New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Core should automaticaly unbind all pci devs that are assigned to a VM that is being started #252

Closed
marmarek opened this Issue Mar 8, 2015 · 2 comments

Comments

Projects
None yet
2 participants
@marmarek
Member

marmarek commented Mar 8, 2015

Reported by joanna on 1 Jul 2011 14:48 UTC
None

Migrated-From: https://wiki.qubes-os.org/ticket/252

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 8, 2015

Member

Comment by marmarek on 4 Jul 2011 23:16 UTC
Besides, we should, I think, implement some better pci dev management
support in qubes.py. E.g. the QubesVM class should offer methods such as
add_pci_dev(), get_pci_devs(), revoke_pci_dev().

Then it would be trival to write a useful supporting tools, such as:
qvm-lspci, qvm-add-pci-to-vm, qvm-revoke-pci-from-vm.

The current scheme (treating all the pcidevs as a argument string) is
not very fortunate -- qvm-pref is not able to detect simple errors (such
as missing quotation mark, and it also makes it harder to automatically
unbind all the pci devs assigned to VMs.

Member

marmarek commented Mar 8, 2015

Comment by marmarek on 4 Jul 2011 23:16 UTC
Besides, we should, I think, implement some better pci dev management
support in qubes.py. E.g. the QubesVM class should offer methods such as
add_pci_dev(), get_pci_devs(), revoke_pci_dev().

Then it would be trival to write a useful supporting tools, such as:
qvm-lspci, qvm-add-pci-to-vm, qvm-revoke-pci-from-vm.

The current scheme (treating all the pcidevs as a argument string) is
not very fortunate -- qvm-pref is not able to detect simple errors (such
as missing quotation mark, and it also makes it harder to automatically
unbind all the pci devs assigned to VMs.

@marmarek marmarek assigned marmarek and unassigned rootkovska Mar 8, 2015

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 8, 2015

Member

Comment by marmarek on 9 Jul 2011 20:31 UTC

  1. PCI devices assigned to VM are bound to pciback at VM start
  2. new tool qvm-pci

http://git.qubes-os.org/gitweb/?p=marmarek/core.git;a=commit;h=5f10e408e0ba6145b94f9eb187456efa4cd54dc9

Member

marmarek commented Mar 8, 2015

Comment by marmarek on 9 Jul 2011 20:31 UTC

  1. PCI devices assigned to VM are bound to pciback at VM start
  2. new tool qvm-pci

http://git.qubes-os.org/gitweb/?p=marmarek/core.git;a=commit;h=5f10e408e0ba6145b94f9eb187456efa4cd54dc9

@marmarek marmarek closed this Mar 8, 2015

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment