Alexandre Bezroutchko
|
3898b69ac1
|
Merge branch 'master' of git://git.qubes-os.org/marmarek/core
|
2012-11-08 10:49:39 +01:00 |
|
Marek Marczykowski
|
272b6b7e1d
|
dom0/usb: "port" xenstore entry isn't encoded, so don't try to decode it
|
2012-11-08 03:57:04 +01:00 |
|
Marek Marczykowski
|
14686a0243
|
dom0/usb: imporove qvm-usb warning message
|
2012-11-08 03:52:41 +01:00 |
|
Alexandre Bezroutchko
|
42ae001b74
|
dom0/usb: cosmetic changes to warning messages displayed by qvm-usb tool
|
2012-11-08 02:59:55 +01:00 |
|
Alexandre Bezroutchko
|
f2b633756e
|
dom0+vm/usb: fixed a bug introduced in eb193fc870
|
2012-11-08 02:42:09 +01:00 |
|
Alexandre Bezroutchko
|
3f555e75a8
|
Merge branch 'pvusb2' of github.com:grwl/qubes-core into pvusb2
|
2012-11-08 01:32:04 +01:00 |
|
Alexandre Bezroutchko
|
5ad7e9622c
|
Merge branch 'master' of git://git.qubes-os.org/marmarek/core into pvusb2
|
2012-11-08 01:31:07 +01:00 |
|
Marek Marczykowski
|
6219ecd01c
|
dom0/core: increase default SWIOTLB size
Needed by some network devices like Realtek RTL8111DL.
|
2012-11-07 23:57:05 +01:00 |
|
Marek Marczykowski
|
62732d78b2
|
dom0/usb: added Big Fat Warning to qvm-usb tool (#664)
|
2012-11-07 22:02:28 +01:00 |
|
Alexandre Bezroutchko
|
eb193fc870
|
dom0+vm/usb: sanitize data (USB device names) read from xenstore before use
|
2012-11-07 01:33:19 +01:00 |
|
Alexandre Bezroutchko
|
350ff3aaa1
|
dom0+vm/usb: encode/decode dots in USB device names when writing/reading xenstore
|
2012-11-07 01:14:12 +01:00 |
|
Alexandre Bezroutchko
|
14a1f9f67f
|
dom0+vm/usb: cosmetic - added comments to usb_find_unused_frontend()
|
2012-11-07 00:41:13 +01:00 |
|
Alexandre Bezroutchko
|
900e5327d2
|
dom0+vm/usb: improve error reporting in usb_find_unused_frontend()
|
2012-11-07 00:37:50 +01:00 |
|
Alexandre Bezroutchko
|
aeac4d20dc
|
dom0+vm/usb: bugfix in usb_find_unused_frontend()
|
2012-11-07 00:24:05 +01:00 |
|
Alexandre Bezroutchko
|
bee83bea0d
|
dom0/qvm-create: fixed couple typos
|
2012-10-28 03:49:53 +01:00 |
|
Alexandre Bezroutchko
|
073ce8a683
|
dom0+vm/usb: completed support for usb versions, fixed a bug
|
2012-10-26 23:30:55 +02:00 |
|
Alexandre Bezroutchko
|
14fff45ddd
|
dom0+vm/usb: add USB version to device list displayed by qvm-usb -l'
|
2012-10-26 23:09:36 +02:00 |
|
Alexandre Bezroutchko
|
d37efe031e
|
dom0+vm/usb: added USB vesrion support to usb_setup() and usb_find_unused_frontend()
|
2012-10-24 22:30:42 +02:00 |
|
Marek Marczykowski
|
7fec0fd6f3
|
dom0/updates: include pkg groups metadata from Fedora 13
This will allow calls like "qubes-dom0-update @XFCE"
|
2012-10-23 05:47:09 +02:00 |
|
Marek Marczykowski
|
4b44a149c1
|
dom+vm/qvm-usb: improve handling devices like "2-1.4"
xenstore doesn't allow '.' in key name, so translate it to '_'
|
2012-10-23 05:42:39 +02:00 |
|
Alexandre Bezroutchko
|
9fe165ebb4
|
dom0/qvm-usb: Automatically create XS directory for USB devices
|
2012-10-21 14:59:40 +02:00 |
|
Alexandre Bezroutchko
|
743d93d8f0
|
dom0/qvm-usb: bugfix
|
2012-10-21 14:59:39 +02:00 |
|
Alexandre Bezroutchko
|
9d77b3dd3c
|
dom0/qvm-usb: detach operation appears to work
|
2012-10-21 14:59:39 +02:00 |
|
Alexandre Bezroutchko
|
89b78d9426
|
dom0/qvm-usb: changed output format for qvm-usb -l
|
2012-10-21 14:59:39 +02:00 |
|
Alexandre Bezroutchko
|
b72db5cad8
|
dvp/qvm-usb: not going to implement explicit specification of USB frontend device/port
|
2012-10-21 14:59:39 +02:00 |
|
Alexandre Bezroutchko
|
4bb1182228
|
dom0/qvm-usb: implemented automatic frontend/backend initialization on attach
|
2012-10-21 14:59:39 +02:00 |
|
Alexandre Bezroutchko
|
a85d34a8b3
|
dom0/qvm-usb: partly implement usb_find_unused_frontend()
|
2012-10-21 14:59:39 +02:00 |
|
Alexandre Bezroutchko
|
d613d6a04d
|
dom0/qvm-usb: attach works again for dom0 backend
|
2012-10-21 14:59:38 +02:00 |
|
Alexandre Bezroutchko
|
db4d49b19c
|
dom0+vm/qvm-usb: intermediate
|
2012-10-21 14:59:38 +02:00 |
|
Alexandre Bezroutchko
|
72fba0ac1b
|
dom0/qvm-usb: added usb_setup()
|
2012-10-21 14:59:37 +02:00 |
|
Alexandre Bezroutchko
|
17263c96b8
|
dom0/qvm-usb: fixed missing input validation
|
2012-10-21 14:59:37 +02:00 |
|
Alexandre Bezroutchko
|
b9b2077062
|
dom0/qvm-usb: display proper name of vm a device is attached to
|
2012-10-21 14:59:37 +02:00 |
|
Alexandre Bezroutchko
|
c8cb9d00ce
|
dom0/qvm-usb: use xs transaction
|
2012-10-21 14:59:36 +02:00 |
|
Alexandre Bezroutchko
|
0ef88be16d
|
dom0/qvm-usb: added description to usb_list() and usb_check_attached() methods
|
2012-10-21 14:59:36 +02:00 |
|
Alexandre Bezroutchko
|
caf27cb936
|
dom0+vm/qvm-usb: use transaction in usb_check_attached()
|
2012-10-21 14:59:36 +02:00 |
|
Alexandre Bezroutchko
|
81ca750403
|
dom0+vm/qvm-usb: cosmetic: removed debugging code, adjusted fixmes
|
2012-10-21 14:59:36 +02:00 |
|
Alexandre Bezroutchko
|
b962debfad
|
dom0/qvm-usb: implemented usb_check_attached method, now "qvm-usb -l" indicate attachments
|
2012-10-21 14:59:36 +02:00 |
|
Alexandre Bezroutchko
|
988d37fcb2
|
dom0/qvm-usb: qvm-usb is hopefully complete, stubs for all remaining usb_* methods implemented
|
2012-10-21 14:59:36 +02:00 |
|
Alexandre Bezroutchko
|
95b93a5082
|
dom0/qvm-usb: enabled -f option to qvm-usb (and cosmetic changes)
|
2012-10-21 14:59:35 +02:00 |
|
Alexandre Bezroutchko
|
fc74c6a85b
|
dom0/qvm-usb: first implementation of qvm-usb
|
2012-10-21 14:59:35 +02:00 |
|
Bruce A Downs
|
a504600c20
|
dom0/core: Added the pretty print of qubes.xml
* Replaced xml.etree.ElementTree with lxml.etree
* Added argument to tree.write(file, encoding="UTF-8", pretty_print=True)
|
2012-10-19 02:21:41 +02:00 |
|
Bruce A Downs
|
28b4f82b0a
|
dom0/core: Added call to lock.remove_pidfile() on successful exit
* Adding remove_pidfile on exit
* prevents the incorrect 'crash' message on startup
* Added proper call to main
|
2012-10-19 02:21:41 +02:00 |
|
Alexandre Bezroutchko
|
d6432a16c4
|
dom0/qvm-tools: clean resolv.conf when networking goes down
|
2012-10-19 02:21:03 +02:00 |
|
Marek Marczykowski
|
3a875edf58
|
dom0/core: fix qubes-dom0-network-via-netvm (#660)
IP 10.137.0.1 was already used by netvm, so change dom0 IP to 10.137.0.2.
|
2012-10-19 02:07:35 +02:00 |
|
Marek Marczykowski
|
3e90174910
|
Merge branch 'hvm-for-master'
Conflicts:
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-sync-clock
version_dom0
vm-systemd/qubes-sysinit.sh
|
2012-10-17 21:41:03 +02:00 |
|
Marek Marczykowski
|
d010906eb1
|
Merge remote-tracking branch 'abb/qvm_block-bugfix'
|
2012-10-16 00:59:36 +02:00 |
|
Alexandre Bezroutchko
|
ca4367821e
|
Improve handling of command line parameters, don't silently ignore unexpected arguments.
This is to avoid following behavior:
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
[abb@dom0 qubes-core]$ qvm-block -a qdvp dom0:sdb
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB (attached to 'qdvp' as 'xvdi')
[abb@dom0 qubes-core]$ qvm-block -d qdvp BLAHBLAH
^^^^^^^^^^^^^
>>> The last parameter is silently ignored and all devices get detached
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
|
2012-10-15 11:40:08 +02:00 |
|
Marek Marczykowski
|
02601049ca
|
dom0/qmemman: do not fail when domain name not available
This can be the case when domain just dissapeared (destroy), but qmemman didn't
processed xenstore watch trigger.
|
2012-10-15 01:58:07 +02:00 |
|
Bruce A Downs
|
6304155990
|
dom0/core: minor spell check fixes
* happend
* avilable
* skiping
|
2012-10-09 01:23:54 +02:00 |
|
Bruce A Downs
|
05f7bfc9c1
|
dom0/core: Code cleanup of qubesutils.py
* Took out unreferenced restore_vm_file function
* removed unused imports
* renamed interpreter from python2 to python
|
2012-10-09 01:23:45 +02:00 |
|