HP-UX vPars and Integrity VM V6.3 Administrator Guide

# hpvmdevmgmt -m gdev:/var/opt/hpvm/ISO-images/hpux/:attr:SHARE=YES
# hpvmmodify -P host1 -a dvd:avio_stor::null:/var/opt/hpvm/ISO-images/hpux/
# hpvmmodify -P host2 -a dvd:svio_stor::null:/var/opt/hpvm/ISO-images/hpux/
Virtual DVDs and virtual network devices can be shared. DVDs are not shareable unless you specify
otherwise. Sharing of virtual devices or hardware backing stores must be carefully planned in
order to prevent the data getting corrupted.
To restrict the vswitch named myswitch so that it is no longer shareable, enter the following
command:
# hpvmdevmgmt -m gdev:myswitch:attr:SHARE=NO
This command restricts the vswitch called myswitch to be used by one guest only.
13.19.2.2 Replacing devices
If a backing storage device malfunctions, replace it by using the hpvmdevmgmt -n option. The
-n option works for only guest devices. It replaces the existing device entry with the new device
entry while keeping all the current guest dependents. Thus, each guest dependent is modified to
replace the old device with the new one. If the device being replaced is a pNIC, use the hpvmnet
command to halt and remove the current vswitches using that pNIC, and recreate the same named
vswitches using the new pNIC. This method allows guests to use the new pNIC through the old
vswitch names without modifying the guests.
13.19.2.3 Deleting devices
A device entry can be deleted only if it has no dependents. If a device has dependents, those
dependents must be removed before you delete the device. The hpvmmodify command that
removes a device removes that guest as a dependent on that device.
If the guest cannot be modified, you can use the hpvmdevmgmt -d command to delete a dependent
from a device. However, this command does not modify the guest that is dependent on the device.
Use this method only if you can use the hpvmmodify command on the guests that are dependent
on the device. The following example shows how to remove a guest as a dependent:
# hpvmdevmgmt -d gdev:entry_name:depend:depend_name
13.19.2.4 Restricting VSP devices
You must set up restricted devices to ensure that no guest uses devices that are reserved for use by
the VSP, including the storage devices that the VSP uses to boot and run. This can also include a
network LAN device to which the host requires exclusive access.
If a volume manager is used for host-specific file systems, then the restricted devices must include
both, the volume devices and the underlying special device files to protect both from guest access.
For more information about storage devices, see Section 5.3 (page 57).
You can also allow guests to access certain files while restricting them from accessing the device
files that contain those files. You can add or delete restricted device entries to the Integrity VM
device database.
For example, to add /dev/rdisk/disk0 as a restricted device, enter the following command:
# hpvmdevmgmt -a rdev:/dev/rdisk/disk0
To delete the restricted device /dev/rdisk/disk0, enter the following command:
# hpvmdevmgmt -d rdev:/dev/rdisk/disk0
To add network lan0 as a restricted device, enter the following command:
# hpvmdevmgmt -a rdev:lan0
If the configuration file of the guest contains restricted devices, the guest does not start.
13.19 Managing the device database 251