Marek Marczykowski-Górecki
f85c2ffa5a
Merge remote-tracking branch 'joanna/master'
2013-11-20 02:58:00 +01:00
Marek Marczykowski-Górecki
6fddae3b9b
Support for autostart VMs ( #724 )
2013-11-20 02:57:17 +01:00
Marek Marczykowski-Górecki
2005207462
Template support for HVM ( #719 )
...
Any HVM (which isn't already template-based) can be a template for
another HVM. For now do not allow simultaneous run of template and its
VM (this assumption simplify the implementation, as no root-cow.img is
needed).
2013-11-19 18:42:59 +01:00
Marek Marczykowski-Górecki
92b479bf49
qvm-tools: exit with code 1 on error
...
Not only print error message.
2013-11-19 18:40:16 +01:00
Marek Marczykowski-Górecki
25fd41aa2f
qvm-tools: do not assume that every template VM must have root-cow.img
...
Especially HVM templates do not have (at least for now).
2013-11-19 18:39:22 +01:00
Marek Marczykowski-Górecki
1756ab33e9
qvm-tools: make qvm-ls code more defensive
...
Do not assume only predefined VMs types, do not assume only one type of
template etc.
2013-11-19 18:36:12 +01:00
Marek Marczykowski-Górecki
4090fdf758
QubesHVm: restore private.img support
2013-11-19 18:35:10 +01:00
Marek Marczykowski-Górecki
1315bdec87
QubesHVm: fix copy&paste error
2013-11-19 18:33:35 +01:00
Marek Marczykowski-Górecki
f0e24c358e
qvm-tools: clarify help message/options error checking ( #741 )
2013-11-18 01:15:17 +01:00
Joanna Rutkowska
07f011ebec
version 2.1.26
2013-11-16 15:26:53 +01:00
Marek Marczykowski-Górecki
dfa9e7c0df
Add device-mapper devices to name->(major,minor) mapping
...
qvm-block will still not list device-mapper devices, but it would be
much easier to modify it.
2013-11-16 01:29:50 +01:00
Marek Marczykowski-Górecki
b3c127091d
hvm: check for HVM capability on host when failed to start the VM
2013-11-09 23:48:49 +01:00
Joanna Rutkowska
f9b37a2a38
version 2.1.25
2013-11-02 12:55:09 -04:00
Joanna Rutkowska
b33020e385
Merge branch 'master' of git://git.qubes-os.org/marmarek/core-admin
2013-11-02 11:42:41 -04:00
Joanna Rutkowska
124a8f6892
Merge branch 'master' of git://git.qubes-os.org/marmarek/core-admin
2013-11-02 11:35:41 -04:00
Marek Marczykowski-Górecki
8200b15c61
NotifyTools: handle default user setting
...
If the VM provides 'default-user' setting - save it to the VM settings.
2013-11-01 02:32:32 +01:00
Marek Marczykowski-Górecki
5291227de3
qvm-tools: qvm-start --install-windows-tools ( #41 pro)
2013-11-01 02:31:13 +01:00
Marek Marczykowski-Górecki
c52059a23e
core: unify handling dom0 case in --cdrom option
2013-11-01 02:25:22 +01:00
Marek Marczykowski-Górecki
55b4c6b6d1
missing import once again
2013-11-01 02:25:04 +01:00
Marek Marczykowski-Górecki
e2c43d2292
Allow HVM to notify dom0 about tools installation
...
HVM can set some xenstore entries (in qubes-tools/ subtree) to pass
informations about installed tools to dom0. qubes.NotifyTools service
triggers update of VM properties (like qrexec_installed).
This way, after installation of Qubes Windows Tools, the user doesn't need
to change any VM settings to use the tools.
2013-10-28 05:09:54 +01:00
Marek Marczykowski-Górecki
495a24a2e7
core/HVM: always start qrexec daemon
...
If not marked as installed, start it in background - waiting for
possible Qubes Tools installation. If that happens, make it possible to
tell the dom0 about that fact.
2013-10-28 05:08:28 +01:00
Marek Marczykowski-Górecki
3df9719972
core: add missing import
2013-10-27 16:09:16 +01:00
Marek Marczykowski-Górecki
68d8eb308c
Merge branch 'master' of git://git.qubes-os.org/joanna/core-admin
2013-10-27 12:30:47 +01:00
Marek Marczykowski-Górecki
dfe0b18382
core: call ACPI S3 emulation only for VMs with PCI devices
...
Actually it looks to be needed only there.
But also another problem: this suspend doesn't work for firewallvm, for
unknown reason.
2013-10-24 04:10:07 +02:00
Marek Marczykowski-Górecki
149971ae2e
core: add methods to trigger ACPI S3 of VM
...
Those methods should be called during dom0 suspend/resume.
2013-10-23 21:56:50 +02:00
Marek Marczykowski-Górecki
084b5575a9
qvm-tools: add option to list only selected VMs
2013-10-23 20:52:32 +02:00
Marek Marczykowski-Górecki
71960d83cc
qmemman: fix maxmem handling ( #736 )
...
'static-max' as read from xenstore is string, so needs to be converted
to int. Additionally units needs to be adjusted (MB vs kB).
2013-10-22 02:04:39 +02:00
Joanna Rutkowska
17e2e7d436
version 2.1.24
2013-10-19 17:29:15 +02:00
Marek Marczykowski-Górecki
aadd47ce45
dispvm: fix commit "pass VM name to qrexec-daemon"
2013-10-19 15:55:31 +02:00
Marek Marczykowski-Górecki
3443f94aa9
dispvm: fix out of memory message - Xfce version
2013-10-19 15:54:55 +02:00
Joanna Rutkowska
ef6f3d74e6
version 2.1.23
2013-10-19 11:37:09 +02:00
Marek Marczykowski-Górecki
ed3d602140
dispvm: pass VM name to qrexec-daemon
...
Now qrexec-daemon requires three arguments: domid, domname,
default_user.
2013-10-19 00:07:25 +02:00
Joanna Rutkowska
fb745c2ff2
version 2.1.22
2013-10-18 11:06:42 +02:00
Marek Marczykowski
5e0d8c1155
Pass domain name to qrexec daemon
2013-10-18 03:39:02 +02:00
Joanna Rutkowska
b2a0b69742
version 2.1.21
2013-10-11 12:06:05 +02:00
Marek Marczykowski-Górecki
41ba079eb8
Force the first character of VM name to be a letter
...
Especially don't allow numeric-only name (our deserializer of qubes.xml
will convert it to int instead of str...).
2013-10-08 22:47:56 +02:00
Marek Marczykowski-Górecki
8f302bf2bc
version 2.1.20
2013-10-08 10:44:52 +02:00
Marek Marczykowski-Górecki
e6012a8fd2
Fix qubes.xml unlock code ( #748 )
...
Do not call explicit lockf(lOCK_UN) to not unlock the file
buffers are flushed. This is simpler than adding flush() call.
2013-10-02 04:54:10 +02:00
Marek Marczykowski-Górecki
76144df2e7
qvm-backup: respect "include in backups by default" setting ( #746 )
2013-10-01 03:31:12 +02:00
Marek Marczykowski-Górecki
f74caf876b
qvm-backup: support explicit list of VMs to backup
2013-10-01 03:18:44 +02:00
Marek Marczykowski-Górecki
c6d51fd68f
version 2.1.19
2013-09-17 04:45:57 +02:00
Marek Marczykowski-Górecki
1525b64e16
Merge remote-tracking branch 'joanna/master'
2013-09-17 04:45:23 +02:00
Marek Marczykowski-Górecki
c43efac87b
version 2.1.18
2013-09-16 22:45:12 +02:00
Marek Marczykowski-Górecki
5da7a520c4
core: move pci_add/pci_remove to QubesVM, add support for live add/remove ( #708 )
...
This additionally requires qubes.DetachPciDevice service in VM.
2013-09-01 01:26:43 +02:00
Marek Marczykowski
a0cb8dbf7e
dispvm: minor fixes
...
Conflicts:
dispvm/qubes-prepare-saved-domain.sh
2013-08-13 00:36:49 +02:00
Marek Marczykowski
19982da9d2
QubesVm: drop evals already covered by generic deserializer
2013-08-13 00:33:54 +02:00
Marek Marczykowski
28b8eb0445
Send monitor layout at VM startup.
...
Gui daemon isn't aware of multihead parameters, also gui protocol
doesn't support such information - currently by design it is configured
via Qubes RPC service.
At GUI startup send monitor layout to the VM.
2013-08-11 04:11:34 +02:00
Marek Marczykowski
42416504bb
qvm-prefs: fix checking kernel path
2013-08-09 13:00:07 +02:00
Zrubi
2fc8e7abb0
qubes-hcl-report update + qvm-check
...
It's now handle dual VGA scenarios, got some other hardware related
improvements, and some usage help text ;)
And because I needed to check if a VM is exists or not just made a
small check script: qvm-check
This is really just a stripped down version of the existing qvm-* scripts..
2013-07-03 09:47:29 +00:00
Marek Marczykowski
c8b3009b4f
One more missing import
2013-06-07 05:40:13 +02:00