Scroll to navigation

xen-pv-channel(7) Xen xen-pv-channel(7)


xen-pv-channel - Xen PV Channels


A channel is a low-bandwidth private byte stream similar to a serial link. Typical uses of channels are

to provide initial configuration information to a VM on boot (example use: CloudStack's cloud-early-config service)
to signal/query an in-guest agent (example use: oVirt's guest agent)

Channels are similar to virtio-serial devices and emulated serial links. Channels are intended to be used in the implementation of libvirt s when running on Xen.

Note: if an application requires a high-bandwidth link then it should use vchan instead.

How to use channels: an example

Consider a cloud deployment where VMs are cloned from pre-made templates, and customised on first boot by an in-guest agent which sets the IP address, hostname, ssh keys etc. To install the system the cloud administrator would first:

Install a guest as normal (no channel configuration necessary)
Install the in-guest agent specific to the cloud software. This will prepare the guest to communicate over the channel, and also prepare the guest to be cloned safely (sometimes known as "sysprepping")
Shutdown the guest
Register the guest as a template with the cloud orchestration software
Install the cloud orchestration agent in dom0

At runtime, when a cloud tenant requests that a VM is created from the template, the sequence of events would be: (assuming a Linux domU)

A VM is "cloned" from the template
A unique Unix domain socket path in dom0 is allocated (e.g. /my/cloud/software/talk/to/domain/)
Domain configuration is created for the VM, listing the channel name expected by the in-guest agent. In xl syntax this would be:

channel = [ "connection=socket,, path = /my/cloud/software/talk/to/domain/" ]

The VM is started
In dom0 the cloud orchestration agent connects to the Unix domain socket, writes a handshake message and waits for a reply
Assuming the guest kernel has CONFIG_HVC_XEN_FRONTEND set then the console driver will generate a hotplug event
A udev rule is activated by the hotplug event.

The udev rule would look something like:

SUBSYSTEM=="xen", DEVPATH=="/devices/console-[0-9]", RUN+="xen-console-setup"

where the "xen-console-setup" script would read the channel name and make a symlink in /dev/xen-channel/ pointing to /dev/hvcN. N is the same number as the number in "/devices/console-[0-9]". In other words, "/devices/console-2" maps to /dev/hvc2.

The in-guest agent uses inotify to see the creation of the /dev/xen-channel symlink and opens the device.
The in-guest agent completes the handshake with the dom0 agent
The dom0 agent transmits the unique VM configuration: hostname, IP address, ssh keys etc etc
The in-guest agent receives the configuration and applies it.

Using channels avoids having to use a temporary disk device or network connection.

Design recommendations and pitfalls

It's necessary to install channel-specific software (an "agent") into the guest before you can use a channel. By default a channel will appear as a device which could be mistaken for a serial port or regular console. It is known that some software will proactively seek out serial ports and issue AT commands at them; make sure such software is disabled!

Since channels are identified by names, application authors must ensure their channel names are unique to avoid clashes. We recommend that channel names include parts unique to the application such as a domain names. To assist prevent clashes we recommend authors add their names to our global channel registry at the end of this document.


Hotplug and unplug of channels is not currently implemented.

Channel name registry

It is important that channel names are globally unique. To help ensure that no-one's name clashes with yours, please add yours to this list.

    N: Name
    C: Contact
    D: Short description of use, possibly including a URL to your software or API
    N: org.xenproject.guest.clipboard.0.1
    C: David Scott <>
    D: Share clipboard data via an in-guest agent. See:
2024-06-24 4.18.2_06-1