HP Integrity Virtual Machines Installation, Configuration, and Administration Version A.03.50

To restrict the vswitch named myswitch so that it is no longer sharable, enter the following
command:
# hpvmdevmgmt -m gdev:myswitch:attr:SHARE=NO
This command restricts the vswitch called myswitch to use by one guest only.
9.8.2.2 Replacing Devices
If a backing storage device malfunctions, replace it using the hpvmdevmgmt -n option. The -n
option works only for guest devices. It replaces the existing device entry with the new device
entry while keeping all the current guest dependents. Thus, each guest dependent is modified
to replace the old device with the new one. If the device being replaced is a pNIC, use the hpvmnet
command to halt and remove the current vswitches using that pNIC and recreate the same named
vswitches using the new pNIC. This method allows the guests to use the new pNIC through the
old vswitch names without modifying the guests.
9.8.2.3 Deleting Devices
A device entry can be deleted only if it has no dependents. If a device has dependents, those
dependents must be removed before you delete the device. The hpvmmodify command that
removes a device removes that guest as a dependent on that device.
If, for some reason, the guest cannot be modified, you can use the hpvmdevmgmt -d command
to delete a dependent from a device; however, this command does not modify the guest that is
dependent on the device. Use this method only if you can use the hpvmmodify command on
the guests that are dependent on the device. The following example shows how to remove a
guest as a dependent:
# hpvmdevmgmt -d gdev:entry_name:depend:depend_name
9.8.2.4 Restricting VM Host Devices
You must set up restricted devices to ensure that no guest uses devices that are reserved for use
by the VM Host, including the storage devices that the VM Host uses to boot and run. This can
also include a network LAN device to which the host requires exclusive access.
If a volume manager is used for host-specific file systems, then the restricted devices should
include both the volume devices and the underlying special device files to protect both from
guest access. For more information, see Chapter 7 (page 81).
You can also allow guests to access certain files while restricting them from accessing the device
files that contain those files. You can add or delete restricted device entries to the Integrity VM
device database.
For example, to add /dev/rdsk/c2t0d0 as a restricted device, enter the following command:
# hpvmdevmgmt -a rdev:/dev/rdsk/c2t0d0
To delete the restricted device /dev/rdsk/c2t0d0, enter the following command:
# hpvmdevmgmt -d rdev:/dev/rdsk/c2t0d0
To add network lan0 as a restricted device, enter the following command:
# hpvmdevmgmt -a rdev:lan0
If a guest's configuration file contains restricted devices, the guest does not start.
9.9 HP AVIO Stor EFI Driver Enumeration Policy
The default enumeration policy of the “HP AVIO Stor EFI Driver is to enumerate all LUNs, that
is, to discover and list all the LUNs under the AVIO storage adapter. You can use the drvcfg
EFI utility to change the enumeration policy to:
Enumerate only boot LUNs.
Enumerate all LUNs.
140 Managing Guests