Re: [qubes-users] Qubes VM snapshots using git / SVN
On 12/05/2016 09:06 PM, Patrick Schleizer wrote: Why I used git: * I found it simpler and quicker to type to manage the whole /var/lib/qubes/vm-templates/vm-name including all files using git rather than manually that folder. Using LVM or Btrfs snapshots would accomplish this far more quickly and efficiently. Its also much closer to standard practice for managing disk volumes. On Btrfs, if I wanted snapshots to contain a certain folder, I could make that folder into a subvolume and then start snapshotting it. Alternately, I could forgo subvolumes and use 'cp --reflink source dest' to create COW copies. LVM is less flexible and requires more commands, but your system may already be setup with it and it would at least give you snapshots without any need to copy large volumes of data unnecessarily. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/75ebfdfa-a3c4-a1e3-7d49-2a05a9ec344e%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: First impressions
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-05 18:49, raahe...@gmail.com wrote: > On Sunday, December 4, 2016 at 2:52:05 PM UTC-5, Eva Star wrote: >> On 12/03/2016 07:20 PM, raahe...@gmail.com wrote: >> >>> In KDE it was much easier to make shortcuts to launch specific apps right >>> in the menu. XFCE unfortunately does not make this easy anymore. You >>> actually have to edit a cfg file to do it, but its possible. >> >> It's not true. It's easy to create shortcuts menu. Right click on >> toolbar, then New Item> then Launcher. After it will be visible you can >> change settings and add shortcuts with right click > properties >> >> -- >> Regards > > I'm talking about the applications menu. what is the "toolbar" you are > talking about? All I know of to edit the menu in xfce is to use alt f3. But > that only lets you edit existing entries, not create new ones. > Eva is referring to what is called a "panel" in Xfce. By default, there is a panel that horizontally spans the top of the screen. You can right-click on this panel to add new "Items" to it, one of which is a "Launcher." The "Launcher" can be used to start apps inside AppVMs with one or two clicks. I find this very convenient, since I have a lot of VMs and there's no way (that I've found) to create submenus in the main "Applications Menu." - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYRjXaAAoJENtN07w5UDAwYCgQAKKANFBDrYG0DibQH6f9muh0 Jhnt/9eDbh0bArKnUr36V8G9hEyBaOMSHFHbbYxhmraUqkJU1dj3oGuJVbgUyZVj 4xoGBZACsHxqx/BwNlQqdRSFaGbB7DvOq2C7bCmjz/A6Z6J0+NytHNNygKRoKqsq h3Uxue08h9lcEOES0WC+CmPVAlztQ6MuDRmTFPXYnqwgGUy6MZAXkE+PXR15Izco QQz2Gcca1pP7r6H0tKHofIPT13yRADhnoigFRK2ghmsAJmk/jrJ/3kHTevQBRZPG fi6wn0ix0kakKr5l02qBDKJeNCJ9MON4x9y8Uw9kGyz3ku6m4l4uZWibPFSiYw8r wFt78Pvb6UqaFgqUDMGazI00e+DhryP1qtO/r9zLbZEoc/zi+Q27zJZzU8LrzOKm fpjWJkXT0teKMODQOu9UIsMWMXiGN20WOtKLHxbqsr2a6juafpS71AYNVE+Kwtfw vcb1dnP2B+iRHK38LI2IO6o9uOPXTsQpGFmwqIo5MQA2PczkjBq7xqX2KgIT4ex+ Il234XK1klxTVUgA2heJ0OL1bSkmIL5dS6grfhMKsizMEY/UMC7c5OMPyChaYzom 8K4ELXkuaMo+0xx934e6slcviIdH+F7aF0fstH6ARxcOidr4EX/pD/lFG0lgiEiy iUnvx+O4CLgmbWEMt8tV =oqL5 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1653e468-9d55-3ec7-71d6-6d76848f2418%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: First impressions
On Sunday, December 4, 2016 at 2:52:05 PM UTC-5, Eva Star wrote: > On 12/03/2016 07:20 PM, raahe...@gmail.com wrote: > > > In KDE it was much easier to make shortcuts to launch specific apps right > > in the menu. XFCE unfortunately does not make this easy anymore. You > > actually have to edit a cfg file to do it, but its possible. > > It's not true. It's easy to create shortcuts menu. Right click on > toolbar, then New Item> then Launcher. After it will be visible you can > change settings and add shortcuts with right click > properties > > -- > Regards I'm talking about the applications menu. what is the "toolbar" you are talking about? All I know of to edit the menu in xfce is to use alt f3. But that only lets you edit existing entries, not create new ones. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/81b1df4c-737e-4c3a-b8b0-23594bbb754e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes VM snapshots using git / SVN
Why I used git: * I found it simpler and quicker to type to manage the whole /var/lib/qubes/vm-templates/vm-name including all files using git rather than manually that folder. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8c2188b6-2b95-2cd8-4672-dc2df92957a4%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-05 14:01, Grzesiek Chodzicki wrote: > W dniu niedziela, 4 grudnia 2016 09:37:01 UTC+1 użytkownik Andrew David Wong > napisał: >> On 2016-12-03 05:07, Grzesiek Chodzicki wrote: >>> Also, you forgot to post this to qubes-announce Andrew. >>> >> Didn't forget; qubes-announce is strictly for QSBs and new releases: >> >> https://www.qubes-os.org/mailing-lists/#qubes-announce >> > My bad then. > No worries. We know that some people are only willing to receive very infrequent messages about critical Qubes announcements, and we want those people to be able to trust qubes-announce for that purpose. We know that if we start sending too many messages through qubes-announce, we'll drive those readers away, so it's very important to us to keep our promise by sending announcements only for QSBs and new Qubes OS releases. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYRht/AAoJENtN07w5UDAwpNcP/2A3YZloArvt8+d4JLxNeNTk HiMjxAQE2h4SIUQSESjprFi52NUCpTFo/81UcC1pT6dHMPSWKHAZuOytChSnBqHI A86vWbLP92uoqVJKuiGyhu5nAVP9EQBnKMV8ki3GbMzABNjeCIGvpuoGY3clDrIY mc3yS9ArAKrPK99Ovkeuhbi80xrwHCjLyxAD6N0StF53VDsG22Au1mVGuDKwJqWk isZKwyFl/9IG2LgTnNcIjWdv+SDGEi/g1HF0BcUcoG+rxa5O2tLlxJze9e5mdFo/ 6eaIjOrJmNEDZYFRpzNzG7aI3Z3P1td2GpqgKMezsvN7r7ls7RsYY5hnwfvsfmKJ 9YtKC7ALZxAmob+x9bUYWbRum/si7ob777nawAmTBj6irN7FCGrYRxQLFPLolkcm Z9Sf4xhTF9WwLit0zSxSK5HqRRT9cfHpj21c1vN3Xb0kaBjSZlve4CmxGcOLiaK5 XYaRkqAWJ0wcf5ayMDE2Pkze1q3ICjHD39tr5onsMEOj3+815sipHhvZn+5Holp5 nw+RHdACo7QbJUv4Fl0QakgdysXIcNJrSkIgp3WZ/1pTuWEf8te9VGJrDNcos9Or +MvtOU9XFwH0z2eQCq1nSRucHoEcr2XKE4pA93dh/9HgbK7Ql78gXdbTK2N1BWLj 87eAVCfNsdCayrz/uVMe =q9LD -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ea52a1ec-2add-4534-638d-5a99ca291b0e%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-05 09:18, Patrick Bouldin wrote: > Hi Andrew, ok - after reading it a couple more times I got the total gist. > Not sure who all was hired but hopefully there will be sufficient marketing > efforts to get them funded long term. > > Thanks, > Patrick > > Dallas, TX > Just to clarify, I'm not aware of anyone having been newly hired specifically in connection with this announcement. Rather, I think the idea is that any funds donated through Open Collective will be used to pay individual developers to work on the open source edition of Qubes, whether they're developers who are already working on Qubes (who are listed on the Team page) or new developers hired in the future. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYRhpWAAoJENtN07w5UDAw7IoP/AptSAnCHu0tA6Ojhlx2iVHd ux6Qmt7edr8EFsrQLF+nAEluyWvt2yF48sFYHyX6a7EX+WQq5sRFJ+c0xkiLRjql l8giDlrPs1EfxVptdSYWZJh7L1qnO80CmaxXBK3mkwtCQHvktOqW5xFsKFYwC6Ze K69hqUD/TPRfq30fW+c4L1TMVt2K9le5XxU+djKSIpOwqUTxisSIy1yvv6r19o3B MiRgAj1VTl+NxHc7K8PzJbJMOZ5v3s+T5CoBy6fYYmntWkt1vBKuFjjTRoRtXRqt 56DSUnxRv1DKbO/r8d860kjDhxjFkLy4ZFo3BodxtqArOzmZITDu4V8Vhc47I1hf V/zfPGWZGYOS4zGcxkRzGJugnEAVV36a5/grCILihD2M8zxp8cAQOt/z20ryeMZ3 pYO43YFw2WZ2dNlBX55ph/gNWwHvIKpIJZN+NEk10/NuCiHnXP7BKYzIIcWylX7K ofD1kTH7WG1XxHI+73rYZqXQXjxNilFSkwZYz2JXmacKp/ap/dMwJabeRnPjv/vo 8fbwFF2dpQ+iydM9vKfaq0upCuwXAEeaQLkjlKhkak5xp08dAxjmBIVrGrjOuXQ/ 5BoESHkYjgiZLhoiOKngeeNNgN65y43dQDJ3PpP4NybueAgF+zlUta7SiZizcVqj wJ+h8ZpUezefJ7oi0ArX =ymxe -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d8d8e886-6b1c-5986-bdc3-a327c048335b%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes VM snapshots using git / SVN
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-05 12:03, Patrick Schleizer wrote: > Has anyone used git / SVN on huge Qubes templates (in case they break > during upgrades or for development purposes) for snapshot / rollback > purposes and can can share some tips (for speeding git it up)? > > (Since qvm-revert-template-changes works only on templates and can > revert only to the previews state, not any after multiple VM restarts.) > > (Previously posted here:) > https://forums.whonix.org/t/qubes-vm-snapshots-using-git-svn > What are the pros and cons of managing templates under Git (as opposed to, say, manually `cp -r`ing a template directory)? Pros of Git: * Organization (timestamps, metadata, commit messages, etc.) * Saves disk space? (can't be much, since Git has to store every distinct binary file) Cons of Git: * Complex operations performed in dom0 (non-zero security risk) * A lot slower than `mv` Is this accurate? Are there others? - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYRheRAAoJENtN07w5UDAwKJgQAKGDVbcobfdLqPePDLk/QeVu 2hmYvl57EEiRbjGme5EKxGsu/aZD6/Oqeb4NN1XjGWGk4V5YHaYJUoeoRB5aFgWo NXykuuCcAhbmTCBhJsarczvfOm09LpynUYOm77vqyrNsQZe9V/2EerkUb7U7mUrJ E8xTJcAzSTKAEQXCsp98kuKgzI2OOJ6frBIcA1u5xlaYKkSskfr85hF+xIuD/cWm ZD2Mdz/R7uoNqah/x/sQVaxlwjGR8e6+SG06Oz5hfRBCtV4JS/qgCtP/gD5zwDtW F2zMXzAtGVttSCAdj44AcxMTArywLRrQXQhxBeNCqsEUBHZYLsjQvN3XSYm9dteF PFDe1GsIOKCOIyebO6dsdeUWhByncLhYCxFXBQGLykSKP894CP6WCJm9LB1SxuqX ZwiFZDOlAVPi8tDPcNAMf9FEoshdZ/l/Z6gm2XgB2ettmgN6Uy2QqJ3jvkE4XEIM 8Kep2HORQ4/3kd0LNXuN1as0eNNQ9cRKKMA2fSwfU/zlZLB2QvDtKs3wP6HO5eUx 8cODVfJTQsToyZYwGLYKERFxTZKz8Lows7W8HJ0QbiEZkeKjTVQvoK3YQkBYZqSD kicfnfhn7a+U0z67YeHXeH0goEdLJHGlKPnYb4HyJeH9HhnnWixJwwKb+C0WlFvA /4BTnVxGWDPJCmNJgEvc =aNz7 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/920cc608-8e35-2806-5939-e7353b0a1605%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] qubes wifi driver
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-05 11:12, Alex wrote: > On 12/05/2016 07:51 PM, rch6688...@gmail.com wrote: >> How can I install the driver for Broadcom BCM4312 in Qubes? >> >> Difficult to install in dom0 because of no connectivty. Installing in >> a Template VM not working; possibly the dom0 driver ssb is overriding >> the Broadcom driver. > You should not install the network device in dom0; you should install it > in the netvm. > > Long story short: try to install your drivers in the template you use > for your netvm... > Correct. I'm not sure about Broadcom (which historically has been highly problematic on Qubes), but with a lot of Wi-Fi devices, your best bet is to search with `dnf search ` and install the appropriate package from the repo of your NetVM template's distro, if available. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYRhVPAAoJENtN07w5UDAwWz8P/R0Z/CiCI1gBuC0n/DZKVCBO hwi/OaoWJ6zOZD15d2wrJY+7Lme29/fUblaRu0NJ3/X+copSQnXHgstTOjFUC2Rh qdvCM7VLsWLPeBbmQWp7PGgxpShlKrygDz/glV6sWLPZjwh9qgik746AQ47hdnyg SjNAH7qHXRatYmtWBP0kxYB2gGWJCagCEJoezpeoibNbx40pXom0h2UlcI+DVIE8 qXkkkQgGlwL3jfgA0bs36SoKuGX8aUXWj77rj4QlC5N+g63dlZFf9FQDSHwyX3H5 g/KRlXmhAD6XzdAOr/pOgF1q+v1wgdQbgGkPBQ+Q64dVUSfZJeELe14xF48Emk7S /jcQLaiJONiYWeJulAamIVga7ywNG0e3Ui5SDglFw3wEROmpHLu4y6/2U4c8YeN8 8O6yqtX0FUj3t7dcj0imrURgfV2eCz46vl7wcv3TBlStKyvMcQMqp+J2ChbPKzHL 9VWMYMBza0q254Yt021Go3Z8FrsAQn884iYHOj0F9coq0uyyoBxkUHt4hl7owGRw uGHU4sSldNDKUnYF6SsPPZPtRsuGyDu6x866AOfc4iRG5P735hCFtS49H0oM4FYT PsA6EWHo38IqqfGvBGl6F7lsZSoRb6cD0QGhCUXT9XN55uMmqk38OJ9uKTR+reg0 f8WVOWnW4deXkSdryg9D =SlpR -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/41aaac5f-f5e0-f901-3da0-680b9873922d%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Shortcuts of PlayonLinux
Manuel Amador (Rudd-O)於 2016年12月5日星期一 UTC+8下午7時59分48秒寫道: > On 12/05/2016 09:46 AM, peter tseng wrote: > > I installed window applications by PlayonLinux and the shortcuts generated > > in /home/user/desktop. then I copy those shortcuts to > > /usr/share/applications but I can't see any of them in Add more shortcuts > > setting. I surely run qvm-sync-appmenus XXXVM. Any solution? > > The destination directory — was it on the templatevm? > > -- > Rudd-O > http://rudd-o.com/ yes, it is templateVM where I installed window applications. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/358e0eac-6609-4796-b964-ef8ede69acd4%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Booting Xen directly from GRUB2 command line
Just as a heads up you can load a grub config file with "configfile (DRIVENAME,DRIVEPART)/blahblah/grub.cfg" Great for testing pre-baking it in. On 11/25/2016 07:37 PM, Duncan Guthrie wrote: Hej folks, I have installed Grub2 as my Coreboot payload, and now I want to boot Qubes from a USB drive. Since I haven't made any changes to Grub2's default config, I am trying to boot Qubes from the command line Grub provides. I do the following: set root=(usb0) linux /isolinux/vmlinuz initrd /isolinux/initrd.img This is clearly wrong though as it boots without Xen, so when Qubes loads, the little bar only gets to halfway then it crashes into a rescue shell. What I want to know is how I can boot Qubes from the Grub2 CLI then I can install it. I don't know the right commands. D -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d8927e0a-c717-706b-37a1-b113f959e491%40gmx.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts
W dniu niedziela, 4 grudnia 2016 09:37:01 UTC+1 użytkownik Andrew David Wong napisał: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-12-03 05:07, Grzesiek Chodzicki wrote: > > This is a wonderful idea, there are about 20k Qubes users out there, if we > > al give you guys an equivalent of Windows license price you should be set > > for a millenium. I'd also love to see some Qubes merchandise available to > > buy so I can up my swag game while simultaneously contributing funds. > > > > Thanks! The merchandise ideas has been discussed internally, but we've > decided not to pursue that option at this time. > > > Also, you forgot to post this to qubes-announce Andrew. > > > > Didn't forget; qubes-announce is strictly for QSBs and new releases: > > https://www.qubes-os.org/mailing-lists/#qubes-announce > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJYQ9WhAAoJENtN07w5UDAw9pEQAKdkd/X7l9SwDJHHaWhVHDFp > CSe0lFuLCbnjQiPH34ygV7oRGAoi5Tmqg/AEnxczpmy9hNZ/TYYHx85h1nwa3T7Z > hhE+8jJgPHsvtpBV37GZwSl/IG0YyUInQ0yaEwCSKFDNGSkb5kn/mWdF3745QgNe > tIn5cyHF5skswcFwxh+6TJFnIN9sAiHbDvqHNbNb5lyFShxyBklt55hmybzZ+2Y8 > qopYmMR4MYYRBuzeKx4PPqfBF4+uEHEA9jQzpQBxclpSY4MPGOvgt0gBs+OPBWLG > VGdgcL2yzZIz5667YEO1NVu3FIlKH0B7128tcYEBV5wGTi0KNud7T7kVNSP5Qbvz > BTbaYpri8U/I+i1djHb9aHXkGzMn7oXznwOgCfFJ31YQivjym/E3c/j7ChRqNg0d > FcEQ3Qljz/Qn7LgO94Oj074sFTgBcjKb7pudfByMw1LJrdskCsdiDAGk2u30bLXP > /0l9QRC046NfEjEhVFHZqBpEqEoPiXMDizIy6antlyZx5BrlnIOv1iqETV4gUxaa > WKZx1GTWFZISsGqhPIjGtiO+WLDvhC0QoAzU0dBgxM+4/W3WmP64V1bv4PB5Achf > eYX46kT8SDMLJSVGlD7GQJYpVdbdAUZJfL1TgVTu1+l2xqWRV9F7pzRs5XopmQOX > X33rxAH+Bhc4yM7i41Uv > =GeRw > -END PGP SIGNATURE- My bad then. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6133abb5-d83c-4b85-8441-16593179edb6%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes VM snapshots using git / SVN
Has anyone used git / SVN on huge Qubes templates (in case they break during upgrades or for development purposes) for snapshot / rollback purposes and can can share some tips (for speeding git it up)? (Since qvm-revert-template-changes works only on templates and can revert only to the previews state, not any after multiple VM restarts.) (Previously posted here:) https://forums.whonix.org/t/qubes-vm-snapshots-using-git-svn -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e68dd70e-3831-621d-a842-13d7802f845a%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] AEM boot doesn't load serviceVM's since Xen 4.6.3
On Sunday, December 4, 2016 at 10:27:19 PM UTC+1, Marek Marczykowski-Górecki wrote: > What exactly you get when starting sys-net manually? Also, take a look > at /var/log/libvirt/libxl/libxl-driver.log and > /var/log/xen/console/hypervisor.log for any related messages. For > example you can use `tail -f` while starting sys-net manually, to see > what messages will show up there: > > sudo tail -f /var/log/libvirt/libxl/libxl-driver.log It says cannot create qrexec-daemon. During boot it says "Failed to start Qubes NetVM startup" and "Failed to start Start Qubes VM sys-net"(and some more for the other serviceVMs) This is the log from libxl-driver.log: [user@dom0 ~]$ sudo tail -f /var/log/libvirt/libxl/libxl-driver.log 2016-12-05 17:24:33 CET libxl: error: libxl_pci.c:1047:libxl__device_pci_reset: The kernel doesn't support reset from sysfs for PCI device :23:00.0 2016-12-05 17:24:33 CET libxl: error: libxl_pci.c:1047:libxl__device_pci_reset: The kernel doesn't support reset from sysfs for PCI device :23:00.2 2016-12-05 17:24:43 CET libxl: error: libxl_device.c:1269:libxl__wait_for_backend: Backend /local/domain/0/backend/pci/4/0 not ready 2016-12-05 17:24:43 CET libxl: error: libxl_pci.c:1321:do_pci_remove: xc_physdev_unmap_pirq irq=16: Invalid argument 2016-12-05 17:24:54 CET libxl: error: libxl_device.c:1269:libxl__wait_for_backend: Backend /local/domain/0/backend/pci/4/0 not ready 2016-12-05 17:24:54 CET libxl: error: libxl_pci.c:1047:libxl__device_pci_reset: The kernel doesn't support reset from sysfs for PCI device :23:00.0 2016-12-05 17:25:04 CET libxl: error: libxl_device.c:1269:libxl__wait_for_backend: Backend /local/domain/0/backend/pci/4/0 not ready 2016-12-05 17:25:04 CET libxl: error: libxl_pci.c:1321:do_pci_remove: xc_physdev_unmap_pirq irq=18: Invalid argument 2016-12-05 17:25:04 CET libxl: error: libxl_pci.c:1047:libxl__device_pci_reset: The kernel doesn't support reset from sysfs for PCI device :23:00.2 2016-12-05 17:25:14 CET libxl: error: libxl_device.c:1269:libxl__wait_for_backend: Backend /local/domain/0/backend/pci/4/0 not ready 2016-12-05 17:29:34 CET libxl: error: libxl_device.c:1269:libxl__wait_for_backend: Backend /local/domain/0/backend/pci/5/0 not ready 2016-12-05 17:29:45 CET libxl: error: libxl_device.c:1269:libxl__wait_for_backend: Backend /local/domain/0/backend/pci/5/0 not ready and hypervisor.log: [user@dom0 ~]$ sudo tail -f /var/log/xen/console/hypervisor.log (XEN) 81c03f30 81d53c6a 3e55772b4f5cc499 (XEN) 81c03f60 81c03f5c (XEN) 81c03f40 81d53339 81c03ff8 (XEN)81d56b96 000206a7 000103100800 1f898b75 (XEN) (XEN) (XEN) (XEN) (XEN) 00010102464c457f (XEN) 0001003e0003 09b0 0040 (XEN) d6v0 Unhandled invalid opcode fault/trap [#6, ec=] (XEN) domain_crash_sync called from entry.S: fault at 82d08022c643 create_bounce_frame+0x12b/0x13a (XEN) Domain 6 (vcpu#0) crashed on cpu#3: (XEN) [ Xen-4.6.3 x86_64 debug=n Not tainted ] (XEN) CPU:3 (XEN) RIP:e033:[] (XEN) RFLAGS: 0292 EM: 1 CONTEXT: pv guest (d6v0) (XEN) rax: rbx: 00012c00 rcx: (XEN) rdx: 81a3f810 rsi: 003f rdi: (XEN) rbp: 81c03e70 rsp: 81c03da8 r8: 0011 (XEN) r9: 0168 r10: 0001 r11: (XEN) r12: 000a9b00 r13: 8000 r14: 000111d0 (XEN) r15: 0011 cr0: 80050033 cr4: 000426e0 (XEN) cr3: 000333409000 cr2: (XEN) ds: es: fs: gs: ss: e02b cs: e033 (XEN) Guest stack trace from rsp=81c03da8: (XEN) 81d57b3a 0001e030 (XEN)00010092 81c03de8 e02b 81d57b3a (XEN)81df7920 81c03e10 (XEN)0001 00111d00 00012c00 12c0 (XEN)7ff081c03e88 0013 81dfc020 db3d2ed3ec447c09 (XEN)0100 81c03f00 81df7920 (XEN) 81c03e88 81d5e406 0100 (XEN)81c03ef0 81d5bd08 0010 81c03f00 (XEN)81c03eb8 db3d2ed3ec447c09 697a696c61697469 db3d2ed3ec447c09 (XEN)
Re: [qubes-users] qubes wifi driver
On 12/05/2016 07:51 PM, rch6688...@gmail.com wrote: > How can I install the driver for Broadcom BCM4312 in Qubes? > > Difficult to install in dom0 because of no connectivty. Installing in > a Template VM not working; possibly the dom0 driver ssb is overriding > the Broadcom driver. You should not install the network device in dom0; you should install it in the netvm. Long story short: try to install your drivers in the template you use for your netvm... -- Alex -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8e21cfa1-5e9f-23a0-6030-e4453fbb77c7%40gmx.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] qubes wifi driver
How can I install the driver for Broadcom BCM4312 in Qubes? Difficult to install in dom0 because of no connectivty. Installing in a Template VM not working; possibly the dom0 driver ssb is overriding the Broadcom driver. There is documentation about this online but it is old, sometimes obsolete and generally confusing. A clear, up-to-date explanation would be great. Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d8b71980-b508-416d-94d7-f968ac3a4721%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Intel Wifi not detected in network manager debian net-vm
Solved with: https://groups.google.com/d/msg/qubes-users/BJRnCNcDtoo/QUXiHApxBQAJ Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0f714b81-1c63-4c04-990e-b4a65c97b7ee%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Intel Wifi not detected in network manager debian net-vm
Hi, I'm trying to setup a debian based net-vm, I assigned the hardware and installed the firmware, but the network manager doesn't see the interface. user@sys-net:~$ ip a 1: lo:mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever user@sys-net:~$ lspci 00:00.0 Network controller: Intel Corporation Wireless 7260 (rev 6b) user@sys-net:~$ sudo modinfo iwlwifi filename: /lib/modules/4.4.31-11.pvops.qubes.x86_64/kernel/drivers/net/wireless/iwlwifi/iwlwifi.ko license:GPL author: Copyright(c) 2003- 2015 Intel Corporation description:Intel(R) Wireless WiFi driver for Linux firmware: iwlwifi-100-5.ucode firmware: iwlwifi-1000-5.ucode firmware: iwlwifi-135-6.ucode firmware: iwlwifi-105-6.ucode firmware: iwlwifi-2030-6.ucode firmware: iwlwifi-2000-6.ucode firmware: iwlwifi-5150-2.ucode firmware: iwlwifi-5000-5.ucode firmware: iwlwifi-6000g2b-6.ucode firmware: iwlwifi-6000g2a-5.ucode firmware: iwlwifi-6050-5.ucode firmware: iwlwifi-6000-4.ucode firmware: iwlwifi-7265D-13.ucode firmware: iwlwifi-7265-13.ucode firmware: iwlwifi-3160-13.ucode firmware: iwlwifi-7260-13.ucode firmware: iwlwifi-8000-13.ucode ... -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e4fe7ccc-37e6-46f8-b61c-530bd18ea878%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Persistent audio issues in a particular appvm (Qubes 3.1)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Mon, Dec 05, 2016 at 05:19:23AM -0800, Jonathan Diamond wrote: > When I check the pulseaudio daemon on "development" after boot it isn't > running, if I start it manually (pulseaudio --start) I see a "Dummy Output" > device in the sound settings (previously nothing would have been there) but > still no audio will play. If you want to start pulseaudio manually in the VM, use start-pulseaudio-with-vchan command. > If I move the "development" private storage to one of the working Fedora-23 > appvms e.g. I overwrite the private.img of "personal" with the "development" > private.img audio stops working there as well (I tried clearing down the > .config/pulse directory under the users home but it didn't help, I'm not sure > what other user state there could be). Take a look at ~/.xsession-errors - maybe pulseaudion fails to start for some other reason. Also take a look at `journalctl` output when it fails. > Can anyone provide any more suggestions, particullarly perhaps how the "Qubes > VCHAN Sink" is provided? or maybe I am kicking pulseaudio incorrectly and > there is a better way etc? There is 'module-vchan-sink' providing it. start-pulseaudio-with-vchan script take care of loading the right module. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYRaC+AAoJENuP0xzK19cs5jAIAIB471TCpMDT0udq7c99f9ii Rjkdg/8sK+gkmJGXAC8PKUdCONBsvTgbGI4F5eTU1dAB0vHBfKjNZUZtq5YuTGii TwqfwejYdBY16FpLfhawGyYiCO7BHV4mtN98a6FwX38BW9v+j4KCabXBIpcVXZ1z 3kn5yk/CNdLoxeCgZQwEmGPNNmHfSBijEfa0Py2ghhwZ2891IuIVYfWkfmmunDZN 6Nwfk9IDTdKrP8zuLjtBEFNEBYGqu8dyBwCdjzBNMi4dRk4tvoN+W44F5pOp3Kg3 F6Ei2Ii7JTqRw8tJYQUQvxs0+ZUYKpfzVpBZwhlWOzcjdMbmtjW50T41cjSNZPM= =/04D -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161205171540.GC1145%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Install on Dell XPS 13 (9350)
Hi. A simple solution is to use PCIe permissive mode, which weakens device isolation. Please refer to "PCI passthrough issues" of https://www.qubes-os.org/doc/assigning-devices/ Although there is a dmesg saying [2.411487] brcmfmac :00:00.0: Direct firmware load for brcm/brcmfmac4350-pcie.txt failed with error -2 wlan0 works as expected. Thanks, miaoski. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/68146215-5a2c-46b3-bf02-474a38e52cc3%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Install on Dell XPS 13 (9350)
It's very weird that "SB chip is not supported" showed in dmesg. According to http://lxr.free-electrons.com/source/drivers/net/wireless/broadcom/brcm80211/brcmfmac/chip.c#L932 , it shows only when socitype == SOCI_SB and chip is not BCM4329. Given the chip is BCM4350, socitype should not be SB. But I'm not good at driver debugging ... Help is much appreciated. Thanks, miaoski. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/183d65be-4a5f-4361-897b-99357d9f35b8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Issues with debian-8 qrexec service
Fixed. Quoting marmarek: "Missing libxen-4.6 update seems to be the cause, just uploaded the update. Also, enabling testing repository should be enough (the package was there, but I missed uploading it to stable). So, to fix the issue - start the template, access its console (sudo xl console debian-8) and install updates (sudo apt-get update && sudo apt-get -V dist-upgrade)." Thanks! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/58daabd0-ee97-4d91-ac01-ad8dd10888f5%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Persistent audio issues in a particular appvm (Qubes 3.1)
Hi, I have looked at similar audio issue posts and whilst some are similar none seem to provide any answers to my problem. I have an appvm based on a Fedora-23 template, I also have other appvms e.g. the "personal" and "untrusted" vms based off the same template. The "personal" vm I can boot and play audio without issues, the "development" vm will not play any audio at all this appears to be a pulseaudio issue (this hasn't always been the case it was working fine about a week ago and I cannot think of what changed). When I check the pulseaudio daemon on "development" after boot it isn't running, if I start it manually (pulseaudio --start) I see a "Dummy Output" device in the sound settings (previously nothing would have been there) but still no audio will play. The fact that audio doesn't work after restarting pulseaudio isn't really a surprise because even on vm with working audio ("personal") if I run "pulseaudio -k" followed by "pulseaudio --start" I find that I have lost audio there as well. Following the restart of pulseaudo the output device is always displayed as "Dummy Output" whereas when it is working it is displayed as "Qubes VCHAN Sink". If I move the "development" private storage to one of the working Fedora-23 appvms e.g. I overwrite the private.img of "personal" with the "development" private.img audio stops working there as well (I tried clearing down the .config/pulse directory under the users home but it didn't help, I'm not sure what other user state there could be). When the audio isn't working I cannot attach audio devices to the vm in qubes manager which is the easiest way to spot the problem has occurred. It's not the first time I've had this issue but it has always gone away in the past, this time however it seems more persistent. All appvm settings are the same e.g. devices etc. Can anyone provide any more suggestions, particullarly perhaps how the "Qubes VCHAN Sink" is provided? or maybe I am kicking pulseaudio incorrectly and there is a better way etc? Obviosuly I could migrate my private storage away from the vm in question and trash it but I'm hoping something can be learnt from this problem. Thanks for any help. Jon -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/38f6d888-3f20-4128-b6ef-38b8a6ba7282%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Shortcuts of PlayonLinux
On 12/05/2016 09:46 AM, peter tseng wrote: > I installed window applications by PlayonLinux and the shortcuts generated in > /home/user/desktop. then I copy those shortcuts to /usr/share/applications > but I can't see any of them in Add more shortcuts setting. I surely run > qvm-sync-appmenus XXXVM. Any solution? The destination directory — was it on the templatevm? -- Rudd-O http://rudd-o.com/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/eebf6758-6a19-e538-bf7f-327ac44ded56%40rudd-o.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues
Am Sonntag, 4. Dezember 2016 22:59:28 UTC+1 schrieb Marek Marczykowski-Górecki: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Sun, Dec 04, 2016 at 12:18:23AM -0800, Benjamin Richter wrote: > > Am Sonntag, 4. Dezember 2016 01:33:31 UTC+1 schrieb Marek > > Marczykowski-Górecki: > > > > > > I've attached the ethernet dongle to the same port as the logitech > > > > keyboard, but it does not show up anywhere. > > > > > > If you see the device in dom0 in some configuration, take a look at its > > > sysfs path - it will have a hint on which controller is it. Like this: > > > lrwxrwxrwx 1 root root 0 Dec 4 01:32 /sys/bus/usb/devices/3-1 -> > > > ../../../devices/pci-0/pci:00/:00:02.0/usb3/3-1 > > > > > > - -- > > > Best Regards, > > > Marek Marczykowski-Górecki > > > Invisible Things Lab > > > A: Because it messes up the order in which people normally read text. > > > Q: Why is top-posting such a bad thing? > > > -BEGIN PGP SIGNATURE- > > > Version: GnuPG v2 > > > > > > iQEcBAEBCAAGBQJYQ2RWAAoJENuP0xzK19csKxMH/3rkY6pxlWVSjltPRc1r2jGn > > > njWyqDEA6Zoe56gAQ3zS1ORX54hgpEw6omZgzB3bY9KI2U3ihLncJ4jF8mVwxa+S > > > rTCFF1Flqp8Olk2jTXc2lobdLcOQBMQXXfNq4GbpHkl0C+ZVIa1n7lndfJI9WA21 > > > TKA3gsW/SY8EgBjYtFO0Emnhr5WMi3jYyt/qSWU8jrYn92IoZnx6CbpQp8xA/S8L > > > KLvt7WUnBjuFX+k4z9hodXHq6eU00YNqOEI4fm0+y92PPSjIGKbDhClCstSMMXRE > > > RqlbJmWpBasYBPm2pOg+1C0Vkeg593TtxahLd2k8MuFZUjrCjY4OXwA7+YkHFRA= > > > =4hF8 > > > -END PGP SIGNATURE- > > > > That's really quite clear, here's a lsusb output from dom0 with both usb > > controllers. Here the ASIX and Realtek ethernet deivces show up on bus 004. > > > > Bus 004 Device 004: ID 0b95:1790 ASIX Electronics Corp. AX88179 Gigabit > > Ethernet > > Bus 004 Device 005: ID 0bda:8153 Realtek Semiconductor Corp. > > Bus 004 Device 003: ID 05e3:0620 Genesys Logic, Inc. > > Bus 004 Device 002: ID 05e3:0620 Genesys Logic, Inc. > > Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub > > Bus 003 Device 004: ID 046d:c51e Logitech, Inc. > > Bus 003 Device 007: ID 1e4e:0898 Cubeternet > > Bus 003 Device 006: ID 0572:1703 Conexant Systems (Rockwell), Inc. > > Bus 003 Device 003: ID 05e3:0610 Genesys Logic, Inc. 4-port hub > > Bus 003 Device 002: ID 05e3:0610 Genesys Logic, Inc. 4-port hub > > Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub > > Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub > > Bus 001 Device 004: ID 0b05:1838 ASUSTek Computer, Inc. > > Bus 001 Device 003: ID 8087:0a2a Intel Corp. > > Bus 001 Device 002: ID 04f2:b5b1 Chicony Electronics Co., Ltd > > Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub > > > > lsusb of dom0 after attaching the controller to sys-net: > > Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub > > Bus 001 Device 004: ID 0b05:1838 ASUSTek Computer, Inc. > > Bus 001 Device 003: ID 8087:0a2a Intel Corp. > > Bus 001 Device 002: ID 04f2:b5b1 Chicony Electronics Co., Ltd > > Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub > > > > and of sys-net: > > sudo lsusb > > Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub > > Bus 003 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub > > Bus 002 Device 004: ID 046d:c51e Logitech, Inc. > > Bus 002 Device 006: ID 1e4e:0898 Cubeternet > > Bus 002 Device 005: ID 0572:1703 Conexant Systems (Rockwell), Inc. > > Bus 002 Device 003: ID 05e3:0610 Genesys Logic, Inc. 4-port hub > > Bus 002 Device 002: ID 05e3:0610 Genesys Logic, Inc. 4-port hub > > Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub > > > > The Logitech keyboard attached to the docking station is there, but neither > > the asix dongle nor the docks ethernet port show up. It seems dom0s usb bus > > 004 got lost somewhere. > > Interestingly, if I switch the ethernet dongle and the logitech keyboard, > > the keyboard shows up on another port, but the dongle does not show up. > > > > I have no idea what's going on. > > It looks like none of devices from that bus show up (just root hub). > Anything interesting in dmesg there? I'd recommend looking for more than > just "grep usb" - for example some messages may contain only xhci, or > just pci BDF. > > - -- > Best Regards, > Marek Marczykowski-Górecki > Invisible Things Lab > A: Because it messes up the order in which people normally read text. > Q: Why is top-posting such a bad thing? > -BEGIN PGP SIGNATURE- > Version: GnuPG v2 > > iQEcBAEBCAAGBQJYRJG7AAoJENuP0xzK19csxUMIAIRJL6cJEwZhTWJ6+VubNKl1 > nlZ//ruZ39jmXevc3GCQQydxyxcpF96ZXXTeAHjHp977nLSqByeD1DjdJdaIrCVW > MExKtvHWX3Bz7ddgMdoIWAGF8j4VbLC4thjgxFxuvbnHYVcZcq31CXb8ipcKXyTl > YyNMSEhAtx+FLIk0NNI+mlVLpUEfg2fGH1bRCewkY+Ptu9PingXi+M/AR4BIAACt > ri8nVL3yhAIcxoeV3sdBPnSEzijb6iBBz7KpbGvSsxRgua3cYuGJnKCrZ2oTv6CF > vEbr5ekTIHOuhj12T5kvqPRtTOR4RWCN69brGksMjMSjN9zyYGHQSVytRZesA/Q= > =r5Zg > -END PGP SIGNATURE- I really can't see anything in there, but i've attached the log, maybe I
[qubes-users] Shortcuts of PlayonLinux
I installed window applications by PlayonLinux and the shortcuts generated in /home/user/desktop. then I copy those shortcuts to /usr/share/applications but I can't see any of them in Add more shortcuts setting. I surely run qvm-sync-appmenus XXXVM. Any solution? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cc790995-6da5-4722-b8b4-ce5089b7c115%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Newbie surprises
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-05 00:57, Alex wrote: > On 12/05/2016 09:40 AM, Zbigniew Łukasiak wrote: >> 2. The suspend button activates a popup that says: >> >> "Do you want to suspend to RAM?" >> >> This is a bit confusing - I thought that suspension saves the RAM >> onto the disk, not in the opposite direction. > There has always been a lot of confusion with this, but usually: > - suspend means to RAM > - hibernation means to disk > Different systems may have confusing wording.. Even Windows has a story > of changing the meaning of sleep/suspend/hibernate. > To expand a bit on this: Xen supports only suspending to RAM. It does not support suspending to disk (hibernation). >> 3. Initially I did not understand how can I change the templates. I >> thought that to have additional software or to make any special >> configuration in a template I need to create a new template and I >> started reading the documentation at >> https://www.qubes-os.org/doc/qubes-builder/ - that was really >> confusing. There are also additional questions that the docs don't >> answer, like if the changes in the template will be visible in a vm >> based on it and if yes - then when? > You can simply boot the template: it will start with its root in > read-write, and then you can add software and shut the VM down. > > After you start (or re-start) any AppVM based on that template you will > find the software installed. This happens even if you install it > manually (e.g. by copying something in /opt). > > If you want to try the software before you actually install it, boot an > AppVM out of your template: according to the summary above, you will be > able to do "sudo dnf install xyz" and try it out, but everything out of > /home and /usr/local will be gone after a reboot. > In addition, take a look at this: https://www.qubes-os.org/doc/templates/#important-notes - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYRS9zAAoJENtN07w5UDAw6GYP/iIbAcYtYh9oZXWTRK8yrlmC qcd7sCRLlWzYc6YACS4oMbvGmBD9IxdUrnZa2NCpGDcvhrruFHOoO2R7jbMu7tdd ceAUepSncY0nCHYjJamD1onYGlnniIWgkAYCeeWye76oYK+kSArQz7PxRGjAneZJ me5pK2CJipXRB/OduhhS9S8Po6ekrqSuZCXmLGqrc7yBiZCvVBq6D/1kh+k39tdZ 9Rsxu6+HNIUBr/KQKr/1kCQ7SYzyNaeIKfp81ZRNd2nbmDuPHRyZdeTVA5a153+I 5If1pPFe31PMHxQenGBNCBMqTfNKw5HGTZHzaL70QAAks5z0KneRPfcNtf9CUGuf dzA5bi99FpzYOIERg905tUyoFllxcZ8+rvw/ukCHUwVPl9+0ruKO6Bqe1DZytk5o ZUsFvaJyosJ8mUciMMXqFkV9IupZiW2aFdIClHhG5WqgDca9dBjTZvX8HesxWoHo eCiMLInhn0LfMT5BdFxKe60mmFv8acQt4maVXSXuykKZrBmxTZbl3txFPxGk1H9u fmNNiM5uPV0b1dTqQbt4C4yLu6ve/nv/qqzBrU4Mb4I+yAW5OmS/+/9nwEUV8Bk+ ZRKGgTpCIzCmmQY+sONGymd4I12zSpNRlyQRmmSpe8qYDljH7+9ZxnIuPfZmstbA 0wXbJFzQKvnw3zlqxl6J =62cV -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9cf2-ff42-9b30-bc63-79175382b022%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Issues with debian-8 qrexec service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-04 21:26, jkitt wrote: > I'm not 100% that this is the issue but I'm having troubles running anything > with qvm-run on a Debian-8 template/app-vms. This happened after a recent > upgrade. Fedora template/app-vms are working fine after some initiation > problems (I have to killall qrexec-client in dom0 - possibly because it's > hanging) > > Right now I can't run anything, and I don't know if it's related, or an > unrelated bug (as I've seen it previous), but the qubes manager indicated > remains yellow on debian based VMs. > > I struggle to give you all the information you probably need - I don't know > much about Xen or Xen tools. > > Thanks. > Tracking issue with (probably) the same root cause: https://github.com/QubesOS/qubes-issues/issues/2484 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYRSzsAAoJENtN07w5UDAw9L0P/0uqQWjMkuKXt6b8yKEgZsPo /YNml4rvWFPCmWTp5sM26kPDdH9wZ1gxvckj1Jm/8g/rA24uGrJnrRtrz8oFy2ce B0VXddnjjteigFbQaf76EJZb4SdMv/+78UvPShGR5YZt+yhQOf8EsE4Mw6eyksuA EXQGoYTwNkDYZ6y2/oOKVh0wRhbb7wYRTSpTbT3jF5jwpg/yO42SZ80U1MJ8133n d9BoQ+CIIWmCGUaepqxhp9kxx67aO0cPCjFBp4Bl847ifhytNKIT53UTWxIO00fD g4qLpWqMhk4gJCvxHou3ubVi+TJDDwZQ7AsGVxEGjouK/lSz9J5wnA6oG7JKaQgg dfBa1ZQDclzBY+YSQSXCCj0qAKfv3BerRCfcRSzcBjrRb91X5UZ/BIjncelkPgGv k5V4T9kHArZejBhsZTE5aE6TCOXoJvOFGjM61zP/1StkDS/hgIePAEVA1D4sfOjy dlXiDV8WoxeiKkbXUFRgMSovceFvw9Oi+UoRuqaecswK1eorE2OzvMFsIa7aTcYf A76+Zxnj45UVssfZehFLIiX29aVLR1x2j8Xp1NQN1pV9WlOoNB81cN5smbA1uJTy HUo6PUYUwq8pjrujpjY8cOglvf/LRxeW/M6dz3DUlIcj36/7yC8BS4J4p+xYzOIj S7TigFWXb6aMKoPMrYrG =X9KP -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/17afd515-da1d-a820-8ac0-56b51d01e22d%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Newbie surprises
On 12/05/2016 09:40 AM, Zbigniew Łukasiak wrote: > Here is a list of stuff that I got into trouble trying out Qubes. I > am a long time Linux user (since 1993) - so I know a bit about the > Linux environment - but I never liked administration stuff. Welcome to Qubes! As you have noticed, this is hardly a typical linux system... Before checking your questions, a few guidelines for interpretation: - everything happens in virtual machines, which brings with it the fact that device sharing is (intentionally, for increased security) hard - there is a "super" vm, called dom0, which represents your physical system (e.g. it has, by default, all the physical devices and contains disk images for all other VMs) - some of these virtual machine are read-only-like (anything but templates and dom0), in the sense that only part of the filesystem is persisted. The other part, while writable, will be reset to the "template" master copy on reboot - a lot of things work the linux way, with the added complexity of having several VM at once (with intermixed windows) and something readonly on many filesystems > 1. Immediately after installation I wanted to add USB headphones to > the personal vm and I went into Devices configuration of that vm and > I added all lines with USB to the vm. I don't remember if it froze > immediately or maybe after a reboot of the vm - but I've got > completely cut off from the top level Qubes system. Fortunately a > hard reboot fixed the problem. By assigning devices via the Devices configuration you are moving them away from dom0. If some of these devices are needed for dom0 to work (say, you have a USB keyboard/mouse) then it'll look like the system has freezed. By using the Devices configuration you can only move PCI (or any other single-virtualizable) devices: this means that you cannot move a single USB device, but only a single USB controller (and all its USB device tree) at once. This is a limitation of hardware virtualization technologies: they typically work only with discrete PCI devices. Some USB devices can be proxied from the VM that holds the USB controllers to specific AppVMs using qvm-usb (after having the usb proxy arrangement set up) > > 2. The suspend button activates a popup that says: > > "Do you want to suspend to RAM?" > > This is a bit confusing - I thought that suspension saves the RAM > onto the disk, not in the opposite direction. There has always been a lot of confusion with this, but usually: - suspend means to RAM - hibernation means to disk Different systems may have confusing wording.. Even Windows has a story of changing the meaning of sleep/suspend/hibernate. > 3. Initially I did not understand how can I change the templates. I > thought that to have additional software or to make any special > configuration in a template I need to create a new template and I > started reading the documentation at > https://www.qubes-os.org/doc/qubes-builder/ - that was really > confusing. There are also additional questions that the docs don't > answer, like if the changes in the template will be visible in a vm > based on it and if yes - then when? You can simply boot the template: it will start with its root in read-write, and then you can add software and shut the VM down. After you start (or re-start) any AppVM based on that template you will find the software installed. This happens even if you install it manually (e.g. by copying something in /opt). If you want to try the software before you actually install it, boot an AppVM out of your template: according to the summary above, you will be able to do "sudo dnf install xyz" and try it out, but everything out of /home and /usr/local will be gone after a reboot. > > 4. I still don't really understand how the keyboard configuration > works. What worked for me to have Polish letters in a vm was to set > it up both in the top level environment (System Tools > Settings > Manager >> Keyboard) and in the vm (setxkbmap pl). Initially I spent a lot of > time in trying to do it only in the vm - but it failed in mysterious > ways. You can set a default layout for dom0, and you can set a layout for each VM from the VM Manager (right click on a VM, set keyboard layout). This can be done from dom0 shell too. Qubes tools will make sure the layout that's been set from the VM manager is set on reboot. -- Alex -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c33c4b9f-0537-6171-fe93-563c4a649293%40gmx.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Issues with debian-8 qrexec service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-04 21:26, jkitt wrote: > I'm not 100% that this is the issue but I'm having troubles running anything > with qvm-run on a Debian-8 template/app-vms. This happened after a recent > upgrade. Fedora template/app-vms are working fine after some initiation > problems (I have to killall qrexec-client in dom0 - possibly because it's > hanging) > > Right now I can't run anything, and I don't know if it's related, or an > unrelated bug (as I've seen it previous), but the qubes manager indicated > remains yellow on debian based VMs. > > I struggle to give you all the information you probably need - I don't know > much about Xen or Xen tools. > > Thanks. > You may want to try qvm-revert-template-changes: https://www.qubes-os.org/doc/dom0-tools/qvm-revert-template-changes/ - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYRSuVAAoJENtN07w5UDAwzZkP/2wBz1ONTbeNz4bNp9Qzgff1 iYVaX5RKH5Ahbd5LVQcF7qXeqKSIKzDIs7C5giA24N/gDNb4dhhUwEEC0KTCE2fF +HFSDxPrEVvMsS7TBoOvdi+Z/hyQLeAG7QlCgBKuf08l3HVZDRHiUVFrucpqqCRu lvgD5vnMcTQn85q8B/tLDSsqpYbrKvJBrJnUcRI+u7mGO1g6EyFUoKwvR+76+eqQ lKKsuO3fiMvzRGwQkFiHQ4vTvfWq0DY8UkZGXgDszIFC3F/qHsUC3cAdVHagXRZW Tboq5uJ9D2VvW4gWcwWqYwpSssUepXs1fdLvoQjwkadwrMAlEJkEs/tInKiV3hhW KbfGvp4udpWx6bH5/Q1r7JtjLWGC2GmcbFcBXgua3DvLPq9NxMFGNT/sumNYBkng nSm4kB33HbIqaFBabiuWZoQ5l8gkMuECbUd5Y+XiyXWyjvVD+Z+GrmAeaOQCJbRD 215aUQIcu08qvv1/KcoHZS/zJ2a++mIevcvWt4eA+MpKdOtydgpCuBNUlPD1lPS6 5A0o2Tc7oYeYgruLS5diRmfG/jRiBM6wpRPvhndGx9SGe4yLXha3TOXmk31jGyaQ dL1JHXypFzI9+lbJsNYSQDbwqWCvAceJ/hfg7NpJRmb1DcgfgKdgckP686Pybcsm 72Mn/iJlPiAaqz5X0yST =oZ1D -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/05d02326-6798-57fb-5765-2bdcee70c99a%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: [qubes-devel] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-04 13:50, Patrick Bouldin wrote: > Andrew, > > I'm very willing to donate - and well noted that you all will continue to > update the core changes in the public domain. I do understand the why, the > what and the dollars for the change - however, will there be anyone left to > work on the core, for the sake of the core? Just wondering where the donation > dollars will be going. I ask because I agree with the person noting 20,000 > current licenses. If we all sent in $100 US each then that's $2 million US. > > Is it possible to set up some separation of funding to ensure each group is > getting what they want? Set up the public funding better with separate > marketing, and let that fund improvements for the public domain (not just > maintenance and slight core improvements) - and then fund your corporate > goals using the methods you mentioned. > > As a relatively new user I'm concerned about investing more time in this and > it not progressing. > > Thanks, > Patrick > Dallas, Texas > As mentioned in the announcement, all donations made via Open Collective will be paid directly to developers who have been hired to work on the open source edition of Qubes. ITL will not see or benefit from any of that money. All from donated funds should be transparently visible to everyone on our Open Collective page. Does this address your concern? - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYRSrmAAoJENtN07w5UDAwUqIP/RYxE5CfTfzfYh7c3g3KSid/ x4o04p36NtNEvycrQ3GrjVl1o36BRG1VRxC2/IGT2zJVFrL6hRcwAfq2EAW3nITZ sgVHtblyr45y4sKvm0ZXCBnIGIt04yo/6gy40enLuy7lz4HHY5xXsyxvui1M7/zW LyLgWdIcNbBhhwYz/8sCp5yZxJX7a5gMiumNxa74b6fwPa7bMi83w67k1JDbduVJ VO54Kkf/JTc28BWdEIGRYJ/k+1APibRq6RNRbTCGs6JQWHK2Z8ZIW3a7HBr8eW38 u2N+BSmzF1iKzlcBimK6K25ERQRaQuW0q5BdfjEmHKDarMrBQ2YnAyVUjBbLDdDy tcMlt9M3xbnlwnXP62S7/2qdmqKl40/tJ/Y61kK3uVhaetJ/U2AOVkQI+f1CFKGy s1eT7/gSm2C9oafcFzPWWvRzB9HMFDUpU7gQ6+kvxx1PJtJx4J2/oGiz+VVp1cQ5 1LjwZMVaDfrmHlAiN4y/UM4LLK7pWkLrbUhBSh6GvO/AIyd7+XA+Y3Ps/gtiKegd VoYLpQ64MBdAw4YOfcx9+IRVtAGGRhHMjY+pu91SJpNJ7rCJKHbvuhCEF3X+Yq+0 uVxivVOOCB7KNjqqFrn6MpTY4r0/u9Pdk0YAfMVVRKcICHRUu5MwIrCc9BMduAMG ocLaz94qaDRirvjNZJRR =0cWy -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/77d29120-e6cf-56a7-7c4e-984eb7979a51%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Where is Chrome once installed?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-04 12:58, Patrick Bouldin wrote: > Hi, newbie question. > > I am using 3.2 and an HP I7 processor. > > I created a Fedora VM. I wanted to run a Chrome browser, so I used Firefox to > download and save in the Fedora VM file section, where I installed Chrome. > Then it asks if I want to run it, and I do - no problem. However, I don't see > a way to actually launch Chrome anywhere (other than when it asks me after > installing). No trace of Chrome anywhere. > > Any help is appreciated. > > Thanks, > Patrick > I recommend that you install it from the repo instead. In your template, issue: $ sudo dnf install --enablerepo=google-chrome google-chrome-stable - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYRSgmAAoJENtN07w5UDAwJPsP/An98ZuKbdN6ZtB5Ce0ZqAI0 /SWNnt3x3wmCtdUkIvueklKhE71jPmLDrcAeFU3xMj6romp8grq8rNNH4MHXNm3+ w3If65jnKJBq18YvUdEXQE5tDhdUB7vQRTmq7GC/0uoB475Bm3cydRPDkyIhSoOV g5sTQBM3YdANAiui5IMkCD9Mpot0/2rnzrA1EsCAswDgrY2EDoxjBLZlAFIFID3p aGHB7kUgMXcBgnuS2Wg37/vVWAO3MieX7DR+9fqQobsK2AxVUhzCkhiUpM1GYuQj dphquB5dbl3YZUB7RgO1KY/KttgWqR2G4bKd5PM/snYRrUc03QyszkGJjI2NAk/F /jN5JQlKg6K3hWENxcnyiuVzKZW2xh2FHi3FTDUu0SLDw/XjzBeGDFz6GglcG+SL fDt1GPdAI4ITrFrX3EoPiel9zSmDwY3XzjUEkQF0Z/4nl3v8uuYtAEpvq8GIlgNu 3lX/YMp2kWpbWF/Ck2QstX+3TXYCjnaSEwCuVcO3tQ8+1oaVCE4IIBa6lx85Liat KVtvQrZfcEf74ghDe9Ac6m2z5bVT5Bcw5yHdyYGqWTDmE+5GIurQlfOyIoeL68ym lO0LhvD0uHBEIIkJBuFsw7emYl901beXWlh61HQIw/H0T7zqo9KwlAHUeZhyBXWJ 9E7wSbUOnKu4zaWgFOEs =To/O -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/735895cc-8644-9672-754e-32ff050ee539%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Newbie surprises
Here is a list of stuff that I got into trouble trying out Qubes. I am a long time Linux user (since 1993) - so I know a bit about the Linux environment - but I never liked administration stuff. This is just a list - I guess I did a lot of silly things, and I don't suggest that the system should make it impossible to do that. But I hope that it might inspire someone to make it a little bit less probably that newbies get lost :) 1. Immediately after installation I wanted to add USB headphones to the personal vm and I went into Devices configuration of that vm and I added all lines with USB to the vm. I don't remember if it froze immediately or maybe after a reboot of the vm - but I've got completely cut off from the top level Qubes system. Fortunately a hard reboot fixed the problem. 2. The suspend button activates a popup that says: "Do you want to suspend to RAM?" This is a bit confusing - I thought that suspension saves the RAM onto the disk, not in the opposite direction. 3. Initially I did not understand how can I change the templates. I thought that to have additional software or to make any special configuration in a template I need to create a new template and I started reading the documentation at https://www.qubes-os.org/doc/qubes-builder/ - that was really confusing. There are also additional questions that the docs don't answer, like if the changes in the template will be visible in a vm based on it and if yes - then when? 4. I still don't really understand how the keyboard configuration works. What worked for me to have Polish letters in a vm was to set it up both in the top level environment (System Tools > Settings Manager > Keyboard) and in the vm (setxkbmap pl). Initially I spent a lot of time in trying to do it only in the vm - but it failed in mysterious ways. -- Zbigniew Lukasiak http://brudnopis.blogspot.com/ http://perlalchemy.blogspot.com/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAGL_UUvk%2BfDxHotQ%3Db9fcky4JBY85n9WBqmskPBaMnLSJ%2Brhxw%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Issues with debian-8 qrexec service
On Monday, 5 December 2016 05:26:04 UTC, jkitt wrote: > I'm not 100% that this is the issue but I'm having troubles running anything > with qvm-run on a Debian-8 template/app-vms. This happened after a recent > upgrade. Fedora template/app-vms are working fine after some initiation > problems (I have to killall qrexec-client in dom0 - possibly because it's > hanging) > > Right now I can't run anything, and I don't know if it's related, or an > unrelated bug (as I've seen it previous), but the qubes manager indicated > remains yellow on debian based VMs. > > I struggle to give you all the information you probably need - I don't know > much about Xen or Xen tools. > > Thanks. typo: indicated = indicator. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0b20bb03-50ef-44d3-a5fd-45b90ce43c7d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.