Sin descripción

Alexandre Bezroutchko f8f04f4b38 dom0+vm/qvm-usb: intermediate hace 11 años
misc f8f04f4b38 dom0+vm/qvm-usb: intermediate hace 11 años
network 7131bb7dcd vm/network: do not fail service on failed xenstore-read hace 11 años
qubes_rpc a9fd8ec5dd Merge branch 'hvm-for-master' hace 11 años
rpm_spec 4daa5f56ea Merge branch 'master-for-hvm' into hvm hace 11 años
test c71e52a471 dvp/qvm-usb: ignore whitespaces when comparing output of qvm-usb tools hace 11 años
vm-init.d aa1b1e86a8 vm/prepare-dvm: wait for Xorg in more deterministic way (#636) hace 12 años
vm-systemd e0780538f6 vm/systemd: force exit status 0 in qubes-sysinit hace 11 años
.gitignore 45f70b4e02 gitignore files - add build products hace 13 años
LICENSE cd9c01266c Added LICENSE hace 14 años
Makefile 077c74782c vm: kernel-placeholder package to inhibit real kernel pkg in VM (#645) hace 12 años
README.pvusb f8f04f4b38 dom0+vm/qvm-usb: intermediate hace 11 años
install-pvusb-backend.sh 7374216913 dom0+vm/qvm-usb: don't destroy xenstore in backend on install hace 11 años
install-pvusb-dom0.sh 24959d014b dvp/qvm-usb: split installation script for non-dom0 usb backend hace 11 años
install-pvusb-frontend.sh 5dd8da1373 dvp/qvm-usb: reworked installation scripts for usbvm and added one for appvms hace 11 años
version_vaio_fixes 45f0bd7f98 sony-vaio-fixes v1.6.1 hace 13 años
version_vm a1b485f3be version 1.7.46 hace 11 años

README.pvusb

Installation
~~~~~~~~~~~~

In dom0, once:
qvm-create -l red usbvm

# FIXME: use your own PCI device IDs
qvm-pci -a usbvm 00:1d.0
qvm-pci -a usbvm 00:1d.1
qvm-pci -a usbvm 00:1d.2
qvm-pci -a usbvm 00:1d.7

In dom0, after each dom0 reboot:
sudo ./install-pvusb-dom0.sh
qvm-start usbvm

In dom0, after each usbvm reboot:
usbvm_xid=`xl list | awk '($1=="usbvm"){print $2}'`
xenstore-write /local/domain/${usbvm_xid}/qubes-usb-devices ''
xenstore-chmod /local/domain/${usbvm_xid}/qubes-usb-devices n0 b${usbvm_xid}

In usbvm, after each reboot:
sudo ./install-pvusb-backend.sh

In appvms, after each reboot:
sudo ./install-pvusb-frontend.sh

In dom0, after each usbvm and appvm reboot (FIXME):
sudo initpv.py

Attach
~~~~~~

In dom0:
qvm-usb -a [-b ] [-f [--p ]] [--no-auto-detach] -

Defaults:
usbvm-name = 'usbvm'
frontend-controller = 0
frontend-port = first unused between 1 and 8

Example:
qvm-usb -a netvm usbvm:4-1

List
~~~~

In dom0:
qvm-usb -l

Example output:
usbvm:4-1 1234:5678 My Bluetooth Dongle
usbvm:4-2 5678:1234 My Wireless Adapter (attached to 'netvm' as '0-1')

Detach
~~~~~~

In dom0:
qvm-usb -d :-
qvm-usb -d

Example:
qvm-usb -d netvm:0-1

Known issues
~~~~~~~~~~~~

* The content of backend/vusb does not get cleaned on domain shutdown (no impact on functionality)
* System keyboard / mouse are listed and can be detached away
* Virtual USB devices (ones created by PVUSB frontend) may be listed
* The installation/configuration is not persistent, not retained between reboots
* The name of the default usbvm is hardcoded in qubesutils.py
* No logging / audit trail?