge platform (BZ#507257)
- set cpu_weight default value back to 256 (BZ#508680)
Users of xen are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 228890 - Pinned CPUs of guests are unpinned after save/restore sequence
- BZ - 334821 - [RHEL 5.2] Xen 3.1.1 Prevent migration with attached PCI devices
- BZ - 338321 - [RHEL 5.2] Xen 3.1.1 Add F11/F12 key support to hvm bios
- BZ - 338331 - [RHEL 5.2] Xen 3.1.1 Add ctrl-alt-del reboot to hvm bios
- BZ - 345251 - [RHEL 5.2] Xen 3.1.1: Add default keymap option to config.sxp
- BZ - 345271 - [RHEL 5.2] Xen 3.1.1: Give memory back to dom0 after failed autoballoon
- BZ - 345321 - [RHEL 5.2] Xen 3.1.1: Fix sched params to stick on reboot and be accurate in xm list
- BZ - 345441 - [RHEL 5.2] Xen 3.1.1: Add vbd and vif duplication checks
- BZ - 419771 - Creating full virt domain fails showing 'cannot allocate memory'
- BZ - 425411 - [RHEL5.2]: i386 PV guests on x86_64 HV fail "xm save"
- BZ - 430904 - [RHEL5]: xend and xendomains init scripts have wrong return values
- BZ - 439182 - [RHEL5.2]: Running "xm destroy" on a domain with PVFB causes a xenstore leak
- BZ - 454611 - [man] Ctrl+] not documented for xenconsole
- BZ - 456926 - virt-install with 8GB of ram aborts after it creates the storage file.
- BZ - 460410 - xm create fails to add vif PHYSDEV match rules for a domU with multiple network interfaces
- BZ - 465116 - Formatting a disk on a Windows Server 2008/Vista 32 guest causes Windows to panic.
- BZ - 468971 - Xen domain cannot be rebooted after restarting xend
- BZ - 474579 - Xen domain cannot be rebooted after restarting xend if it is configured with a mixture of tap and vbd disks
- BZ - 475249 - xen network-bridge script doesn't work with SRCADDR option in default route interface
- BZ - 475433 - When out of range hdX values are attached, guests misbehave/crash
- BZ - 476611 - xm network-attach allow bogus mac addresses to be entered
- BZ - 480118 - [RHEL5 Xen]: xm dump-core with 32-on-64 PV guest fails
- BZ - 480689 - SMP 32bit RHEL5u1 and RHEL5u2 HVM domain might stop booting when start udev service
- BZ - 480843 - SCSI problems on fullvirt guests with > 4Gb mem
- BZ - 481354 - typo in python2.4/site-packages/xen/xend/sxp.py
- BZ - 481782 - scsi backend: make sure data is actually written to disk
- BZ - 482780 - FEAT: support virtual SCSI disks >2TB
- BZ - 484110 - Unable to shut down guest after attempting block-detach of guest boot device
- BZ - 484346 - xm dump-core does not truncate existing files
- BZ - 485471 - blktap qcow driver uses incompatible endianess vs qemu's qcow driver
- BZ - 486157 - PV guest stops running when xm save fails
- BZ - 486291 - xm console does not work when xm save fails
- BZ - 486353 - Fix missing blktap poll-on-aio support
- BZ - 487559 - RFE: Xen QEMU VNC server needs to support relative mouse VNC extension
- BZ - 487907 - Patch to provide INT13 LBA48 extensions to Xen HVM BIOS (boot off disks/images larger than 128GB)
- BZ - 490053 - xen doesn't stop when entering runlevels 0, 1, or 6.
- BZ - 490158 - libxenstore.so leaks memory on every @domainIntroduced event
- BZ - 490754 - pygrub abort with IndexError if default is set higher than number of boot entries
- BZ - 492258 - network-bridge-bonding doesn't support 802.1q vlans
- BZ - 507765 - XenD looses PVFB config info after PV guest reboot
- BZ - 508680 - default value of cpu_weight changed from 256 to 1
- BZ - 514733 - [Regression] xen HVM fsync performance for file-backed fs is in the toilet
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
xen-3.0.3-94.el5.src.rpm | SHA-256: b53317aeeee38910ba12bfa7de8c46b1ff9bdc74b3b96569d3a1898679f5b3ce |
x86_64 | |
xen-3.0.3-94.el5.x86_64.rpm | SHA-256: 1af8c3b96f2a12d331ba61b2738ea052b30529a466aae81eaccd1a758c75cf7e |
xen-devel-3.0.3-94.el5.i386.rpm | SHA-256: 45178b24d2c7cc67a6a8e2cfa39f82fb7915bce275e9525e34ee89b80ecc0ad6 |
xen-devel-3.0.3-94.el5.x86_64.rpm | SHA-256: c6aad0dfca2809c0bb162bb795acf17936aac6cb50c58f2f1f9d1749fbf6805b |
xen-libs-3.0.3-94.el5.i386.rpm | SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07 |
xen-libs-3.0.3-94.el5.x86_64.rpm | SHA-256: a15c8930c267ab9ed525bb5e126d7a9a5dfbf1be361be319cea843f7ffcd3711 |
ia64 | |
xen-3.0.3-94.el5.ia64.rpm | SHA-256: 6186dd1a08c456990b39f192d6a8dc9f4cff08e5a7352cba5b1eeda0930db9ce |
xen-devel-3.0.3-94.el5.ia64.rpm | SHA-256: b7f7eaa3211b7ec0ed3b696147ba569d7ff18df36535f579078e6b8cef2e152b |
xen-libs-3.0.3-94.el5.ia64.rpm | SHA-256: 4515953765484f36a3faa8160e785ffdb597c7e549823badf38af1f69fc21d83 |
i386 | |
xen-3.0.3-94.el5.i386.rpm | SHA-256: 8e2c6ecce54f56fa91c7b0c1c68ed707cb028c8c28bcb3ba17ac31da7e938f7a |
xen-devel-3.0.3-94.el5.i386.rpm | SHA-256: 45178b24d2c7cc67a6a8e2cfa39f82fb7915bce275e9525e34ee89b80ecc0ad6 |
xen-libs-3.0.3-94.el5.i386.rpm | SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
xen-3.0.3-94.el5.src.rpm | SHA-256: b53317aeeee38910ba12bfa7de8c46b1ff9bdc74b3b96569d3a1898679f5b3ce |
x86_64 | |
xen-3.0.3-94.el5.x86_64.rpm | SHA-256: 1af8c3b96f2a12d331ba61b2738ea052b30529a466aae81eaccd1a758c75cf7e |
xen-devel-3.0.3-94.el5.i386.rpm | SHA-256: 45178b24d2c7cc67a6a8e2cfa39f82fb7915bce275e9525e34ee89b80ecc0ad6 |
xen-devel-3.0.3-94.el5.x86_64.rpm | SHA-256: c6aad0dfca2809c0bb162bb795acf17936aac6cb50c58f2f1f9d1749fbf6805b |
xen-libs-3.0.3-94.el5.i386.rpm | SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07 |
xen-libs-3.0.3-94.el5.x86_64.rpm | SHA-256: a15c8930c267ab9ed525bb5e126d7a9a5dfbf1be361be319cea843f7ffcd3711 |
i386 | |
xen-3.0.3-94.el5.i386.rpm | SHA-256: 8e2c6ecce54f56fa91c7b0c1c68ed707cb028c8c28bcb3ba17ac31da7e938f7a |
xen-devel-3.0.3-94.el5.i386.rpm | SHA-256: 45178b24d2c7cc67a6a8e2cfa39f82fb7915bce275e9525e34ee89b80ecc0ad6 |
xen-libs-3.0.3-94.el5.i386.rpm | SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
xen-3.0.3-94.el5.src.rpm | SHA-256: b53317aeeee38910ba12bfa7de8c46b1ff9bdc74b3b96569d3a1898679f5b3ce |
x86_64 | |
xen-libs-3.0.3-94.el5.i386.rpm | SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07 |
xen-libs-3.0.3-94.el5.x86_64.rpm | SHA-256: a15c8930c267ab9ed525bb5e126d7a9a5dfbf1be361be319cea843f7ffcd3711 |
i386 | |
xen-libs-3.0.3-94.el5.i386.rpm | SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
xen-3.0.3-94.el5.src.rpm | SHA-256: b53317aeeee38910ba12bfa7de8c46b1ff9bdc74b3b96569d3a1898679f5b3ce |
x86_64 | |
xen-libs-3.0.3-94.el5.i386.rpm | SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07 |
xen-libs-3.0.3-94.el5.x86_64.rpm | SHA-256: a15c8930c267ab9ed525bb5e126d7a9a5dfbf1be361be319cea843f7ffcd3711 |
i386 | |
xen-libs-3.0.3-94.el5.i386.rpm | SHA-256: 004b0b72e4df2fca3d12f9c0a8a314db50cd1e56973f9c8406d36e630a257e07 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.