Oracle® Linux

Release Notes for Unbreakable Enterprise Kernel Release 3 Quarterly Update 2

Oracle Legal Notices

Copyright Notice

Copyright © 1994-2014, Oracle and/or its affiliates. All rights reserved.

Trademark Notice

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.

License Restrictions Warranty/Consequential Damages Disclaimer

This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.

Warranty Disclaimer

The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.

Restricted Rights Notice

If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable:

U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.

Hazardous Applications Notice

This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.

Third-Party Content, Products, and Services Disclaimer

This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services.

Alpha and Beta Draft Documentation Notice Disclaimer

If this document is in preproduction status:

This documentation is in preproduction status and is intended for demonstration and preliminary use only. It may not be specific to the hardware on which you are using the software. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to this documentation and will not be responsible for any loss, costs, or damages incurred due to the use of this documentation.

E52507-01

May 2014

Abstract

This document contains information on Quarterly Update 2 to the Unbreakable Enterprise Kernel Release 3. This document may be updated after it is released. To check for updates to this document, and to view other Oracle documentation, refer to the Documentation section on the Oracle Technology Network (OTN) Web site:

http://www.oracle.com/technology/documentation/

This document is intended for users and administrators of Oracle Linux. It describes potential issues and the corresponding workarounds you may encounter while using the Unbreakable Enterprise Kernel Release 3 with Oracle Linux 6. Oracle recommends that you read this document before installing or upgrading the Unbreakable Enterprise Kernel Release 3.

Document generated on: 2014-05-19 (revision: 1875)


Table of Contents

Preface
1 New Features and Changes
1.1 Notable Changes
1.2 Xen Improvements
1.3 Driver Updates
1.3.1 Storage Adapter Drivers
1.3.2 Network Adapter Drivers
1.3.3 Miscellaneous Drivers
1.4 Technology Preview
1.5 Compatibility
2 Fixed and Known Issues
2.1 Fixed Issues
2.2 Known Issues
3 Installation and Availability
3.1 Switching a System to UEK R3 (ULN)
3.2 Switching a System to UEK R3 (Public Yum)
3.3 Upgrading OFED Packages

Preface

The Oracle Linux Unbreakable Enterprise Kernel Release Notes provides a summary of the new features, changes, and fixed and known issues in the Unbreakable Enterprise Kernel Release 3.

Audience

This document is written for system administrators who want to use the Unbreakable Enterprise Kernel with Oracle Linux. It is assumed that readers have a general understanding of the Linux operating system.

Documentation Accessibility

For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program website at http://www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc.

Access to Oracle Support

Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.

Related Documents

The latest version of this document and other documentation for this product are available at:

http://www.oracle.com/technetwork/server-storage/linux/documentation/index.html.

Conventions

The following text conventions are used in this document:

Convention

Meaning

boldface

Boldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary.

italic

Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular values.

monospace

Monospace type indicates commands within a paragraph, URLs, code in examples, text that appears on the screen, or text that you enter.

Chapter 1 New Features and Changes

The Unbreakable Enterprise Kernel Release 3 (UEK R3) is Oracle's third major release of its heavily tested and optimized operating system kernel for Oracle Linux 6 on the x86-64 architecture. It is based on the mainline Linux kernel version 3.8.13.

The 3.8.13-35 release is the second quarterly update release for UEK R3. It includes security and bug fixes, as well as driver updates.

Oracle actively monitors upstream checkins and applies critical bug and security fixes to UEK R3.

UEK R3 uses the same versioning model as the mainline Linux kernel version. It is possible that some applications might not understand the 3.x versioning scheme. If an application does require a 2.6 context, you can use the uname26 wrapper command to start it. However, regular Linux applications are usually neither aware of, nor affected by, Linux kernel version numbers.

1.1 Notable Changes

  • Updates to the hpsa driver adds HP SSD Smart Path feature, which improves the performance of select HP Smart Array Controllers in SSD-based HP ProLiant servers.

  • Support has been added for the Intel Ethernet Controller XL710 family.

  • Paravirtualization drivers have been added or updated to support Oracle Linux guests running on Microsoft Hyper-V.

  • The DTrace profile provider now supports profile-n probes that fire at a fixed interval at high-interrupt level on all active CPUs. (For comparison, tick-n probes fire on only one CPU per interval and the CPU on which they fire can change over time.) The units of n default to a frequency expressed as a rate of firing per second. You can use the same suffixes as for tick-n probes to specify either a time interval or a frequency.

  • Quarterly Update 2 includes a change to requirements for dracut, version 004-303.0.3 or higher is now required.

  • The kernel-uek-headers package is no longer built and delivered with UEK3 releases. In order to build kernel modules, you only need the kernel-uek-devel package. If you need a headers package, use the kernel-headers package.

  • Limited support for client-side NFS over RDMA (Remote Direct Memory Access) has been enabled. Server-side NFS over RDMA is not enabled.

1.2 Xen Improvements

  • Fixes in netback for Rx (receive) and Tx (transmit) path issues (Bug ID 18379272).

  • Fixes in netfront for resources leaks and missed timer (Bug ID 18348558).

  • Fixes in virtual CPU (VCPU) hotplug code (Bug ID 18348666).

  • Fixes in physical to machine (P2M) code for PCI passthrough (Bug ID 18355746).

1.3 Driver Updates

The Unbreakable Enterprise Kernel supports a wide range of hardware and devices. In close cooperation with hardware and storage vendors, several device drivers have been updated by Oracle.

1.3.1 Storage Adapter Drivers

Broadcom

  • NetXtreme II Fibre Channel over Ethernet (FCoE) driver (bnx2fc) updated to 2.4.2e.

Brocade

  • Fibre Channel host bus adapter (HBA) driver fcpim (bfa) updated to 3.2.23.0.

Cisco

  • Cisco FCoE HBA driver (fnic) updated to 1.6.0.10.

Emulex

  • OneConnect (previously known as Blade Engine 2) Open-iSCSI driver (be2iscsi) updated to 10.2.125.0o.

HP

  • HP Smart Array Controller driver (hpsa) updated to 3.4.4-1.

Intel

  • NVM Express device driver (nvme) updated to 0.9.

QLogic

  • Fibre Channel HBA driver (qla2xxx) updated to 8.07.00.08.39.0-k1.

  • iSCSI HBA driver (qla4xxx) updated to 5.04.00.05.06.02-uek3.

1.3.2 Network Adapter Drivers

Broadcom

  • NetXtreme II 1 Gigabit network adapter driver (bnx2) updated to 2.2.5f.

  • NetXtreme II 10 Gigabit network adapter driver (bnx2x) updated to 1.710.10.

  • NetXtreme II Converged Network Interface Card core driver (cnic) updated to 2.5.18d.

  • Tigon3 ethernet adapter driver (tg3) updated to 3.136e.

Brocade

  • 10 Gigabit PCI Express network adapter driver (bna) updated to 3.2.23.0.

Cisco

  • VIC Ethernet NIC Driver (enic) updated to 2.1.1.50.

Emulex

  • OneConnect (previously known as Blade Engine 2) 10Gbps adapter driver (be2net) updated to 10.2u.

Intel

  • PRO/1000 PCI Express Gigabit network adapter driver (e1000e) updated to 3.0.4-NAPI.

  • Ethernet Connection XL710 network adapter driver (i40e) version 0.3.9-k added.

  • Gigabit Ethernet network adapter driver (igb) updated to 5.1.2.

  • Gigabit Virtual Function driver (igbvf) updated to 2.3.3.

  • 10 Gigabit PCI Express network adapter driver (ixgbe) updated to 3.19.1.

  • 10 Gigabit PCI Express Virtual Function driver (ixgbevf) updated to 2.12.1.

Oracle

  • Sun Blade 40/10Gigabit Ethernet network driver (sxge) updated to 0.11202013.

  • Sun Blade Virtualized 40/10Gigabit Ethernet network driver (sxgevf) updated to 0.11202013.

QLogic

  • 1/10 GbE Converged/Intelligent Ethernet adapter driver (qlcnic) updated to 5.3.55.6.

  • 10 Gigabit PCI-E Ethernet adapter driver (qlge) updated to 1.00.00.34.

1.3.3 Miscellaneous Drivers

Intel

  • Package Level C-state Idle Injection for Intel CPUs driver (intel_powerclamp) added.

Microsoft

  • The following paravirtualization drivers have been added or updated to support Oracle Linux guests running on Microsoft Hyper-V:

    • HID-compliant mouse driver (hid-hyperv)

    • Balloon driver (hv_balloon)

    • Network driver (hv_netvsc)

    • Virtual storage driver (hv_storvsc)

    • Utilities (hv_utils)

    • VMBus driver (hv_vmbus)

    • Synthetic video frame buffer driver (hyperv_fb)

    • Keyboard driver (hyperv-keyboard)

1.4 Technology Preview

The following features included in the Unbreakable Enterprise Kernel Release 3 are still under development, but are made available for testing and evaluation purposes.

  • DRBD (Distributed Replicated Block Device)

    A shared-nothing, synchronously replicated block device (RAID1 over network), designed to serve as a building block for high availability (HA) clusters. It requires a cluster manager (for example, pacemaker) for automatic failover.

  • Kernel module signing facility

    Applies cryptographic signature checking to modules on module load, checking the signature against a ring of public keys compiled into the kernel. GPG is used to do the cryptographic work and determines the format of the signature and key data.

  • Transcendent memory

    Transcendent Memory (tmem) provides a new approach for improving the utilization of physical memory in a virtualized environment by claiming underutilized memory in a system and making it available where it is most needed. From the perspective of an operating system, tmem is fast pseudo-RAM of indeterminate and varying size that is useful primarily when real RAM is in short supply. To learn more about this technology and its use cases, see the Transcendent Memory project page at http://oss.oracle.com/projects/tmem/.

1.5 Compatibility

Oracle Linux maintains user-space compatibility with Red Hat Enterprise Linux, which is independent of the kernel version running underneath the operating system. Existing applications in user space will continue to run unmodified on the Unbreakable Enterprise Kernel Release 3 and no re-certifications are needed for RHEL certified applications.

To minimize impact on interoperability during releases, the Oracle Linux team works closely with third-party vendors whose hardware and software have dependencies on kernel modules. The kernel ABI for UEK R3 will remain unchanged in all subsequent updates to the initial release. In this release, there are changes to the kernel ABI relative to UEK R2 that require recompilation of third-party kernel modules on the system. Before installing UEK R3, verify its support status with your application vendor.

Chapter 2 Fixed and Known Issues

This chapter describes the fixed and known issues for the Unbreakable Enterprise Kernel Release 3.

Important

Run the yum update command regularly to ensure that the latest bug fixes and security errata are installed on your system.

2.1 Fixed Issues

The following issues have been fixed in this update.

btrfs

  • The btrfs device scan command no longer displays an error message if devices on which you create btrfs file systems are subsequently reused in another file system. (Bug ID 17087097)

  • Fixes have been applied to the btrfs-convert and mkfs.btrfs -r commands to prevent the creation of btrfs file systems on devices that are already mounted. (Bug ID 18061751, 18606274)

  • The bug that can cause data corruption when reading or updating compressed extents has been fixed. (Bug ID 18403731)

  • In order to alleviate problems with defragmentation, snapshot-aware defragmentation has been disabled. (Bug ID 18348652)

  • Users can now only create snapshots of subvolumes that they own. Previously it was possible for users to create a snapshot of any subvolume. (Bug ID 18348620)

DTrace

  • Problems with symbol lookup when using ustack() with multithreaded processes, which could cause threads to lock up, have been fixed. It also ensures that DTrace assigns the correct values to the pid and ppid variables. (Bug ID 18412802)

  • Added support for profile-n probes to the DTrace profile provider. (Bug ID 18323501, 18323513)

  • The output from the stack() action has been corrected. Previously, this could include incorrect addresses, in particular for kernel functions that allocate data structures on the stack. (Bug ID 18323450)

  • Interrupting DTrace with a SIGINT while monitored processes are dying no longer hangs DTrace on a condition variable. (Bug ID 18689795)

  • Symbol lookups on processes that died at the same instant now always fail and no longer access freed memory. (Bug ID 18550863)

  • Killing DTrace while a ustack() is in progress no longer risks killing crucial system daemons. (Bug ID 18600515)

iSCSI

  • Previously when a system performed a scan for LUNs on a storage appliance (typically a Sun ZFS Storage Appliance) and the storage appliance reports a LUN as not ready or unavailable, the scan was aborted. This has been fixed, and systems now continue to scan for the available LUNs. (Bug ID 18271070)

  • The issue where the kernel reports connection error 1020 during an iSCSI session logout has been fixed. (Bug ID 17585443)

Message Queue

  • A fix has been applied to correct the msgrcv() functionality so that, when a negative msgtyp is specified, the first message of the lowest type that is less than or equal to the absolute value of msgtyp is received. (Bug ID 18348614)

OCFS2

  • A fix has been applied to the OCFS2 recovery process that could cause the whole OCFS2 cluster to hang. (Bug ID 18285345)

SELinux

  • The bug that enabled a empty (zero-length) security context to be set has been fixed. (Bug ID 18348651)

Virtualization

  • Fix applied to support the live migration of hardware virtualized machine (HVM) guests that have more than 32 virtual CPUs. (Bug ID 18552664)

  • The fix has been applied for xen XSA-90 Linux netback crash trying to disable due to malformed packet. (Bug ID 18528832)

  • If a guest is configured with 256 virtual CPUs, the shutdown of the guest appears to hang but does eventually complete. (Bug ID 18380043)

2.2 Known Issues

This section describes the known issues in this update.

ACPI

  • On some systems you might see ACPI-related error messages in dmesg similar to the following:

    ACPI Error: [CDW1] Namespace lookup failure, AE_NOT_FOUND
    ACPI Error: Method parse/execution failed [_SB_._OSC||\||]
    ACPI Error: Field [CDW3] at 96 exceeds Buffer [NULL] size 64 (bits)]]>

    These messages, which are not fatal, are caused by bugs in the BIOS. Contact your system vendor for a BIOS update. (Bug ID 13100702)

  • The following messages indicate that the BIOS does not present a suitable interface, such as _PSS or _PPC, that the acpi-cpufreq module requires:

    kernel: powernow-k8: this CPU is not supported anymore, using acpi-cpufreq instead.
    modprobe: FATAL: Error inserting acpi_cpufreq 

    There is no known workaround for this error. (Bug ID 17034535)

ASM

Calling the oracleasm init script, /etc/init.d/oracleasm, with the parameter scandisks can lead to error messages about missing devices similar to the following:

oracleasm-read-label: Unable to open device "device": No such file or directory

However, the device actually exists. You can ignore this error message, which is triggered by a timing issue. Only use the init script to start and stop the oracleasm service. All other options, such as scandisks, listdisk, and createdisk, are deprecated. For these and other administrative tasks, use /usr/sbin/oracleasm instead. (Bug ID 13639337)

bnx2x Driver

When using the bnx2x driver in a bridge, disable Transparent Packet Aggregation (TPA) by including the statement options bnx2x disable_tpa=1 in /etc/modprobe.conf. (Bug ID 14626070)

btrfs

  • If you use the --alloc-start option with mkfs.btrfs to specify an offset for the start of the file system, the size of the file system should be smaller but this is not the case. It is also possible to specify an offset that is higher than the device size. (Bug ID 16946255)

  • The usage information for mkfs.btrfs reports raid5 and raid6 as possible profiles for both data and metadata. However, the kernel does not support these features and cannot mount file systems that use them. (Bug ID 16946303)

  • The btrfs filesystem balance command does not warn that the RAID level can be changed under certain circumstances, and does not provide the choice of cancelling the operation. (Bug ID 16472824)

  • Converting an existing ext2, ext3, or ext4 root file system to btrfs does not carry over the associated security contexts that are stored as part of a file's extended attributes. With SELinux enabled and set to enforcing mode, you might experience many permission denied errors after reboot, and the system might be unbootable. To avoid this problem, enforce automatic file system relabeling to run at bootup time. To trigger automatic relabeling, create an empty file named .autorelabel (for example, by using touch) in the file system's root directory before rebooting the system after the initial conversion. The presence of this file instruct SELinux to recreate the security attributes for all files on the file system. If you forget to do this and rebooting fails, either temporarily disable SELinux completely by adding selinux=0 to the kernel boot parameters, or disable enforcing of the SELinux policy by adding enforcing=0. (Bug ID 13806043)

  • Commands such as du can show inconsistent results for file sizes in a btrfs file system when the number of bytes that is under delayed allocation is changing. (Bug ID 13096268)

  • The copy-on-write nature of btrfs means that every operation on the file system initially requires disk space. It is possible that you cannot execute any operation on a disk that has no space left; even removing a file might not be possible. The workaround is to run sync before retrying the operation. If this does not help, remount the file system with the -o nodatacow option and delete some files to free up space. See https://btrfs.wiki.kernel.org/index.php/ENOSPC.

  • Btrfs has a limit of 237 or fewer hard links to a file from a single directory. The exact limit depends on the number of characters in the file name. The limit is 237 for a file with up to eight characters in its file name; the limit is lower for longer file names. Attempting to create more than this number of links results in the error Too many links. You can create more hard links to the same file from another directory. Although the limitation of the number of hard links in a single directory has been increased to 65535, the version of mkfs.btrfs that is provided in the btrfs-progs package does not yet support the compatibility flag for this feature. (Bug ID 16285431)

  • If you run the btrfs quota enable command on a non-empty file system, any existing files do not count toward space usage. Removing these files can cause usage reports to display negative numbers and the file system to be inaccessible. The workaround is to enable quotas immediately after creating the file system. If you have already written data to the file system, it is too late to enable quotas. (Bug ID 16569350)

  • The btrfs quota rescan command is not currently implemented. The command does not perform a rescan and returns without displaying any message. (Bug ID 16569350)

  • When you overwrite data in a file, starting somewhere in the middle of the file, the overwritten space is counted twice in the space usage numbers that btrfs qgroup show displays. (Bug ID 16609467)

  • If you run btrfsck --init-csum-tree on a file system and then run a simple btrfsck on the same file system, the command displays a Backref mismatch error that was not previously present. (Bug ID 16972799)

  • If you use the -s option to specify a sector size to mkfs.btrfs that is different from the page size, the created file system cannot be mounted. By default, the sector size is set to be the same as the page size. (Bug ID 17087232)

  • The btrfs subvolume delete command may result in a "Directory not empty" error. This error message is incorrect. The actual reason that the subvolume cannot be deleted is that the subvolume is configured as the default subvolume. The default subvolume is the subvolume that is mounted when no subvolume is specified with the mount command. Before you can delete the subvolume, you need to configure a different default subvolume using the btrfs subvolume set-default command. (Bug ID 17661944)

  • Defragmentation can break data block sharing. Due to the copy-on-write design of btrfs, snapshots initially share the same data blocks of the original subvolume. However, when either the snapshot or the subvolume is defragmented, this sharing can be undone, resulting in a higher disk space usage.

CPU Microcode Update Failures on PVM or PVHVM Guests

When running Oracle Linux 6 with UEK R3, you might see error messages in dmesg or /var/log/messages similar to this one:

microcode: CPU0 update to revision 0x6b failed.

You can ignore this warning. You do not need to upgrade the microcode for virtual CPUs as presented to the guest. (Bug ID 12576264, 13782843)

DHCP Lease is not Obtained at Boot Time

If DHCP lease negotiation takes more than 5 seconds at boot time, the following message is displayed:

ethX: failed. No link present. Check cable?

If the ethtool ethX command confirms that the interface is present, edit /etc/sysconfig/network-scripts/ifcfg-ethX and set LINKDELAY=N, where N is a value greater than 5 seconds (for example, 30 seconds). Alternatively, use NetworkManager to configure the interface. (Bug ID 16620177)

dm-nfs Module Obsolete

In UEK R2, the dm-nfs module provided the ability to create a loopback device for a mounted NFS file or file system. For example, the feature allowed you to create the shared storage for an Oracle 3 VM cluster on an NFS file system. The dm-nfs module provided direct I/O to the server and bypassed the loop driver to avoid an additional level of page caching. The dm-nfs module is not provided with UEK R3. The loop driver can now provide the same I/O functionality as dm-nfs by extending the AIO interface to perform direct I/O. To create the loopback device, use the losetup command instead of dmsetup.

DTrace

  • Using kill -9 to terminate dtrace can leave breakpoints outstanding in processes being traced, which might sooner or later kill them.

  • Argument declarations for probe definitions cannot be declared with derived types such as enum, struct, or union.

  • The following compiler warning can be ignored for probe definition arguments of type string (which is a D type but not a C type):

    provider_def.h:line#: warning: parameter names (without types) in function declaration

ERST Message

You can safely ignore the following message that might be displayed in syslog or dmesg:

ERST: Failed to get Error Log Address Range.

The message indicates that the system BIOS does not support an Error Record Serialization Table (ERST). (Bug ID 17034576)

Ext4

  • The inline data feature that allows the data of small files to be stored inside their inodes is not yet available. The -O inline_data option to the mkfs.ext4 and tune2fs commands is not supported. (Bug ID 17210654)

  • The intensive direct random writing to files opened for synchronous I/O (O_DIRECT, O_SYNC) with unwritten extent conversions may hang in some circumstances. (Bug ID 18389351)

Firmware Warning Message

You can safely ignore the following firmware warning message that might be displayed on some Sun hardware:

[Firmware Warn]: GHES: Poll interval is 0 for generic hardware error source:
1, disabled.

(Bug ID 13696512)

Huge Pages

One-gigabyte (1 GB) huge pages are not currently supported for the following configurations:

  • HVM guests

  • PV guests

  • Oracle Database

Two-megabyte (2 MB) huge pages have been tested and work with these configurations.

(Bug ID 17299364, 17299871, 17271305)

I/O Scheduler

The Unbreakable Enterprise Kernel uses the deadline scheduler as the default I/O scheduler. For the Red Hat Compatible Kernel, the default I/O scheduler is the cfq scheduler.

ioapic Failure Messages

You can safely ignore messages such as ioapic: probe of 0000:00:05.4 failed with error -22. Such messages are the result of the ioapic driver attempting to re-register I/O APIC PCI devices that were already registered at boot time. (Bug ID 17034993)

InfiniBand

  • You might see the following warning messages if you use the ibportstate disable command to disable a switch port:

    ibwarn: [2696] _do_madrpc: recv failed: Connection timed out
    ibwarn: [2696] mad_rpc: _do_madrpc failed; dport (Lid 38)
    ibportstate: iberror: failed: smp set portinfo failed

    You can safely ignore these warnings. (Bug ID 16248314)

  • The Internet Protocol over InfiniBand (IPoIB) driver supports the use of either connected mode or datagram mode with an interface, where datagram mode is the default mode. Changing the mode of an InfiniBand interface by echoing either connected or datagram to /sys/class/net/ibN/mode is not supported. It is also not possible to change the mode of an InfiniBand interface while it is enabled.

    To change the IPoIB mode of an InfiniBand interface:

    1. Edit the /etc/sysconfig/network-scripts/ifcfg-ibN configuration file, where N is the number of the interface:

      • To configure connected mode, specify CONNECTED_MODE=yes in the file.

      • To configure datagram mode, either specify CONNECTED_MODE=no in the file or do not specify this setting at all (datagram mode is enabled by default).

      Note

      Before saving your changes, make sure that you have not specified more than one setting for CONNECTED_MODE in the file.

    2. To enable the specified mode on the interface, use the following commands to take down the interface and bring it back up:

      # ifdown ibN
      # ifup ibN

    (Bug ID 17479833)

  • When the rds_ib_srq parameter for the rds_rdma module is enabled and the module is in use (for example when running the rds-stress tool), restarting the rdma service (which reloads the rds_rdma module) generates error messages visible in dmesg or /var/log/messages. (Bug ID 18243427)

Linux Containers (LXC)

  • The correct operation of containers might require that you completely disable SELinux on the host system. For example, SELinux can interfere with container operation under the following conditions:

    • Running the halt or shutdown command from inside the container hangs the container or results in a permission denied error. (An alternate workaround is to use the init 0 command from inside the container to shut it down.)

    • Setting a password inside the container results in a permission denied error, even when run as root.

    • You want to allow ssh logins to the container.

    To disable SELinux on the host:

    1. Edit the configuration file for SELinux, /etc/selinux/config and set the value of the SELINUX directive to disabled.

    2. Shut down and reboot the host system.

  • The root user in a container can affect the configuration of the host system by setting some /proc entries. (Bug ID 17190287)

  • Using yum to update packages inside the container that use init scripts can undo changes made by the Oracle template.

  • Migrating live containers (lxc-checkpoint) is not yet supported.

  • Oracle Database is not yet supported for use with Linux Containers. The following information is intended for those who want to experiment with such a configuration.

    The following /proc parameter files may only be set on the host and not for individual containers:

    • /proc/sys/fs/aio-max-nr

    • /proc/sys/net/core/rmem_default

    • /proc/sys/net/core/rmem_max

    • /proc/sys/net/core/wmem_default

    • /proc/sys/net/core/wmem_max

    • /proc/sys/net/ipv4/ip_local_port_range

    Setting the parameters in the host to the Oracle recommended values sets them for all containers and allows the Oracle database to run in a container. For more information, see Configuring Kernel Parameters and Resource Limits. (Bug ID 17217854)

NUMA Warning Messages on a Non-NUMA System

You can safely ignore the following warning messages in dmesg and /var/log messages if you see them on a non-NUMA system:

kernel: NUMA: Warning: node ids are out of bound, from=-1 to=-1 distance=10
hcid[4293]: Register path:/org/bluez fallback:1
kernel: No NUMA configuration found

(Bug ID 13711370)

Power/Level is Deprecated Message (libfprint)

The following message might appear in dmesg or /var/log/messages:

WARNING! power/level is deprecated; use power/control instead.

The USB subsystem in UEK R3 deprecates the power/level sysfs attribute in favor of the power/control attribute. The libfprint fingerprinting library triggers this warning via udev rules that try to use the old attribute first. You can safely ignore this warning. The setting of the appropriate power level still succeeds. (Bug ID 13523418)

RDMA Does Not Load the mlx4_ib Module

If you enable the OFED stack and the RDMA service but the version of the RDMA package is lower than rdma‑3.10‑3.0.2.el6, the RDMA service does not load the mlx4_ib module automatically.

To configure the RDMA service to load the mlx4_ib module at boot time:

  1. Edit /etc/rdma/rdma.conf and set the entry MLX4_LOAD=yes in this file.

  2. To make the change take effect, restart the RDMA service or reboot the system.

sched_yield() Settings for CFS

For the Unbreakable Enterprise Kernel, kernel.sched_compat_yield=1 is set by default. For the Red Hat Compatible Kernel, kernel.sched_compat_yield=0 is used by default.

Slow Performance With Multipath Devices

Starting with UEK R2, the device mapper has had the capability to check whether the underlying storage device has advertised the need to flush the data that resides in the device's cache to its non-volatile storage. For a data integrity operation, such as fsync and sync, the operation will now need to include the time to flush the device's cache (if it is advertised). Such an operation will appear to be slower when compared to a previous older kernel, however this is the correct behavior. (Bug ID 17823743)

Soft Lockup Errors When Booting

When upgrading or installing the UEK R3 kernel on fast hardware, usually with SAN storage attached, the kernel can fail to boot and BUG: soft lockup messages are displayed in the console log. The workaround is to increase the baud rate from the default value of 9600 by amending the kernel boot line in /boot/grub/grub.conf to include an appropriate console setting, for example:

console=ttyS0,115200n8

A value of 115200 is recommended as smaller values such as 19200 are known to be insufficient for some systems (for example, see http://docs.oracle.com/cd/E19045-01/blade.x6220/820-0048-18/sp.html#0_pgfId-1002490). If the host implements an integrated system management infrastructure, such as ILOM on Sun and Oracle systems or iLO on HP systems, configure the integrated console baud rate to match the setting for the host system. Otherwise, the integrated console is likely to display garbage characters. (Bug ID 17064059, 17252160)

Transparent Huge Pages

This release removes the Transparent Huge Pages (THP) feature. Following extensive benchmarking and testing, Oracle found that THP caused a performance degradation of between 5 and 10% for some workloads. This performance degradation was a result of a slower memory allocator code path being used even when the applications were not using THP. When the fact that huge pages are not swappable was taken into account, the positive effect that THP should provide was outweighed by its negative effects.

After installing this UEK release, you cannot enable THP (for example, by specifying kernel boot parameters). The THP settings under /sys/kernel/mm/transparent_hugepage have also been removed. A future update might contain an updated THP implementation which resolves the performance issue.

Note

This change does not affect support for applications that use explicit huge pages (for example, Oracle Database).

(Bug ID 16823432)

User Namespaces

The kernel functionality (CONFIG_USER_NS) that allows unprivileged processes to create namespaces for users inside which they have root privileges is not currently implemented because of a clash with the implementation of XFS. This functionality is primarily intended for use with Linux Containers. As a result, the lxc-checkconfig command displays User namespace: missing. (Bug ID 16656850)

Virtualization

  • When booting UEK R3 as a PVHVM guest, you can safely ignore the following kernel message:

    register_vcpu_info failed:
              err=-38

    (Bug ID 13713774)

  • Under Oracle VM Server 3.1.1, migrating a PVHVM guest that is running the UEK R3 kernel causes a disparity between the date and time as displayed by date and hwclock. The workaround post migration is either to run the command hwclock --hctosys on the guest or to reboot the guest. (Bug ID 16861041)

  • On virtualized systems that are built on Xen version 3, including all releases of Oracle VM 2 including 2.2.2 and 2.2.3, disk synchronization requests for ext3 and ext4 file systems result in journal corruption with kernel messages similar to the following being logged:

    blkfront: barrier: empty write xvda op failed
    blkfront: xvda: barrier or flush: disabled

    In addition, journal failures such as the following might be reported:

    Aborting journal on device xvda1

    The workaround is to add the mount option barrier=0 to all ext3 and ext4 file systems in the guest VM before upgrading to UEK R3. For example, you would change a mount entry such as:

    UUID=4e4287b1-87dc-47a8-b69a-075c7579eaf1  /  ext3  defaults  1 1

    so that it reads:

    UUID=4e4287b1-87dc-47a8-b69a-075c7579eaf1  /  ext3  defaults,barrier=0  1 1

    This issue does not apply to Xen 4 based systems, such as Oracle VM 3. (Bug ID 17310816)

X.509 Certificates for Module Verification

The system reports a message similar to the following if there is a problem loading an in-kernel X.509 module verification certificate at boot time:

Loading module verification certificates 
X.509: Cert 0c21da3d73dcdbaffc799e3d26f3c846a3afdc43 is not yet valid 
MODSIGN: Problem loading in-kernel X.509 certificate (-129)

This error occurs because the hardware clock lags behind the system time as shown by hwclock, for example:

# hwclock
Tue 20 Aug 2013 01:41:40 PM EDT -0.767004 seconds

The solution is to set the hardware clock from the system time by running the following command:

# hwclock --systohc

After correcting the hardware clock, no error should be seen at boot time, for example:

Loading module verification certificates 
MODSIGN: Loaded cert 'Slarti: Josteldalsbreen signing key: 
0c21da3d73dcdbaffc799e3d26f3c846a3afdc43'

(Bug ID 17346862)

XFS

  • In some circumstances, xfsdump can fail when the file system to be backed up is specified as a mount point, for example:

    xfsdump: ERROR: /mnt/myxfs/ does not identify a file system

    The workaround is to specify the file system by its device name, for example /dev/sdb. (Bug ID 18483275)

  • In a virtual machine, the intensive direct I/O on files which are being fragmented by fallocate and punch_hole in parallel may result, in some circumstances, in data corruption with the error Invalid or incomplete multibyte or wide character. (Bug ID 18711409)

Chapter 3 Installation and Availability

You can install Unbreakable Enterprise Kernel Release 3 (UEK R3) on Oracle Linux 6 Update 4 or newer, running either the Red Hat compatible kernel or a previous version of the Unbreakable Enterprise Kernel. If you are still running an older version of Oracle Linux, first update your system to the latest available update release.

UEK R3 is supported on the x86-64 architecture but not on x86.

The kernel's source code is available via a public git source code repository at:
https://oss.oracle.com/git/?p=linux-uek3-3.8.git.

Starting with Oracle Linux 6 Update 5 for x86-64, UEK R3 is the default boot kernel for fresh installations of Oracle Linux.

For systems that are running UEK R3 and are subscribed to the ol6_x86_64_UEKR3_latest channel on ULN, or the ol6_UEKR3_latest repository in the Oracle Public Yum repository, you upgrade to the latest UEK release as follows:

  1. Upgrade all packages on the system, including kernel packages.

    # yum update

    By default, the boot manager automatically enables the most recent kernel version so you do not need to change your GRUB configuration.

  2. Reboot the system.

    # shutdown -r now

For systems that are currently running a previous version of the Unbreakable Enterprise Kernel (UEK R2) or the Red Hat compatible kernel (RHCK), you can switch to UEK R3 at any time. For details, see:

3.1 Switching a System to UEK R3 (ULN)

If you have a subscription to Oracle Unbreakable Linux support, you can obtain the packages for Unbreakable Enterprise Kernel Release 3 (UEK R3) by registering your system with the Unbreakable Linux Network (ULN) and subscribing it to additional channels.

Before you begin:

To Switch a System to UEK R3:

  1. Using a browser, log in at http://linux.oracle.com with the ULN user name and password that you used to register the system.

  2. On the Systems tab, click the link named of your system in the list of registered machines.

  3. On the System Details page, click Manage Subscriptions.

  4. On the System Summary page, select each required channel in the Available Channels list and click the right arrow to move the channel to the Subscribed Channels list.

    The kernel image and user-space packages are available on the following ULN channels:

    Channel Name and Label

    Description

    Oracle Linux 6 Latest (x86_64)

    ol6_x86_64_latest

    All packages released for Oracle Linux 6 (x86_64) including the latest errata packages. (x86_64).

    Unbreakable Enterprise Kernel Release 3 for Oracle Linux 6 (x86_64) - Latest

    ol6_x86_64_UEKR3_latest

    Latest packages for Unbreakable Enterprise Kernel Release 3 for Oracle Linux 6 (x86_64).

    Contains the kernel-uek*,
    dtrace-modules-*, libdtrace-*, and uname26 packages.

    Oracle Linux 6 Dtrace Userspace Tools (x86_64) - Latest

    ol6_x86_64_Dtrace_userspace_latest

    The latest DTrace userspace tools for Oracle Linux 6 (x86_64).

    Contains the dtrace-utils* packages.

    OFED supporting tool packages for Unbreakable Enterprise Kernel on Oracle Linux 6 (x86_64)

    ol6_x86_64_ofed_UEK

    Latest OpenFabrics Enterprise Distribution (OFED) supporting tools for the Unbreakable Enterprise Kernel (UEK) on Oracle Linux 6 (x86_64).

    HA Utilities for MySQL and Oracle Linux 6 (x86_64)

    ol6_x86_64_mysql-ha-utils

    Management Utilities for MySQL HA with Oracle Linux 6.

    Contains the drbd84-utils package.

    As a minimum, you should subscribe the system to the ol6_x86_64_latest and the ol6_x86_64_UEKR3_latest channels. If required, you can also add the channels for the DTrace, OFED, and DRBD packages.

    Caution

    Take care not to select the ol6_x86_64_UEK_BETA channel.

    Because you are switching to the latest UEK kernel, you no longer need to subscribe the system to the previous UEK R2 (ol6_x86_64_UEK_latest) channel.

  5. When you have finished selecting channels, click Save Subscriptions and log out of ULN.

  6. Log in as root on the system.

  7. Upgrade all packages on the system, including kernel packages.

    # yum update

    By default, the boot manager automatically enables the most recent kernel version so you do not need to change your GRUB configuration.

  8. Reboot the system.

    # shutdown -r now

3.2 Switching a System to UEK R3 (Public Yum)

If your system is not registered with ULN, you can obtain most of the packages for Unbreakable Enterprise Kernel Release 3 (UEK R3) from Oracle Public Yum by subscribing it to additional repositories.

Before you begin:

  • Check that the system meets the requirements for installing UEK R3.

    For details, see Chapter 3, Installation and Availability.

  • Remove some of the existing OpenFabrics Enterprise Distribution (OFED) packages.

    You only need to do this if you have installed any OFED packages on your system and you want to replace them with the latest OFED tools packages. The packages have to be removed manually, see Section 3.3, “Upgrading OFED Packages”.

To Switch a System to UEK R3:

  1. Log in as root on the system.

  2. Change directory to /etc/yum.repos.d.

    # cd /etc/yum.repos.d
    Note

    This assumes that yum on your system is configured to find repository files in the default /etc/yum.repos.d directory.

  3. Download the Oracle Linux 6 repository configuration file, http://public-yum.oracle.com/public-yum-ol6.repo.

    For example:

    # wget http://public-yum.oracle.com/public-yum-ol6.repo

    The /etc/yum.repos.d directory is updated with the repository configuration file.

  4. Enable the required repositories by editing the public-yum-ol6.repo file.

    You enable or disable repositories in the file by setting the value of the enabled directive to 1 or 0 as required.

    The kernel image and user-space packages are available on the following Oracle Public Yum repositories:

    Repository

    Description

    ol6_latest

    All packages released for Oracle Linux 6 (x86_64) including the latest errata packages.

    ol6_UEKR3_latest

    Latest packages for Unbreakable Enterprise Kernel Release 3 for Oracle Linux 6.

    Contains the kernel-uek*, dtrace-modules-*, libdtrace-*, and uname26 packages.

    ol6_ofed_UEK

    Latest OpenFabrics Enterprise Distribution (OFED) supporting tools for the Unbreakable Enterprise Kernel (UEK) on Oracle Linux 6 (x86_64).

    As a minimum, you should enable the ol6_latest and the ol6_UEKR3_latest repositories.

    Note

    The DTrace utility and DRBD packages are not available on Public Yum.

    Because you are switching to the latest UEK kernel, you can disable the previous UEK R2 (ol6_UEK_latest) repository.

    In the following example, the ol6_UEKR3_latest repository is enabled, and the ol6_UEK_latest repository is disabled:

    [ol6_UEKR3_latest]
    name=Latest Unbreakable Enterprise Kernel for Oracle Linux $releasever ($basearch)
    baseurl=http://public-yum.oracle.com/repo/OracleLinux/OL6/UEKR3/latest/$basearch/
    gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-oracle
    gpgcheck=1
    enabled=1
    
    [ol6_UEK_latest]
    name=Latest Unbreakable Enterprise Kernel for Oracle Linux $releasever ($basearch)
    baseurl=http://public-yum.oracle.com/repo/OracleLinux/OL6/UEK/latest/$basearch/
    gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-oracle
    gpgcheck=1
    enabled=0
  5. Upgrade all packages on the system, including kernel packages.

    # yum update

    By default, the boot manager automatically enables the most recent kernel version so you do not need to change your GRUB configuration.

  6. Reboot the system.

    # shutdown -r now

3.3 Upgrading OFED Packages

If you have enabled the ol6_ofed_UEK channel, you must remove any existing OFED packages for the 32-bit x86 architecture before you can upgrade the remaining OFED packages on your system. You must also completely remove and reinstall the ibutils packages. The latest version of the ibutils package no longer depends on an ibutils-libs package as the libraries are now included in ibutils itself.

Use the following command to remove any non-upgradable packages for the x86 architecture:

# rpm -e infiniband-diags \
libibcm \
libibcm-devel \
libibmad \
libibmad-devel \
libibumad \
libibumad-devel \
libibverbs \
libibverbs-devel \
libmlx4 \
librdmacm \
librdmacm-devel \
opensm-devel \
opensm-libs \
ibacm-devel

Use the following commands to remove the existing ibutils and ibutils-libs packages and install the new ibutils package:

# rpm -e ibutils ibutils-libs
# yum install ibutils