Short version: Proxmox staff have now called out the end of support for the 6.14-based Proxmox kernel series. At the same time, QEMU 11.0 is moving through Proxmox VE 9 repositories and has a specific Windows Server 2025 / HVCI / RDS / nested Hyper-V boot-risk note in the Proxmox forum thread. If you run Proxmox VE 9 for hosting, lab, or customer VMs, check your kernel and QEMU package versions before your next maintenance window.
This is not a panic item. It is a maintenance-planning item. Hosts that are still sitting on 6.14 should be moved to a supported Proxmox kernel series. Hosts taking QEMU 11.0 should be staged carefully if they run newer Windows Server workloads, Remote Desktop Services, Hyper-V-in-VM labs, or security features like HVCI.
What Changed
- Kernel 6.14 is no longer the right place to park production Proxmox VE 9 hosts. Proxmox staff said they are actively announcing the end of support for the 6.14-based kernel series because of recent problematic churn.
- Supported Proxmox kernel lanes are now clearer. Proxmox lists 6.8 for Proxmox VE 8 / Debian Bookworm-based releases, 6.17 for Proxmox VE 9 / Debian Trixie-based releases, and 7.0 as the newer lane transitioning toward default status for Proxmox VE 9 and other Trixie-based Proxmox releases.
- Kernel 6.17 is not a forever parking spot either. Proxmox also notes that 6.17 is planned to begin sunsetting around the start of July, moving toward best-effort updates.
- QEMU 11.0 is available through pve-test and pve-no-subscription. Proxmox says package version 11.0.0-2 includes important stable fixes beyond the original QEMU 11.0 release.
- There is a known Windows workload edge case. Proxmox notes that on hosts with recent Intel CPUs and kernel 7.x, Windows Server 2025 VMs with HVCI, RDS, or Hyper-V may fail to boot when using host or recent Intel CPU models, because QEMU 11 exposes newer CPU flags that hit a kernel-side issue.
Who Should Act First
- Hosting clusters on Proxmox VE 9 that have customer Windows Server VMs, RDS environments, or nested virtualization labs.
- Nodes still booted into 6.14, especially if they have not been rebooted after recent Proxmox package updates.
- No-subscription Proxmox VE hosts that may receive QEMU 11.0 before a conservative production test cycle has been completed.
- Clusters using HA or live migration where different nodes may be running different kernel and QEMU combinations.
- Backup-sensitive environments where a failed Windows boot after host patching could create customer downtime or delay restores.
Safe Inventory Checks
Run these checks before changing packages. They are inventory commands, not a fix by themselves.
uname -r
pveversion -v
apt-cache policy proxmox-kernel-6.14 proxmox-kernel-6.17 proxmox-kernel-7.0 pve-qemu-kvm qemu-server
On clustered systems, collect this from every node. Mixed versions are normal during maintenance, but they should be intentional and temporary. The risky pattern is a cluster where one node quietly keeps an old kernel while another takes a new QEMU stack and VMs move between them without an operator noticing.
Maintenance Plan For Proxmox Hosts
- Backups first: Confirm Proxmox Backup Server jobs, datastore health, and recent restore-point visibility before host changes.
- Snapshot only where it makes sense: VM snapshots are useful for application rollback, but they are not a replacement for a backup before hypervisor maintenance.
- Patch one node at a time: Put the node into maintenance mode or manually evacuate guests before rebooting.
- Keep quorum in view: Do not reboot enough nodes at once to risk cluster quorum, Ceph health, or HA recovery.
- Drain Windows-sensitive workloads deliberately: Treat Windows Server 2025, RDS, HVCI-enabled guests, and nested Hyper-V guests as the first test group after a QEMU/kernel change.
- Cold restart where QEMU changed: Proxmox notes that VMs need a complete restart to run with a new QEMU version. Live migration can move a VM to an already-upgraded host, but a VM that never fully restarts can still be running under the old process.
- Verify after reboot: Confirm the running kernel with
uname -r, then verifypve-qemu-kvm,qemu-server, storage, networking, HA state, and backup jobs.
Windows VM Notes
If you host Windows Server 2025, RDS, or nested Hyper-V workloads, test before pushing QEMU 11.0 and kernel 7.x across the cluster. The Proxmox QEMU thread points admins toward updated qemu-server packages, different virtual CPU model choices, or a supported kernel lane as mitigation options. Follow the current Proxmox thread rather than applying random CPU-flag changes from old forum posts.
For customer-facing hosting, the safest path is to validate one representative Windows VM per application type: one IIS box, one RDS host, one domain member, one nested virtualization lab VM if you support that, and one backup restore test if Windows restores are part of your SLA.
What To Tell Customers
A practical maintenance note can be simple: Proxmox host kernels and virtualization packages are being moved away from an end-of-support kernel lane and tested against current QEMU packages. Customer VMs may be live-migrated or briefly restarted during the maintenance window. Windows Server workloads that use RDS, HVCI, or nested Hyper-V are being checked separately before broad rollout.
Related Fix I.T. Phill Proxmox Guides
- Proxmox VE 8.4 to 9.1 upgrade guide
- Proxmox Backup Server 3.4 to 4.2 upgrade guide
- Proxmox Mail Gateway 8.2 to 9.0 upgrade guide
- Proxmox May 2026 PBS, StorPool, Kasm, and fleet checks
Sources
- Proxmox forum: Kernel 6.14 end of support
- Proxmox forum: QEMU 11.0 available on pve-test and pve-no-subscription
- Proxmox forum: opt-in Linux 7.0 kernel for Proxmox VE 9
- Proxmox VE roadmap and release history
- Proxmox VE upgrade from 8 to 9 documentation
Bottom line: inventory every node, stop treating kernel 6.14 as a supported Proxmox VE 9 landing zone, test QEMU 11.0 with Windows-heavy workloads before broad rollout, and make the migration/reboot order explicit before touching a hosting cluster.
