HP Integrity Virtual Machines Installation, Configuration, and Administration Version A.03.50

hpvmdevmgmt(1M)
NAME
hpvmdevmgmt -- Manage the devices that are associated with the VM Host and the guests.
SYNOPSIS
hpvmdevmgmt -a { server | rdev | gdev }:entry-name [-V]
hpvmdevmgmt -d { server | rdev | gdev }:entry-name [-V]
hpvmdevmgmt -d { all | entry-name }:depend:dependent-name [-V]
hpvmdevmgmt -d { server | rdev | gdev }:attr:attr_name [-V]
hpvmdevmgmt -m { server | rdev | gdev }:attr:attr-name [-V]
hpvmdevmgmt -n {[gdev] | [rdev]}:oldentry-name:newentry-name0,newentry-name1
[-V]
hpvmdevmgmt -l { server | rdev | gdev } [-V]
hpvmdevmgmt -l { server | rdev | gdev }:depend:dependent-name [-V]
hpvmdevmgmt -l { server | rdev | gdev }:attr-name=attr-value [-V]
hpvmdevmgmt -I [-V]
hpvmdevmgmt -r
hpvmdevmgmt -v
hpvmdevmgmt -S file-size file-name [-V]
DESCRIPTION
Manages entries in the Integrity VM device-management database, which tracks and validates
guest-device usage, ensures that devices are only shared deliberately, and optionally restricts
guest access to devices used by the VM Host. Guest devices are added, modified, and removed
from this database when you use Integrity VM commands, such as hpvmcreate, hpvmmodify,
and hpvmclone. The hpvmdevmgmt command allows you to examine the database entries, alter
specific device attributes, such as shared devices. You can also use the hpvmdevmgmt command
to create database entries for restricted devices (to which guest access is prohibited) and for
pre-extending files used as virtual devices.
The device management database contains three types of entries:
Restricted devices (rdev)
Guest devices (gdev)
VM Host devices (server)
A device management database entry contains a name or alias, attributes in the form
attribute-name=value, a list of guest names and device entities that depend on the entry (called its
dependents), and a unique identifier.
The Integrity VM device-management facility allows you to restrict devices and directories for
exclusive use by the VM Host in two ways:
By specifying individual device, file, or directory paths:
# hpvmdevmgmt -a rdev:/some-device
# hpvmdevmgmt -a rdev:/some-file
# hpvmdevmgmt -a rdev:/some-directory
This restricts the ability to later designate the specified device, file, or directory for use by
a guest.
By specifying recursive directory paths:
# # Restrict everything in and under a specified directory
# # that is also in the same file system that the specified
# # restricted directory is in.
# hpvmdevmgmt -a rdev:/some-directory:attr:RECURSIVE=FS
# # Restrict everything in and under a specified directory,
203