HP Integrity Virtual Machines 4.2.5: Release Notes HP Part Number: 5900-1840 Published: August 2011, Edition 13.
© Copyright 2011 Hewlett-Packard Company, L.P. Legal Notices Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice.
Contents About This Document...................................................................................11 Intended Audience..................................................................................................................11 New and Changed Information in This Edition............................................................................11 Typographic Conventions.........................................................................................................
3 Creating Virtual Machines.........................................................................37 3.1 Changes and Issues in this Release......................................................................................37 3.2 Known Issues and Information............................................................................................37 3.2.1 Failed API Access to Local Running Guest.....................................................................37 3.2.
4.3.2 Known Issues and Information.....................................................................................46 4.3.2.1 Using Linux Guests.............................................................................................46 4.3.2.2 SUSE Linux Cloned Guests Boot-Disk Boot Problems...............................................47 4.3.2.3 TC INIT Dump Messages Fail to Appear in SUSE Linux Guest Consoles Running Multi CPUs......................................................................
5.2.14 5.2.15 5.2.16 5.2.17 5.2.18 5.2.19 Missing uuid or .vmid Files........................................................................................58 Maintain Minimum Entitlement...................................................................................58 Actual Running Entitlement Might Differ from Configured Entitlement...............................58 Duplicate Messages when Modifying Running Guests...................................................58 Manpages Display on Linux Guests..
.2.3 Known Limitation on OpenVMS Guests and HP-UX Guests Sharing the same vswitch..........71 7.2.4 OpenVMS Guests Support vswitch-based VLAN Configuration and Not Guest-based VLANs.............................................................................................................................71 7.2.5 Networking Interface Support for OpenVMS Guest........................................................71 7.2.6 AVIO Non-Physical Network vswitch (localnet) Restrictions............................
.2.20.2 iSCSI-Based Backing Stores with AVIO Require Host AVIOstor B.11.31.1009.01.........84 8.2.20.3 Modifying the Storage Adapter from scsi to avio_stor...........................................84 8.2.20.4 GuestAVIOStor Bundle not Installed but AVIO Storage Device is Configured............84 8.2.20.5 Longer Failure Reporting Time for AVIO Devices on 11i v2 Guests..........................84 8.2.20.6 Online Modification of AVIO Devices Might Fail..................................................84 8.2.
11.9 Network Interface Support..............................................................................................102 11.10 AVIO Support..............................................................................................................103 A hpvmhostgdev Manpage.........................................................................105 hpvmhostgdev(1M)...............................................................................................................
Tables 1 2 3 4 5 6 7 8 9 10 11 Guest and VM Host Support..............................................................................................16 Guest Management Software Kit Locations..........................................................................17 VM Host Patches..............................................................................................................27 Do Not Install Product or Patch...................................................................................
About This Document The HP Integrity Virtual Machines Release Notes document describes the latest enhancements and changes to the HP Integrity Virtual Machines product (Integrity VM), including limitations and guidelines for using the Integrity VM software. Always read the release notes before installing and using the product. For the most current information, obtain the latest version of this document from Integrity Virtual Machines documentation.
• Chapter 3: “Creating Virtual Machines” (page 37) contains information about creating virtual machines. • Chapter 4: “Installing Guests” (page 39) contains information about installing guest operating system and management software. • Chapter 5: “Using Integrity VM Commands” (page 55) contains information about using Integrity VM commands. • Chapter 6: “Guest Administration” (page 61) contains information about guest system administration.
Publication Number Supported VM Host Operating System Supported Integrity VM Version Edition Number Publication Date T2767–90076 HP-UX 11i v2 September 2006 and later HP Integrity Virtual Machines 4.0 A.03.00 April 2007 T2767–90094 HP-UX 11i v2 December 2007 and later HP Integrity Virtual Machines 5.0 A.03.50 December 2007 T2767–90114 HP-UX 11i v2 December 2007 and later HP Integrity Virtual Machines 6.0 A.03.
initiate a fast and accurate resolution, based on your product’s service level. Notifications may be sent to your authorized HP Channel Partner for on-site service, if configured and available in your country. The software is available in two variants: • HP Insight Remote Support Standard: This software supports server and storage devices and is optimized for environments with 1-50 servers.
1 Introduction Thank you for installing HP Integrity Virtual Machines (also called Integrity VM). This Release Notes document describes the changes in this version of the Integrity VM product. The Integrity VM Version 4.2.5 release introduces several new features including support for the HP-UX 11i v3 1009 as a VM Host. The following patches and software products are required: • On the 11i v3 VM Host: ◦ PHSS_41543 1.0 HPVM B.04.20.
1.1 New Features and Enhancements in This Version of Integrity VM This section describes how the current version of Integrity VM has been enhanced over previous versions. The following feature has been included in this release of Integrity VM: • Support for the HP Integrity rx2800 i2 • Dynamic memory support enabled by default- Dynamic memory is now enabled by default for support of the statistics—gathering feature in guests.
Table 1 Guest and VM Host Support (continued) Guests VM Host on HP Integrity server blades1 VM Host on HP Integrity Superdome 21 VM Host on HP Integrity Servers VM Host on HP Integrity rx2800 i2 HP-UX 11i v3 0803 No No Yes No HP-UX 11i v3 0809 No No Yes No HP-UX 11i v3 0903 Yes No Yes No HP-UX 11i v3 0909 Yes No Yes No HP-UX 11i v3 1003 Yes No Yes No HP-UX 11i v3 1009 Yes Yes Yes Yes HP OpenVMS V8.
the guest management software on each guest can cause problems that are difficult to diagnose and solve.
2 Installation Notes This chapter contains notes about installing and upgrading Integrity VM and associated software on the VM Host system. 2.1 Installing Integrity VM This section describes information about installing the HP Integrity Virtual Machines product and associated software on the VM Host system. HP Integrity Virtual Machines B.04.20.05 is supported on HP Integrity servers or nPartitions running HP-UX 11i v3 September 2010 1009).
2.3.1 After Installation, Integrity VM Might Hang Upon Reboot Due to a timing issue, Integrity VM V4.2.5 might hang upon reboot after it is installed. This is an intermittent issue. To fix the problem, install patch PHKL_41227, which will be available from the HP IT Resource Center website: http://itrc.hp.com by the middle of August 2010. 2.3.2 Unable to Communicate with the FSS Agents Messages in /var/opt/hpvm/ common/command.log When Integrity VM is stopped either with the /sbin/init.
• You might receive a read error while reading filesets from the OE media, with a “Bad Address (14)” wording in the error message. Workaround: Install the PHKL_39114 patch. • The update might hang while installing the filesets from the March 2009 OE media. Installing PHKL_39114 does NOT fix this critical problem. This problem results when you update the OE from 0809 to 0903 using physical (DVD) media.
NOTE: Patch PHKL_37815 contains the new USB driver delivered with HP–UX 11i v3 (0903). Consequently, if you install this patch on an HP–UX 11i v3 system that is older than 0903, you might experience the same problem. You can use a single hpvmdevmgmt command to modify all guests to use the new USB DVD device.
2.3.10 Failures in Key Applications Some applications fail when run on HP-UX with large pages configured (larger than 8K).
Virtual Software Environment software versions earlier than V4.0 must upgrade to HP Insight Dynamics — VSE V4.1 (which contains VMMgr V4.0). VMMgr V4.0 is designed to run on HP-UX 11i v3 with Integrity VM V4.2.5 or earlier. It cannot use or display any new features in Integrity VM V4.2,5, but does support new features in HP-UX 11i v3, including the new agile addressing hardware paths and device files for storage devices. This means the following: • The VMMgr product V4.
Serviceguard, as documented in the HP Integrity Virtual Machines Installation, Configuration, and Administration manual. • Using backup solutions for VM Host and guest backups Backup solutions such as HP Data Protector or Veritas NetBackup can be used on both the VM Host system and the guest systems. Consult the support matrix of such products for supported versions. Install the backup (client) agents on the VM Host and the guests.
If you have installed the HP Integrity Virtual Machines Manager software, you must upgrade it to a version that supports this version of Integrity VM. To use Integrity Virtual Machines Manager, you must install the VMProvider bundle that is provided with Integrity VM. If you upgrade Integrity VM, be sure to keep the VMProvider up-to-date also. If the VMProvider version does not match the Integrity VM version, the Integrity Virtual Machines Manager will not work properly.
to properly run or even boot. If the guest boot was already attempted before the patch was installed, installing the patch by itself does not prevent the problem. Reconfiguration of dynamic memory settings is necessary for the guest to be able to boot again.
Table 3 VM Host Patches (continued) 28 Affected HP-UX (VM Host) Version Affected Integrity VM Version Fix Description/Impact Comment 11i v2 0505 thru 0606 A.02.00 or later PHKL_33604 (11.23.0609) PHKL_33605 (11.23.0609) FSS Must install PHKL_33605 before PHKL_33604. 11i v2 0512 thru 0606 A.01.00 or later PHKL_33827 (11.23.0609) Bug fix Resolves panic on guest. Specific to EVA8000 environment. (corrected to be Host patch, not guest) 11i v2 0505 or later A.01.
Table 3 VM Host Patches (continued) Affected HP-UX (VM Host) Version Affected Integrity VM Version Fix Description/Impact Comment 11i v2 0712 A.03.50 PHSS_38297 Bug fix Mandatory patch: HPVM A.03.50 HPVM-CORE (cell-based memory tuning, support for USB 2.0 driver, other fixes). 11i v2 0712 A.03.50 PHSS_38298 Bug fix Mandatory patch: HPVM A.03.50 VMAGENT vmProvider (cell-based memory tuning). 11i v2 0609 to 0712 A.03.00 or later PHSS_38610 Bug fix Mandatory patch: HPVM B.04.
Table 3 VM Host Patches (continued) 30 Affected HP-UX (VM Host) Version Affected Integrity VM Version Fix Description/Impact Comment 11i v3 0903 B.04.10 PHSS_39354 Bug fix HPVM B.04.10 HPVM-VMSGTK 11i v3 0903 and later B.04.10 PHKL_39407 Bug fix 11i v3 USB 2.0, DVD Write, Cumulative USB Patch (Avoid lengthy hpvmcreate and hpvmmodify operations when adding USB DVD. 11i v3 0903 and later B.04.10 PHSS_39784 Bug fix and enhancements HPVM B.04.
Table 3 VM Host Patches (continued) Affected HP-UX (VM Host) Version Affected Integrity VM Version Fix Description/Impact Comment 11i v3 1003 B.04.20 PHKL_40383 Bug fix HostAVIOStor: AVIO Host driver 11i v3 1003 B.04.20 PHSS_40875 Enhancements HPVM core: Itanium 9300 series host and OpenVMS guest support 11i v3 1003 B.04.20 PHSS_40876 Enhancements VMAGENT: Itanium 9300 series host and OpenVMS guest support 11i v3 1003 B.04.
Table 4 Do Not Install Product or Patch Affected HP-UX Host Version Affected Integrity VM Version Fix Description/Impact Comment 11i v2 0505 or later A.02.00 or later PHNE_35793 igelan patch An Integrity VM guest that uses a virtual interface that belongs to an IGELAN interface configured on the Integrity VM Host can experience hangs with network services like ping, NFS, rcp, ftp for data transfers that use full-sized frames. 2.
11i v2 0505 or later A.01.00 or later Bug fix Cumulative ARPA transport patch, resolves panic. Requires prerequisite PHNE_32277. HPVM A.02.00 11.23.0609 HWE Intel Itanium 9000 hardware support Integrity VM V2.0 or later is strongly recommended for use with Intel Itanium 9000-based systems. 11i v2 0505 or later A.01.20 or later PHSS_35863 (Serviceguard A.11.16) PHSS_35427 (Serviceguard A.11.17) Bug fix Specific to Serviceguard.
Table 5 HP-UX Guest Patches (continued) 34 11i v3 A.03.50 PHSS_37843 Bug fix 11i v3 B.04.10 PHSS_39376 Bug fix HPVM-Guest 11i v2 A.04.10 PHSS_39377 Bug fix HPVM-Guest 11i v2 A.04.10 PHSS_39786 Bug fix and enhancements HPVM A.04.10 vmProvider — Windows Server 2008 * Attached AVIO Tape Support 11i v2 A.04.10 PHSS_39807 Bug fix HPVM A.04.10 HPVM-Guest – Windows Server 2008 * Attached Tape Support 11i v3 B.04.10 PHSS_39785 Bug fix HPVM B.04.
Table 5 HP-UX Guest Patches (continued) 11i v2 0712 A.04.20.05 PHSS_41416 Enhancements 11i v2 vmTools Virtprovider enhancements 11i v3 0803 or later B.04.20.05 PHSS_41413 Enhancements 11i v3 VMGuestLib VirtProvider enhancements 11i v3 0803 or later B.04.20.05 PHSS_41414 Enhancements 11i v3 vmTools VirtProvider enhancements For more information about updates to HP-UX software, contact your HP representative or support specialist.
Table 9 Do Not Install Products or Patches on Windows Guests Affected Guest OS and Affected Integrity VM Version Version Fix Description/Impact Comment SSM 4.5 SSM 4.6 PalHaltLightRegEdit component Idle detection See Section 4.1.2.9 (page 40) Description/Impact Comment A.02.00 Intel Itanium 9000 (Montecito) 2.8 Patches Required for Red Hat Linux Guests Table 10 lists the patches that are required in the guests.
3 Creating Virtual Machines This chapter contains notes about creating and configuring virtual machines on the VM Host system. 3.1 Changes and Issues in this Release There are no new virtual machine creation or configuration issues in the V4.2.5 release. 3.2 Known Issues and Information The following sections describe known issues and information from previous releases that still apply to V4.2.5. 3.2.1 Failed API Access to Local Running Guest A Failed API access to local running guest.
3.2.4 Do Not Run hpvmstart in Background When Starting Multiple Guests With Resource Conflicts Do not run the hpvmstart command in the background when starting multiple guests that have resource conflicts. The locking that would normally catch and report the resource conflicts does not always work properly in this situation. 3.2.5 Numbers Reported by Glance 4.6 or Later Running on VM Host Depend on Context Glance 4.
4 Installing Guests This chapter describes notes pertaining to installing guest software on the virtual machines. 4.1 Windows Guests The following sections contain the release notes specific to installing Windows guests. 4.1.1 Changes and Issues in This Release There are no new Windows guest issues in the V4.2.5 release. 4.1.2 Known Issues and Information The following sections describe known issues and information from previous releases that still apply to V4.2.5. 4.1.2.
4.1.2.6 Palhaltlight in Windows Server 2008 Guests The use of palhaltlight is enabled by default in a Windows 2008 guest, which allows the VM Host to be notified when the guest is idle, so that the VM Host avoids spinning the physical processor. The VM Host can then use the physical processor for other useful purposes (for example, running other guests or running host service processes and threads) whenever the Windows guest does not need it.
• After the automatic reboot, Windows controls the console. When you see the SAC> prompt, use Esc-Tab to change the channel to the product key prompt. • Stop and start the virtual machine and interrupt the automatic boot sequence. • Before the system is allowed to continue, from the virtual console, execute the necessary insert (IN) command to reload the media. • After the media is reloaded into the virtual DVD, select the Windows Media install (the first boot option) and allow the system to boot.
corrupted. This can cause problems with subsequent reboots of that guest. To correct the problem, copy the file /opt/hpvm/guest-images/common/nvram to /var/opt/hpvm/guests/vm_name/nvram on the VM Host system. This procedure restores the copy of the NVRAM that was used when the guest was created. Then you can used the EFI Boot Manager to recreate the guest's boot path and other data. (The installed guest's operating system should be intact and unaffected by the corruption.
[my_guest] vMP> in Insertable Guest Devices Num Hw-path (Bus,Slot,Tgt) Gdev -------------------------------------------[1] 0/0/1/0.1.0 (0,1,1) dvd Enter menu item number or [Q] to Quit: 1 Insertable File Backing Stores Num File --------------------[1] 1131_0909_DVD1.iso [2] 1131_0909_DVD2.iso Enter menu item number or [Q] to Quit: 1 Confirm insertion action G - Go F - Force Enter menu item or [Q] to Quit: g 5.
------------------------------------------------------------------------[1] 0/0/0/0.1.0 (0,0,1) dvd file /tmp/iso/1131_0909_DVD1.iso Enter menu item number or [Q] to Quit: 1 Confirm eject action G - Go F - Force Enter menu item or [Q] to Quit: g c. Insert the second DVD: [my_guest] vMP:VM> in Insertable Guest Devices Num Hw-path (Bus,Slot,Tgt) Gdev -------------------------------------------[1] 0/0/0/0.1.
• HP-UX 11i v2: PHCO_40685 and PHKL_40684 • HP-UX 11i v3: PHKL_39482 and PHCO_38777 You can download these patches from the ITRC website, http://itrc.hp.com 4.2.2.4 HP-UX 11i v3 Guests Might Fail to Configure Interface Cards Due to Lack of Memory HP-UX 11i v3 guests with small memory resources (less than or equal to 2 GB RAM) might fail to configure one or more virtual interface cards.
4.2.2.7 Do Not Use the iomap(7) Mechanism on HP-UX Guests The iomap(7) mechanism allows you to map physical I/O addresses into the user process address space. Do not use this command on HP-UX guests. 4.2.2.8 iCAP Commands Fail on HP-UX Guests iCAP is installed as part of the HP-UX OS installation. Install-time configuration of iCAP reports failure with messages similar to the following: NOTE: ERROR: ERROR: ERROR: Checking for partitionable system. Software configuration has failed.
• Red Hat Enterprise Linux 4 Installation Guide for x86, Itanium, AMD64 • Intel Extended Memory 64 Technology (Intel EM64T) • Red Hat Linux Customization Guide For information about the SUSE Linux operating system for HP Integrity servers, see http:// docs.hp.com/en/linuxsuse.html The guest parameter settings for Linux guests are listed in the HP Integrity Virtual Machines 4.2: Installation, Configuration, and Administration manual.
3. Edit the elilo configuration file, /boot/efi/SuSE/elilo.conf, and the fstab file, /mnt/ etc/fstab, to update all entries of the guest boot disk SCSI WWID with the cloned guest boot disk's SCSI WWID. NOTE: The cloned guest's boot disk SCSI WWID can be copied from the /dev/disk/ by-id/ device names.
4.3.2.5 Before Installing the SUSE Linux Guest You must install the tog-pegasus RPM kit prior to installing the SUSE Linux RPM guest; however, the SUSE Linux installation media does not contain the tog-pegasus RPM kit. This RPM kit is available in the “HP Integrity Essentials Foundation Pack for Linux” (also known as HPIEFL for Linux). The SUSE Linux RPM guest kit is actually two parts, a guest kit and a provider kit. The Hpvm.*.
These warnings, errors, and exceptions occur because some optional elements are not provided by the Integrity VM ACPI table. These messages are printed because the SUSE startup/initialization code is trying to reference these optional elements, particularly for configured guest CPUs. The messages do not impede the SUSE boot process; the boot/startup process completes.
Use ^ and v to change option(s). Use Enter to select an option Loading: Red Hat Enterprise Linux AS Starting: Red Hat Enterprise Linux AS- - - - - - - - - - - ELILO boot: Uncompressing Linux... done Loading initrd initrd-2.6.9-42.EL.img...done i8042.c: i8042 controller self test timeout. Red Hat nash version 4.2.1.8 starting mptbase: ioc0: ERROR - Doorbell ACK timeout (count=4999), IntStatus=80000000! mptbase: ioc0: ERROR - Doorbell ACK timeout (count=4999), IntStatus=80000000! Reading all physical volumes.
4.3.2.16 Occasional Floating-Point Assist Fault Messages. Occasional floating-point assist fault messages appear when running Mozilla. This problem also occurs on native Integrity servers running Linux. For more information, see the “Developer & Solution Partner Program (DSPP)” webpage on http://www.hp.com, and search for “floating-point assist fault”. 4.3.2.
************************************************************** * Exception Frame Display: * … Crash dump information follows this output. Use one of the following solutions to fix either of these issues: • Set the VM Host base_pagesize = 64K (See the base_pagesize(5) manpage for details of determining and setting the VM Host’s base_pagesize.) • Set the guest preferred pagesize to 8K: # hpvmmodify -P vm-name -x tunables=ptsz=13 4.4.
$! Format and print a UUID $uuid = f$getsyi("system_uuid") $len=f$len(uuid) $if (len .eq.
5 Using Integrity VM Commands This chapter contains notes about the Integrity VM commands. 5.1 Changes and Issues in This Release The following sections describe changes, issues, and new information pertaining to this release. 5.1.
CPUs to the number indicated by num, and disables the others. Depending on the kernel version, Linux guests might support enabling or disabling virtual CPUs by writing into /sys/devices/ system/cpu/cpuN/ online, as on a physical system. Disabled virtual CPUs no longer show up in the guest in commands such as top or GlancePlus, and no longer consume resources on the host. However, disabled virtual CPUs still appear on the host, for example in the hpvmsar command. 5.2.
5.2.6.1 The hpvmdevtranslate Command Can be Used to Translate Devices Like SecurePath and AutoPath The hpvmdevtranslate command can be used to translate devices like SecurePath and AutoPath after starting Integrity VM Version 4.0 on HP-UX 11i v3. The devices are translated to agile devices if they have legitimate WWIDs in the /var/opt/hpvm/common/hpvm_mgmtb_pre1131 device database file. 5.2.6.
5.2.11 Setting Devices to Sharable Can Lead to Device Conflicts Integrity VM allows Virtual FileDVDs and attached devices ( avio_stor type) to be shared by guests. With HP Serviceguard, you can share Virtual Disks. Other types of storage devices are not supported for sharing and cannot be allocated to multiple guests. Be careful when you set a virtual device to sharable using the hpvmdevmgmt command.
hpvmmodify: WARNING (test_duperr): File size of: 0 (bytes) for disk backing file: /tmp/zero.size.2 must be equal to or greater than: 512 (bytes), or the device may not show up in the guest when booted. hpvmmodify: WARNING (test_duperr): File size of: 0 (bytes) for disk backing file: /tmp/zero.size.1 must be equal to or greater than: 512 (bytes), or the device may not show up in the guest when booted. hpvmmodify: WARNING (test_duperr): File size of: 0 (bytes) for disk backing file: /tmp/zero.size.
6 Guest Administration This chapter contains information about managing Integrity VM guests. 6.1 Changes and Issues in this Release The following sections discuss new guest administration information in the V4.2.5 release. 6.1.1 Integrity VM Fully Supported with ID-VSE Logical Server Management 6.2 Integrity VM now fully supports ID-VSE Logical Server Management (LSM).
NOTE: If you add new devices in the future, run the hpvmhostgdev -a script again. If you want to select the guest devices instead of adding all of them to the gdev database, create a list of unused disks and logical volumes with the -l option and pipe them to a file. Use the specified device-list file to add devices for guest use with the -f option. # hpvmhostgdev -l > devicelist # hpvmhostgdev -f devicelist For information about the hpvmhostgdev script, see Appendix A (page 105). 5.
6.2.1 Creating Virtual Machine Administrator and Operator Accounts In versions of Integrity VM prior to A.03.00, Admin console access is available, and one such account per guest is allowed. The administrator account name must match the guest name. The new version of Integrity VM provides proper access controls and individual accountability for these accounts. For more information, see Section 6.2.4 (page 63). 6.2.2 Administrator Account Names Integrity VM Version 4.
# useradd -r no -g users -s /opt/hpvm/bin/hpvmconsole \ -c "Console access to guest 'testme'" \> -d /var/opt/hpvm/guests/testme \ testme2 # useradd -r no -g users -s /opt/hpvm/bin/hpvmconsole \ -c "Console access to guest 'testme'" \ -d /var/opt/hpvm/guests/testme \ testme3 The following command creates the virtual machine named testme: # hpvmcreate -P testme -u testme1:admin -u testme2 -u testme3:oper At this point, users testme2 and testme3 both have oper level access to the virtual console, and user te
devices in the guest configuration and evaluate the Host storage configuration with respect to these devices and the adapters used to access them. 6.2.8 Do Not Add User Accounts to the hpvmsys Group The hpvmsys group implements the security model for the VM Host and guests. The hpvmsys group is automatically added to /etc/group when Integrity VM is installed. Do not add user accounts to this group. 6.2.
used by guests but requires users to verify or provide activation modes and package dependencies for the backing stores. The hpvmsg_package script creates the package configuration in the package directory: /etc/cmcluster/hpvm-name/hpvm-name.conf. Inside the configuration file are instructions, examples, and default and assigned named-values pairs describing the resources used by the virtual machines and controlled and monitored by Serviceguard.
6.2.13.10 Reenter Command to Start Packages The procedure for configuring and starting guest packages includes the cmrunpkg command. This command does not always work the first time you enter it. If the command does not start the package, re-enter the command. 6.2.13.11 Do not Use Integrity VM Commands to Manage Distributed Guests Guests configured as Serviceguard packages should be stopped and started using Serviceguard package control commands.
7 Networking Information This chapter contains notes about configuring networks for virtual machines. 7.1 Changes and Issues in This Release The following sections provide new networking information for the patch kit applied to the V4.2.5 release. 7.1.1 AVIO LAN Driver on OpenVMS Guest Does Not Support Checksum Offloading (CKO) OpenVMS does not support checksum offloading.
============== lan0 lan1 lan2 lan3 lan900 lan901 lan902 lan903 lan904 ========= UP UP UP UP UP DOWN DOWN DOWN DOWN ============== 0x0017A4AB5461 0x0017A4AB5460 0x001A4B06E90A 0x001A4B06E90B 0x001A4B06E90B 0x000000000000 0x000000000000 0x000000000000 0x000000000000 ======== igelan igelan iether iether hp_apa hp_apa hp_apa hp_apa hp_apa ============== ========= 1000Base-T 1000Base-T 1000Base-T 1000Base-T lan900 hp_apa hp_apa hp_apa hp_apa hp_apa To configure a PPA of the VLAN interface (VPPA) with a VLAN
7.2.2 AVIO LAN Devices Left Unclaimed by OpenVMS Guest if vswitch is Down at Boot If you boot an OpenVMS guest while the vswitch is not UP, AVIO interfaces associated with the vswitch might not be claimed in the guest. For example, this issue might occur if the guest is booted prior to booting the vswitch, or if the corresponding network interface on the VM Host is not cabled during the guest boot time. If you encounter this problem, perform the following steps: 1.
1. Specify the correct network driver associated with the device type in the /etc/ modprobe.conf file. For example, if the eth0 network device type is changing from VIO to AVIO and the existing alias line reads alias eth0 e1000, change it to the following:: alias eth0 lgssn 2. Issue the depmod -a command to inform the kernel of the device type change. After you issue the command, you should see the following (or similar) line in modules.dep file: /lib/modules/2.6.9-55.EL/kernel/drivers/net/lgssn/lgssn.
incorrectly. To help mitigate this issue use the minpoll and maxpoll directives in the ntp.conf file to change the polling intervals. Start with minpoll at 4 (16 seconds) and maxpoll at 6 (64 seconds) and then reduce maxpoll towards 4 if necessary to force shorter polling intervals. HP recommends that a VM guest never be allowed to deliver time (allow guests to be a time consumers). Because a VM guest never delivers time, you do not need to configure the local clock (server 127.127.1.0) or an ntp.
• AD221A — Add-in • AD222A — Add-in • AD337A — Add-in • AD338A — Add-in • AD339A — Add-in • AD385A — Add-in (10GbE) • AD386A — Add-in (10GbE) • NC360m — C-class Mezz card • NC364m — C-class Mezz card 7.2.11 Calculating the Actual Utilization of the Virtual Network Card The emulation of the virtual network I/O card is based on the Intel I8254X family.
By default, Integrity VM makes three attempts (each with a one-second timeout) to determine the validity of the MAC address for the virtual NIC. This process can result in up to ten seconds of delay for each defined virtual NIC. To speed up this processing, add the following tunable to the /etc/rc.config.d/hpvmconf configuration file: HPVMMACADDRFRAMES=n Where n is the number of attempts (1 to 30). The default is 3. A value of 1 or 2 increases performance at the risk of missing a response from a slow NIC.
NOTE: The lanadmin command is deprecated and will be removed in a future HP-UX release. HP recommends that you use the nwmgr command to perform all network interface-related tasks. The following table shows the nwmgr command that performs the same task as the lanadmin command: Task Legacy Command Check the status of the transmit CKO. # lanadmin -x cko 4 Hardware TCP/UDP (IPv4) transmit checksum offload is currently enabled. Hardware TCP/UDP (IPv4) receive checksum offload is currently disabled.
Task Legacy Command nwmgr Command Turn TSO off on lan0. # lanadmin -X vmtu 0 0 Virtual MTU is set to 0 # nwmgr -s -A vmtu=0 -c lan0 lano current values: New Virtual MTU=0 Allow the TSO attribute change along with the rest of the lan attributes to be perserved between system reboots by saving the current attributes to the lan configuration file. Manually edit the configuration file in # nwmgr -s -c lan0 -A all --sa -fr cu /etc/rc.config.d, or use SAM interface.
reassembly (known with acronyms as drv_pr for driver packet reassembly) is enabled in igssn in the guest. To determine if drv_pr is enabled, an administrator can execute the following command: lanadmin -x drv_pr ppa where ppa is the Card instance # (Crd in#) from lanscan.
8 Storage Information This chapter contains information about storage devices used as backing stores for guest virtual devices. 8.1 Changes and Issues in This Release There are no new storage issues in the V4.2.5 release. 8.2 Known Issues and Information The following sections describe known issues and information from previous releases that still apply to V4.2.5. 8.2.
• ◦ If the LV or file backing store file name is 55 characters long and the guest is a HP-UX 11i v3 guest, guest panic or disk dsf name change is seen on subsequent guest reboots. ◦ When guest storage applications (for example, dd, diskinfo, and so on) attempt to access a device special file, an “Invalid argument” error might be returned. This problem is seen on HP-UX 11i v2 and HP-UX 11i v3 guests with GuestAVIOStor versions earlier than 11.23.0903 and 11.31.0903 respectively.
GuestAVIOStor: Instance numbers for AVIO/VIO disks fixed due to HBA type changes. GuestAVIOStor: Refer to /etc/opt/gvsd/files//gvsd.log for details. 8.2.6 Agile Device Name Recommendations The Integrity VM commands supports mass storage agile device names. Use of agile device names (with the exception of attached devices using avio_stor, which uses the hardware path) for configuring storage devices is highly recommended as it provides VM Host multipathing benefits. 8.2.
disk disk adisk disk disk disk disk disk /dev/dsk/c0t0d0s2 /dev/dsk/c0t0d0s3 16 0/0/5/0.0.0 sdisk CLAIMED /dev/dsk/c3t0d0 18 0/0/5/0.1.0 sdisk CLAIMED /dev/dsk/c3t1d0 20 0/0/5/0.2.0 sdisk CLAIMED /dev/dsk/c3t2d0 17 0/0/6/0.0.0 sdisk CLAIMED /dev/dsk/c4t0d0 19 0/0/6/0.1.0 sdisk CLAIMED /dev/dsk/c4t1d0 21 0/0/6/0.2.0 sdisk CLAIMED /dev/dsk/c4t2d0 23 0/0/6/0.3.0 sdisk CLAIMED /dev/dsk/c4t3d0 25 0/0/6/0.4.
8.2.14 The hpvmmodify Command Fails to Change a DVD The hpvmmodify command might fail to change a Virtual FileDVD if the device has already been modified by the virtual console. The hpvmstatus command displays the current status of the Virtual FileDVD, which might not be in its original resource state. To see the original resource statement, which is required by the hpvmmodify command to change a Virtual FileDVD, use the hpvmstatus —D command. 8.2.
• You cannot upload or download firmware for emulated devices. • Although HP-UX commands such as mptutil(1M) and mptconfig(1M) do not fail when run in a guest, they do not always return the same information as they would when referencing a physical device. • The EFI drvcfg command does not fail when run in a guest, but it returns no useful data. 8.2.20 AVIO Limitations The following sections describe the current limitations using AVIO. 8.2.20.
-H of the lunpath or tgtpath H/W Path from the guest and retry the hpvmmodify command from the host. 8.2.20.7 Mapping AVIO Storage Devices on HP-UX Guests This section explains how to map an AVIO storage device on an HP-UX guest to an hpvmstatus display on the Integrity VM Host either at the EFI console or at the HP-UX operating system.
disk | |(Addr(Target Id) % 16) <-> HP-UX tgt ID PciBus | | |(Addr(Target Id) / 16) <-> HP-UX lun ID | | | | | V V V V V 49 0/0/2/0.6.
1. 2. 3. 4. In the guest, execute rmsf for the lun path ( lunpath Class in ioscan display). In the VM Host, delete the lun entry from the guest's configuration using the hpvmmodify command. In the VM Host, add the lun entry back to the guest's configuration using the hpvmmodify command. In the guest ioscan, the lun (which was deleted and added back) does not appear. Perform the following workaround: 1. In the guest, rmsf the target path (tgtpath Class in ioscan display) corresponding to the lun path. 2.
9 Migrating Virtual Machines This chapter contains information about migrating virtual machines. 9.1 Changes and Issues in This Release The following section provides updated information about online migration in the V4.2.5 release. 9.1.1 Online Migration Support The following list provides the supported online migration paths for HP-UX guests: • A V4.2 guest can be online migrated to V4.2.5. • A V4.2 guest plus general release patches can be online migrated to V4.2.5. • A V4.2.
Can't open VM /var/opt/hpvm/uuids/c0c8a8ee-ac67-11dd-ba00-00306ef3bda7/vm_dev: (55) VMM not loaded Opening minor device and creating guest machine container Creation of VM, minor device 1 hpvmmigrate: ERROR (vmname): Remote message: Target guest exited. Status 2. hpvmmigrate: ERROR (vmname): Remote message: Unable to start guest on target. In this case, use the following workaround: 1. Enter the following: # swremove vmOVMMSW.OnlineMigr-SW 2. Force a reinstall of the 4.
9.2.7 Unpresenting SAN Devices to Integrity VM Hosts Unpresenting SAN devices that were configured to be used by guests causes the guest to fail to start. If SAN devices must be unpresented, guests configured to use those devices should be reconfigured to no longer require them.
10 Error Logging This chapter contains information about the way Integrity VM logs messages. 10.1 Changes and Issues in This Release There are no new error logging issues in the V4.2.5 release. 10.2 Known Issues and Information The following sections describe known issues and information from previous releases that still apply to V4.2.5. 10.2.1 Old Version of /etc/rc.config.d/hpvmconf Not Overwritten When you install the new version of Integrity VM, a new version of the /etc/rc.config.
10.2.6 Virtual Console Event Logs Different from Physical Machine Logs The virtual console allows you to use the sl command to list the System Event log and the Forward Progress log. The displays from the virtual console differ from those generated on a physical machine in the following ways: 94 • Event numbering is inconsistent for different lines. • Although the command menu allows you to specify a cell number, virtual machines are not cellular. Therefore, this option is not functional.
11 Integrity VM Support Policy This chapter describes the HP Integrity Virtual Machine support policies and software version requirements for Integrity VM Host and guest operating system environments. 11.1 Integrity VM Minimum Support Life Beginning with Integrity VM Version 3.0, releases will be supported for a minimum of three years. Integrity VM Version Release Date Expected End of Support Date Current Status A.01.00 December 2005 December 2007 Not supported A.01.
# hpvmstatus -P guestname -d | grep -w scsi # hpvmstatus -P guestname -d | grep -w lan • Integrity VM V4.2.5 will be the last release to support Microsoft Windows and Linux guests. Integrity VM V4.2.5 is the last release that will support Microsoft Windows and Linux guests. Beginning with the next Integrity VM release, HP-UX and OpenVMS guests will be supported. • Use of legacy device special files (DSFs) to define virtual storage will not be supported in a future release.
11.4 HP-UX Guest Support Integrity VM Type of Guest Version OS Support A.03.50 Integrity VM Integrity VM Version Version B.04.00 B.04.10 Integrity VM B.04.20 Integrity VM B.04.20.
NOTE: For information about required patches, see Chapter 2 (page 19). HP-UX patches might be required for proper operation. Install these patches on HP-UX guest operating systems as necessary. For specific patch information, see the patch tables in Chapter 2 (page 19) . 11.5 Windows and Linux Guest Support Type of Guest OS Windows Linux Integrity VM Version A.03.50 Integrity VM Version B.04.
1 Intel® Itanium® 2 9000 Series and Intel Itanium 2 9100 Series 2 Requires V4.2 with the following VM Host patches: PHSS_40875 1.0 HPVM B.04.20 CORE PATCH PHSS_40876 1.0 HPVM B.04.20 VMAGENT PHSS_40901 1.0 HPVM B.04.20 VMMIGRATE PATCH 3 Support for the latest Intel® Itanium® Processor 9300 Series 11.7 HP Serviceguard Support Packages or Nodes Integrity VM Version A.03.50 Integrity VM Version B.04.00 Integrity VM Version B.04.10 Integrity VM Version B.04.20 Integrity VM Version B.04.20.
The version of Serviceguard must be supported with the version of HP-UX on which the VM Host is running. For specific support information, see the Serviceguard documentation. 11.8 Storage Interface Support Integrity VM Version A.03.50 (Both VIO and AVIO unless explicity excluded) Integrity VM Version B.04.00 (both VIO and AVIO unless explicitly excluded) Integrity VM Version B.04.
11.8.1 Guest Attached Device Support Integrity VM Version A.03.50 Integrity VM Version B.04.00 Integrity VM Version B.04.10 Integrity VM Version B.04.20 Integrity VM Version B.04.20.
Backing Store Integrity VM Version A.03.50 Integrity VM Version B.04.00 Integrity VM Version B.04.10 Integrity VM Version B.04.20 Integrity VM Version B.04.20.
can be configured with Auto Port Aggregation (APA), with the resulting port supported as indicated in the following table: Virtual Network Adapter Type Integrity VM Version A.03.50 Integrity VM Version B.04.00 Integrity VM Version B.04.10 Integrity VM Version B.04.20 Integrity VM Version B.04.20.
A hpvmhostgdev Manpage 105
hpvmhostgdev(1M) NAME hpvmhostgdev -- Manages Integrity VM Host devices available for virtual machine access. SYNOPSIS hpvmhostgdev [-H | [-u] | { -a | -c {disklist|lvlist} [>devlistfile] } | -d | -f devlistfile| -r | -v { all|assigned|unassigned }] | -l DESCRIPTION The hpvmhostgdev command analyzes disklist and lvlist output searching for unused disks and logical volumes (LVs). It uses its results to add unused devices to the Integrity VM device database as guest devices (gdevs).
-l -r -u Lists unused devices that can be added for guest use. (For example, pipe -l output to a file for use with —f.) Recovers the Integrity VM device management database. Uses disklist device cache (Do not force hardware scan.). NOTE: This option is used to speed up the disklist command to obtain unused disks. Use the -u option before using the following options: -v • -a • -c disklist • -l Verifies add and delete operations by this script (with the AUTOGDEV=YES attribute).
hpvmsg_move(1M), hpvmsg_package(1M), hpvmstart(1M), hpvmstatus(1M), hpvmstop(1M), hpvmupgrade(1M), p2vassist(1M) On the Integrity VM guest: hpvmcollect(1M), hpvmmgmt(1M), hpvmpubapi(3) 108 hpvmhostgdev Manpage