It doesn't seem to be implemented in libvirt's XML.
You can still try and hack it though:
It will mark this domain "tainted" in libvirt's log.
/--Regards, Aleksei/
*From:*
I'm running libvirt in user session and libvirt creates VARS part of
OVMF in ~/.config/libvirt/qemu/nvram/
Check your xml, there should be lines like this:
hvm
/UEFI_OVMF/OVMF_CODE.fd
/home/username/.config/libvirt/qemu/nvram/vm_VARS.fd
/--Regards, Al
apparently not going so well with emulating real hardware.
/--Regards, Aleksei/
*From:* Manuel Ullmann
*Sent:* Tuesday, December 20, 2016 5:41AM
*To:* Libvirt-users
*Subject:* [libvirt-users] Audio in Windows 10 VM is
Have you considered PCI passthrough? Sounds like you want the VM to
control WiFi interface completely.
/--Regards, Aleksei/
*From:* Michael Ströder
*Sent:* Monday, November 07, 2016 11:45AM
*To:* Libvirt-users
*Subject
n.html#elementsTime) and disable ntp in
VM's OS.
/--Regards, Aleksei/
*From:* Michael Ströder
*Sent:* Thursday, October 20, 2016 11:48AM
*To:* Libvirt-users
*Subject:* [libvirt-users] security BPC
HI!
Disclaimer:
I&
gs
for that attempted boot in the guest either - apparently it doesn't get
to the point when Windows starts logging.
Attaching VM xml definition (with HyperV features enabled).
--
/--Regards, Aleksei/
win7
-X-X--X
win7
4194304
4194304
2