In this case the configuration is permanently loaded into the xen-store. Improve this answer. Nils Nils 7, 3 3 gold badges 29 29 silver badges 71 71 bronze badges. You should have read my answer three hours before you solved it yourselv.
Then when I came back to finish up I saw the note "A new answer has been added", but I did not want to lose all may careful work, so I completed my answer despite yours, and the rest is history.
Heh :- I almost did not allocate the bounty to you because reading my question and your answer, I think you should have known this at the time you made the original comment and you could have saved me quite some pain if you gave this answer earlier. Well yes and no. Sometimes my first assumptions are wrong, so I had to be sure that you are encountering this problem. Show 1 more comment.
Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown. The Overflow Blog. Podcast Explaining the semiconductor shortage, and how it might end. Does ES6 make JavaScript frameworks obsolete?
Action to take if the domain shuts down due to a Xen watchdog timeout. Default is destroy. Action to take if the domain performs a 'soft reset' e. Default is soft-reset. Direct kernel boot allows booting guests with a kernel and an initrd stored on a filesystem available to the host physical machine, allowing command line arguments to be passed directly.
PV guest direct kernel boot is supported. HVM guest direct kernel boot is supported with some limitations it's supported when using qemu-xen and the default BIOS 'seabios', but not supported in case of using stubdom-dm and the old 'rombios'.
Note: the meaning of this is guest specific. Non direct kernel boot allows booting guests with a firmware. This can be used by all types of guests, although the selection of options is different depending on the guest type.
This option provides the flexibly of letting the guest decide which kernel they want to boot, while preventing having to poke at the guest file system form the toolstack domain. Boots a guest using a para-virtualized version of grub that runs inside of the guest.
The bitness of the guest needs to be know, so that the right version of pvgrub can be selected. Note that xl expects to find the pvgrub Currently there's no firmware available for PVH guests, they should be booted using the Direct Kernel Boot method or the bootloader option.
Ie, the guest will experience a PV environment, but processor hardware extensions are used to separate its address space to mitigate the Meltdown attack CVE The PV shim is a specially-built firmware-like executable constructed from the hypervisor source tree. This option specifies to use a non-default shim. Ignored if pvhsim is false. Command line for the shim. Extra command line arguments for the shim. Default is empty. Specify an XSM security label used for this domain temporarily during its build.
The domain's XSM label will be changed to the execution seclabel specified by seclabel once the build is complete, prior to unpausing the domain. Specify the maximum number of grant frames the domain is allowed to have. This value controls how many pages the domain is able to grant access to for other domains, needed e. The default is settable via xl. Specify the maximum number of grant maptrack frames the domain is allowed to have.
This value controls how many pages of foreign domains can be accessed via the grant mechanism by this domain. The default value is settable via xl. Specify the maximum grant table version the domain is allowed to use.
Disable migration of this domain. This enables certain other features which are incompatible with migration. Specify that this domain is a driver domain. This enables certain features needed in order to run a driver domain. Specify a partial device tree compiled via the Device Tree Compiler.
Given the complexity of verifying the validity of a device tree, this option should only be used with a trusted device tree. Note that the partial device tree should avoid using the phandle which is reserved by the toolstack. Specify whether IOMMU mappings are enabled for the domain and hence whether it will be enabled for passthrough hardware. Valid values for this option are:. This option is the default if no passthrough hardware is specified in the domain's configuration.
This option enables IOMMU mappings and selects an appropriate default operating mode see below for details of the operating modes. This option is the default if passthrough hardware is specified in the domain's configuration. Thus a device driver running in the domain may program passthrough hardware using GFN values i.
This option is unavailable for a PV domain. However, the availability of this option is hardware specific. The default, which chooses between disabled and enabled according to whether passthrough devices are enabled in the config file. If this option is true the xenstore path for the domain's suspend event channel will not be created. Instead the old xend behaviour of making the whole xenstore device sub-tree writable by the domain will be re-instated. The existence of the suspend event channel path can cause problems with certain PV drivers running in the guest e.
Specifies the size of vmtrace buffer that would be allocated for each vCPU belonging to this domain. Disabled i. NOTE : Acceptable values are platform specific. For Intel Processor Trace, this value must be a power of 2 between 4k and 16M. The PMU registers are not virtualized and the physical registers are directly accessible when this parameter is enabled.
Only to be used by sufficiently privileged domains. This feature is currently in experimental state. The following options define the paravirtual, emulated and physical devices which the guest will contain.
Specifies the disks both emulated disks and Xen virtual block devices which are to be provided to the guest, and what objects on the host they should map to. See xl-disk-configuration 5 for more details. Specifies the network interfaces both emulated network adapters, and Xen virtual interfaces which are to be provided to the guest.
See xl-network-configuration 5 for more details. Specifies the Virtual Trusted Platform module to be provided to the guest. See xen-vtpm 7 for more details. Specifies the backend domain name or id. This value is required!
If this domain is a guest, the backend should be set to the vTPM domain name. You can create one using the uuidgen 1 program on unix systems. If left unspecified, a new UUID will be randomly generated every time the domain boots. If this is a vTPM domain, you should specify a value.
The value is optional if this is a guest domain. Only "none" is supported today, which means that the files are stored using the same credentials as those they have in the guest no user ownership squash or remap. Creates a Xen pvcalls connection to handle pvcalls requests from frontend to backend. It can be used as an alternative networking model.
This option does not control the emulated graphics card presented to an HVM guest. If Emulated VGA Graphics Device options are used in a PV guest configuration, xl will pick up vnc , vnclisten , vncpasswd , vncdisplay , vncunused , sdl , opengl and keymap to construct the paravirtual framebuffer device for the guest. Allow access to the display via the VNC protocol. This enables the other VNC-related settings. Default is 1 enabled.
The actual display used can be accessed with xl vncviewer. Specifies the password for the VNC server. If the password is set to an empty string, authentication on the VNC server will be disabled, allowing any user to connect. The default is 0 not enabled. Specifies the path to the X authority file that should be used to connect to the X server when the sdl option is used. The default is 0 disabled.
Configure the keymap to use for the keyboard associated with this display. If the input method does not easily support raw keycodes e. The specific values which are accepted are defined by the version of the device-model which you are using.
See Keymaps below or consult the qemu 1 manpage. The default is en-us. Specifies the virtual channels to be provided to the guest. A channel is a low-bandwidth, bidirectional byte stream, which resembles a serial link. Typical uses for channels include transmitting VM configuration after boot and signalling to in-guest agents. Please see xen-pv-channel 7 for more details. Defined values are:.
This parameter is optional. If this parameter is omitted then the toolstack domain will be assumed. Specifies the name for this device. This parameter is mandatory! This should be a well-known name for a specific application e. There is no formal registry of channel names, so application authors are encouraged to make their names unique by including the domain name and a version number in the string e. The backend will proxy data between the channel and the connected socket.
The backend will create a pty and proxy data between the channel and the master device. The command xl channel-list can be used to discover the assigned slave device. If set to "host" it means all reserved device memory on this platform should be checked to reserve regions in this VM's address space. This global RDM parameter allows the user to specify reserved regions explicitly, and using "host" includes all reserved regions reported on this platform, which is useful when doing hotplug.
By default this isn't set so we don't check all RDMs. Instead, we just check the RDM specific to a given device if we're assigning this kind of a device.
Specifies how to deal with conflicts when reserving already reserved device memory in the guest address space. Specifies that in case of an unresolved conflict the VM can't be created, or the associated device can't be attached in the case of hotplug.
Specifies that in case of an unresolved conflict the VM is allowed to be created but may cause the VM to crash if a pass-through device accesses RDM.
Determines whether a kernel based backend is installed. If this is the case, pv is used, otherwise qusb will be used. For HVM domains devicemodel will be selected. Specifies the usb controller version. Possible values include 1 USB1. Default is 2 USB2.
Value 3 USB3. Specifies the total number of ports of the usb controller. The maximum number is The default is 8. With the type devicemodel the number of ports is more limited: a USB1.
USB controller ids start from 0. In line with the USB specification, however, ports on a controller start from 1. If no controller is specified, an available controller:port combination will be used. If there are no available controller:port combinations, a new controller will be created. The port option is valid only when the controller option is specified. Add a disk device to a domain. If DOM is specified it defines the backend driver domain to use for the disk. The option may be repeated to add more than one disk.
Add a PCI device to a domain, using given parameters in hex. The option may be repeated to add more than one pci device. Add an IRQ interrupt line to a domain. This option may be repeated to add more than one IRQ. Add a physical USB port to a domain, as specified by the path to that port.
This option may be repeated to add more than one port. Make the domain a framebuffer backend. The backend type should be either sdl or vnc. The server will listen on ADDR default N defaults to the domain id. Add a network interface with the given MAC address and bridge. The vif is configured by calling the given configuration script.
If type is not specified, default is netfront not ioemu device. If mac is not specified a random MAC address is used. If not specified then the network backend chooses its own MAC address.
If bridge is not specified the first bridge found is used. If script is not specified the default script is used. If backend is not specified the default backend driver domain is used. If vifname is not specified the backend virtual interface will have name vifD.
0コメント