Commit Graph

2368 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
4090fdf758 QubesHVm: restore private.img support 2013-11-19 18:35:10 +01:00
Marek Marczykowski-Górecki
1315bdec87 QubesHVm: fix copy&paste error 2013-11-19 18:33:35 +01:00
Marek Marczykowski-Górecki
f0e24c358e qvm-tools: clarify help message/options error checking (#741) 2013-11-18 01:15:17 +01:00
Marek Marczykowski-Górecki
dfa9e7c0df Add device-mapper devices to name->(major,minor) mapping
qvm-block will still not list device-mapper devices, but it would be
much easier to modify it.
2013-11-16 01:29:50 +01:00
Marek Marczykowski-Górecki
b3c127091d hvm: check for HVM capability on host when failed to start the VM 2013-11-09 23:48:49 +01:00
Joanna Rutkowska
f9b37a2a38 version 2.1.25 2013-11-02 12:55:09 -04:00
Joanna Rutkowska
b33020e385 Merge branch 'master' of git://git.qubes-os.org/marmarek/core-admin 2013-11-02 11:42:41 -04:00
Joanna Rutkowska
124a8f6892 Merge branch 'master' of git://git.qubes-os.org/marmarek/core-admin 2013-11-02 11:35:41 -04:00
Marek Marczykowski-Górecki
8200b15c61 NotifyTools: handle default user setting
If the VM provides 'default-user' setting - save it to the VM settings.
2013-11-01 02:32:32 +01:00
Marek Marczykowski-Górecki
5291227de3 qvm-tools: qvm-start --install-windows-tools (#41 pro) 2013-11-01 02:31:13 +01:00
Marek Marczykowski-Górecki
c52059a23e core: unify handling dom0 case in --cdrom option 2013-11-01 02:25:22 +01:00
Marek Marczykowski-Górecki
55b4c6b6d1 missing import once again 2013-11-01 02:25:04 +01:00
Marek Marczykowski-Górecki
e2c43d2292 Allow HVM to notify dom0 about tools installation
HVM can set some xenstore entries (in qubes-tools/ subtree) to pass
informations about installed tools to dom0. qubes.NotifyTools service
triggers update of VM properties (like qrexec_installed).
This way, after installation of Qubes Windows Tools, the user doesn't need
to change any VM settings to use the tools.
2013-10-28 05:09:54 +01:00
Marek Marczykowski-Górecki
495a24a2e7 core/HVM: always start qrexec daemon
If not marked as installed, start it in background - waiting for
possible Qubes Tools installation. If that happens, make it possible to
tell the dom0 about that fact.
2013-10-28 05:08:28 +01:00
Marek Marczykowski-Górecki
3df9719972 core: add missing import 2013-10-27 16:09:16 +01:00
Marek Marczykowski-Górecki
68d8eb308c Merge branch 'master' of git://git.qubes-os.org/joanna/core-admin 2013-10-27 12:30:47 +01:00
Marek Marczykowski-Górecki
dfe0b18382 core: call ACPI S3 emulation only for VMs with PCI devices
Actually it looks to be needed only there.
But also another problem: this suspend doesn't work for firewallvm, for
unknown reason.
2013-10-24 04:10:07 +02:00
Marek Marczykowski-Górecki
149971ae2e core: add methods to trigger ACPI S3 of VM
Those methods should be called during dom0 suspend/resume.
2013-10-23 21:56:50 +02:00
Marek Marczykowski-Górecki
084b5575a9 qvm-tools: add option to list only selected VMs 2013-10-23 20:52:32 +02:00
Marek Marczykowski-Górecki
71960d83cc qmemman: fix maxmem handling (#736)
'static-max' as read from xenstore is string, so needs to be converted
to int. Additionally units needs to be adjusted (MB vs kB).
2013-10-22 02:04:39 +02:00
Joanna Rutkowska
17e2e7d436 version 2.1.24 2013-10-19 17:29:15 +02:00
Marek Marczykowski-Górecki
aadd47ce45 dispvm: fix commit "pass VM name to qrexec-daemon" 2013-10-19 15:55:31 +02:00
Marek Marczykowski-Górecki
3443f94aa9 dispvm: fix out of memory message - Xfce version 2013-10-19 15:54:55 +02:00
Joanna Rutkowska
ef6f3d74e6 version 2.1.23 2013-10-19 11:37:09 +02:00
Marek Marczykowski-Górecki
ed3d602140 dispvm: pass VM name to qrexec-daemon
Now qrexec-daemon requires three arguments: domid, domname,
default_user.
2013-10-19 00:07:25 +02:00
Joanna Rutkowska
fb745c2ff2 version 2.1.22 2013-10-18 11:06:42 +02:00
Marek Marczykowski
5e0d8c1155 Pass domain name to qrexec daemon 2013-10-18 03:39:02 +02:00
Joanna Rutkowska
b2a0b69742 version 2.1.21 2013-10-11 12:06:05 +02:00
Marek Marczykowski-Górecki
41ba079eb8 Force the first character of VM name to be a letter
Especially don't allow numeric-only name (our deserializer of qubes.xml
will convert it to int instead of str...).
2013-10-08 22:47:56 +02:00
Marek Marczykowski-Górecki
8f302bf2bc version 2.1.20 2013-10-08 10:44:52 +02:00
Marek Marczykowski-Górecki
e6012a8fd2 Fix qubes.xml unlock code (#748)
Do not call explicit lockf(lOCK_UN) to not unlock the file
buffers are flushed. This is simpler than adding flush() call.
2013-10-02 04:54:10 +02:00
Marek Marczykowski-Górecki
76144df2e7 qvm-backup: respect "include in backups by default" setting (#746) 2013-10-01 03:31:12 +02:00
Marek Marczykowski-Górecki
f74caf876b qvm-backup: support explicit list of VMs to backup 2013-10-01 03:18:44 +02:00
Marek Marczykowski-Górecki
c6d51fd68f version 2.1.19 2013-09-17 04:45:57 +02:00
Marek Marczykowski-Górecki
1525b64e16 Merge remote-tracking branch 'joanna/master' 2013-09-17 04:45:23 +02:00
Marek Marczykowski-Górecki
c43efac87b version 2.1.18 2013-09-16 22:45:12 +02:00
Marek Marczykowski-Górecki
5da7a520c4 core: move pci_add/pci_remove to QubesVM, add support for live add/remove (#708)
This additionally requires qubes.DetachPciDevice service in VM.
2013-09-01 01:26:43 +02:00
Marek Marczykowski
a0cb8dbf7e dispvm: minor fixes
Conflicts:
	dispvm/qubes-prepare-saved-domain.sh
2013-08-13 00:36:49 +02:00
Marek Marczykowski
19982da9d2 QubesVm: drop evals already covered by generic deserializer 2013-08-13 00:33:54 +02:00
Marek Marczykowski
28b8eb0445 Send monitor layout at VM startup.
Gui daemon isn't aware of multihead parameters, also gui protocol
doesn't support such information - currently by design it is configured
via Qubes RPC service.
At GUI startup send monitor layout to the VM.
2013-08-11 04:11:34 +02:00
Marek Marczykowski
42416504bb qvm-prefs: fix checking kernel path 2013-08-09 13:00:07 +02:00
Zrubi
2fc8e7abb0 qubes-hcl-report update + qvm-check
It's now handle dual VGA scenarios, got some other hardware related
improvements, and some usage help text ;)

And because I needed to check if a VM is exists or not just made a
small check script: qvm-check

This is really just  a stripped down version of the existing qvm-* scripts..
2013-07-03 09:47:29 +00:00
Marek Marczykowski
c8b3009b4f One more missing import 2013-06-07 05:40:13 +02:00
Marek Marczykowski
a1e9e3bf1a Fix domain clone/rename 2013-05-25 22:18:37 +02:00
Marek Marczykowski
8b71129445 qvm-template-commit: --offline-mode
Just a placeholder for now, to have common template-builder with Qubes
R3.
2013-05-18 06:01:25 +02:00
Marek Marczykowski
8efba3092c dispvm: fix zenity arguments for error message 2013-05-16 15:53:29 +02:00
Marek Marczykowski
6009ac5021 Remove default runlevel from VM kernel parameters
Runlevels are not used anymore with systemd (it uses target concept).
Remove the parameter as it causes problems with archlinux template.
2013-05-04 05:27:33 +02:00
Marek Marczykowski
3e119a6589 version 2.1.17 2013-03-26 03:05:29 +01:00
Marek Marczykowski
48098accc5 core: fix datetime handling with new imports
Now it is 'import datetime', not 'from datetime import datetime', so use
explicit datetime class from datetime module.
2013-03-26 02:15:34 +01:00
Marek Marczykowski
59d36cfb69 Missing imports... 2013-03-26 01:28:39 +01:00