We have more and more problems with locking filesystems in read only with our Redhat EL 4 (up3 sure and up 7 if my memory is ok).
The only way we have found for the moment to solve is rebooting but it's a disaster on a production environement. So is there any other solution to solve this (I've read on a vmware paper that all kernel under 2.6.22 were impacted ? is this right ?) is there any workaround ?
Is vmware tools installed in the VMs?
Is /var a seperate partition or is / all one disk/partition?
What apps / services eg mysql are using data in /var?
If you found this information useful please award points using the buttons at the top of the page accordingly.
This KB might be what you read or referenced regarding Kernel 2.6.22.
This post explains a bit of what the problem may be in your case.
I resolved this at a client well over a year ago. I checked some notes and I just have that kernels >= 220.127.116.11.EL should work, previous kernels required a patched MPT driver. The second link I posted talks about patching the mptscsi.h driver header to address this. Of course, just from browsing a bugzilla or two with a google search on the driver name and vmware, I saw a few reopened bugs marked regression, meaning the change was reverted at least once. You may want to get a copy of your current kernel branch source, check the mptscsi.h file and compare it to what the suggested patch fix would be.
If you can't find an appropriate kernel you can quick update, you can patch the mptscsi.h file, rebuild your modules, and installed the patched mptscsi driver.
This of course assumes it is the same issue, but sounds like it.
Moved to VIrtual Machine and Guest OS forum.
Edward L. Haletky
VMware Communities User Moderator
Author of the book 'VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers', Copyright 2008 Pearson Education.
Blue Gears and SearchVMware Pro Blogs: http://www.astroarch.com/wiki/index.php/Blog_Roll
Top Virtualization Security Links: http://www.astroarch.com/wiki/index.php/Top_Virtualization_Security_Links