Friends don't let friends expose #usb devices to their #qemu guests, especially when #virtio is right there. The usb sub-system is one of our older ones and is currently Orphaned will all the security implications that entails. We don't need more #llm driven vulnerability scanning - we need maintainers who know the problem domain taking the reigns.

@stsquad There is a lot more to virtualization than running Linux guests on servers.

Without an emulated USB tablet there is no way to make the Windows GUI work properly out of the box. Windows does not ship with virtio drivers and the virtio drivers are not shipped in most distro packages.

To fix this properly, either someone needs to maintain the QEMU USB stack, or virtio drivers need to be in OVMF packages.

@alwayscurious it is even better than that. Even #Microsoft don't emulate USB for #HyperV guests, they have #vmbus: https://docs.kernel.org/virt/hyperv/vmbus.html to provide guest with input devices.

My shout into the void was hoping to find someone with a vested interest in funding work on the USB stack. Most of the core parts of QEMU are maintained by paid engineers but running #Windows on #KVM seems to be niche enough to ignore. Finding a volunteer to wade through 55 bugs + security reports would be rough.

VMBus — The Linux Kernel documentation