New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Already assigned devices should not be listed as "available" under VM Settings > Devices of other VMs #1838

Open
mfc opened this Issue Mar 15, 2016 · 2 comments

Comments

4 participants
@mfc
Member

mfc commented Mar 15, 2016

reproduce by assigning devices to a VM (say the USB devices to the default sys-usb). Go to VM Settings > Devices of another VM. Those controllers should not be assignable to other VMs.

Reported at the Internet Freedom Festival.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 15, 2016

Member

I agree those devices shouldn't be listed in Qubes Manager. Also it would be good idea to exclude system critical components (host bridge, PCI bridge, primary SATA controller etc).
But there are some cases when assigning the same device to multiple VMs makes sense - for example you may have alternative USB VM used only for video chats (as it isn't currently possible to attach single USB device to another VM). Of course you can't run both of them at the same time, but still should be possible. IMHO leaving this option only from qvm-pci command line tool is good enough.

Member

marmarek commented Mar 15, 2016

I agree those devices shouldn't be listed in Qubes Manager. Also it would be good idea to exclude system critical components (host bridge, PCI bridge, primary SATA controller etc).
But there are some cases when assigning the same device to multiple VMs makes sense - for example you may have alternative USB VM used only for video chats (as it isn't currently possible to attach single USB device to another VM). Of course you can't run both of them at the same time, but still should be possible. IMHO leaving this option only from qvm-pci command line tool is good enough.

@bnvk bnvk referenced this issue Mar 23, 2016

Closed

Implement a more intuitive Qubes Manager #1870

1 of 12 tasks complete
@bnvk

This comment has been minimized.

Show comment
Hide comment
@bnvk

bnvk Mar 23, 2016

The case @mfc brings up here, I have run into and it failed in a confusing and less than ideal way. Ironically, this case came up, because I was trying to do what @marmarek mentions

But there are some cases when assigning the same device to multiple VMs makes sense

I'll think about if there is a better way to handle this in the new Qubes Manager I'm working on!

bnvk commented Mar 23, 2016

The case @mfc brings up here, I have run into and it failed in a confusing and less than ideal way. Ironically, this case came up, because I was trying to do what @marmarek mentions

But there are some cases when assigning the same device to multiple VMs makes sense

I'll think about if there is a better way to handle this in the new Qubes Manager I'm working on!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment