Article ID: 113033, created on Dec 20, 2011, last review on May 3, 2014

  • Applies to:
  • Virtuozzo hypervisor 5.0

Release notes

--------------------------------------------------------------------------------
Synopsis:          New Parallels Server Bare Metal 5.0 kernel provides
                   an update with stability fixes.
Issue date:        2011-11-03
Product:           Parallels Server Bare Metal 5.0
Keywords:          'bugfix' 'stability' 'VSwap' 'nfs' 'online migration'
                   'Fedora 15'

--------------------------------------------------------------------------------

This document provides information on the new Parallels Server Bare Metal 5.0
kernel, version 2.6.32-042stab044.11.

--------------------------------------------------------------------------------
TABLE OF CONTENTS

1. About This Release
2. Updates Description
3. Obtaining New Kernel
4. Installing New Kernel
5. Required RPMs
6. References

--------------------------------------------------------------------------------

1. ABOUT THIS RELEASE

The current update for the Parallels Server Bare Metal 5.0 kernel provides a new
kernel based on the Red Hat 6.1 kernel (2.6.32-131.21.1.el6). The updated
kernel includes important stability fixes, improvements in VSwap, NFS and
live migration code, and support for the Fedora 15 OS template.

--------------------------------------------------------------------------------

2. UPDATES DESCRIPTION

This update contains fixes for the following issues:

* Inaccuaracies in memory usage accounting could make a Container exceed
  its RAM limit under certain conditions. (PCLIN-29922)

* Under memory pressure, the OOM killer could start killing tasks too early
  or could kill a wrong task. (PCLIN-29923, PCLIN-30281, PCLIN-30292)

* A kernel panic could occur in tmpfs code when using symbolic links with
  short names. (PCLIN-30078)

* The file opened by a Hardware Node process on a Container NFS mount could
  lead to a kernel crash when the Container was stopped.  (PCLIN-30079,
  PCLIN-30297)

* FIFOs located on an NFS mount could get corrupted during live migration.
 (PCLIN-30081)

* The traffic shaper could work incorrectly in Containers. (PCLIN-30091)

* When moving a networking device to a Container, the corresponding sysfs
  entries were not moved. This could cause networking scripts to fail on
  some OS templates. (PCLIN-30190)

* A kernel crash could happen when using the acct command-line tool to stop
  a Container with NFS mounts inside. (PCLIN-30209)

* NAT on the Hardware Node did not work in the bridged networking mode.
  (PCLIN-30216)

* The xattrs attributes did not work for files in Containers pointing to the
  template area on the Hardware Node. (PCLIN-30219)

* The ustat and lsattr system calls did not work properly in 32-bit Containers
  hosted on 64-bit Hardware Nodes. (PCLIN-30241, PCLIN-30242)

* Containers running NFSd could stuck during the shutdown. (PCLIN-30298)

* The dcachesize resource could leak when stopping a Container with the
  binfmt_misc module loaded. (PCLIN-30320)

* A kernel crash could happen under heavy memory usage. (PCLIN-30321)

* Quota tools in a Container could complain of the inability to remount the
  Container root file system.(PCLIN-30324, PCLIN-30358)

* The kernel could hang when running with the AAC-RAID 2405 adapter.
  (PCLIN-30340)

* Under certain conditions, the kernel could deadlock under heavy memory usage.
  (PCLIN-30367, PCLIN-30378)

* A kernel crash could happen when stopping the iptables service. (PCLIN-30508)

--------------------------------------------------------------------------------

3. OBTAINING NEW KERNEL

You can download and install this kernel update using the vzup2date utility
included in the Parallels Server Bare Metal 5.0 distribution set.

--------------------------------------------------------------------------------

4. INSTALLING NEW KERNEL

To install the update, do the following:

I. Use the "rpm -ihv" command to install the new kernel and Virtuozzo modules.

# rpm -ivh vzkernel-2.6.32-042stab044.11.i686.rpm \
vzmodules-2.6.32-042stab044.11.i686.rpm
Preparing...                ################################# [100%]
    1:vzkernel               ################################# [50%]
    2:vzmodules              ################################# [100%]

    Please DO NOT USE the "rpm -Uhv" command to install the kernel. Otherwise,
    all the kernels previously installed on your system may be removed from
    the Hardware Node.

II. You can adjust your boot loader configuration file to have the new kernel
    loaded by default. If you use the LILO bootloader, please do not forget to
    execute the 'lilo' command to write the changes to the boot sector:

     # lilo
     Added Virtuozzo2 *
     Added Virtuozzo1
     Added linux
     Added linux-up

III. Reboot your computer with the "shutdown -r now" command to boot the new
     kernel.

--------------------------------------------------------------------------------

5. REQUIRED RPMS

Depending on the processor installed on the Hardware Node, the following RPM
packages are included in the kernel update:

x86 kernels:

- SMP:
   vzkernel-2.6.32-042stab044.11.i686.rpm
   vzmodules-2.6.32-042stab044.11.i686.rpm

- Enterprise:
   vzkernel-ent-2.6.32-042stab044.11.i686.rpm
   vzmodules-ent-2.6.32-042stab044.11.i686.rpm

- Enterprise with the 4GB split feature disabled:
   vzkernel-PAE-2.6.32-042stab044.11.i686.rpm
   vzmodules-PAE-2.6.32-042stab044.11.i686.rpm


x86_64 kernels:

- SMP:
   vzkernel-2.6.32-042stab044.11.x86_64.rpm
   vzmodules-2.6.32-042stab044.11.x86_64.rpm

--------------------------------------------------------------------------------

6. REFERENCES

http://rhn.redhat.com/errata/RHSA-2011-1465.html
https://www.redhat.com/security/data/cve/CVE-2011-1162.html
https://www.redhat.com/security/data/cve/CVE-2011-1577.html
https://www.redhat.com/security/data/cve/CVE-2011-2494.html
https://www.redhat.com/security/data/cve/CVE-2011-2699.html
https://www.redhat.com/security/data/cve/CVE-2011-2905.html
https://www.redhat.com/security/data/cve/CVE-2011-3188.html
https://www.redhat.com/security/data/cve/CVE-2011-3191.html
https://www.redhat.com/security/data/cve/CVE-2011-3353.html
https://www.redhat.com/security/data/cve/CVE-2011-3359.html
https://www.redhat.com/security/data/cve/CVE-2011-3363.html
https://www.redhat.com/security/data/cve/CVE-2011-3593.html
https://www.redhat.com/security/data/cve/CVE-2011-4326.html

--------------------------------------------------------------------------------
Copyright (C) 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights
reserved.

a26b38f94253cdfbf1028d72cf3a498b c662da62f00df94fd77ba7a2c9eff4b4 2897d76d56d2010f4e3a28f864d69223

Email subscription for changes to this article
Save as PDF