Skip to navigation

Enhancement Advisory new package: para-virtualized drivers for fully-virtualized guests

Advisory: RHEA-2008:0274-3
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2008-05-20
Last updated on: 2009-08-03
Affected Products: Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)

Details

A new package containing para-virtualized drivers for fully-virtualized Red
Hat Enterprise Linux guests running on a Red Hat Enterprise Linux 5.1 (or
later) host is now available.

Para-virtualized (PV) drivers are virtualization-aware drivers used by a
fully-virtualized guest instance of Red Hat Enterprise Linux running on Red
Hat Enterprise Linux 5.1 or later. Fully-virtalized guests using PV drivers
gain significant I/O performance improvement.

This new package provides PV network and disk drivers for fully-virtualized
guest instances of Red Hat Enterprise Linux 3.9 and Red Hat Enterprise
Linux 4.8.

To use these drivers, install them into an instance of Red Hat Enterprise
Linux 3.9 or Red Hat Enterprise Linux 4.8 running as a fully-virtualized
guest on a Red Hat Enterprise Linux 5.1 (or later) host. Installation can
be done directly, via the Red Hat Network, or manually, after downloading
the RPMs.

For more information, and full documentation regarding installation,
configuration and trouble-shooting of these PV drivers see the
Para-Virtualized Drivers for Red Hat Enterprise Linux manual at:

http://redhat.com/docs/manuals/enterprise/RHEL-5-manual/en-US/RHEL510/html
/Para-Virtualized_Drivers/

A PDF version of this manual is also available at:

http://redhat.com/docs/manuals/enterprise/RHEL-5-manual/en-US/RHEL510/pdf/
Para-Virtualized_Drivers.pdf

Note: this package has been re-released. This further update adds PV
drivers for fully-virtualized Red Hat Enterprise Linux 3.9 and Red Hat
Enterprise Linux 4.8 guests running under Red Hat Enterprise Linux 5.1 or
later on Itanium® 2-based platforms.

All users running fully-virtualized instances of Red Hat Enterprise Linux
3.9 or Red Hat Enterprise Linux 4.8 on Red Hat Enterprise 5.1 and later
hosts should install these new packages which improve I/O performance
significantly.


Solution

This package requires fully-virtualized Red Hat Enterprise Linux 3.9 or Red
Hat Enterprise Linux 4.8 guests running on a Red Hat Enterprise Linux 5.1
or later host.

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
xenpv-0.1-9.el3.src.rpm     MD5: a094ce26594d5bd4d525cfac15cf2576
 
IA-32:
kmod-xenpv-0.1-9.el3.athlon.rpm     MD5: ff837dfcaefe06450e75f2526cce800d
kmod-xenpv-0.1-9.el3.i686.rpm     MD5: c8d1723e2b41c65fe5f66f75f7c43a39
kmod-xenpv-hugemem-0.1-9.el3.i686.rpm     MD5: 91c3bdaa713ecf365d075ad165f53c3e
kmod-xenpv-smp-0.1-9.el3.athlon.rpm     MD5: 1b143efb27121b7bf4cd51de7fe1c69d
kmod-xenpv-smp-0.1-9.el3.i686.rpm     MD5: e95804bcbde6c60947abceddc4593c91
 
x86_64:
kmod-xenpv-0.1-9.el3.ia32e.rpm     MD5: deab26da2e83eee3e3e9906fab26337e
kmod-xenpv-0.1-9.el3.x86_64.rpm     MD5: 3b07d1ee736f44d6bd42feb4a7c3aa27
kmod-xenpv-smp-0.1-9.el3.x86_64.rpm     MD5: 70b61d274eaf040ec4a73f15a9212e3e
 
Red Hat Desktop (v. 4)

SRPMS:
xenpv-0.1-10.el4.src.rpm
File outdated by:  RHBA-2011:0366
    MD5: eef44f8c0846020c7d8c3af4dd0f26b6
 
IA-32:
kmod-xenpv-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: ead6d363d366de181e7aae5de15d4c3a
kmod-xenpv-hugemem-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: f15f5fc47e8c56b07f70694489707359
kmod-xenpv-smp-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: 1ba4bc9d9aa4b55d6d28fe9083c9c1d0
 
x86_64:
kmod-xenpv-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: e88f7ec60d464687482aee2400a343f8
kmod-xenpv-largesmp-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: f2e866e30c7d89377d817f6c02a4c21a
kmod-xenpv-smp-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: 3089dc792180add139c4c592d5c3c32c
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
xenpv-0.1-9.el3.src.rpm     MD5: a094ce26594d5bd4d525cfac15cf2576
 
IA-32:
kmod-xenpv-0.1-9.el3.athlon.rpm     MD5: ff837dfcaefe06450e75f2526cce800d
kmod-xenpv-0.1-9.el3.i686.rpm     MD5: c8d1723e2b41c65fe5f66f75f7c43a39
kmod-xenpv-hugemem-0.1-9.el3.i686.rpm     MD5: 91c3bdaa713ecf365d075ad165f53c3e
kmod-xenpv-smp-0.1-9.el3.athlon.rpm     MD5: 1b143efb27121b7bf4cd51de7fe1c69d
kmod-xenpv-smp-0.1-9.el3.i686.rpm     MD5: e95804bcbde6c60947abceddc4593c91
 
x86_64:
kmod-xenpv-0.1-9.el3.ia32e.rpm     MD5: deab26da2e83eee3e3e9906fab26337e
kmod-xenpv-0.1-9.el3.x86_64.rpm     MD5: 3b07d1ee736f44d6bd42feb4a7c3aa27
kmod-xenpv-smp-0.1-9.el3.x86_64.rpm     MD5: 70b61d274eaf040ec4a73f15a9212e3e
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
xenpv-0.1-10.el4.src.rpm
File outdated by:  RHBA-2011:0366
    MD5: eef44f8c0846020c7d8c3af4dd0f26b6
 
IA-32:
kmod-xenpv-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: ead6d363d366de181e7aae5de15d4c3a
kmod-xenpv-hugemem-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: f15f5fc47e8c56b07f70694489707359
kmod-xenpv-smp-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: 1ba4bc9d9aa4b55d6d28fe9083c9c1d0
 
IA-64:
kmod-xenpv-0.1-10.el4.ia64.rpm
File outdated by:  RHBA-2011:0366
    MD5: e4d879ee05a7972ffc18992ad8548a94
kmod-xenpv-largesmp-0.1-10.el4.ia64.rpm
File outdated by:  RHBA-2011:0366
    MD5: 7df50d601a5517990a4f6d3e82ebeb0e
 
x86_64:
kmod-xenpv-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: e88f7ec60d464687482aee2400a343f8
kmod-xenpv-largesmp-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: f2e866e30c7d89377d817f6c02a4c21a
kmod-xenpv-smp-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: 3089dc792180add139c4c592d5c3c32c
 
Red Hat Enterprise Linux AS (v. 4.8.z)

SRPMS:
xenpv-0.1-10.el4.src.rpm
File outdated by:  RHBA-2011:0366
    MD5: eef44f8c0846020c7d8c3af4dd0f26b6
 
IA-32:
kmod-xenpv-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: ead6d363d366de181e7aae5de15d4c3a
kmod-xenpv-hugemem-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: f15f5fc47e8c56b07f70694489707359
kmod-xenpv-smp-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: 1ba4bc9d9aa4b55d6d28fe9083c9c1d0
 
IA-64:
kmod-xenpv-0.1-10.el4.ia64.rpm
File outdated by:  RHBA-2011:0366
    MD5: e4d879ee05a7972ffc18992ad8548a94
kmod-xenpv-largesmp-0.1-10.el4.ia64.rpm
File outdated by:  RHBA-2011:0366
    MD5: 7df50d601a5517990a4f6d3e82ebeb0e
 
x86_64:
kmod-xenpv-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: e88f7ec60d464687482aee2400a343f8
kmod-xenpv-largesmp-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: f2e866e30c7d89377d817f6c02a4c21a
kmod-xenpv-smp-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: 3089dc792180add139c4c592d5c3c32c
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
xenpv-0.1-9.el3.src.rpm     MD5: a094ce26594d5bd4d525cfac15cf2576
 
IA-32:
kmod-xenpv-0.1-9.el3.athlon.rpm     MD5: ff837dfcaefe06450e75f2526cce800d
kmod-xenpv-0.1-9.el3.i686.rpm     MD5: c8d1723e2b41c65fe5f66f75f7c43a39
kmod-xenpv-hugemem-0.1-9.el3.i686.rpm     MD5: 91c3bdaa713ecf365d075ad165f53c3e
kmod-xenpv-smp-0.1-9.el3.athlon.rpm     MD5: 1b143efb27121b7bf4cd51de7fe1c69d
kmod-xenpv-smp-0.1-9.el3.i686.rpm     MD5: e95804bcbde6c60947abceddc4593c91
 
x86_64:
kmod-xenpv-0.1-9.el3.ia32e.rpm     MD5: deab26da2e83eee3e3e9906fab26337e
kmod-xenpv-0.1-9.el3.x86_64.rpm     MD5: 3b07d1ee736f44d6bd42feb4a7c3aa27
kmod-xenpv-smp-0.1-9.el3.x86_64.rpm     MD5: 70b61d274eaf040ec4a73f15a9212e3e
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
xenpv-0.1-10.el4.src.rpm
File outdated by:  RHBA-2011:0366
    MD5: eef44f8c0846020c7d8c3af4dd0f26b6
 
IA-32:
kmod-xenpv-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: ead6d363d366de181e7aae5de15d4c3a
kmod-xenpv-hugemem-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: f15f5fc47e8c56b07f70694489707359
kmod-xenpv-smp-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: 1ba4bc9d9aa4b55d6d28fe9083c9c1d0
 
IA-64:
kmod-xenpv-0.1-10.el4.ia64.rpm
File outdated by:  RHBA-2011:0366
    MD5: e4d879ee05a7972ffc18992ad8548a94
kmod-xenpv-largesmp-0.1-10.el4.ia64.rpm
File outdated by:  RHBA-2011:0366
    MD5: 7df50d601a5517990a4f6d3e82ebeb0e
 
x86_64:
kmod-xenpv-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: e88f7ec60d464687482aee2400a343f8
kmod-xenpv-largesmp-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: f2e866e30c7d89377d817f6c02a4c21a
kmod-xenpv-smp-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: 3089dc792180add139c4c592d5c3c32c
 
Red Hat Enterprise Linux ES (v. 4.8.z)

SRPMS:
xenpv-0.1-10.el4.src.rpm
File outdated by:  RHBA-2011:0366
    MD5: eef44f8c0846020c7d8c3af4dd0f26b6
 
IA-32:
kmod-xenpv-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: ead6d363d366de181e7aae5de15d4c3a
kmod-xenpv-hugemem-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: f15f5fc47e8c56b07f70694489707359
kmod-xenpv-smp-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: 1ba4bc9d9aa4b55d6d28fe9083c9c1d0
 
IA-64:
kmod-xenpv-0.1-10.el4.ia64.rpm
File outdated by:  RHBA-2011:0366
    MD5: e4d879ee05a7972ffc18992ad8548a94
kmod-xenpv-largesmp-0.1-10.el4.ia64.rpm
File outdated by:  RHBA-2011:0366
    MD5: 7df50d601a5517990a4f6d3e82ebeb0e
 
x86_64:
kmod-xenpv-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: e88f7ec60d464687482aee2400a343f8
kmod-xenpv-largesmp-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: f2e866e30c7d89377d817f6c02a4c21a
kmod-xenpv-smp-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: 3089dc792180add139c4c592d5c3c32c
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
xenpv-0.1-9.el3.src.rpm     MD5: a094ce26594d5bd4d525cfac15cf2576
 
IA-32:
kmod-xenpv-0.1-9.el3.athlon.rpm     MD5: ff837dfcaefe06450e75f2526cce800d
kmod-xenpv-0.1-9.el3.i686.rpm     MD5: c8d1723e2b41c65fe5f66f75f7c43a39
kmod-xenpv-hugemem-0.1-9.el3.i686.rpm     MD5: 91c3bdaa713ecf365d075ad165f53c3e
kmod-xenpv-smp-0.1-9.el3.athlon.rpm     MD5: 1b143efb27121b7bf4cd51de7fe1c69d
kmod-xenpv-smp-0.1-9.el3.i686.rpm     MD5: e95804bcbde6c60947abceddc4593c91
 
x86_64:
kmod-xenpv-0.1-9.el3.ia32e.rpm     MD5: deab26da2e83eee3e3e9906fab26337e
kmod-xenpv-0.1-9.el3.x86_64.rpm     MD5: 3b07d1ee736f44d6bd42feb4a7c3aa27
kmod-xenpv-smp-0.1-9.el3.x86_64.rpm     MD5: 70b61d274eaf040ec4a73f15a9212e3e
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
xenpv-0.1-10.el4.src.rpm
File outdated by:  RHBA-2011:0366
    MD5: eef44f8c0846020c7d8c3af4dd0f26b6
 
IA-32:
kmod-xenpv-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: ead6d363d366de181e7aae5de15d4c3a
kmod-xenpv-hugemem-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: f15f5fc47e8c56b07f70694489707359
kmod-xenpv-smp-0.1-10.el4.i686.rpm
File outdated by:  RHBA-2011:0366
    MD5: 1ba4bc9d9aa4b55d6d28fe9083c9c1d0
 
IA-64:
kmod-xenpv-0.1-10.el4.ia64.rpm
File outdated by:  RHBA-2011:0366
    MD5: e4d879ee05a7972ffc18992ad8548a94
kmod-xenpv-largesmp-0.1-10.el4.ia64.rpm
File outdated by:  RHBA-2011:0366
    MD5: 7df50d601a5517990a4f6d3e82ebeb0e
 
x86_64:
kmod-xenpv-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: e88f7ec60d464687482aee2400a343f8
kmod-xenpv-largesmp-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: f2e866e30c7d89377d817f6c02a4c21a
kmod-xenpv-smp-0.1-10.el4.x86_64.rpm
File outdated by:  RHBA-2011:0366
    MD5: 3089dc792180add139c4c592d5c3c32c
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

pv-drivers, virtualization, xen


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/