core-admin/core-modules
Marek Marczykowski-Górecki 9cbf9a8a59 Add support for 'pci_strictreset' option
This allows to assign PCI device to the VM, even if it doesn't support
proper reset. The default behaviour (when the value is True) is to not
allow such attachment (VM will not start if such device is assigned).

Require libvirt patch for this option.
2015-05-28 00:11:17 +02:00
..
__init__.py Move all files one level up 2013-03-16 19:56:51 +01:00
01QubesAppVm.py Declare file encoding for all python files, fill missing copyright headers 2014-05-18 21:03:27 +02:00
01QubesDisposableVm.py dispvm: restore DispVM naming independent of Qubes VM ID (#983) 2015-05-04 00:41:33 +02:00
01QubesHVm.py core: do not assume that libvirt domain is always defined 2015-03-29 23:38:36 +02:00
02QubesTemplateHVm.py core: add dummy QubesTemplateHVm.commit_changes 2015-02-22 03:53:51 +01:00
000QubesVm.py Add support for 'pci_strictreset' option 2015-05-28 00:11:17 +02:00
003QubesTemplateVm.py core/modules: debug important VM changes 2015-02-19 21:32:43 +01:00
005QubesNetVm.py core/modules: debug important VM changes 2015-02-19 21:32:43 +01:00
006QubesAdminVm.py core: store dom0 info in qubes.xml 2015-04-28 15:00:50 +02:00
006QubesProxyVm.py core: rename create_xenstore_entries, get rid of xid parameter 2015-03-28 22:36:28 +01:00
Makefile rpm+makefile: move build/install code to Makefile files 2014-11-19 12:50:24 +01:00
README.txt Move all files one level up 2013-03-16 19:56:51 +01:00

This directory contains Qubes core modules. It will be loaded in
lexicographical order, use numeric prefix to force load ordering.

0* - Qubes base modules
00* - Qubes core VM classes