search for: device_model_arg

Displaying 15 results from an estimated 15 matches for "device_model_arg".

Did you mean: device_model_args
2012 Apr 17
0
Save/restore error with xen-unstable and qemu upstream
...ide="/usr/lib/xen/bin/qemu-debug.sh" vnc=1 vncunused=1 vnclisten="0.0.0.0" keymap="it" #spice=1 #spicehost="0.0.0.0" #spiceport=6000 #spicedisable_ticketing=1 on_poweroff="destroy" on_reboot="restart" on_crash="destroy" stdvga=1 #device_model_args=["-vga qxl -global qxl-vga.vram_size_mb=16"] #videoram=128 #device_model_args=["-vga qxl"] ------------------------- xl -v save XP /mnt/vm/save/XP Saving to /mnt/vm/save/XP new xl format (info 0x0/0x0/1173) xc: detail: type fail: page 1015 mfn 000feff7 xc: detail: delta 24187m...
2012 Sep 05
7
Xen Security Advisory 17 (CVE-2012-3515) - Qemu VT100 emulation vulnerability
...y in your guest configuration: serial = ''none'' in your guest configuration. For parallel port devices the syntax is toolstack specific. For xend specify in your guest configuration: parallel = ''none'' For xl specify in your guest configuration: xl: device_model_args = [''-parallel'', ''none''] In both cases the default is to use the vulnerable ''vc'' mode. You can confirm whether or not you are vulnerable by pressing Ctrl-Alt-<N> (for digit N) while connected to either the VNC or SDL console. If you are...
2012 Sep 05
7
Xen Security Advisory 17 (CVE-2012-3515) - Qemu VT100 emulation vulnerability
...y in your guest configuration: serial = ''none'' in your guest configuration. For parallel port devices the syntax is toolstack specific. For xend specify in your guest configuration: parallel = ''none'' For xl specify in your guest configuration: xl: device_model_args = [''-parallel'', ''none''] In both cases the default is to use the vulnerable ''vc'' mode. You can confirm whether or not you are vulnerable by pressing Ctrl-Alt-<N> (for digit N) while connected to either the VNC or SDL console. If you are...
2011 May 28
1
"disk" option in hvm config file
Hi, Does Xen HVM support the the "disk" option that can attach a FAT partion or a floppy image like the qemu? In qemu, we can do it with the option "-hda fat:/root/tmp/" and "-fda /root/floopy.img". Any reply is appreciated. Thanks, Bei Guan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com
2012 Aug 01
1
File system passthrough using v9fs?
Hi, I need to deploy a bunch of VMs, that need data from NFS shares residing on a network I don''t trust my VMs to connect to directly. What would it take for me to mount the shares on the hosts, and export them to my VMs using v9fs, for instance? In practice, only one of my VMs will access a portion of the NFS at a time, and the host won''t touch it at all, so I''m
2012 Sep 07
0
Xen Security Advisory 19 (CVE-2012-4411) - guest administrator can access qemu monitor console
...and ALT each time. If one of the accessible screens shows "QEMU <version> monitor" then you are vulnerable. Otherwise you are not. MITIGATION ========== With xl in Xen 4.1 and later, supplying the following config option in the VM configuration file will disable the monitor: device_model_args=["-monitor","null"] With xend the following config option will disable the monitor: monitor_path="null" Note that with a vulnerable version of the software specifying "monitor=0" will NOT disable the monitor. We are not currently aware of the availabili...
2012 Sep 06
0
Bug#686848: CVE-2007-0998: Qemu monitor can be used to access host resources
...and ALT each time. If one of the accessible screens shows "QEMU <version> monitor" then you are vulnerable. Otherwise you are not. MITIGATION ========== With xl in Xen 4.1 and later, supplying the following config option in the VM configuration file will disable the monitor: device_model_args=["-monitor","null"] With xend the following config option will disable the monitor: monitor_path="null" Note that with a vulnerable version of the software specifying "monitor=0" will NOT disable the monitor. We are not currently aware of the availabili...
2012 Sep 06
0
Re: [oss-security] Xen Security Advisory 19 - guest administrator can access qemu monitor console
...sible screens shows "QEMU <version> monitor" then > you are vulnerable. Otherwise you are not. > > MITIGATION > ========== > > With xl in Xen 4.1 and later, supplying the following config > option in the VM configuration file will disable the monitor: > device_model_args=["-monitor","null"] > > With xend the following config option will disable the monitor: > monitor_path="null" > Note that with a vulnerable version of the software specifying > "monitor=0" will NOT disable the monitor. > > We are no...
2012 Sep 06
1
Fwd: [Xen-announce] Xen Security Advisory 19 - guest administrator can access qemu monitor console
...and ALT each time. If one of the accessible screens shows "QEMU <version> monitor" then you are vulnerable. Otherwise you are not. MITIGATION ========== With xl in Xen 4.1 and later, supplying the following config option in the VM configuration file will disable the monitor: device_model_args=["-monitor","null"] With xend the following config option will disable the monitor: monitor_path="null" Note that with a vulnerable version of the software specifying "monitor=0" will NOT disable the monitor. We are not currently aware of the availabili...
2012 Jan 31
26
[PATCH 00/10] FLASK updates: MSI interrupts, cleanups
This patch set adds XSM security labels to useful debugging output locations, and fixes some assumptions that all interrupts behaved like GSI interrupts (which had useful non-dynamic IDs). It also cleans up the policy build process and adds an example of how to use the user field in the security context. Debug output: [PATCH 01/10] xsm: Add security labels to event-channel dump [PATCH 02/10] xsm:
2011 Nov 17
29
[PATCH 00 of 17] Documentation updates
The following series flushes my documentation queue and replaces previous postings of those patches. The main difference is that the xl cfg file is now formatted using POD instead of markdown and presented as a manpage. I have setup a cron job to build docs/html and publish it at http://xenbits.xen.org/docs/unstable/ (it''s a bit bare right now). The motivation for some of these patches
2013 Nov 19
13
[PATCH v7 1/2] libxl: usb2 and usb3 controller support for upstream qemu
...gt;u.hvm.boot = strdup("cda"); if (!b_info->u.hvm.boot) return ERROR_NOMEM; diff --git a/tools/libxl/libxl_dm.c b/tools/libxl/libxl_dm.c index 85a08af..1c31179 100644 --- a/tools/libxl/libxl_dm.c +++ b/tools/libxl/libxl_dm.c @@ -527,6 +527,30 @@ static char ** libxl__build_device_model_args_new(libxl__gc *gc, *p, NULL); } } + } else if (b_info->u.hvm.usbversion) { + switch (b_info->u.hvm.usbversion) { + case 1: + flexarray_vappend(dm_args, + "...
2013 May 19
71
xen forum
I believe both mailing lists are great but there are so may postings that many issues get missed. There are some bugs that hand never been resolved because developers are unaware of it. I just setup forum for xen users at sam.hebe.us/forums please be free to join _______________________________________________ Xen-users mailing list Xen-users@lists.xen.org http://lists.xen.org/xen-users
2013 May 19
71
xen forum
I believe both mailing lists are great but there are so may postings that many issues get missed. There are some bugs that hand never been resolved because developers are unaware of it. I just setup forum for xen users at sam.hebe.us/forums please be free to join _______________________________________________ Xen-users mailing list Xen-users@lists.xen.org http://lists.xen.org/xen-users
2013 Jun 27
20
SPICE with Upstream QEMU and qxl VGA cause Windows BSOD
...[ 'tap2:vhd:/srv/win7_noDriver,sda,w'] vif = ['bridge=xenbr0'] boot='cd' vcpus=4 name = 'UserVM' usbdevice='tablet' vnc=1 vnclisten="0.0.0.0" vncdisplay=1 vncunused = 0 #spice=1 #spicehost='0.0.0.0' #spiceport=6000 #spicedisable_ticketing=1 #device_model_args_hvm = [ '-vga', 'qxl' ] videoram = 128 apic=1 pae=1 Best Regards 北京信联云通科技有限责任公司 Beijing Octopus link Co. Ltd 北京市朝阳区安定路1号奥体中心2266室 技术服务部 张 沛 手机:13683299045 Email: support@octlink.com _______________________________________________ Xen-users mailing list Xen-users@lists.xen.or...