HP Integrity Virtual Machines 4.2.5: Release Notes

5.2.11 Setting Devices to Sharable Can Lead to Device Conflicts
Integrity VM allows Virtual FileDVDs and attached devices ( avio_stor type) to be shared by guests.
With HP Serviceguard, you can share Virtual Disks. Other types of storage devices are not supported
for sharing and cannot be allocated to multiple guests. Be careful when you set a virtual device to
sharable using the hpvmdevmgmt command. Incorrectly marking a virtual device as sharable can
lead to device conflicts and data corruption if multiple guests access it concurrently. In particular,
attached devices using scsi (as opposed to the avio_stor) adapter type (tape, burner, or changer)
should not be made sharable.
5.2.12 Errors on Displaying Guest or Vswitch Information While that Information is
Being Modified
The hpvmstatus, hpvmmodify, hpvmcreate, hpvmclone, and hpvmremove commands
might return the following error when another command accesses the same guest's configuration
files at the same time:
hpvm_guest_get_state:103:No Guest by that name or number
If you receive this error when you try to display a guest or vswitch configuration, enter the command
again.
5.2.13 Do Not Attempt to Remove Busy Virtual Devices
Before removing virtual devices with the hpvmmodify command, make sure that the guest operating
system is no longer directing I/O to the device. Unmount the device if it is mounted. If you attempt
to remove a device that has I/O in progress, the hpvmmodify command incorrectly removes the
device from the guest configuration file. The hpvmstatus command no longer displays the device,
and the hpvmmodify command does not retry the device removal, but the guest operating system
sees the device as available. To remove the device, restart the guest.
5.2.14 Missing uuid or .vmid Files
If you use Integrity VM commands while guests are being removed, you might receive errors about
missing uuid or .vmid files. Enter the command after the guest removal has completed.
5.2.15 Maintain Minimum Entitlement
The hpvmcreate and hpvmmodify commands do not allow the minimum CPU entitlement to be
set below 5%. If you force the entitlements below 5%, boot time and potential runtime failures
occur.
Set entitlement percentages in integers, not fractions. Fractions are ignored.
5.2.16 Actual Running Entitlement Might Differ from Configured Entitlement
Displayed and reported guest entitlement settings can differ from values that are specified. This
occurs when entitlement settings have a granularity of one percent of the VM Host CPU capacity.
An entitlement specified in cycles can be rounded to an integral percentage of VM Host cycles.
For example, if you specify the guest entitlement as -E 100 on a 900 MHz host system, it is
rounded to 108 MHz (12%).
5.2.17 Duplicate Messages when Modifying Running Guests
Using the hpvmmodify command to add zero-length files to file-backed virtual disks can result in
duplicate warning messages. For example:
# hpvmmodify -P test_duperr -a disk:scsi::file:/tmp/zero.size.1 \
-a disk:scsi::file:/tmp/zero.size.2
hpvmmodify: WARNING (test_duperr): File size of: 0 (bytes) for disk backing file:
/tmp/zero.size.1 must be equal to or greater than: 512 (bytes),
or the device may not show up in the guest when booted.
58 Using Integrity VM Commands