Hello community,
here is the log from the commit of package xen
checked in at Fri Jun 9 02:38:11 CEST 2006.
--------
--- arch/i386/xen/xen.changes 2006-06-06 23:12:54.000000000 +0200
+++ xen/xen.changes 2006-06-08 19:40:35.000000000 +0200
@@ -1,0 +2,15 @@
+Thu Jun 8 11:38:34 MDT 2006 - ccoffing@novell.com
+
+- Drop our XCHG patch for the equivalent upstream patch, to fix
+ patch application order. No code change.
+
+-------------------------------------------------------------------
+Wed Jun 7 12:19:16 MDT 2006 - ccoffing@novell.com
+
+- Updated README: HVM issues/tips, CDROM tips, known issues.
+- Add patch from Intel to decode LODS/STOS instructions to fix
+ Windows installation. Only affects HVM. Xen changeset #9725
+ consolidates this patch and xen-hvm-decode.diff; drop our 2 in
+ favor of the consolidated upstream patch. (#176717)
+
+-------------------------------------------------------------------
Old:
----
xen-hvm-decode.diff
xen-hvm-xchg.diff
New:
----
xen-9699-hvm-xchg.diff
xen-9725-hvm-decode.diff
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ xen.spec ++++++
--- /var/tmp/diff_new_pack.mfj4w5/_old 2006-06-09 02:37:23.000000000 +0200
+++ /var/tmp/diff_new_pack.mfj4w5/_new 2006-06-09 02:37:23.000000000 +0200
@@ -1,5 +1,5 @@
#
-# spec file for package xen (Version 3.0.2_09721)
+# spec file for package xen (Version 3.0.2_09725)
#
# Copyright (c) 2006 SUSE LINUX Products GmbH, Nuernberg, Germany.
# This file and all modifications and additions to the pristine
@@ -14,11 +14,11 @@
BuildRequires: LibVNCServer SDL-devel autoconf automake bin86 dev86 glibc-devel-32bit latex2html libjpeg-devel libreiserfs-devel python-devel te_ams te_latex tetex transfig
%define xvers 3.0
%define xvermaj 3
-%define changeset 09721
+%define changeset 09725
%define build_xmtest 0
%define with_pygrub 1
%define xen_build_dir xen-3.0-testing
-Version: 3.0.2_09721
+Version: 3.0.2_09725
Release: 1
License: GPL
Group: System/Kernel
@@ -68,21 +68,19 @@
Patch29: xen-BUILD_BUG_ON.diff
Patch30: xen-pirq_shared.diff
Patch31: xen-lost-mouse.diff
-Patch33: xen-cirrus-corruption.diff
-Patch34: xen-hvm-memory-check.diff
-Patch35: xen-load-pae-bin-kernel.diff
-Patch36: xen-paths.diff
-Patch37: xen-hvm-rep-movs.diff
-Patch38: xen-lowmem-emergency-pool.diff
-Patch39: xen-hvm-decode.diff
-Patch40: xen-console.diff
-Patch41: xen-removable.diff
-Patch42: xen-fatal-trap-halt.diff
-Patch43: xen-amd-smp.diff
-Patch44: xen-hvm-xchg.diff
-Patch45: xen-cpuid.diff
-Patch46: xen-cpuid-amd.diff
-Patch47: xen-get-page-type.diff
+Patch32: xen-cirrus-corruption.diff
+Patch33: xen-hvm-memory-check.diff
+Patch34: xen-load-pae-bin-kernel.diff
+Patch35: xen-paths.diff
+Patch36: xen-hvm-rep-movs.diff
+Patch37: xen-lowmem-emergency-pool.diff
+Patch38: xen-console.diff
+Patch39: xen-removable.diff
+Patch40: xen-fatal-trap-halt.diff
+Patch41: xen-amd-smp.diff
+Patch42: xen-cpuid.diff
+Patch43: xen-cpuid-amd.diff
+Patch44: xen-get-page-type.diff
Patch50: xen-genapic.diff
Patch100: xen-9657-get-mfn-from-gpfn.diff
Patch101: xen-9658-pirq-mask-into-bitmap.diff
@@ -105,16 +103,18 @@
Patch118: xen-9695-signed.diff
Patch119: xen-9696-rm-broken-string-func.diff
Patch120: xen-9698-no-corrupt-frame-0.diff
-Patch121: xen-unstable-9967-summa.diff
-Patch122: xen-9702-MMU_NORMAL_PT_UPDATE.diff
-Patch123: xen-9703-ignore-empty-ptes.diff
-Patch124: xen-9704-dealloc-l1.diff
-Patch125: xen-9705-signed.diff
-Patch126: xen-9706-init-list-head.diff
-Patch127: xen-9708-shadow-l4.diff
-Patch128: xen-9709-extended-cr3.diff
-Patch129: xen-9717-disable-interrupts.diff
-Patch130: xen-9721-explicitly-sized-types.diff
+Patch121: xen-9699-hvm-xchg.diff
+Patch122: xen-unstable-9967-summa.diff
+Patch123: xen-9702-MMU_NORMAL_PT_UPDATE.diff
+Patch124: xen-9703-ignore-empty-ptes.diff
+Patch125: xen-9704-dealloc-l1.diff
+Patch126: xen-9705-signed.diff
+Patch127: xen-9706-init-list-head.diff
+Patch128: xen-9708-shadow-l4.diff
+Patch129: xen-9709-extended-cr3.diff
+Patch130: xen-9717-disable-interrupts.diff
+Patch131: xen-9721-explicitly-sized-types.diff
+Patch132: xen-9725-hvm-decode.diff
Patch200: xen-enable-hvm-debug.diff
Patch201: xen-enable-debug
Patch202: xen-poweroff.diff
@@ -492,6 +492,8 @@
%patch128 -p1
%patch129 -p1
%patch130 -p1
+%patch131 -p1
+%patch132 -p1
# Now our patches...
%patch1 -p1
%patch2 -p1
@@ -525,6 +527,7 @@
%patch29 -p1
%patch30 -p1
%patch31 -p1
+%patch32 -p1
%patch33 -p1
%patch34 -p1
%patch35 -p1
@@ -537,9 +540,6 @@
%patch42 -p1
%patch43 -p1
%patch44 -p1
-%patch45 -p1
-%patch46 -p1
-%patch47 -p1
%patch50 -p1
#%patch200 -p1
XEN_EXTRAVERSION=%version-%release
@@ -847,6 +847,15 @@
%{insserv_cleanup}
%changelog -n xen
+* Thu Jun 08 2006 - ccoffing@novell.com
+- Drop our XCHG patch for the equivalent upstream patch, to fix
+ patch application order. No code change.
+* Wed Jun 07 2006 - ccoffing@novell.com
+- Updated README: HVM issues/tips, CDROM tips, known issues.
+- Add patch from Intel to decode LODS/STOS instructions to fix
+ Windows installation. Only affects HVM. Xen changeset #9725
+ consolidates this patch and xen-hvm-decode.diff; drop our 2 in
+ favor of the consolidated upstream patch. (#176717)
* Tue Jun 06 2006 - ccoffing@novell.com
- Drop xen-8-way-bios patch, because it breaks Windows HVM
installation. The patch was only necessary when running SMP HVM
++++++ README.SuSE ++++++
--- arch/i386/xen/README.SuSE 2006-06-02 01:57:50.000000000 +0200
+++ xen/README.SuSE 2006-06-07 20:15:40.000000000 +0200
@@ -156,9 +156,9 @@
click "Add". Now adjust the VM's configuration to your liking.
Xen does not yet properly support removable media in VMs in paravirtual mode,
-so installing an operating system from CDs is rather difficult, manual
-process. We recommend using a network installation source, a DVD, or a DVD
-ISO. CDs do, however, work as expected in fully-virtual mode.
+so installing an operating system from CDs can be difficult. We recommend
+using a network installation source, a DVD, or a DVD ISO. CDs do, however,
+work as expected in fully-virtual mode.
Note that is is possible to install SUSE Linux graphically, even when it is
paravirtualized. Add "vnc=1" to the "Installation Options" in YaST, and see
@@ -176,6 +176,18 @@
This is useful, for example, if the installer and the application that will
run in the VM have different memory or network requirements.
+The creation of VMs can be automated with AutoYaST. A single AutoYaST profile
+can control the VM's settings (regardless of OS type) and/or the actual
+installation of the OS within the VM (for SUSE only). Perhaps the easiest way
+to create such a profile is to install a SUSE OS within a VM and "clone" the
+operating system in the final stage of the OS installation. Then copy the
+resulting file (/root/autoyast.xml) into the VM server's filesystem, into the
+directory /var/lib/autoinstall/repository/. Start the AutoYaST tool (YaST >
+Miscellaneous > Autoinstall) and then open the profile. Select the "Virtual
+Machine Management (Xen)" heading, and add the settings for the VM. Save the
+profile. Now the single profile can direct both the configuration of a VM,
+and the installation of the OS within the VM.
+
Creating a VM Manually
----------------------
@@ -272,6 +284,19 @@
the large Windows driver websites.
+HVM Console in Fully-Virtual Mode
+---------------------------------
+When running a VM in fully-virtual mode, a special console is available that
+provides some additional ways to control the VM. Press Ctrl-Alt-2 to access
+the console; press Ctrl-Alt-1 to return to the VM.
+
+The two most important commands are "send-key" and "change". The "send-key"
+command allows you to send any key sequence to the VM, which might otherwise
+be intercepted by your local window manager. The "change" command allows the
+target of a block device to be changed; for example, use it to change from one
+CD ISO to another. Type "help" for more information.
+
+
Managing Virtual Machines
-------------------------
VMs can be managed from the command line or from YaST.
@@ -466,6 +491,12 @@
---------------
First try to get Linux running on bare iron before trying with Xen.
+Be sure your Xen hypervisor (xen) and VM kernels (kernel-xen) are compatible.
+While Xen 3.x attempts to preserve compatibility between the hypervisor and
+VMs, changes sometimes occur. In particular:
+- The interface between Xen, the VMs, and the tools changed between SLES 10
+ RC 2.5 and RC 3.
+
If you have trouble early in the boot, try passing pnpacpi=off to the Linux
kernel. If you have trouble with interrupts or timers, passing lapic to Xen
may help. Xen and Linux understand similar ACPI boot parameters. Try the
@@ -502,12 +533,26 @@
Some large-memory machines may not boot with ACPI enabled.
-Be sure your Xen hypervisor (xen) and VM kernels (kernel-xen) are compatible.
-While Xen 3.x attempts to preserve compatibility between the hypervisor and
-VMs, changes sometimes occur. In particular:
-- Xen changeset 8783 (between SLES 10 beta 3 and beta 4) and 9120 (between
- beta 6 and beta 7) broke compatibility between the hypervisor and the domain
- 0 Linux kernel. Linux kernels running in other VMs are not affected.
+Bugzilla #180133:
+Fully-virtualized VMs may crash, especially when running heavy loads, if not
+enough free memory is available for Xen. Xen does not yet flush the shadow
+page cache when memory becomes low, which can result in an artificial
+out-of-memory condition. As a work-around, manually shrink the VM server's
+memory (to leave some amount free for use by Xen) with a command like:
+ xm mem-set 0 384
+
+Bugzilla #175112:
+When switching CDs that are used by a paravirtualized VM, wait for the CD to
+spin up before attempting to use it from the VM. If you attempt to use the CD
+before it is ready, some paravirtualized operating systems will fail to
+recognize the new CD. Once in this state, the only known work-around is to
+manually detach and reattach the virtual device to the VM (with the "xm"
+commands).
+
+Bugzilla #167187:
+When running Linux in fully-virtual mode and viewing it with SDL, the mouse
+pointer may occasionally jump across the screen. To work around this issue,
+disable ACPI (acpi=off) in the VM's boot loader.
Disclaimer
++++++ xen-9699-hvm-xchg.diff ++++++
# HG changeset patch
# User kaf24@firebug.cl.cam.ac.uk
# Date Wed May 31 07:32:55 2006 +0100
# Node ID d316d7faf64e7240c748acb598eb0cf83d86c536
# parent: b6a04d27b6e16cf16a3bdbad61a00719df62b8d3
[HVM] Fix a bug in the emulation of the xchg instruction.
This bug has prevented us from booting fully virtualized SMP guests
that write to the APIC using the xchg instruction (when
CONFIG_X86_GOOD_APIC is not set). On 32 bit platforms, sles 10 kernels
are built without CONFIG_x86_GOOD_APIC not set and hence we have had
problems booting fully virtualized SMP sles 10 guests.
Signed-off-by: K. Y. Srinivasan