Alexandre Bezroutchko
d6432a16c4
dom0/qvm-tools: clean resolv.conf when networking goes down
2012-10-19 02:21:03 +02:00
Marek Marczykowski
3a875edf58
dom0/core: fix qubes-dom0-network-via-netvm ( #660 )
...
IP 10.137.0.1 was already used by netvm, so change dom0 IP to 10.137.0.2.
2012-10-19 02:07:35 +02:00
Marek Marczykowski
3e90174910
Merge branch 'hvm-for-master'
...
Conflicts:
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-sync-clock
version_dom0
vm-systemd/qubes-sysinit.sh
2012-10-17 21:41:03 +02:00
Marek Marczykowski
d010906eb1
Merge remote-tracking branch 'abb/qvm_block-bugfix'
2012-10-16 00:59:36 +02:00
Alexandre Bezroutchko
ca4367821e
Improve handling of command line parameters, don't silently ignore unexpected arguments.
...
This is to avoid following behavior:
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
[abb@dom0 qubes-core]$ qvm-block -a qdvp dom0:sdb
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB (attached to 'qdvp' as 'xvdi')
[abb@dom0 qubes-core]$ qvm-block -d qdvp BLAHBLAH
^^^^^^^^^^^^^
>>> The last parameter is silently ignored and all devices get detached
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
2012-10-15 11:40:08 +02:00
Marek Marczykowski
02601049ca
dom0/qmemman: do not fail when domain name not available
...
This can be the case when domain just dissapeared (destroy), but qmemman didn't
processed xenstore watch trigger.
2012-10-15 01:58:07 +02:00
Bruce A Downs
6304155990
dom0/core: minor spell check fixes
...
* happend
* avilable
* skiping
2012-10-09 01:23:54 +02:00
Bruce A Downs
05f7bfc9c1
dom0/core: Code cleanup of qubesutils.py
...
* Took out unreferenced restore_vm_file function
* removed unused imports
* renamed interpreter from python2 to python
2012-10-09 01:23:45 +02:00
Marek Marczykowski
081cfab559
dom0/core: do not leak xs transaction and use it in all xs calls
2012-10-08 01:26:07 +02:00
Alexandre Bezroutchko
f4ef1adcdd
dom0/qvm-core: start XS transaction before getting the list of domains
2012-10-08 01:23:52 +02:00
Alexandre Bezroutchko
3c53f049a3
dom0/qvm-block: cosmetic
2012-10-08 01:23:42 +02:00
Alexandre Bezroutchko
abfe99756f
start XS transaction before getting the list of domains
2012-10-08 00:48:20 +02:00
Alexandre Bezroutchko
caf3ed1ae4
cosmetic
2012-10-08 00:46:30 +02:00
Marek Marczykowski
d03bab3db2
Merge branch 'master-for-hvm' into hvm
...
Conflicts:
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-sync-clock
2012-10-04 05:45:41 +02:00
Marek Marczykowski
5e696298cf
dom0/core: fix icon handling on VM clone
2012-10-04 05:44:20 +02:00
Marek Marczykowski
d5c74f69ee
dom0/core: recreate appmenus after rename for any VM, not only AppVM ( #659 )
2012-10-04 05:44:20 +02:00
Marek Marczykowski
9a2f1dfebe
dom0/core: include net/proxy VM default appmenus list in cloned template
2012-10-04 05:44:19 +02:00
Olivier Médoc
69354475bf
dom0/qvm-sync-clock: use timestamp in RFC2822 format to avoid locale issues
2012-10-04 05:44:19 +02:00
Marek Marczykowski
397f2912f0
dom0/core: allow '_' in VM name
2012-10-04 05:44:18 +02:00
Marek Marczykowski
92747285c7
dom0/qvm-block: rework device name parsing to better support c0p1 name style
2012-10-04 05:44:18 +02:00
Marek Marczykowski
19a60eff55
dom0/core: fix icon handling on VM clone
2012-10-03 22:28:49 +02:00
Marek Marczykowski
1b25d77504
dom0/core: recreate appmenus after rename for any VM, not only AppVM ( #659 )
2012-10-03 21:36:52 +02:00
Marek Marczykowski
45639096fa
dom0/core: include net/proxy VM default appmenus list in cloned template
2012-10-03 21:12:18 +02:00
Olivier Médoc
9a90f499bc
dom0/qvm-sync-clock: use timestamp in RFC2822 format to avoid locale issues
2012-10-03 14:55:05 +02:00
Marek Marczykowski
c1214bfef9
dom0/core: VM property for qrexec startup timeout ( #27 pro)
2012-09-25 03:26:44 +02:00
Marek Marczykowski
96199058d1
dom0/core: wait for user session on HVM start ( #31 pro)
2012-09-25 00:23:35 +02:00
Marek Marczykowski
f271ad8463
dom0/core: fix return value of QubesHVM.run()
2012-09-25 00:23:20 +02:00
Marek Marczykowski
9db9d8b6c2
dom0/core: allow passing stdin to QubesVM.run()
2012-09-25 00:22:31 +02:00
Marek Marczykowski
3ecc031603
dom0/core: allow '_' in VM name
2012-09-14 12:58:00 +02:00
Marek Marczykowski
2444603ef5
dom0/core: allow '_' in VM name
2012-09-14 12:57:25 +02:00
Marek Marczykowski
900a21db72
dom0/init.d: hide some missleading error
2012-09-04 19:24:01 +02:00
Marek Marczykowski
b7eaf9a30d
dom0/core: do not use hardcoded "user" in qvm-sync-clock
2012-08-31 00:53:50 +02:00
Marek Marczykowski
46fd664ba3
dom0/qrexec: implement default user handling in qrexec_daemon
...
This will simplify using qrexec from utilities which doen't load qubes.xml
normally (like qrexec_policy, gui daemon).
2012-08-30 17:44:52 +02:00
Marek Marczykowski
3b320878ac
dom0/qvm-block: rework device name parsing to better support c0p1 name style
2012-08-26 14:42:32 +02:00
Marek Marczykowski
6305e6cbe1
dom0/qvm-block: rework device name parsing to better support c0p1 name style
2012-08-26 14:41:35 +02:00
Marek Marczykowski
fefb6d9cff
vm+dom0/filecopy-unpacker: send errors to qfile-agent istead of local message ( #239 )
...
Because unpacker no longer require GUI access, there is no need for separate
process for error reporting. Which greatly simplify the code.
2012-08-25 02:09:45 +02:00
Marek Marczykowski
c0455ac641
Merge branch 'master' into hvm
...
Conflicts:
dom0/qvm-tools/qvm-create
version_dom0
2012-08-23 11:11:59 +02:00
Marek Marczykowski
1cd3ef3456
dom0/qvm-tools: catch exceptions while settting VM name ( #656 )
2012-08-23 04:02:50 +02:00
Marek Marczykowski
536eb00b9c
dom0/core: verify VM name for not-allowed characters ( #656 )
2012-08-23 04:01:55 +02:00
Marek Marczykowski
b7f5c6ac0b
dom0/qvm-tools: catch exceptions while settting VM name ( #656 )
2012-08-23 03:48:03 +02:00
Marek Marczykowski
85565af560
dom0/core: verify VM name for not-allowed characters ( #656 )
2012-08-23 03:45:06 +02:00
Marek Marczykowski
cc23d3cb3d
dom0/qubes_rpc: mark untrusted variables ( #654 )
2012-08-16 16:56:55 +02:00
Marek Marczykowski
26fca20d45
dom0/qmemman: fix reporting to qubes-manager
...
When VM is shutting down, xenstore entries (especially 'name') can be deleted
before qmemman remove VM from its list. So check if name is defined before
reporting to qubes-manager.
2012-08-16 16:56:55 +02:00
Marek Marczykowski
9b3a77bc1d
dom0: move RPC services to separate directory ( #654 )
...
This makes more clear which code have contact with untrusted data from VM.
2012-08-16 16:56:16 +02:00
Marek Marczykowski
a67bf1f1c0
Merge branch 'master' into hvm
2012-08-06 15:00:02 +02:00
Marek Marczykowski
4f56cf420a
dom0/core: add missing "cleanup_dispvms" file ( #648 )
2012-08-06 14:57:30 +02:00
Marek Marczykowski
e1404a2d4f
dom0/qvm-run: do not break --all when run in one VM failed
2012-08-04 04:15:33 +02:00
Marek Marczykowski
fa17c541af
dom0: cleanup dead DispVMs at system startup ( #648 )
2012-08-04 00:57:34 +02:00
Marek Marczykowski
7677854fd2
dom0/core: make verbose parameter of create_appmenus optional
2012-08-04 00:37:14 +02:00
Marek Marczykowski
847fe81dcd
dom0/qvm-run: do not break --all when run in one VM failed
2012-08-01 01:01:37 +02:00
Marek Marczykowski
e6c8bf81fd
Merge branch 'master' into hvm
...
Conflicts:
version_dom0
2012-08-01 00:55:05 +02:00
Marek Marczykowski
a680976f1e
dom0/updates: show errors from qubes-receive-updates
...
Especially when signature verification failed, show message about it, not
enigmatic "Could not open/read
file:///var/lib/qubes/updates/repodata/repomd.xml"
2012-07-30 23:16:05 +02:00
Marek Marczykowski
4ffe3e0391
dom0/qvm-block: fix error handler
2012-07-30 23:16:05 +02:00
Marek Marczykowski
c2d4b0de62
dom0/updates: typo fix in qubes-manager statfile handling
2012-07-30 23:16:05 +02:00
Marek Marczykowski
be389bddb9
dom0/core: allow custom kernel for non-updateable VMs
2012-07-28 01:40:24 +02:00
Marek Marczykowski
500baf3a60
dom0/core: allow custom kernel for non-updateable VMs
2012-07-28 01:39:59 +02:00
Marek Marczykowski
18c9af90c7
dom0/core: fix qubes-session wait code
2012-07-28 00:55:12 +02:00
Marek Marczykowski
4b9cc1e405
dom0/core: fix qubes-session wait code
2012-07-28 00:51:19 +02:00
Marek Marczykowski
d1b827e1bd
Merge branch 'master' into hvm
...
Conflicts:
dom0/init.d/qubes_core
rpm_spec/core-dom0.spec
version_dom0
2012-07-25 02:52:00 +02:00
Marek Marczykowski
ad7da49e74
dom0/core: remove ugly hack in network-reconnect code ( #637 )
2012-07-22 01:33:08 +02:00
Marek Marczykowski
6da61af323
dom0/backup-restore: fix netvm field in summary
2012-07-21 00:12:18 +02:00
Marek Marczykowski
a97458ad08
dom0/core: do not reset firewall on clone_attrs
2012-07-20 22:55:28 +02:00
Marek Marczykowski
dc95349145
dom0/backup-restore: fix verification of VMs in backup
2012-07-20 22:55:28 +02:00
Marek Marczykowski
e7477cfaf2
dom0/core: minor comments improvements
2012-07-20 22:55:28 +02:00
Marek Marczykowski
dbbb168b66
dom0/core: improve diagnostics of qmemman errors
2012-07-20 22:55:17 +02:00
Marek Marczykowski
130873071f
dom0/core: do not reset firewall on clone_attrs
2012-07-20 22:54:53 +02:00
Marek Marczykowski
7f9d77b27e
dom0/backup-restore: fix verification of VMs in backup
2012-07-20 22:54:12 +02:00
Marek Marczykowski
ea02bee444
dom0/core: minor comments improvements
2012-07-20 22:53:14 +02:00
Marek Marczykowski
abefe78197
dom0/core: improve diagnostics of qmemman errors
2012-07-20 16:49:19 +02:00
Marek Marczykowski
5ea32bd11b
dom0/meminfo-writer: fork into background after first info sent to qmemman ( #635 )
2012-07-20 16:42:12 +02:00
Marek Marczykowski
148e5e55f7
dom0/qmemman: fork into background after daemon initialization ( #635 )
...
Parse config and setup socket before fork.
2012-07-20 16:42:11 +02:00
Marek Marczykowski
59a1fb96db
dom0/meminfo-writer: fork into background after first info sent to qmemman ( #635 )
2012-07-20 16:41:26 +02:00
Marek Marczykowski
c2d20e59d0
dom0/qmemman: fork into background after daemon initialization ( #635 )
...
Parse config and setup socket before fork.
2012-07-20 16:32:17 +02:00
Marek Marczykowski
ba568ed3e9
dom0/core: use generic run() to wait for qubes-session
...
Especially use 'ignore_stderr' feature.
2012-07-20 13:17:37 +02:00
Marek Marczykowski
273032bfae
dom0: add missing file
2012-07-20 13:09:20 +02:00
Marek Marczykowski
d5dbbd41cb
dom0/qvm-tools: add missing imports
2012-07-20 13:09:07 +02:00
Marek Marczykowski
f98bf1d570
dom0: fix dirs permissions after xen upgrade
2012-07-20 13:08:18 +02:00
Marek Marczykowski
7071bf62bc
dom0/core: use generic run() to wait for qubes-session
...
Especially use 'ignore_stderr' feature.
2012-07-20 13:06:26 +02:00
Marek Marczykowski
2ddd48f8e4
dom0/core: disable dynamic memory when VM have PCI devices assigned
2012-07-19 14:44:09 +02:00
Marek Marczykowski
406d233b6b
dom0/core: disable dynamic memory when VM have PCI devices assigned
2012-07-19 14:43:24 +02:00
Marek Marczykowski
cfd95575dd
dom0: add missing file
2012-07-18 22:22:52 +02:00
Marek Marczykowski
b321d16336
dom0/qvm-tools: add missing imports
2012-07-18 18:10:08 +02:00
Marek Marczykowski
38e8b85b06
dom0: fix dirs permissions after xen upgrade
2012-07-18 12:46:36 +02:00
Marek Marczykowski
4b92f6390a
dom0/qvm-core: ignore stderr from VM commands when not needed for sure ( #626 )
...
pam_systemd.so has a bug, which cause spurious '...killed' output on stderr.
2012-07-16 13:36:08 +02:00
Marek Marczykowski
5637793fae
dom0/qvm-core: ignore stderr from VM commands when not needed for sure ( #626 )
...
pam_systemd.so has a bug, which cause spurious '...killed' output on stderr.
2012-07-16 13:31:43 +02:00
Marek Marczykowski
712d122894
dom0: fix block-cleaner daemon
2012-07-15 19:48:36 +02:00
Marek Marczykowski
d9291ab2b4
dom0/appmenus: Rename dir entry for ServiceVMs ( #627 )
2012-07-15 02:41:23 +02:00
Marek Marczykowski
6c74db3aac
dom0/qvm-sync-appmenus: use qubes.GetAppmenus service
2012-07-15 02:41:23 +02:00
Marek Marczykowski
1083fad626
dom0/core: remove duplicated remove_from_disk definition
2012-07-15 02:41:23 +02:00
Marek Marczykowski
c0ffdd6fa5
dom0/dom0-updates: remove updates-pending flag after update installation
2012-07-15 02:41:23 +02:00
Marek Marczykowski
0218ab0b2a
dom0/core: remove appmenus when removing NetVM ( #627 )
2012-07-15 02:41:23 +02:00
Marek Marczykowski
b6b50b6fea
dom0/appmenus: Rename dir entry for ServiceVMs ( #627 )
2012-07-15 02:26:17 +02:00
Marek Marczykowski
1009b1a46d
dom0/qvm-sync-appmenus: use qubes.GetAppmenus service
2012-07-15 02:26:17 +02:00
Marek Marczykowski
08888fcf7a
dom0/core: remove duplicated remove_from_disk definition
2012-07-14 16:07:35 +02:00
Marek Marczykowski
d156a815d2
dom0/dom0-updates: remove updates-pending flag after update installation
2012-07-14 15:55:46 +02:00
Marek Marczykowski
7fbeacc81b
dom0/core: remove appmenus when removing NetVM ( #627 )
2012-07-14 15:12:41 +02:00
Marek Marczykowski
2c1201b4a9
dom0: call qrexec service while preparing NetVM for sleep ( #617 )
...
Instead of hardcoded commands.
2012-07-13 14:44:11 +02:00
Marek Marczykowski
32fbd5aefd
dom0: call qrexec service while preparing NetVM for sleep ( #617 )
...
Instead of hardcoded commands.
2012-07-13 14:42:54 +02:00
Marek Marczykowski
8d8ce2de31
dom0/dispvm: by default use prerun script from inside of VM ( #620 )
2012-07-12 14:22:44 +02:00
Marek Marczykowski
4aab477f38
dom0/dispvm: by default use prerun script from inside of VM ( #620 )
2012-07-12 14:21:59 +02:00
Marek Marczykowski
b42e09e4ba
dom0/qvm-tools: Warn the user when running qvm-tool as root is not recommended ( #612 )
2012-07-12 03:57:22 +02:00
Marek Marczykowski
342a190302
dom0/dispvm: notify when starting new DispVM ( #616 )
2012-07-12 03:56:09 +02:00
Marek Marczykowski
2c0d0dff8b
dom0/qvm-sync-clock: string '\n' from date output
2012-07-12 03:56:09 +02:00
Marek Marczykowski
64a942eee8
dom0/dispvm: notify when starting new DispVM ( #616 )
2012-07-12 03:44:41 +02:00
Marek Marczykowski
ac76b7203f
dom0/qvm-sync-clock: string '\n' from date output
2012-07-12 03:43:57 +02:00
Marek Marczykowski
ba81866b2f
dom0/qvm-tools: Warn the user when running qvm-tool as root is not recommended ( #612 )
2012-07-11 23:53:23 +02:00
Marek Marczykowski
ee3cf6b583
dom0/qvm-block: fix error handling ( #614 )
2012-07-05 01:49:41 +02:00
Marek Marczykowski
64369bf02a
dom0/qvm-run: Notify qubes-manager about failed VM start ( #615 )
2012-07-05 01:43:32 +02:00
Marek Marczykowski
e70b690150
dom0/qmemman: notify qubes-manager about misbehaving VMs ( #615 )
2012-07-05 01:43:32 +02:00
Marek Marczykowski
b4070a99a3
dom0/qmemman: check if donors have returned memory before distributing it to other VMs ( #563 )
...
When some VM did't returned memory to Xen, mark this VM as suspicious and abort
balance to always have some xen free_memory margin.
VMs marked as suspicius will be evaluated before next balance and still didn't
returned memory, will be skipped in balance process.
2012-07-05 01:43:32 +02:00
Marek Marczykowski
892a6bbc13
dom0/guihelpers: interface to notifying qubes-manager ( #615 )
2012-07-05 01:43:32 +02:00
Marek Marczykowski
421b13b6c4
dom0/qmemman: minor fix in mem_set()
...
Set target/maxmem in more logical order (balloon driver can fail to balloon the
first time, but will retry anyway). Force sizes to be integers.
2012-07-05 01:43:32 +02:00
Marek Marczykowski
897f981c8c
dom0/qvm-run: Notify qubes-manager about failed VM start ( #615 )
2012-07-05 01:30:00 +02:00
Marek Marczykowski
27b6aa4378
dom0/qmemman: notify qubes-manager about misbehaving VMs ( #615 )
2012-07-05 01:29:45 +02:00
Marek Marczykowski
3ce68def8c
dom0/qmemman: check if donors have returned memory before distributing it to other VMs ( #563 )
...
When some VM did't returned memory to Xen, mark this VM as suspicious and abort
balance to always have some xen free_memory margin.
VMs marked as suspicius will be evaluated before next balance and still didn't
returned memory, will be skipped in balance process.
2012-07-05 01:29:45 +02:00
Marek Marczykowski
eb3da24aa4
dom0/guihelpers: interface to notifying qubes-manager ( #615 )
2012-07-05 01:29:45 +02:00
Marek Marczykowski
30ff420b52
dom0/qmemman: minor fix in mem_set()
...
Set target/maxmem in more logical order (balloon driver can fail to balloon the
first time, but will retry anyway). Force sizes to be integers.
2012-07-05 01:29:45 +02:00
Marek Marczykowski
2b452c9970
dom0/qmemman: remove trainling spaces
2012-07-05 01:29:45 +02:00
Marek Marczykowski
11ab37b9ff
dom0/qvm-block: fix error handling ( #614 )
2012-06-30 00:58:06 +02:00
Marek Marczykowski
2854f08bca
dom0/core: fix the last merge...
...
Remove duplicated lines by faulty conflict resolution.
2012-06-28 12:28:14 +02:00
Marek Marczykowski
41efe076b2
dom0/core: typo fix in clone_disk_files ( #608 )
2012-06-28 11:37:18 +02:00
Marek Marczykowski
50dc086682
dom0/core: typo fix in clone_disk_files ( #608 )
2012-06-26 11:05:03 +02:00
Marek Marczykowski
44767bea7f
Merge branch 'master' into hvm
...
Conflicts:
dom0/init.d/qubes_core
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-prefs
version_dom0
version_vm
2012-06-26 03:49:10 +02:00
Marek Marczykowski
bf9b63e06f
dom0/qmemman: allow balance when xen have low free memory ( #563 )
2012-06-26 03:43:36 +02:00
Marek Marczykowski
2e7d5cc178
dom0: appmenu to start Firefox in new DispVM ( #594 )
2012-06-26 03:43:36 +02:00
Marek Marczykowski
29e3593a02
dom0/qmemman: allow balance when xen have low free memory ( #563 )
2012-06-26 00:26:53 +02:00
Marek Marczykowski
0008e71784
dom0: appmenu to start Firefox in new DispVM ( #594 )
2012-06-24 14:09:43 +02:00
Marek Marczykowski
ad7d6957b1
dom0/updates: clean yum cache as root ( #540 )
...
Actually looks like this solve problem, don't know why (cleaning as user
didn't returned any error).
2012-06-23 00:37:47 +02:00
Marek Marczykowski
89aaa60753
dom0: use RPC service to sync clock via NTP ( #603 )
2012-06-23 00:37:47 +02:00
Marek Marczykowski
24352c3dce
dom0: minor init.d script fix
2012-06-23 00:37:47 +02:00
Marek Marczykowski
be7c079705
dom0/updates: clean yum cache as root ( #540 )
...
Actually looks like this solve problem, don't know why (cleaning as user
didn't returned any error).
2012-06-22 23:44:05 +02:00
Marek Marczykowski
1dad96b0e9
dom0: use RPC service to sync clock via NTP ( #603 )
2012-06-22 22:23:17 +02:00
Marek Marczykowski
36f6a2c42c
dom0: minor init.d script fix
2012-06-22 01:22:06 +02:00
Marek Marczykowski
ffa3d8732c
dom0: use new qubes-manager appmenu applet ( #548 )
2012-06-22 01:15:54 +02:00
Marek Marczykowski
96f7d4da81
Revert "dom0/appmenus: do not add "Add more shortcuts" menu ( #458 )" ( #548 )
...
This reverts commit 8b613a10b4
.
Restore this option.
2012-06-22 01:15:54 +02:00
Marek Marczykowski
51f4a60a44
dom0: use new qubes-manager appmenu applet ( #548 )
2012-06-21 11:57:36 +02:00
Marek Marczykowski
3109deebd5
Revert "dom0/appmenus: do not add "Add more shortcuts" menu ( #458 )" ( #548 )
...
This reverts commit 8b613a10b4
.
Restore this option.
2012-06-21 11:50:52 +02:00
Marek Marczykowski
c978ce3a48
dom0/qvm-firewall: eliminate duplicate firewall defaults definition ( #599 )
...
This caused ignore of different firewall defaults for TemplateVM.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
0e2aba228f
dom0: minor qvm-sync-clock fix
...
Catch any error in vm.run, to not break clock syncing of all VMs because one
VM.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
ab9c2e503a
dom0: qvm-run --nogui switch
...
Can be used to not start guid.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
a4e10f00c1
dom0/qvm-firewall: eliminate duplicate firewall defaults definition ( #599 )
...
This caused ignore of different firewall defaults for TemplateVM.
2012-06-18 23:51:44 +02:00
Marek Marczykowski
06d99b77df
dom0: minor qvm-sync-clock fix
...
Catch any error in vm.run, to not break clock syncing of all VMs because one
VM.
2012-06-15 17:42:14 +02:00
Marek Marczykowski
92844a161a
dom0: qvm-run --nogui support for HVM
...
Translate it to "nogui:" command prefix.
2012-06-15 17:40:03 +02:00
Marek Marczykowski
4dfad5f1ae
dom0: qvm-run --nogui switch
...
Can be used to not start guid.
2012-06-15 17:37:19 +02:00
Marek Marczykowski
8bdc5706f7
dom0/core: allow to change default user for qvm-run ( #577 )
...
This doesn't make all dom0 code VM-username independent, still 'user' is
hardcoded in many places. This only change behavior of qvm-run, especially for use in HVM.
2012-06-13 19:01:32 +02:00
Marek Marczykowski
844d43b0ef
dom0/core: introduce is_guid_running() and use it in is_fully_usable()
...
To improve code reuse, especially to remove direct checking for
"/var/run/qubes/guid_running.{0}" in many places.
2012-06-13 18:59:56 +02:00
Marek Marczykowski
c534d5871b
dom0/core: fix order of loading VM attributes
...
Parsing kernelopts depends on uses_default_kernelopts, so set 'order' appropriate.
2012-06-13 18:59:56 +02:00
Marek Marczykowski
6bd988bf81
dom0/core: allow to change default user for qvm-run ( #577 )
...
This doesn't make all dom0 code VM-username independent, still 'user' is
hardcoded in many places. This only change behavior of qvm-run, especially for use in HVM.
2012-06-13 17:16:12 +02:00
Marek Marczykowski
e6a75c732e
dom0/core: support for qrexec for Windows HVM
...
Because not every HVM will have qrexec agent installed, introduce VM property
'qrexec_installed'. If it is set, spawn qrexec_daemon at VM startup and allow
use of qvm-run.
2012-06-13 17:14:25 +02:00
Marek Marczykowski
5504142187
dom0/core: fix race in QubesHVm.stubdom_xid
...
device-model-domid is written to xenstore after domaid id itself, so do not
assume the former is present when we know VM XID.
2012-06-13 17:11:21 +02:00