gitee.com/leisunstar/runtime@v0.0.0-20200521203717-5cef3e7b53f9/cli/config/configuration-acrn.toml.in (about) 1 # Copyright (c) 2017-2019 Intel Corporation 2 # 3 # SPDX-License-Identifier: Apache-2.0 4 # 5 6 # XXX: WARNING: this file is auto-generated. 7 # XXX: 8 # XXX: Source file: "@CONFIG_ACRN_IN@" 9 # XXX: Project: 10 # XXX: Name: @PROJECT_NAME@ 11 # XXX: Type: @PROJECT_TYPE@ 12 13 [hypervisor.acrn] 14 path = "@ACRNPATH@" 15 ctlpath = "@ACRNCTLPATH@" 16 kernel = "@KERNELPATH_ACRN@" 17 image = "@IMAGEPATH@" 18 19 # Optional space-separated list of options to pass to the guest kernel. 20 # For example, use `kernel_params = "vsyscall=emulate"` if you are having 21 # trouble running pre-2.15 glibc. 22 # 23 # WARNING: - any parameter specified here will take priority over the default 24 # parameter value of the same name used to start the virtual machine. 25 # Do not set values here unless you understand the impact of doing so as you 26 # may stop the virtual machine from booting. 27 # To see the list of default parameters, enable hypervisor debug, create a 28 # container and look for 'default-kernel-parameters' log entries. 29 kernel_params = "@KERNELPARAMS@" 30 31 # Path to the firmware. 32 # If you want that acrn uses the default firmware leave this option empty 33 firmware = "@FIRMWAREPATH@" 34 35 # Default maximum number of vCPUs per SB/VM: 36 # unspecified or == 0 --> will be set to the actual number of physical cores or to the maximum number 37 # of vCPUs supported by KVM if that number is exceeded 38 # > 0 <= number of physical cores --> will be set to the specified number 39 # > number of physical cores --> will be set to the actual number of physical cores or to the maximum number 40 # of vCPUs supported by KVM if that number is exceeded 41 # WARNING: Depending of the architecture, the maximum number of vCPUs supported by KVM is used when 42 # the actual number of physical cores is greater than it. 43 # WARNING: Be aware that this value impacts the virtual machine's memory footprint and CPU 44 # the hotplug functionality. For example, `default_maxvcpus = 240` specifies that until 240 vCPUs 45 # can be added to a SB/VM, but the memory footprint will be big. Another example, with 46 # `default_maxvcpus = 8` the memory footprint will be small, but 8 will be the maximum number of 47 # vCPUs supported by the SB/VM. In general, we recommend that you do not edit this variable, 48 # unless you know what are you doing. 49 default_maxvcpus = @DEFMAXVCPUS_ACRN@ 50 51 # Bridges can be used to hot plug devices. 52 # Limitations: 53 # * Currently only pci bridges are supported 54 # * Until 30 devices per bridge can be hot plugged. 55 # * Until 5 PCI bridges can be cold plugged per VM. 56 # This limitation could be a bug in the kernel 57 # Default number of bridges per SB/VM: 58 # unspecified or 0 --> will be set to @DEFBRIDGES@ 59 # > 1 <= 5 --> will be set to the specified number 60 # > 5 --> will be set to 5 61 default_bridges = @DEFBRIDGES@ 62 63 # Default memory size in MiB for SB/VM. 64 # If unspecified then it will be set @DEFMEMSZ@ MiB. 65 default_memory = @DEFMEMSZ@ 66 67 # Block storage driver to be used for the hypervisor in case the container 68 # rootfs is backed by a block device. ACRN only supports virtio-blk. 69 block_device_driver = "@DEFBLOCKSTORAGEDRIVER_ACRN@" 70 71 # This option changes the default hypervisor and kernel parameters 72 # to enable debug output where available. This extra output is added 73 # to the proxy logs, but only when proxy debug is also enabled. 74 # 75 # Default false 76 #enable_debug = true 77 78 # Disable the customizations done in the runtime when it detects 79 # that it is running on top a VMM. This will result in the runtime 80 # behaving as it would when running on bare metal. 81 # 82 #disable_nesting_checks = true 83 84 # If host doesn't support vhost_net, set to true. Thus we won't create vhost fds for nics. 85 # Default false 86 #disable_vhost_net = true 87 88 # Path to OCI hook binaries in the *guest rootfs*. 89 # This does not affect host-side hooks which must instead be added to 90 # the OCI spec passed to the runtime. 91 # 92 # You can create a rootfs with hooks by customizing the osbuilder scripts: 93 # https://github.com/kata-containers/osbuilder 94 # 95 # Hooks must be stored in a subdirectory of guest_hook_path according to their 96 # hook type, i.e. "guest_hook_path/{prestart,postart,poststop}". 97 # The agent will scan these directories for executable files and add them, in 98 # lexicographical order, to the lifecycle of the guest container. 99 # Hooks are executed in the runtime namespace of the guest. See the official documentation: 100 # https://github.com/opencontainers/runtime-spec/blob/v1.0.1/config.md#posix-platform-hooks 101 # Warnings will be logged if any error is encountered will scanning for hooks, 102 # but it will not abort container execution. 103 #guest_hook_path = "/usr/share/oci/hooks" 104 105 [proxy.@PROJECT_TYPE@] 106 path = "@PROXYPATH@" 107 108 # If enabled, proxy messages will be sent to the system log 109 # (default: disabled) 110 #enable_debug = true 111 112 [shim.@PROJECT_TYPE@] 113 path = "@SHIMPATH@" 114 115 # If enabled, shim messages will be sent to the system log 116 # (default: disabled) 117 #enable_debug = true 118 119 # If enabled, the shim will create opentracing.io traces and spans. 120 # (See https://www.jaegertracing.io/docs/getting-started). 121 # 122 # Note: By default, the shim runs in a separate network namespace. Therefore, 123 # to allow it to send trace details to the Jaeger agent running on the host, 124 # it is necessary to set 'disable_new_netns=true' so that it runs in the host 125 # network namespace. 126 # 127 # (default: disabled) 128 #enable_tracing = true 129 130 [agent.@PROJECT_TYPE@] 131 # If enabled, make the agent display debug-level messages. 132 # (default: disabled) 133 #enable_debug = true 134 135 # Enable agent tracing. 136 # 137 # If enabled, the default trace mode is "dynamic" and the 138 # default trace type is "isolated". The trace mode and type are set 139 # explicity with the `trace_type=` and `trace_mode=` options. 140 # 141 # Notes: 142 # 143 # - Tracing is ONLY enabled when `enable_tracing` is set: explicitly 144 # setting `trace_mode=` and/or `trace_type=` without setting `enable_tracing` 145 # will NOT activate agent tracing. 146 # 147 # - See https://github.com/kata-containers/agent/blob/master/TRACING.md for 148 # full details. 149 # 150 # (default: disabled) 151 #enable_tracing = true 152 # 153 #trace_mode = "dynamic" 154 #trace_type = "isolated" 155 156 [netmon] 157 # If enabled, the network monitoring process gets started when the 158 # sandbox is created. This allows for the detection of some additional 159 # network being added to the existing network namespace, after the 160 # sandbox has been created. 161 # (default: disabled) 162 #enable_netmon = true 163 164 # Specify the path to the netmon binary. 165 path = "@NETMONPATH@" 166 167 # If enabled, netmon messages will be sent to the system log 168 # (default: disabled) 169 #enable_debug = true 170 171 [runtime] 172 # If enabled, the runtime will log additional debug messages to the 173 # system log 174 # (default: disabled) 175 #enable_debug = true 176 # 177 # Internetworking model 178 # Determines how the VM should be connected to the 179 # the container network interface 180 # Options: 181 # 182 # - bridged (Deprecated) 183 # Uses a linux bridge to interconnect the container interface to 184 # the VM. Works for most cases except macvlan and ipvlan. 185 # ***NOTE: This feature has been deprecated with plans to remove this 186 # feature in the future. Please use other network models listed below. 187 # 188 # 189 # - macvtap 190 # Used when the Container network interface can be bridged using 191 # macvtap. 192 # 193 # - none 194 # Used when customize network. Only creates a tap device. No veth pair. 195 # 196 # - tcfilter 197 # Uses tc filter rules to redirect traffic from the network interface 198 # provided by plugin to a tap interface connected to the VM. 199 # 200 internetworking_model="@DEFNETWORKMODEL_ACRN@" 201 202 # disable guest seccomp 203 # Determines whether container seccomp profiles are passed to the virtual 204 # machine and applied by the kata agent. If set to true, seccomp is not applied 205 # within the guest 206 # (default: true) 207 disable_guest_seccomp=@DEFDISABLEGUESTSECCOMP@ 208 209 # If enabled, the runtime will create opentracing.io traces and spans. 210 # (See https://www.jaegertracing.io/docs/getting-started). 211 # (default: disabled) 212 #enable_tracing = true 213 214 # If enabled, the runtime will not create a network namespace for shim and hypervisor processes. 215 # This option may have some potential impacts to your host. It should only be used when you know what you're doing. 216 # `disable_new_netns` conflicts with `enable_netmon` 217 # `disable_new_netns` conflicts with `internetworking_model=bridged` and `internetworking_model=macvtap`. It works only 218 # with `internetworking_model=none`. The tap device will be in the host network namespace and can connect to a bridge 219 # (like OVS) directly. 220 # If you are using docker, `disable_new_netns` only works with `docker run --net=none` 221 # (default: false) 222 #disable_new_netns = true 223 224 # if enabled, the runtime will add all the kata processes inside one dedicated cgroup. 225 # The container cgroups in the host are not created, just one single cgroup per sandbox. 226 # The runtime caller is free to restrict or collect cgroup stats of the overall Kata sandbox. 227 # The sandbox cgroup path is the parent cgroup of a container with the PodSandbox annotation. 228 # The sandbox cgroup is constrained if there is no container type annotation. 229 # See: https://godoc.org/github.com/kata-containers/runtime/virtcontainers#ContainerType 230 sandbox_cgroup_only=@DEFSANDBOXCGROUPONLY@ 231 232 # Enabled experimental feature list, format: ["a", "b"]. 233 # Experimental features are features not stable enough for production, 234 # they may break compatibility, and are prepared for a big version bump. 235 # Supported experimental features: 236 # (default: []) 237 experimental=@DEFAULTEXPFEATURES@