Re: [qubes-users] /usr/bin/notify-send does not work when invoked via qubes-rpc

2019-04-22 Thread tomhet
> Can I ask why you want to do this? > Why dont you just call notify-send in the qube? First some introduction: - I have 'storage' vm. It takes storage devices (few HDDs) on startup and exposes them via NFS & Samba to other VMs and physical machines. Each VM can access just what is exported

Re: [qubes-users] Log qubes firewall packets

2019-04-21 Thread tomhet
> >> Wondering how to log packets blocked and accepted by qubes firewall > >> for specific vm or all vms if thats the only option? Couldn't find > >> anything in website or google or qvm-firewall > > Unfortunately, Qubes firewall was not designed for such use case. > > > > If you are familiar

[qubes-users] /usr/bin/notify-send does not work when invoked via qubes-rpc

2019-04-21 Thread tomhet
Hi all, I struggle to get something that's working in Q3.2 also in Qubes4: - I need to display message from AppVm on the screen (via notify-send in dom0) and do it via qubes-rpc executed in AppVm "storage". rpc procedure is named 'storage.log' - allow policy in dom0: > cat

[qubes-users] Qubes4: net,fw,appvms-all in 10.137.0.* ?

2019-04-21 Thread tomhet
Hi all, I tried test install of Qubes4 to test migration from 3.2 and I was surpised that sys-new,sys-fw and all appvm share same network 10.137.0.* This is in contrast to 3.2, where appVMs are in 10.137.2.*, firewalls in 10.137.1.*, and just sys-net in 10.137.0.* (like drawn in

Re: [qubes-users] Removing Thunderbird from fedora-29 removes 68 packages (of which 11 qubes packages)

2019-04-20 Thread tomhet
Great, thank you both! 1. 'dnf mark install qubes-vm-recommended' 2. 'dnf remove thunderbird-qubes' (on which above metapackage depends). This way it removes removes also the recommended meta-package, but leaves its other dependencies Let's mark this as completed -- You received this

[qubes-users] Removing Thunderbird from fedora-29 removes 68 packages (of which 11 qubes packages)

2019-04-19 Thread tomhet
Hi guys, I installed Q4.0.1 on USB HDD to see changes from 3.2. As I've decided to use fedora-29 for system-related VMs, I wanted to remove large apps like Firefox and Thunderbird from it. But running 'dnf remove thunderbird' on f29 template resulted in removal of 67 other packages, which

Re: [qubes-users] Protect AppVM init startup scripts:

2017-05-05 Thread tomhet
Suggestion: Instead of having "VMs that boot 'cleanly'" I'd propose to add following option: - configuration data that lives in /rw/config (usrlocal) and is cleaned by this scripts/services to be fetched from Dom0 (or dedicated VM) based on VM's name. This should be done after cleanup service

[qubes-users] Re: SUCCESS: GPU passthrough on Qubes 3.1 (Xen 4.6.1) / Radeon 6950 / Win 7 & Win 8.1 (TUTORIAL + HCL)

2016-11-23 Thread tomhet
So, after Marek's fix here, https://github.com/QubesOS/qubes-issues/issues/1659 is it true that I can expect this from it: - HVM passthrough working using stub domain via xl ? (following your guide above, exlcuding 'qemu-xen-traditional') And not: - HVM passthrough working via VM created with

[qubes-users] Re: Unmounting USB Devices at VM shutdown

2016-08-01 Thread tomhet
> If we shutdown a VM that has a USB storage device attached, the VM still > indicates the device being attached to the VM. But when you restart the VM, > the device is not accessible and can no longer be disconnected. As far as I remember this should fix it: "sudo udevadm trigger

[qubes-users] Re: SUCCESS: GPU passthrough on Qubes 3.1 (Xen 4.6.1) / Radeon 6950 / Win 7 & Win 8.1 (TUTORIAL + HCL)

2016-08-01 Thread tomhet
Hi Marcus, I'm bit confused with this > Edit /etc/default/grub and add following options (change the pci address if > needed) Which version of Qubes is this? Aint 3.1 EFI-only? And EFI version of kernel args are to be passed via /boot/efi/EFI/qubes (kernel=)? regards, Tom -- You received

Re: [qubes-users] Re: Automatically mount block devices when appvm launches

2016-06-07 Thread tomhet
etc/init.d/rc.local (not sure if necessary qubes stuff will be already available) - something else thanks, Tomhet P.S. An alternative could be event listeners for qubes events 'onVmStartComplete'/'beforeVmShutdown', if such exist & I knew python. -- You received this message because you

[qubes-users] Re: Automatically mount block devices when appvm launches

2016-06-07 Thread tomhet
ices to be attached to storage - this is 2nd column of table output by qvm-block command. After devices are assigned to storageVM, auto-mount is executed in the VM. I have similar script that unmounts and detaches devices from the storageVM. Currently I have to find suitable place and time to run th