Go to file
2012-10-21 14:59:37 +02:00
dom0 dom0/qvm-usb: added usb_setup() 2012-10-21 14:59:37 +02:00
misc dom0+vm/qvm-usb: cosmetic: removed debugging code, adjusted fixmes 2012-10-21 14:59:36 +02:00
network vm/network: do not fail service on failed xenstore-read 2012-10-13 11:47:32 +02:00
qrexec vm/qrexec: fix race between child cleanup and select call 2012-10-04 05:44:18 +02:00
qubes_rpc Merge branch 'hvm-for-master' 2012-10-17 21:41:03 +02:00
rpm_spec dom0/spec: add R: python-lxml for pretty print 2012-10-19 02:21:41 +02:00
test dvp/qvm-usb: ignore whitespaces when comparing output of qvm-usb tools 2012-10-21 14:59:36 +02:00
u2mfn gitignores 2011-03-23 19:57:48 -04:00
vchan win/vchan: reset the evtchn buffer in case of overflow 2012-09-16 23:32:56 +02:00
vm-init.d vm/prepare-dvm: wait for Xorg in more deterministic way (#636) 2012-07-22 01:23:45 +02:00
vm-systemd vm/systemd: force exit status 0 in qubes-sysinit 2012-10-15 02:33:36 +02:00
.gitignore gitignore files - add build products 2011-03-06 14:06:24 +01:00
install-pvusb-backend.sh dvp/qvm-usb: fix backend install script to ignore some errors 2012-10-21 14:59:37 +02:00
install-pvusb-dom0.sh dvp/qvm-usb: split installation script for non-dom0 usb backend 2012-10-21 14:59:37 +02:00
install-pvusb-frontend.sh dvp/qvm-usb: reworked installation scripts for usbvm and added one for appvms 2012-10-21 14:59:37 +02:00
LICENSE Added LICENSE 2010-04-05 21:21:27 +02:00
Makefile vm: kernel-placeholder package to inhibit real kernel pkg in VM (#645) 2012-07-23 23:17:50 +02:00
README.pvusb dvp/qvm-usb: added a readme 2012-10-21 14:59:37 +02:00
version_dom0 version 1.7.46 2012-09-27 11:03:26 +02:00
version_vaio_fixes sony-vaio-fixes v1.6.1 2011-07-25 01:49:07 +02:00
version_vm version 1.7.46 2012-09-27 11:03:26 +02:00

Installation
~~~~~~~~~~~~

In dom0:
 qvm-create -l red usbvm
 # FIXME: use your own PCI device IDs
 qvm-pci -a usbvm 00:1d.0
 qvm-pci -a usbvm 00:1d.1
 qvm-pci -a usbvm 00:1d.2
 qvm-pci -a usbvm 00:1d.7
 qvm-start usbvm

In usbvm:
 sudo ./install-pvusb-backend.sh 

In appvms:
 sudo ./install-pvusb-frontend.sh 

Attach
~~~~~~

In dom0:
 qvm-usb -a [-b <usbvm-name>] [-f <frontend-controller> [--p <frontend-port>]] [--no-auto-detach] <vm-name> <controller>-<port>

Defaults:
 usbvm-name = 'usbvm'
 frontend-controller = 0
 frontend-port = first unused between 1 and 8

Example:
 qvm-usb -a netvm usbvm:4-1

List
~~~~

In dom0:
 qvm-usb -l

Example output:
 usbvm:4-1 1234:5678 My Bluetooth Dongle
 usbvm:4-2 5678:1234 My Wireless Adapter (attached to 'netvm' as '0-1')

Detach
~~~~~~

In dom0:
 qvm-usb -d <vm-name>:<vusb-controller>-<vusb-port>
 qvm-usb -d <vm-name>

Example:
 qvm-usb -d netvm:0-1

Known issues
~~~~~~~~~~~~

* The content of backend/vusb does not get cleaned on domain shutdown (no impact on functionality)
* System keyboard / mouse are listed and can be detached away
* The installation is not persistent, not retained between reboots
* The configuration is not persistent, not retained between reboots
* The name of the default usbvm is hardcoded in qubesutils.py