Installation ~~~~~~~~~~~~ In dom0, once: qvm-create -l red usbvm # FIXME: use your own PCI device IDs qvm-pci -a usbvm 00:1d.0 qvm-pci -a usbvm 00:1d.1 qvm-pci -a usbvm 00:1d.2 qvm-pci -a usbvm 00:1d.7 In dom0, after each dom0 reboot: sudo ./install-pvusb-dom0.sh qvm-start usbvm In dom0, after each usbvm reboot: usbvm_xid=`xl list | awk '($1=="usbvm"){print $2}'` xenstore-write /local/domain/${usbvm_xid}/qubes-usb-devices '' xenstore-chmod /local/domain/${usbvm_xid}/qubes-usb-devices n0 b${usbvm_xid} In usbvm, after each reboot: sudo ./install-pvusb-backend.sh In appvms, after each reboot: sudo ./install-pvusb-frontend.sh Attach ~~~~~~ In dom0: qvm-usb -a [-b ] [-f [--p ]] [--no-auto-detach] - Defaults: usbvm-name = 'usbvm' frontend-controller = 0 frontend-port = first unused between 1 and 8 Example: qvm-usb -a netvm usbvm:4-1 List ~~~~ In dom0: qvm-usb -l Example output: usbvm:4-1 1234:5678 My Bluetooth Dongle usbvm:4-2 5678:1234 My Wireless Adapter (attached to 'netvm' as '0-1') Detach ~~~~~~ In dom0: qvm-usb -d :- qvm-usb -d Example: qvm-usb -d netvm:0-1 Known issues ~~~~~~~~~~~~ * The content of backend/vusb does not get cleaned on domain shutdown (no impact on functionality) * System keyboard / mouse are listed and can be detached away * Virtual USB devices (ones created by PVUSB frontend) may be listed * The installation/configuration is not persistent, not retained between reboots * The name of the default usbvm is hardcoded in qubesutils.py * No logging / audit trail?