qubes-linux-utils/udev
Marek Marczykowski-Górecki 098bfb634d
udev/qvm-block: exclude device if its partition is already attached
This prevents simultaneous attachment of the same device (in practice)
to multiple VMs.
This change to be effective requires udev action being called when such
device is attached/detached to some domain. Script
/etc/xen/scripts/block will take care of it.

Fixes QubesOS/qubes-issues#1081
2016-05-16 11:53:30 +02:00
..
Makefile Fix building Fedora package after Archlinux build fixes 2016-01-06 04:21:42 +01:00
udev-block-add-change udev/qvm-block: exclude device if its partition is already attached 2016-05-16 11:53:30 +02:00
udev-block-cleanup Qrexec common code, qubes.Filecopy common code, udev scripts 2013-03-20 06:27:32 +01:00
udev-block-remove udev/qvm-block: exclude devices used elsewhere 2016-05-16 11:52:57 +02:00
udev-qubes-block.rules udev: ignore devices set to be ignore elsewhere 2016-01-07 03:00:32 +01:00
udev-qubes-misc.rules udev: allow normal user to access /dev/xen/xenbus for vchan connections 2015-03-25 00:04:45 +01:00
udev-qubes-usb.rules Move udev scripts to /usr/lib/qubes, move rules to /lib/udev/ 2015-11-26 22:18:03 +01:00
udev-usb-add-change Use Qubes DB instead of Xenstore 2014-11-19 15:10:58 +01:00
udev-usb-remove Use Qubes DB instead of Xenstore 2014-11-19 15:10:58 +01:00