Displaying 15 results from an estimated 15 matches for "device_model_args".
2012 Apr 17
0
Save/restore error with xen-unstable and qemu upstream
...ide="/usr/lib/xen/bin/qemu-debug.sh"
vnc=1
vncunused=1
vnclisten="0.0.0.0"
keymap="it"
#spice=1
#spicehost="0.0.0.0"
#spiceport=6000
#spicedisable_ticketing=1
on_poweroff="destroy"
on_reboot="restart"
on_crash="destroy"
stdvga=1
#device_model_args=["-vga qxl -global qxl-vga.vram_size_mb=16"]
#videoram=128
#device_model_args=["-vga qxl"]
-------------------------
xl -v save XP /mnt/vm/save/XP
Saving to /mnt/vm/save/XP new xl format (info 0x0/0x0/1173)
xc: detail: type fail: page 1015 mfn 000feff7
xc: detail: delta 24187ms...
2012 Sep 05
7
Xen Security Advisory 17 (CVE-2012-3515) - Qemu VT100 emulation vulnerability
...y in your guest configuration:
serial = ''none''
in your guest configuration.
For parallel port devices the syntax is toolstack specific.
For xend specify in your guest configuration:
parallel = ''none''
For xl specify in your guest configuration:
xl: device_model_args = [''-parallel'', ''none'']
In both cases the default is to use the vulnerable ''vc'' mode.
You can confirm whether or not you are vulnerable by pressing
Ctrl-Alt-<N> (for digit N) while connected to either the VNC or SDL
console. If you are a...
2012 Sep 05
7
Xen Security Advisory 17 (CVE-2012-3515) - Qemu VT100 emulation vulnerability
...y in your guest configuration:
serial = ''none''
in your guest configuration.
For parallel port devices the syntax is toolstack specific.
For xend specify in your guest configuration:
parallel = ''none''
For xl specify in your guest configuration:
xl: device_model_args = [''-parallel'', ''none'']
In both cases the default is to use the vulnerable ''vc'' mode.
You can confirm whether or not you are vulnerable by pressing
Ctrl-Alt-<N> (for digit N) while connected to either the VNC or SDL
console. If you are a...
2011 May 28
1
"disk" option in hvm config file
Hi,
Does Xen HVM support the the "disk" option that can attach a FAT partion or
a floppy image like the qemu? In qemu, we can do it with the option "-hda
fat:/root/tmp/" and "-fda /root/floopy.img". Any reply is appreciated.
Thanks,
Bei Guan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2012 Aug 01
1
File system passthrough using v9fs?
Hi,
I need to deploy a bunch of VMs, that need data from NFS shares residing
on a network I don''t trust my VMs to connect to directly.
What would it take for me to mount the shares on the hosts, and export
them to my VMs using v9fs, for instance?
In practice, only one of my VMs will access a portion of the NFS at a
time, and the host won''t touch it at all, so I''m
2012 Sep 07
0
Xen Security Advisory 19 (CVE-2012-4411) - guest administrator can access qemu monitor console
...and ALT each time.
If one of the accessible screens shows "QEMU <version> monitor" then
you are vulnerable. Otherwise you are not.
MITIGATION
==========
With xl in Xen 4.1 and later, supplying the following config
option in the VM configuration file will disable the monitor:
device_model_args=["-monitor","null"]
With xend the following config option will disable the monitor:
monitor_path="null"
Note that with a vulnerable version of the software specifying
"monitor=0" will NOT disable the monitor.
We are not currently aware of the availabilit...
2012 Sep 06
0
Bug#686848: CVE-2007-0998: Qemu monitor can be used to access host resources
...and ALT each time.
If one of the accessible screens shows "QEMU <version> monitor" then
you are vulnerable. Otherwise you are not.
MITIGATION
==========
With xl in Xen 4.1 and later, supplying the following config
option in the VM configuration file will disable the monitor:
device_model_args=["-monitor","null"]
With xend the following config option will disable the monitor:
monitor_path="null"
Note that with a vulnerable version of the software specifying
"monitor=0" will NOT disable the monitor.
We are not currently aware of the availabilit...
2012 Sep 06
0
Re: [oss-security] Xen Security Advisory 19 - guest administrator can access qemu monitor console
...sible screens shows "QEMU <version> monitor" then
> you are vulnerable. Otherwise you are not.
>
> MITIGATION
> ==========
>
> With xl in Xen 4.1 and later, supplying the following config
> option in the VM configuration file will disable the monitor:
> device_model_args=["-monitor","null"]
>
> With xend the following config option will disable the monitor:
> monitor_path="null"
> Note that with a vulnerable version of the software specifying
> "monitor=0" will NOT disable the monitor.
>
> We are not...
2012 Sep 06
1
Fwd: [Xen-announce] Xen Security Advisory 19 - guest administrator can access qemu monitor console
...and ALT each time.
If one of the accessible screens shows "QEMU <version> monitor" then
you are vulnerable. Otherwise you are not.
MITIGATION
==========
With xl in Xen 4.1 and later, supplying the following config
option in the VM configuration file will disable the monitor:
device_model_args=["-monitor","null"]
With xend the following config option will disable the monitor:
monitor_path="null"
Note that with a vulnerable version of the software specifying
"monitor=0" will NOT disable the monitor.
We are not currently aware of the availabilit...
2012 Jan 31
26
[PATCH 00/10] FLASK updates: MSI interrupts, cleanups
This patch set adds XSM security labels to useful debugging output
locations, and fixes some assumptions that all interrupts behaved like
GSI interrupts (which had useful non-dynamic IDs). It also cleans up the
policy build process and adds an example of how to use the user field in
the security context.
Debug output:
[PATCH 01/10] xsm: Add security labels to event-channel dump
[PATCH 02/10] xsm:
2011 Nov 17
29
[PATCH 00 of 17] Documentation updates
The following series flushes my documentation queue and replaces
previous postings of those patches.
The main difference is that the xl cfg file is now formatted using POD
instead of markdown and presented as a manpage.
I have setup a cron job to build docs/html and publish it at
http://xenbits.xen.org/docs/unstable/ (it''s a bit bare right now).
The motivation for some of these patches
2013 Nov 19
13
[PATCH v7 1/2] libxl: usb2 and usb3 controller support for upstream qemu
...gt;u.hvm.boot = strdup("cda");
if (!b_info->u.hvm.boot) return ERROR_NOMEM;
diff --git a/tools/libxl/libxl_dm.c b/tools/libxl/libxl_dm.c
index 85a08af..1c31179 100644
--- a/tools/libxl/libxl_dm.c
+++ b/tools/libxl/libxl_dm.c
@@ -527,6 +527,30 @@ static char ** libxl__build_device_model_args_new(libxl__gc *gc,
*p, NULL);
}
}
+ } else if (b_info->u.hvm.usbversion) {
+ switch (b_info->u.hvm.usbversion) {
+ case 1:
+ flexarray_vappend(dm_args,
+ "-...
2013 May 19
71
xen forum
I believe both mailing lists are great but there are so may postings that
many issues get missed. There are some bugs that hand never been resolved
because developers are unaware of it. I just setup forum for xen users at
sam.hebe.us/forums please be free to join
_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
2013 May 19
71
xen forum
I believe both mailing lists are great but there are so may postings that
many issues get missed. There are some bugs that hand never been resolved
because developers are unaware of it. I just setup forum for xen users at
sam.hebe.us/forums please be free to join
_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
2013 Jun 27
20
SPICE with Upstream QEMU and qxl VGA cause Windows BSOD
...[ 'tap2:vhd:/srv/win7_noDriver,sda,w']
vif = ['bridge=xenbr0']
boot='cd'
vcpus=4
name = 'UserVM'
usbdevice='tablet'
vnc=1
vnclisten="0.0.0.0"
vncdisplay=1
vncunused = 0
#spice=1
#spicehost='0.0.0.0'
#spiceport=6000
#spicedisable_ticketing=1
#device_model_args_hvm = [ '-vga', 'qxl' ]
videoram = 128
apic=1
pae=1
Best Regards
北京信联云通科技有限责任公司
Beijing Octopus link Co. Ltd
北京市朝阳区安定路1号奥体中心2266室
技术服务部
张 沛
手机:13683299045
Email: support@octlink.com
_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org...