Advertisement
Guest User

Untitled

a guest
Dec 5th, 2016
606
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 20.15 KB | None | 0 0
  1. nvram = [
  2. "/usr/share/edk2.git/ovmf-x64/OVMF_CODE-pure-efi.fd:/usr/share/edk2.git/ovmf-x64/OVMF_VARS-pure-efi.fd",
  3. ]
  4. # Master configuration file for the QEMU driver.
  5. # All settings described here are optional - if omitted, sensible
  6. # defaults are used.
  7.  
  8. # VNC is configured to listen on 127.0.0.1 by default.
  9. # To make it listen on all public interfaces, uncomment
  10. # this next option.
  11. #
  12. # NB, strong recommendation to enable TLS + x509 certificate
  13. # verification when allowing public access
  14. #
  15. #vnc_listen = "0.0.0.0"
  16.  
  17. # Enable this option to have VNC served over an automatically created
  18. # unix socket. This prevents unprivileged access from users on the
  19. # host machine, though most VNC clients do not support it.
  20. #
  21. # This will only be enabled for VNC configurations that do not have
  22. # a hardcoded 'listen' or 'socket' value. This setting takes preference
  23. # over vnc_listen.
  24. #
  25. #vnc_auto_unix_socket = 1
  26.  
  27. # Enable use of TLS encryption on the VNC server. This requires
  28. # a VNC client which supports the VeNCrypt protocol extension.
  29. # Examples include vinagre, virt-viewer, virt-manager and vencrypt
  30. # itself. UltraVNC, RealVNC, TightVNC do not support this
  31. #
  32. # It is necessary to setup CA and issue a server certificate
  33. # before enabling this.
  34. #
  35. #vnc_tls = 1
  36.  
  37.  
  38. # Use of TLS requires that x509 certificates be issued. The
  39. # default it to keep them in /etc/pki/libvirt-vnc. This directory
  40. # must contain
  41. #
  42. # ca-cert.pem - the CA master certificate
  43. # server-cert.pem - the server certificate signed with ca-cert.pem
  44. # server-key.pem - the server private key
  45. #
  46. # This option allows the certificate directory to be changed
  47. #
  48. #vnc_tls_x509_cert_dir = "/etc/pki/libvirt-vnc"
  49.  
  50.  
  51. # The default TLS configuration only uses certificates for the server
  52. # allowing the client to verify the server's identity and establish
  53. # an encrypted channel.
  54. #
  55. # It is possible to use x509 certificates for authentication too, by
  56. # issuing a x509 certificate to every client who needs to connect.
  57. #
  58. # Enabling this option will reject any client who does not have a
  59. # certificate signed by the CA in /etc/pki/libvirt-vnc/ca-cert.pem
  60. #
  61. #vnc_tls_x509_verify = 1
  62.  
  63.  
  64. # The default VNC password. Only 8 bytes are significant for
  65. # VNC passwords. This parameter is only used if the per-domain
  66. # XML config does not already provide a password. To allow
  67. # access without passwords, leave this commented out. An empty
  68. # string will still enable passwords, but be rejected by QEMU,
  69. # effectively preventing any use of VNC. Obviously change this
  70. # example here before you set this.
  71. #
  72. #vnc_password = "XYZ12345"
  73.  
  74.  
  75. # Enable use of SASL encryption on the VNC server. This requires
  76. # a VNC client which supports the SASL protocol extension.
  77. # Examples include vinagre, virt-viewer and virt-manager
  78. # itself. UltraVNC, RealVNC, TightVNC do not support this
  79. #
  80. # It is necessary to configure /etc/sasl2/qemu.conf to choose
  81. # the desired SASL plugin (eg, GSSPI for Kerberos)
  82. #
  83. #vnc_sasl = 1
  84.  
  85.  
  86. # The default SASL configuration file is located in /etc/sasl2/
  87. # When running libvirtd unprivileged, it may be desirable to
  88. # override the configs in this location. Set this parameter to
  89. # point to the directory, and create a qemu.conf in that location
  90. #
  91. #vnc_sasl_dir = "/some/directory/sasl2"
  92.  
  93.  
  94. # QEMU implements an extension for providing audio over a VNC connection,
  95. # though if your VNC client does not support it, your only chance for getting
  96. # sound output is through regular audio backends. By default, libvirt will
  97. # disable all QEMU sound backends if using VNC, since they can cause
  98. # permissions issues. Enabling this option will make libvirtd honor the
  99. # QEMU_AUDIO_DRV environment variable when using VNC.
  100. #
  101. #vnc_allow_host_audio = 0
  102.  
  103.  
  104.  
  105. # SPICE is configured to listen on 127.0.0.1 by default.
  106. # To make it listen on all public interfaces, uncomment
  107. # this next option.
  108. #
  109. # NB, strong recommendation to enable TLS + x509 certificate
  110. # verification when allowing public access
  111. #
  112. #spice_listen = "0.0.0.0"
  113.  
  114.  
  115. # Enable use of TLS encryption on the SPICE server.
  116. #
  117. # It is necessary to setup CA and issue a server certificate
  118. # before enabling this.
  119. #
  120. #spice_tls = 1
  121.  
  122.  
  123. # Use of TLS requires that x509 certificates be issued. The
  124. # default it to keep them in /etc/pki/libvirt-spice. This directory
  125. # must contain
  126. #
  127. # ca-cert.pem - the CA master certificate
  128. # server-cert.pem - the server certificate signed with ca-cert.pem
  129. # server-key.pem - the server private key
  130. #
  131. # This option allows the certificate directory to be changed.
  132. #
  133. #spice_tls_x509_cert_dir = "/etc/pki/libvirt-spice"
  134.  
  135.  
  136. # The default SPICE password. This parameter is only used if the
  137. # per-domain XML config does not already provide a password. To
  138. # allow access without passwords, leave this commented out. An
  139. # empty string will still enable passwords, but be rejected by
  140. # QEMU, effectively preventing any use of SPICE. Obviously change
  141. # this example here before you set this.
  142. #
  143. #spice_password = "XYZ12345"
  144.  
  145.  
  146. # Enable use of SASL encryption on the SPICE server. This requires
  147. # a SPICE client which supports the SASL protocol extension.
  148. #
  149. # It is necessary to configure /etc/sasl2/qemu.conf to choose
  150. # the desired SASL plugin (eg, GSSPI for Kerberos)
  151. #
  152. #spice_sasl = 1
  153.  
  154. # The default SASL configuration file is located in /etc/sasl2/
  155. # When running libvirtd unprivileged, it may be desirable to
  156. # override the configs in this location. Set this parameter to
  157. # point to the directory, and create a qemu.conf in that location
  158. #
  159. #spice_sasl_dir = "/some/directory/sasl2"
  160.  
  161.  
  162. # By default, if no graphical front end is configured, libvirt will disable
  163. # QEMU audio output since directly talking to alsa/pulseaudio may not work
  164. # with various security settings. If you know what you're doing, enable
  165. # the setting below and libvirt will passthrough the QEMU_AUDIO_DRV
  166. # environment variable when using nographics.
  167. #
  168. #nographics_allow_host_audio = 1
  169.  
  170.  
  171. # Override the port for creating both VNC and SPICE sessions (min).
  172. # This defaults to 5900 and increases for consecutive sessions
  173. # or when ports are occupied, until it hits the maximum.
  174. #
  175. # Minimum must be greater than or equal to 5900 as lower number would
  176. # result into negative vnc display number.
  177. #
  178. # Maximum must be less than 65536, because higher numbers do not make
  179. # sense as a port number.
  180. #
  181. #remote_display_port_min = 5900
  182. #remote_display_port_max = 65535
  183.  
  184. # VNC WebSocket port policies, same rules apply as with remote display
  185. # ports. VNC WebSockets use similar display <-> port mappings, with
  186. # the exception being that ports start from 5700 instead of 5900.
  187. #
  188. #remote_websocket_port_min = 5700
  189. #remote_websocket_port_max = 65535
  190.  
  191. # The default security driver is SELinux. If SELinux is disabled
  192. # on the host, then the security driver will automatically disable
  193. # itself. If you wish to disable QEMU SELinux security driver while
  194. # leaving SELinux enabled for the host in general, then set this
  195. # to 'none' instead. It's also possible to use more than one security
  196. # driver at the same time, for this use a list of names separated by
  197. # comma and delimited by square brackets. For example:
  198. #
  199. # security_driver = [ "selinux", "apparmor" ]
  200. #
  201. # Notes: The DAC security driver is always enabled; as a result, the
  202. # value of security_driver cannot contain "dac". The value "none" is
  203. # a special value; security_driver can be set to that value in
  204. # isolation, but it cannot appear in a list of drivers.
  205. #
  206. #security_driver = "selinux"
  207.  
  208. # If set to non-zero, then the default security labeling
  209. # will make guests confined. If set to zero, then guests
  210. # will be unconfined by default. Defaults to 1.
  211. #security_default_confined = 1
  212.  
  213. # If set to non-zero, then attempts to create unconfined
  214. # guests will be blocked. Defaults to 0.
  215. #security_require_confined = 1
  216.  
  217. # The user for QEMU processes run by the system instance. It can be
  218. # specified as a user name or as a user id. The qemu driver will try to
  219. # parse this value first as a name and then, if the name doesn't exist,
  220. # as a user id.
  221. #
  222. # Since a sequence of digits is a valid user name, a leading plus sign
  223. # can be used to ensure that a user id will not be interpreted as a user
  224. # name.
  225. #
  226. # Some examples of valid values are:
  227. #
  228. # user = "qemu" # A user named "qemu"
  229. # user = "+0" # Super user (uid=0)
  230. # user = "100" # A user named "100" or a user with uid=100
  231. #
  232. user = "diomedes"
  233.  
  234. # The group for QEMU processes run by the system instance. It can be
  235. # specified in a similar way to user.
  236. group="users"
  237.  
  238. # Whether libvirt should dynamically change file ownership
  239. # to match the configured user/group above. Defaults to 1.
  240. # Set to 0 to disable file ownership changes.
  241. #dynamic_ownership = 1
  242.  
  243.  
  244. # What cgroup controllers to make use of with QEMU guests
  245. #
  246. # - 'cpu' - use for schedular tunables
  247. # - 'devices' - use for device whitelisting
  248. # - 'memory' - use for memory tunables
  249. # - 'blkio' - use for block devices I/O tunables
  250. # - 'cpuset' - use for CPUs and memory nodes
  251. # - 'cpuacct' - use for CPUs statistics.
  252. #
  253. # NB, even if configured here, they won't be used unless
  254. # the administrator has mounted cgroups, e.g.:
  255. #
  256. # mkdir /dev/cgroup
  257. # mount -t cgroup -o devices,cpu,memory,blkio,cpuset none /dev/cgroup
  258. #
  259. # They can be mounted anywhere, and different controllers
  260. # can be mounted in different locations. libvirt will detect
  261. # where they are located.
  262. #
  263. #cgroup_controllers = [ "cpu", "devices", "memory", "blkio", "cpuset", "cpuacct" ]
  264.  
  265. # This is the basic set of devices allowed / required by
  266. # all virtual machines.
  267. #
  268. # As well as this, any configured block backed disks,
  269. # all sound device, and all PTY devices are allowed.
  270. #
  271. # This will only need setting if newer QEMU suddenly
  272. # wants some device we don't already know about.
  273. #
  274. cgroup_device_acl = [
  275. "/dev/null", "/dev/full", "/dev/zero",
  276. "/dev/random", "/dev/urandom",
  277. "/dev/ptmx", "/dev/kvm", "/dev/kqemu",
  278. "/dev/rtc","/dev/hpet", "/dev/vfio/vfio", "/dev/input/event0",
  279. "/dev/input/event1", "/dev/input/event2", "/dev/input/event3",
  280. "/dev/input/event4", "/dev/input/event5", "/dev/input/event6",
  281. "/dev/input/event7", "/dev/input/event8", "/dev/input/event9",
  282. "/dev/input/event10", "/dev/input/event11", "/dev/input/event12",
  283. "/dev/input/event13", "/dev/input/event14", "/dev/input/event15",
  284. "/dev/input/event16", "/dev/input/mice", "/dev/input/mouse0"
  285.  
  286. ]
  287. #
  288. # RDMA migration requires the following extra files to be added to the list:
  289. # "/dev/infiniband/rdma_cm",
  290. # "/dev/infiniband/issm0",
  291. # "/dev/infiniband/issm1",
  292. # "/dev/infiniband/umad0",
  293. # "/dev/infiniband/umad1",
  294. # "/dev/infiniband/uverbs0"
  295.  
  296.  
  297. # The default format for Qemu/KVM guest save images is raw; that is, the
  298. # memory from the domain is dumped out directly to a file. If you have
  299. # guests with a large amount of memory, however, this can take up quite
  300. # a bit of space. If you would like to compress the images while they
  301. # are being saved to disk, you can also set "lzop", "gzip", "bzip2", or "xz"
  302. # for save_image_format. Note that this means you slow down the process of
  303. # saving a domain in order to save disk space; the list above is in descending
  304. # order by performance and ascending order by compression ratio.
  305. #
  306. # save_image_format is used when you use 'virsh save' or 'virsh managedsave'
  307. # at scheduled saving, and it is an error if the specified save_image_format
  308. # is not valid, or the requested compression program can't be found.
  309. #
  310. # dump_image_format is used when you use 'virsh dump' at emergency
  311. # crashdump, and if the specified dump_image_format is not valid, or
  312. # the requested compression program can't be found, this falls
  313. # back to "raw" compression.
  314. #
  315. # snapshot_image_format specifies the compression algorithm of the memory save
  316. # image when an external snapshot of a domain is taken. This does not apply
  317. # on disk image format. It is an error if the specified format isn't valid,
  318. # or the requested compression program can't be found.
  319. #
  320. #save_image_format = "raw"
  321. #dump_image_format = "raw"
  322. #snapshot_image_format = "raw"
  323.  
  324. # When a domain is configured to be auto-dumped when libvirtd receives a
  325. # watchdog event from qemu guest, libvirtd will save dump files in directory
  326. # specified by auto_dump_path. Default value is /var/lib/libvirt/qemu/dump
  327. #
  328. #auto_dump_path = "/var/lib/libvirt/qemu/dump"
  329.  
  330. # When a domain is configured to be auto-dumped, enabling this flag
  331. # has the same effect as using the VIR_DUMP_BYPASS_CACHE flag with the
  332. # virDomainCoreDump API. That is, the system will avoid using the
  333. # file system cache while writing the dump file, but may cause
  334. # slower operation.
  335. #
  336. #auto_dump_bypass_cache = 0
  337.  
  338. # When a domain is configured to be auto-started, enabling this flag
  339. # has the same effect as using the VIR_DOMAIN_START_BYPASS_CACHE flag
  340. # with the virDomainCreateWithFlags API. That is, the system will
  341. # avoid using the file system cache when restoring any managed state
  342. # file, but may cause slower operation.
  343. #
  344. #auto_start_bypass_cache = 0
  345.  
  346. # If provided by the host and a hugetlbfs mount point is configured,
  347. # a guest may request huge page backing. When this mount point is
  348. # unspecified here, determination of a host mount point in /proc/mounts
  349. # will be attempted. Specifying an explicit mount overrides detection
  350. # of the same in /proc/mounts. Setting the mount point to "" will
  351. # disable guest hugepage backing. If desired, multiple mount points can
  352. # be specified at once, separated by comma and enclosed in square
  353. # brackets, for example:
  354. #
  355. # hugetlbfs_mount = ["/dev/hugepages2M", "/dev/hugepages1G"]
  356. #
  357. # The size of huge page served by specific mount point is determined by
  358. # libvirt at the daemon startup.
  359. #
  360. # NB, within these mount points, guests will create memory backing
  361. # files in a location of $MOUNTPOINT/libvirt/qemu
  362. #
  363. #hugetlbfs_mount = "/dev/hugepages"
  364.  
  365.  
  366. # Path to the setuid helper for creating tap devices. This executable
  367. # is used to create <source type='bridge'> interfaces when libvirtd is
  368. # running unprivileged. libvirt invokes the helper directly, instead
  369. # of using "-netdev bridge", for security reasons.
  370. #bridge_helper = "/usr/lib/qemu/qemu-bridge-helper"
  371.  
  372.  
  373.  
  374. # If clear_emulator_capabilities is enabled, libvirt will drop all
  375. # privileged capabilities of the QEmu/KVM emulator. This is enabled by
  376. # default.
  377. #
  378. # Warning: Disabling this option means that a compromised guest can
  379. # exploit the privileges and possibly do damage to the host.
  380. #
  381. clear_emulator_capabilities = 0
  382.  
  383.  
  384. # If enabled, libvirt will have QEMU set its process name to
  385. # "qemu:VM_NAME", where VM_NAME is the name of the VM. The QEMU
  386. # process will appear as "qemu:VM_NAME" in process listings and
  387. # other system monitoring tools. By default, QEMU does not set
  388. # its process title, so the complete QEMU command (emulator and
  389. # its arguments) appear in process listings.
  390. #
  391. #set_process_name = 1
  392.  
  393.  
  394. # If max_processes is set to a positive integer, libvirt will use
  395. # it to set the maximum number of processes that can be run by qemu
  396. # user. This can be used to override default value set by host OS.
  397. # The same applies to max_files which sets the limit on the maximum
  398. # number of opened files.
  399. #
  400. #max_processes = 0
  401. #max_files = 0
  402.  
  403.  
  404.  
  405. # mac_filter enables MAC addressed based filtering on bridge ports.
  406. # This currently requires ebtables to be installed.
  407. #
  408. #mac_filter = 1
  409.  
  410.  
  411. # By default, PCI devices below non-ACS switch are not allowed to be assigned
  412. # to guests. By setting relaxed_acs_check to 1 such devices will be allowed to
  413. # be assigned to guests.
  414. #
  415. #relaxed_acs_check = 1
  416.  
  417.  
  418. # If allow_disk_format_probing is enabled, libvirt will probe disk
  419. # images to attempt to identify their format, when not otherwise
  420. # specified in the XML. This is disabled by default.
  421. #
  422. # WARNING: Enabling probing is a security hole in almost all
  423. # deployments. It is strongly recommended that users update their
  424. # guest XML <disk> elements to include <driver type='XXXX'/>
  425. # elements instead of enabling this option.
  426. #
  427. #allow_disk_format_probing = 1
  428.  
  429.  
  430. # In order to prevent accidentally starting two domains that
  431. # share one writable disk, libvirt offers two approaches for
  432. # locking files. The first one is sanlock, the other one,
  433. # virtlockd, is then our own implementation. Accepted values
  434. # are "sanlock" and "lockd".
  435. #
  436. #lock_manager = "lockd"
  437.  
  438.  
  439.  
  440. # Set limit of maximum APIs queued on one domain. All other APIs
  441. # over this threshold will fail on acquiring job lock. Specially,
  442. # setting to zero turns this feature off.
  443. # Note, that job lock is per domain.
  444. #
  445. #max_queued = 0
  446.  
  447. ###################################################################
  448. # Keepalive protocol:
  449. # This allows qemu driver to detect broken connections to remote
  450. # libvirtd during peer-to-peer migration. A keepalive message is
  451. # sent to the daemon after keepalive_interval seconds of inactivity
  452. # to check if the daemon is still responding; keepalive_count is a
  453. # maximum number of keepalive messages that are allowed to be sent
  454. # to the daemon without getting any response before the connection
  455. # is considered broken. In other words, the connection is
  456. # automatically closed approximately after
  457. # keepalive_interval * (keepalive_count + 1) seconds since the last
  458. # message received from the daemon. If keepalive_interval is set to
  459. # -1, qemu driver will not send keepalive requests during
  460. # peer-to-peer migration; however, the remote libvirtd can still
  461. # send them and source libvirtd will send responses. When
  462. # keepalive_count is set to 0, connections will be automatically
  463. # closed after keepalive_interval seconds of inactivity without
  464. # sending any keepalive messages.
  465. #
  466. #keepalive_interval = 5
  467. #keepalive_count = 5
  468.  
  469.  
  470.  
  471. # Use seccomp syscall whitelisting in QEMU.
  472. # 1 = on, 0 = off, -1 = use QEMU default
  473. # Defaults to -1.
  474. #
  475. #seccomp_sandbox = 1
  476.  
  477.  
  478. # Override the listen address for all incoming migrations. Defaults to
  479. # 0.0.0.0, or :: if both host and qemu are capable of IPv6.
  480. #migration_address = "0.0.0.0"
  481.  
  482.  
  483. # The default hostname or IP address which will be used by a migration
  484. # source for transferring migration data to this host. The migration
  485. # source has to be able to resolve this hostname and connect to it so
  486. # setting "localhost" will not work. By default, the host's configured
  487. # hostname is used.
  488. #migration_host = "host.example.com"
  489.  
  490.  
  491. # Override the port range used for incoming migrations.
  492. #
  493. # Minimum must be greater than 0, however when QEMU is not running as root,
  494. # setting the minimum to be lower than 1024 will not work.
  495. #
  496. # Maximum must not be greater than 65535.
  497. #
  498. #migration_port_min = 49152
  499. #migration_port_max = 49215
  500.  
  501.  
  502.  
  503. # Timestamp QEMU's log messages (if QEMU supports it)
  504. #
  505. # Defaults to 1.
  506. #
  507. #log_timestamp = 0
  508.  
  509.  
  510. # Location of master nvram file
  511. #
  512. # When a domain is configured to use UEFI instead of standard
  513. # BIOS it may use a separate storage for UEFI variables. If
  514. # that's the case libvirt creates the variable store per domain
  515. # using this master file as image. Each UEFI firmware can,
  516. # however, have different variables store. Therefore the nvram is
  517. # a list of strings when a single item is in form of:
  518. # ${PATH_TO_UEFI_FW}:${PATH_TO_UEFI_VARS}.
  519. # Later, when libvirt creates per domain variable store, this list is
  520. # searched for the master image. The UEFI firmware can be called
  521. # differently for different guest architectures. For instance, it's OVMF
  522. # for x86_64 and i686, but it's AAVMF for aarch64. The libvirt default
  523. # follows this scheme.
  524. #nvram = [
  525. # "/usr/share/OVMF/OVMF_CODE.fd:/usr/share/OVMF/OVMF_VARS.fd",
  526. # "/usr/share/AAVMF/AAVMF_CODE.fd:/usr/share/AAVMF/AAVMF_VARS.fd"
  527. #]
  528.  
  529. # The backend to use for handling stdout/stderr output from
  530. # QEMU processes.
  531. #
  532. # 'file': QEMU writes directly to a plain file. This is the
  533. # historical default, but allows QEMU to inflict a
  534. # denial of service attack on the host by exhausting
  535. # filesystem space
  536. #
  537. # 'logd': QEMU writes to a pipe provided by virtlogd daemon.
  538. # This is the current default, providing protection
  539. # against denial of service by performing log file
  540. # rollover when a size limit is hit.
  541. #
  542. #stdio_handler = "logd"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement