Re: [qubes-users] Re: sys-firewall freezing on resume from suspend

2022-06-12 Thread 'qtpie' via qubes-users




On 6/10/22 23:45, Demi Marie Obenour wrote:

On Fri, Jun 03, 2022 at 04:00:20PM +0200, Qubes OS Users Mailing List wrote:

So, apparently, this is not a sys-firewall, but a clocksync issue. To root
out any causes, I moved the clocksync service to a separate, brand new qube
(named sys-clock). And voila: sys-firewall no longer 'crashes' on resume
from suspend, now it's sys-clock.



The cause is probably somewhere in some logfile, but with the many moving
parts, Qubes really needs a better bugfixing howto. With relatively many
minor bugs like this, bugfixing takes too much time. I don't mind spending
some time fixing bugs, but lately it is really becoming too much, to the
extend that I am considering switching back to an easier regular Linux
distro. I have been a paid Linux sysadmin, no total expert, but that is also
not a requirement to use Qubes. I should be able to diagnose bugs on my own
laptop (and contribute to the project by properly reporting them).


Indeed, you should be able to.  The fact that you cannot is itself a
bug.  Please report it.



To prevent soiling the issues list, and make it a little more 
actionable, let's first discuss this here.


What I need is a little more help with fixing or adequately diagnosing 
bugs, as a sysadmin level person, no programmer or Xen or Qubes expert. 
As said, to be able to fix or report & diagnose bugs and other issues 
better. For instance, a list of logfiles added to standard fedora by 
qubes/zen would be helpfull. So just a list, no further explanation of 
how to use logfiles. I don't have more ideas currently, but there 
probably are.


What worries me a little bit is that documentation like this might 
encourage less skilled people to start doing things above their level of 
ability (although this is also a good start to become more skilled). 
Like, in the case of logfiles, soiling communication channels with 
non-relevant information. So it should come with a clear warning.


Suggestions (or critique) welcome.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ead8c970-e4cc-435e-7d74-fc35422bcbd0%40disroot.org.


Re: [qubes-users] Re: sys-firewall freezing on resume from suspend

2022-06-12 Thread 'qtpie' via qubes-users
Yes, it! 
https://github.com/QubesOS/qubes-issues/issues/7510#issuecomment-1146258366_


On 6/10/22 23:49, Demi Marie Obenour wrote:

On Fri, Jun 03, 2022 at 04:00:20PM +0200, Qubes OS Users Mailing List wrote:

So, apparently, this is not a sys-firewall, but a clocksync issue. To root
out any causes, I moved the clocksync service to a separate, brand new qube
(named sys-clock). And voila: sys-firewall no longer 'crashes' on resume
from suspend, now it's sys-clock.


https://github.com/QubesOS/qubes-core-admin/pull/473 will (hopefully)
fix this.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/03c1c15d-d193-941b-4da5-870d8e697441%40disroot.org.


Re: [qubes-users] Re: sys-firewall freezing on resume from suspend

2022-06-06 Thread 'qtpie' via qubes-users

On 6/4/22 11:56, tetrahe...@danwin1210.de wrote:

On Fri, Jun 03, 2022 at 04:00:20PM +0200, 'qtpie' via qubes-users wrote:
So, apparently, this is not a sys-firewall, but a clocksync issue. To 
root out any causes, I moved the clocksync service to a separate, 
brand new qube (named sys-clock). And voila: sys-firewall no longer 
'crashes' on resume from suspend, now it's sys-clock.


This should probably be filed as an issue:
github.com/QubesOS/qubes-issues



Someone else filed an issue where this was solved for me: 
https://github.com/QubesOS/qubes-issues/issues/7510. Briefly put:


Manually applying the patch from 
https://github.com/QubesOS/qubes-core-admin/pull/473 to 
dom0:/usr/lib/python3.8/site-packages/qubes/vm/qubesvm.py and then 
restarting seems to have solved the issue. Also clock syncing trouble 
after suspend seem to have improved. So this was  a suspend and not a 
clock or firewall issue.


This should come soon to dom0 as an update I guess

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6f7a39d1-a13a-b7a6-184e-3dee407ae852%40disroot.org.


[qubes-users] Re: sys-firewall freezing on resume from suspend

2022-06-03 Thread 'qtpie' via qubes-users
So, apparently, this is not a sys-firewall, but a clocksync issue. To 
root out any causes, I moved the clocksync service to a separate, brand 
new qube (named sys-clock). And voila: sys-firewall no longer 'crashes' 
on resume from suspend, now it's sys-clock.


The cause is probably somewhere in some logfile, but with the many 
moving parts, Qubes really needs a better bugfixing howto. With 
relatively many minor bugs like this, bugfixing takes too much time. I 
don't mind spending some time fixing bugs, but lately it is really 
becoming too much, to the extend that I am considering switching back to 
an easier regular Linux distro. I have been a paid Linux sysadmin, no 
total expert, but that is also not a requirement to use Qubes. I should 
be able to diagnose bugs on my own laptop (and contribute to the project 
by properly reporting them).






On 5/28/22 01:15, qtpie wrote:

Hi,

I have a really annoying issue with resume from suspend. On resume, 
sys-firewall is crashed/freezed/unresponsive. So on every resume from 
suspend, I need to kill and restart this VM if I want to use networking. 
Other qubes are fine, except that sys-whonix also freezes, but this is 
because it can't get a network connection to sys-firewall.


The VM is based on the default debian 11 template without any special 
modifications. It has worked fine this way for years. Qubes is the 
latest version. Kernel used 4.10.112.


Symptoms:
- High reported ram/cpu use, cpu hovering around 10-20%
- vm terminal: shows a blank window, no input/output shown
- xen console in dom0: no output
- does not pass networktraffic from connected VM's
- stopped connected VM's can't start because of failed vif (network 
connection) creation.
- sometimes, after a shorter suspend, the VM still works, or it does 
pass networktraffic while the vm still can't open a terminal window.


I've tried:
- checking both before and after suspend the VM console and syslog, dom0 
journal, dmesg, xen logs. It doesn't show any relevant error as far as I 
can tell.

- creating a fresh sys-firewall VM. No change.
- switching the VM to a fedora 35 template, fully upgraded. No change
- checking possibly related issues on qubes github. But those are all 
either fixed with updates, or about VM's with PCI devices connected, 
which this VM doesn't.


What is this problem? Why does it only occur with sys-firewall VM? Which 
logs to doublecheck? Any suggestions welcome.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a8bc0e8d-0183-808c-7a0e-3927dd11b41b%40disroot.org.


[qubes-users] sys-firewall freezing on resume from suspend

2022-05-27 Thread 'qtpie' via qubes-users

Hi,

I have a really annoying issue with resume from suspend. On resume, 
sys-firewall is crashed/freezed/unresponsive. So on every resume from 
suspend, I need to kill and restart this VM if I want to use networking. 
Other qubes are fine, except that sys-whonix also freezes, but this is 
because it can't get a network connection to sys-firewall.


The VM is based on the default debian 11 template without any special 
modifications. It has worked fine this way for years. Qubes is the 
latest version. Kernel used 4.10.112.


Symptoms:
- High reported ram/cpu use, cpu hovering around 10-20%
- vm terminal: shows a blank window, no input/output shown
- xen console in dom0: no output
- does not pass networktraffic from connected VM's
- stopped connected VM's can't start because of failed vif (network 
connection) creation.
- sometimes, after a shorter suspend, the VM still works, or it does 
pass networktraffic while the vm still can't open a terminal window.


I've tried:
- checking both before and after suspend the VM console and syslog, dom0 
journal, dmesg, xen logs. It doesn't show any relevant error as far as I 
can tell.

- creating a fresh sys-firewall VM. No change.
- switching the VM to a fedora 35 template, fully upgraded. No change
- checking possibly related issues on qubes github. But those are all 
either fixed with updates, or about VM's with PCI devices connected, 
which this VM doesn't.


What is this problem? Why does it only occur with sys-firewall VM? Which 
logs to doublecheck? Any suggestions welcome.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3deeb6b8-4fd3-e5fb-511b-627570b63647%40disroot.org.


[qubes-users] Re: usb keyboard not working on debian 11 template

2021-10-07 Thread 'qtpie' via qubes-users
Installing qubes-input-proxy-sender in the template it was. Problem 
solved. Thanks awokd!


Note: to avoid this problem, these should either be default installed 
packages in all templates, or be documented in 
https://www.qubes-os.org/doc/usb-qubes/. If the latter is preferred, I 
can adapt the documentation. Please let me know.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fdddae23-40df-6fe6-23f8-99b78d06bbc6%40disroot.org.


[qubes-users] usb keyboard not working on debian 11 template

2021-08-25 Thread 'qtpie' via qubes-users

Hi,

Question: does a template qube need some kind of modification to let a 
sys-usb qube based on that template work with usb keyboards?


Issue: On a debian 10 template, my usb keyboard/mouse combo 'just 
worked'(tm):

1. I have a default sys-usb qube
2. I attach the keyboard device (either before or after startup, tried both)
3. I get the 'Device X is available' notification
4. I can use the device both inside the sys-usb qube and in other qubes 
and in dom0



When I switch the sys-usb to a debian 11 template:
(same)
4. I can use the keyboard inside the sys-usb qube, not in other qubes. 
The mousepointer does not respond at all.


How can I troubleshoot this? thanks for your suggestions.


---

fyi, this is my only problem with debian 11 as the default template, 
multiple applications seem to work smoother when compared to debian 10.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6ab45cb8-2d62-c3fe-fd6a-66e8c5db083a%40disroot.org.


[qubes-users] DNS issues: servfail on selected subdomains, Qubes modifying DNS replies by stripping IPv6?

2021-05-11 Thread 'qtpie' via qubes-users
I have a very annoying issue with DNS recently. I'm using the standard 
DNS device and servers provided by my internetprovider which runs a full 
dual-stack IPv4/6. Other non-qubes devices have no issues. I think this 
might be a Qubes bug but I want to ask for help first to rule out an 
error on my side.


Selected domainnames (all subdomains, eg www.qubes.org, so not 
qubes.org) get a SERVFAIL when trying to resolve them within 
applications, and on the commandline with 'host' and 'nslookup'. 
Strangely enough, 'dig' has no issues, (querying the same default 
resolver ip of course). At times, the domainname will resolve inside 
sys-net and certain app-vm's, and not in another app-vm. At other times, 
it resolves nowhere. When quering resolvers directly (like my isp's 
resolvers or 1.1.1.1) the issue does not occur.


What can be happening here? One of the only consistent hints I found is 
that Qubes does not seem to pass the full nslookup response from sys-net 
to the appvm (compare nslookup examples below). My router gives a 
servfail when quering it via ipv4, nslookup then tries it's ipv6 
address, where it does get a reply, but this reply is not passed to the 
appvm. The servfail might be an ipv6 issue or an issue with my router, 
but I think still Qubes should pass the full response, right?



some affected domainnames:
www.duckduckgo.com
www.startpage.com
textsecure-service.whispersystems.org



user@chat-1:~$ host -v www.startpage.com
Trying "www.startpage.com"
Host www.startpage.com not found: 2(SERVFAIL)
Received 35 bytes from 10.139.1.2#53 in 2 ms

-

user@chat-1:~$ nslookup  www.startpage.com
;; Got SERVFAIL reply from 10.139.1.1, trying next server
Server:        10.139.1.2
Address:    10.139.1.2#53

** server can't find www.startpage.com: SERVFAIL



user@sys-net:~$ host -v www.startpage.com
Trying "www.startpage.com"
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22135
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;www.startpage.com.        IN    A

;; ANSWER SECTION:
www.startpage.com.    2393    IN    CNAME    startpage.com.
startpage.com.        10    IN    A    145.131.132.72

Received 65 bytes from 192.168.0.1#53 in 4 ms
Trying "startpage.com"
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;startpage.com.            IN    

;; AUTHORITY SECTION:
startpage.com.        2598    
IN    SOA    dns1.p01.nsone.net. 
hostmaster.nsone.net. 1619470914 3600 600 1209600 3600


Received 96 bytes from 192.168.0.1#53 in 3 ms
Trying "startpage.com"
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;startpage.com.            IN    MX

;; ANSWER SECTION:
startpage.com.        2598    
IN    MX    10 mx2.startmail.com.
startpage.com.        2598    
IN    MX    10 mx1.startmail.com.


Received 81 bytes from 192.168.0.1#53 in 1 ms




user@sys-net:~$ nslookup  www.startpage.com
;; Got SERVFAIL reply from 192.168.0.1, trying next server
Server:        fd00::(redacted):ee5e
Address:    fd00::(redacted):ee5e#53

Non-authoritative answer:
www.startpage.com    canonical name = startpage.com.
Name:    startpage.com
Address: 37.0.87.39



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cf58fe9c-c3f8-be3c-42be-1e40fd64b135%40disroot.org.


Re: [qubes-users] Replacing the wpa_supplicant wifi daemon with iwd

2021-03-18 Thread 'qtpie' via qubes-users


On 3/18/21 12:46 PM, haaber wrote:
> On 3/3/21 5:19 PM, 'qtpie' via qubes-users wrote:
>> Due to mysterious, unsolvable Wifi issues, I decided to replace the
>> wpa_supplicant wifi daemon with iwd.
>   -- snip --
>> $ dnf remove wpa_supplicant
>> $ echo -e "[device] \nwifi.backend=iwd" | tee -a
>> /etc/NetworkManager/NetworkManager.conf
>> $ systemctl enable iwd.service
>> $ systemctl start iwd.service
>
> interesting. I tried that in my debian-minimal-net but I cannot start
> iwd with systemctl. Errors similar to here
>
>   https://bbs.archlinux.org/viewtopic.php?id=250220
>
> but the proposed "solution" does not work. The thread suggests
>
>   sudo cp /usr/lib/systemd/system/iwd.service /etc/systemd/system/
>
> but that file does simply not exist, so I cannot copy it. So I stopped
> that experiment for the moment. Maybe @unman has a suggestion for a
> well-working debian-based 'minimal' solution without  networkmanager
> and/or   wpa_applicant ?  Best,
>
>

For those who want to stick to NetworkManager, II found out that the

$ systemctl enable iwd.service
$ systemctl start iwd.service

from my initial post, should not be necessary and can cause conflict.
Because NetworkManager is supposed to handle starting iwd, after iwd is
added to the NetworkManager config file.

That networkmanager does not handle iwd correctly, is a known issue with
NetworkManager. We can only wait for it to get updated with future
Fedora releases I guess.
https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/issues/101

I am now also curious about non-networkmanager alternatives and their
usability though.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/73c466a3-2c9e-6227-343b-be8197d2b618%40disroot.org.


[qubes-users] Replacing the wpa_supplicant wifi daemon with iwd

2021-03-03 Thread 'qtpie' via qubes-users
Hi,

Due to mysterious, unsolvable Wifi issues, I decided to replace the
wpa_supplicant wifi daemon with iwd. iwd itself is excellent and a
definite improvement over wpa_supplicant. I can't find Fedora working on
this though. In the Fedora 33 template, it currently comes down to:

$ dnf remove wpa_supplicant
$ echo -e "[device] \nwifi.backend=iwd" | tee -a
/etc/NetworkManager/NetworkManager.conf
$ systemctl enable iwd.service
$ systemctl start iwd.service
$ systemctl restart NetworkManager

There are just two integration issues remaining that I hope people can
help me with. I am using the standard Qubes Fedora template, and want to
stay as close to it as possible, so I'm not interested in ditching
NetworkManager unless it is unavoidable.

1. /etc/dbus-1/system.d/org.freedesktop.GeoClue2.conf: this is the only
other file in /etc/ that mentions wpa_supplicant. It contains policy to
allow wpa_supplicant to be used for geolocation. Since I don't care for
geolocation, I just removed it (don't comment it out. But if someone
cares to adapt this to iwd, it would be nice.

2. Occasionally, NetworkManager says 'device not ready' under wifi, and
wifi stops working. It is solved temporarily by ``$ systemctl restart
iwd.service && systemctl restart NetworkManager.service`` in sys-net. I
don't get from the log what the exact issue is though.

--

Resources:
- I used this howto from Josh Stoik as a starter:
https://blobfolio.com/2019/replacing-wpa-supplicant-with-iwd-in-ubuntu-eoan/
- https://wiki.archlinux.org/index.php/Iwd

GeoClue2 policy:

  
    
    

    
    

    

    

    

    
  


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a92da205-6c3d-5ae7-3a9e-78ad19cefaaa%40disroot.org.


[qubes-users] Re: issues with i3, xrandr and keyboard

2021-01-29 Thread 'qtpie' via qubes-users



On 1/19/21 6:27 PM, qtpie wrote:
> Also, how do you change your keyboard settings under i3/Fedora/Qubes? I
> want to use the us-altgr-intl keymap. Under i3 when I do $ localectl
> set-keymap us-altgr-intl in a qube vm terminal, this has no effect in
> applications. The right alt key instead remains used to open menu's
> (altgr+f for File, altgr+e for Edit, etc.) If I could use altgr-intl and
> retain that functionality that would actually be great.

To answer my own question for other peoples reference: in i3 the way to
change the keyboard layout is basically suggested in the qubes faq, but
you really have to dig into the workings of localectl and keyboard
configuration in general. I ended up doing in dom0:

$ localectl set-x11-keymap us pc105 altgr-intl compose:ralt
$ localeclt status


localectl howto:
https://docs.fedoraproject.org/en-US/fedora/rawhide/system-administrators-guide/basic-system-configuration/System_Locale_and_Keyboard_Configuration/#s2-Setting_the_Keymap

List of possible keyboard options. This page is about setxkbmap, do not
actually use setxkbmap (I've tried), but these options are generic:
https://gist.github.com/jatcwang/ae3b7019f219b8cdc6798329108c9aee

https://www.qubes-os.org/faq/#my-keyboard-layout-settings-are-not-behaving-correctly-what-should-i-do

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e4197a36-2fcf-a5f7-369a-00933864877d%40disroot.org.


Re: [qubes-users] issues with i3, xrandr and keyboard

2021-01-21 Thread 'qtpie' via qubes-users


On 1/20/21 12:32 PM, Patrik Hagara wrote:
>> I'm using the i3 window manager with Qubes in a multi-monitor setup. The
>> laptop monitor is 1920x1080, the external monitor is 2560x1440. To
>> enable the second monitor I do $ xrandr  --output eDP1 --auto --right-of
>> DP1 --output DP1 --auto.
>>
>> The issue I keep running in to is that about half of the time, my mouse
>> will not work on the the external monitor on the rightmost quarter and
>> lowest quarter (approximately). The pointer will move there, but clicks
>> are not registered. It is as if the mousedriver sees the second monitor
>> as 1920x1080 instead of its actual resolution. The status bar is
>> displayed on both monitors.
>
> Hi,
>
> This can be fixed by increasing the dom0 Qubes GUI video memory [1].
>
> [1]
> https://www.qubes-os.org/doc/gui-configuration/#video-ram-adjustment-for-high-resolution-displays
>
>
> Cheers,
> Patrik
>
Patrik,

Thanks for this excellent answer, an immediate fix! Dual monitors now
seem to work flawlessly withouth having to use any fancy xrandr options.

I will at some point propose an update to the qubes-i3 documentation
with this addition among others.



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/611f5eda-a594-0de7-2e9f-6644e4fe0ef4%40disroot.org.


[qubes-users] issues with i3, xrandr and keyboard

2021-01-19 Thread 'qtpie' via qubes-users
Hi,

A few questions about using Qubes with i3. I think the idea behind i3 is
great, but getting everything to work is a bit of a struggle.


I'm using the i3 window manager with Qubes in a multi-monitor setup. The
laptop monitor is 1920x1080, the external monitor is 2560x1440. To
enable the second monitor I do $ xrandr  --output eDP1 --auto --right-of
DP1 --output DP1 --auto.

The issue I keep running in to is that about half of the time, my mouse
will not work on the the external monitor on the rightmost quarter and
lowest quarter (approximately). The pointer will move there, but clicks
are not registered. It is as if the mousedriver sees the second monitor
as 1920x1080 instead of its actual resolution. The status bar is
displayed on both monitors.

I have read much of what there is to read on xrandr and tried many
options, like switching monitor postitions, scaling, panning,
positioning, but to to avail, the issue keeps returning. I have tried
comparing the output of $ xrandr -q, but there is no difference between
working and error situations.

- Does anyone have a comparable setup and what xrandr command do you use?
- Is there an alternative to using xrandr under i3?


Also, how do you change your keyboard settings under i3/Fedora/Qubes? I
want to use the us-altgr-intl keymap. Under i3 when I do $ localectl
set-keymap us-altgr-intl in a qube vm terminal, this has no effect in
applications. The right alt key instead remains used to open menu's
(altgr+f for File, altgr+e for Edit, etc.) If I could use altgr-intl and
retain that functionality that would actually be great.

thanks!

qtpie



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8705a851-50ff-3cb2-bc2f-bf53d07ef7a2%40disroot.org.