[qubes-users] customizing Firefox in disp-vms

2021-01-29 Thread Josefa Hays
I use dispvm's all the time (both Fedora and Debian dispvms). Thus, I am
quite annoyed to see varios "first run" issues every time i start
Firefox in a disp-vm. I would like to perform the following changes in
the template-vms, preferably from CLI, so I don't have to start Firefox
in the template:

* disable "first run" wellcome tabs
* change startpage to https://duckduckgo.com
* In Fedora-30 dispvm: disable the bookmark-bar in the top

I've been poking around in ~/.mozilla/ files and configs, but so far no
luck. 
Anybody got this working who can share their configs? (Maybe we could
put a guide on in wiki/docs? I guess it is quite a common "problem" for
people that use disp-vm's on a regular basis?)

Best regards,
Jo

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/006955be507a3ff01cb6cc4b60ac3db4%40riseup.net.


[qubes-users] Re: customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian
You can use an autoconfig 
 
file in the firefox-esr install directory in the template to control 
everything except default search, which mozilla has added a bunch of 
protections to in order to prevent default search page hijacking. You can 
use this to disable "first run" welcome tabs, etc.
You probably also want to put privacy/hardening settings in the autoconfig 
file.

To change the default search page you actually need two mechanisms:
1. Reverse engineer the way the firefox-esr directory configures default 
search.
2. Reverse engineer the way the profile directory configures default search.

You need both because:
#1 will be undone every time you update firefox. If you run firefox before 
re-doing it, the change will be cached in your profile directory, and 
method #1 will no longer work for you because the profile will 
#2 doesn't work unless you already have a profile directory. A startup 
script that ran on dispvm creation that both created a profile directory 
and modified it using #2 would allow you to avoid needing #1, but it seemed 
cleaner to me to just do #1 as well.

#1 requires monkey patching modules/SearchService.jsm to not fetch the 
default search from mozilla's servers, and changing the search default in 
chrome/browser/search-extensions/list.json.
#2 is documented 
here 
https://blog.onee3.org/2018/04/manually-add-a-search-engine-to-firefox-quantum/
On Friday, January 29, 2021 at 1:58:22 AM UTC-8 Josefa Hays wrote:

> I use dispvm's all the time (both Fedora and Debian dispvms). Thus, I am
> quite annoyed to see varios "first run" issues every time i start
> Firefox in a disp-vm. I would like to perform the following changes in
> the template-vms, preferably from CLI, so I don't have to start Firefox
> in the template:
>
> * disable "first run" wellcome tabs
> * change startpage to https://duckduckgo.com
> * In Fedora-30 dispvm: disable the bookmark-bar in the top
>
> I've been poking around in ~/.mozilla/ files and configs, but so far no
> luck. 
> Anybody got this working who can share their configs? (Maybe we could
> put a guide on in wiki/docs? I guess it is quite a common "problem" for
> people that use disp-vm's on a regular basis?)
>
> Best regards,
> Jo
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5a021d48-361c-473d-a5ef-c9127b48a7d0n%40googlegroups.com.


[qubes-users] Re: customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian
I might be interested in contributing code for this, but I'm not sure how 
to package it.

On Friday, January 29, 2021 at 2:43:20 AM UTC-8 Emma Borhanian wrote:

> You can use an autoconfig 
>  
> file in the firefox-esr install directory in the template to control 
> everything except default search, which mozilla has added a bunch of 
> protections to in order to prevent default search page hijacking. You can 
> use this to disable "first run" welcome tabs, etc.
> You probably also want to put privacy/hardening settings in the autoconfig 
> file.
>
> To change the default search page you actually need two mechanisms:
> 1. Reverse engineer the way the firefox-esr directory configures default 
> search.
> 2. Reverse engineer the way the profile directory configures default 
> search.
>
> You need both because:
> #1 will be undone every time you update firefox. If you run firefox before 
> re-doing it, the change will be cached in your profile directory, and 
> method #1 will no longer work for you because the profile will 
> #2 doesn't work unless you already have a profile directory. A startup 
> script that ran on dispvm creation that both created a profile directory 
> and modified it using #2 would allow you to avoid needing #1, but it seemed 
> cleaner to me to just do #1 as well.
>
> #1 requires monkey patching modules/SearchService.jsm to not fetch the 
> default search from mozilla's servers, and changing the search default in 
> chrome/browser/search-extensions/list.json.
> #2 is documented here 
> https://blog.onee3.org/2018/04/manually-add-a-search-engine-to-firefox-quantum/
> On Friday, January 29, 2021 at 1:58:22 AM UTC-8 Josefa Hays wrote:
>
>> I use dispvm's all the time (both Fedora and Debian dispvms). Thus, I am 
>> quite annoyed to see varios "first run" issues every time i start 
>> Firefox in a disp-vm. I would like to perform the following changes in 
>> the template-vms, preferably from CLI, so I don't have to start Firefox 
>> in the template: 
>>
>> * disable "first run" wellcome tabs 
>> * change startpage to https://duckduckgo.com 
>> * In Fedora-30 dispvm: disable the bookmark-bar in the top 
>>
>> I've been poking around in ~/.mozilla/ files and configs, but so far no 
>> luck. 
>> Anybody got this working who can share their configs? (Maybe we could 
>> put a guide on in wiki/docs? I guess it is quite a common "problem" for 
>> people that use disp-vm's on a regular basis?) 
>>
>> Best regards, 
>> Jo 
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f9f2ec05-8256-485b-8e82-866ab63586c4n%40googlegroups.com.


[qubes-users] Re: customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian
This is an arms race though and eventually mozilla will make any particular 
methods of overriding the default search not work. It's really annoying.

I looked into using other browsers but IceCat 
 seems to not receive security 
updates frequently enough to be a viable secure browser. It seems we are 
stuck with firefox and playing this arms race game for setting default 
search forever.

On Friday, January 29, 2021 at 2:47:48 AM UTC-8 Emma Borhanian wrote:

> I might be interested in contributing code for this, but I'm not sure how 
> to package it.
>
> On Friday, January 29, 2021 at 2:43:20 AM UTC-8 Emma Borhanian wrote:
>
>> You can use an autoconfig 
>>  
>> file in the firefox-esr install directory in the template to control 
>> everything except default search, which mozilla has added a bunch of 
>> protections to in order to prevent default search page hijacking. You can 
>> use this to disable "first run" welcome tabs, etc.
>> You probably also want to put privacy/hardening settings in the 
>> autoconfig file.
>>
>> To change the default search page you actually need two mechanisms:
>> 1. Reverse engineer the way the firefox-esr directory configures default 
>> search.
>> 2. Reverse engineer the way the profile directory configures default 
>> search.
>>
>> You need both because:
>> #1 will be undone every time you update firefox. If you run firefox 
>> before re-doing it, the change will be cached in your profile directory, 
>> and method #1 will no longer work for you because the profile will 
>> #2 doesn't work unless you already have a profile directory. A startup 
>> script that ran on dispvm creation that both created a profile directory 
>> and modified it using #2 would allow you to avoid needing #1, but it seemed 
>> cleaner to me to just do #1 as well.
>>
>> #1 requires monkey patching modules/SearchService.jsm to not fetch the 
>> default search from mozilla's servers, and changing the search default in 
>> chrome/browser/search-extensions/list.json.
>> #2 is documented here 
>> https://blog.onee3.org/2018/04/manually-add-a-search-engine-to-firefox-quantum/
>> On Friday, January 29, 2021 at 1:58:22 AM UTC-8 Josefa Hays wrote:
>>
>>> I use dispvm's all the time (both Fedora and Debian dispvms). Thus, I am 
>>> quite annoyed to see varios "first run" issues every time i start 
>>> Firefox in a disp-vm. I would like to perform the following changes in 
>>> the template-vms, preferably from CLI, so I don't have to start Firefox 
>>> in the template: 
>>>
>>> * disable "first run" wellcome tabs 
>>> * change startpage to https://duckduckgo.com 
>>> * In Fedora-30 dispvm: disable the bookmark-bar in the top 
>>>
>>> I've been poking around in ~/.mozilla/ files and configs, but so far no 
>>> luck. 
>>> Anybody got this working who can share their configs? (Maybe we could 
>>> put a guide on in wiki/docs? I guess it is quite a common "problem" for 
>>> people that use disp-vm's on a regular basis?) 
>>>
>>> Best regards, 
>>> Jo 
>>>
>>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d7160ffc-522f-4131-9e6e-6aae990b43d9n%40googlegroups.com.


[qubes-users] Re: customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian

> #1 requires monkey patching 

I thought of this as "monkey patching", because I automated altering the 
file with sed, but I guess it's not technically monkey patching if you're 
changing the source file.
On Friday, January 29, 2021 at 2:50:41 AM UTC-8 Emma Borhanian wrote:

> This is an arms race though and eventually mozilla will make any 
> particular methods of overriding the default search not work. It's really 
> annoying.
>
> I looked into using other browsers but IceCat 
>  seems to not receive security 
> updates frequently enough to be a viable secure browser. It seems we are 
> stuck with firefox and playing this arms race game for setting default 
> search forever.
>
> On Friday, January 29, 2021 at 2:47:48 AM UTC-8 Emma Borhanian wrote:
>
>> I might be interested in contributing code for this, but I'm not sure how 
>> to package it.
>>
>> On Friday, January 29, 2021 at 2:43:20 AM UTC-8 Emma Borhanian wrote:
>>
>>> You can use an autoconfig 
>>>  
>>> file in the firefox-esr install directory in the template to control 
>>> everything except default search, which mozilla has added a bunch of 
>>> protections to in order to prevent default search page hijacking. You can 
>>> use this to disable "first run" welcome tabs, etc.
>>> You probably also want to put privacy/hardening settings in the 
>>> autoconfig file.
>>>
>>> To change the default search page you actually need two mechanisms:
>>> 1. Reverse engineer the way the firefox-esr directory configures default 
>>> search.
>>> 2. Reverse engineer the way the profile directory configures default 
>>> search.
>>>
>>> You need both because:
>>> #1 will be undone every time you update firefox. If you run firefox 
>>> before re-doing it, the change will be cached in your profile directory, 
>>> and method #1 will no longer work for you because the profile will 
>>> #2 doesn't work unless you already have a profile directory. A startup 
>>> script that ran on dispvm creation that both created a profile directory 
>>> and modified it using #2 would allow you to avoid needing #1, but it seemed 
>>> cleaner to me to just do #1 as well.
>>>
>>> #1 requires monkey patching modules/SearchService.jsm to not fetch the 
>>> default search from mozilla's servers, and changing the search default in 
>>> chrome/browser/search-extensions/list.json.
>>> #2 is documented here 
>>> https://blog.onee3.org/2018/04/manually-add-a-search-engine-to-firefox-quantum/
>>> On Friday, January 29, 2021 at 1:58:22 AM UTC-8 Josefa Hays wrote:
>>>
 I use dispvm's all the time (both Fedora and Debian dispvms). Thus, I 
 am 
 quite annoyed to see varios "first run" issues every time i start 
 Firefox in a disp-vm. I would like to perform the following changes in 
 the template-vms, preferably from CLI, so I don't have to start Firefox 
 in the template: 

 * disable "first run" wellcome tabs 
 * change startpage to https://duckduckgo.com 
 * In Fedora-30 dispvm: disable the bookmark-bar in the top 

 I've been poking around in ~/.mozilla/ files and configs, but so far no 
 luck. 
 Anybody got this working who can share their configs? (Maybe we could 
 put a guide on in wiki/docs? I guess it is quite a common "problem" for 
 people that use disp-vm's on a regular basis?) 

 Best regards, 
 Jo 

>>>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/01445750-c61c-4b8f-a7df-26454320271dn%40googlegroups.com.


[qubes-users] Re: issues with i3, xrandr and keyboard

2021-01-29 Thread 'qtpie' via qubes-users



On 1/19/21 6:27 PM, qtpie wrote:
> Also, how do you change your keyboard settings under i3/Fedora/Qubes? I
> want to use the us-altgr-intl keymap. Under i3 when I do $ localectl
> set-keymap us-altgr-intl in a qube vm terminal, this has no effect in
> applications. The right alt key instead remains used to open menu's
> (altgr+f for File, altgr+e for Edit, etc.) If I could use altgr-intl and
> retain that functionality that would actually be great.

To answer my own question for other peoples reference: in i3 the way to
change the keyboard layout is basically suggested in the qubes faq, but
you really have to dig into the workings of localectl and keyboard
configuration in general. I ended up doing in dom0:

$ localectl set-x11-keymap us pc105 altgr-intl compose:ralt
$ localeclt status


localectl howto:
https://docs.fedoraproject.org/en-US/fedora/rawhide/system-administrators-guide/basic-system-configuration/System_Locale_and_Keyboard_Configuration/#s2-Setting_the_Keymap

List of possible keyboard options. This page is about setxkbmap, do not
actually use setxkbmap (I've tried), but these options are generic:
https://gist.github.com/jatcwang/ae3b7019f219b8cdc6798329108c9aee

https://www.qubes-os.org/faq/#my-keyboard-layout-settings-are-not-behaving-correctly-what-should-i-do

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e4197a36-2fcf-a5f7-369a-00933864877d%40disroot.org.


[qubes-users] Re: customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian
(I retyped all of this so hopefully I didn't typo any of it)

Relevant preferences for start page:
defaultPref("browser.newtabpage.activity-stream.aboutHome.enabled", false);
defaultPref("datareporting.policy.firstRunURL", "");
defaultPref("trailhead.firstrun.branches", "nofirstrun-privacy");

Settings you may want to save:
defaultPref("general.warnOnAboutConfig", false);
defaultPref("browser.tabs.warnOnClose", false);

Disable Pocket:
defaultPref("extensions.pocket.enabled", false);
defaultPref("browser.newtabpage.activity-stream.feeds.section.topstories", 
false);
defaultPref("browser.newtabpage.activity-stream.section.highlights.includePocket",
 
false);
defaultPref("browser.newtabpage.activity-stream.showSponsored", false);

Disable snippets by firefox:
defaultPref("browser.newtabpage.activity-stream.feeds.snippets", false);

The rest is privacy/security stuff, which should probably be copied from 
the union of 1. firefox specific guides 2. whatever tor browser does. Of 
note is whether the URL bar and/or search bar send what you type anywhere.

Another decision is whether to "lock" preferences vs just changing the 
default.
On Friday, January 29, 2021 at 3:00:47 AM UTC-8 Emma Borhanian wrote:

>
> > #1 requires monkey patching 
>
> I thought of this as "monkey patching", because I automated altering the 
> file with sed, but I guess it's not technically monkey patching if you're 
> changing the source file.
> On Friday, January 29, 2021 at 2:50:41 AM UTC-8 Emma Borhanian wrote:
>
>> This is an arms race though and eventually mozilla will make any 
>> particular methods of overriding the default search not work. It's really 
>> annoying.
>>
>> I looked into using other browsers but IceCat 
>>  seems to not receive security 
>> updates frequently enough to be a viable secure browser. It seems we are 
>> stuck with firefox and playing this arms race game for setting default 
>> search forever.
>>
>> On Friday, January 29, 2021 at 2:47:48 AM UTC-8 Emma Borhanian wrote:
>>
>>> I might be interested in contributing code for this, but I'm not sure 
>>> how to package it.
>>>
>>> On Friday, January 29, 2021 at 2:43:20 AM UTC-8 Emma Borhanian wrote:
>>>
 You can use an autoconfig 
 
  
 file in the firefox-esr install directory in the template to control 
 everything except default search, which mozilla has added a bunch of 
 protections to in order to prevent default search page hijacking. You can 
 use this to disable "first run" welcome tabs, etc.
 You probably also want to put privacy/hardening settings in the 
 autoconfig file.

 To change the default search page you actually need two mechanisms:
 1. Reverse engineer the way the firefox-esr directory configures 
 default search.
 2. Reverse engineer the way the profile directory configures default 
 search.

 You need both because:
 #1 will be undone every time you update firefox. If you run firefox 
 before re-doing it, the change will be cached in your profile directory, 
 and method #1 will no longer work for you because the profile will 
 #2 doesn't work unless you already have a profile directory. A startup 
 script that ran on dispvm creation that both created a profile directory 
 and modified it using #2 would allow you to avoid needing #1, but it 
 seemed 
 cleaner to me to just do #1 as well.

 #1 requires monkey patching modules/SearchService.jsm to not fetch the 
 default search from mozilla's servers, and changing the search default in 
 chrome/browser/search-extensions/list.json.
 #2 is documented here 
 https://blog.onee3.org/2018/04/manually-add-a-search-engine-to-firefox-quantum/
 On Friday, January 29, 2021 at 1:58:22 AM UTC-8 Josefa Hays wrote:

> I use dispvm's all the time (both Fedora and Debian dispvms). Thus, I 
> am 
> quite annoyed to see varios "first run" issues every time i start 
> Firefox in a disp-vm. I would like to perform the following changes in 
> the template-vms, preferably from CLI, so I don't have to start 
> Firefox 
> in the template: 
>
> * disable "first run" wellcome tabs 
> * change startpage to https://duckduckgo.com 
> * In Fedora-30 dispvm: disable the bookmark-bar in the top 
>
> I've been poking around in ~/.mozilla/ files and configs, but so far 
> no 
> luck. 
> Anybody got this working who can share their configs? (Maybe we could 
> put a guide on in wiki/docs? I guess it is quite a common "problem" 
> for 
> people that use disp-vm's on a regular basis?) 
>
> Best regards, 
> Jo 
>


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 

[qubes-users] Re: customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian
> Relevant preferences for start page:

I meant for disabling startup notices.
On Friday, January 29, 2021 at 3:18:56 AM UTC-8 Emma Borhanian wrote:

> (I retyped all of this so hopefully I didn't typo any of it)
>
> Relevant preferences for start page:
> defaultPref("browser.newtabpage.activity-stream.aboutHome.enabled", false);
> defaultPref("datareporting.policy.firstRunURL", "");
> defaultPref("trailhead.firstrun.branches", "nofirstrun-privacy");
>
> Settings you may want to save:
> defaultPref("general.warnOnAboutConfig", false);
> defaultPref("browser.tabs.warnOnClose", false);
>
> Disable Pocket:
> defaultPref("extensions.pocket.enabled", false);
> defaultPref("browser.newtabpage.activity-stream.feeds.section.topstories", 
> false);
> defaultPref("browser.newtabpage.activity-stream.section.highlights.includePocket",
>  
> false);
> defaultPref("browser.newtabpage.activity-stream.showSponsored", false);
>
> Disable snippets by firefox:
> defaultPref("browser.newtabpage.activity-stream.feeds.snippets", false);
>
> The rest is privacy/security stuff, which should probably be copied from 
> the union of 1. firefox specific guides 2. whatever tor browser does. Of 
> note is whether the URL bar and/or search bar send what you type anywhere.
>
> Another decision is whether to "lock" preferences vs just changing the 
> default.
> On Friday, January 29, 2021 at 3:00:47 AM UTC-8 Emma Borhanian wrote:
>
>>
>> > #1 requires monkey patching 
>>
>> I thought of this as "monkey patching", because I automated altering the 
>> file with sed, but I guess it's not technically monkey patching if you're 
>> changing the source file.
>> On Friday, January 29, 2021 at 2:50:41 AM UTC-8 Emma Borhanian wrote:
>>
>>> This is an arms race though and eventually mozilla will make any 
>>> particular methods of overriding the default search not work. It's really 
>>> annoying.
>>>
>>> I looked into using other browsers but IceCat 
>>>  seems to not receive 
>>> security updates frequently enough to be a viable secure browser. It seems 
>>> we are stuck with firefox and playing this arms race game for setting 
>>> default search forever.
>>>
>>> On Friday, January 29, 2021 at 2:47:48 AM UTC-8 Emma Borhanian wrote:
>>>
 I might be interested in contributing code for this, but I'm not sure 
 how to package it.

 On Friday, January 29, 2021 at 2:43:20 AM UTC-8 Emma Borhanian wrote:

> You can use an autoconfig 
> 
>  
> file in the firefox-esr install directory in the template to control 
> everything except default search, which mozilla has added a bunch of 
> protections to in order to prevent default search page hijacking. You can 
> use this to disable "first run" welcome tabs, etc.
> You probably also want to put privacy/hardening settings in the 
> autoconfig file.
>
> To change the default search page you actually need two mechanisms:
> 1. Reverse engineer the way the firefox-esr directory configures 
> default search.
> 2. Reverse engineer the way the profile directory configures default 
> search.
>
> You need both because:
> #1 will be undone every time you update firefox. If you run firefox 
> before re-doing it, the change will be cached in your profile directory, 
> and method #1 will no longer work for you because the profile will 
> #2 doesn't work unless you already have a profile directory. A startup 
> script that ran on dispvm creation that both created a profile directory 
> and modified it using #2 would allow you to avoid needing #1, but it 
> seemed 
> cleaner to me to just do #1 as well.
>
> #1 requires monkey patching modules/SearchService.jsm to not fetch the 
> default search from mozilla's servers, and changing the search default in 
> chrome/browser/search-extensions/list.json.
> #2 is documented here 
> https://blog.onee3.org/2018/04/manually-add-a-search-engine-to-firefox-quantum/
> On Friday, January 29, 2021 at 1:58:22 AM UTC-8 Josefa Hays wrote:
>
>> I use dispvm's all the time (both Fedora and Debian dispvms). Thus, I 
>> am 
>> quite annoyed to see varios "first run" issues every time i start 
>> Firefox in a disp-vm. I would like to perform the following changes 
>> in 
>> the template-vms, preferably from CLI, so I don't have to start 
>> Firefox 
>> in the template: 
>>
>> * disable "first run" wellcome tabs 
>> * change startpage to https://duckduckgo.com 
>> * In Fedora-30 dispvm: disable the bookmark-bar in the top 
>>
>> I've been poking around in ~/.mozilla/ files and configs, but so far 
>> no 
>> luck. 
>> Anybody got this working who can share their configs? (Maybe we could 
>> put a guide on in wiki/docs? I guess it is quite a common "problem" 
>> 

Re: [qubes-users] Re: [PATCH v5.10] drm/i915/userptr: detect un-GUP-able pages early

2021-01-29 Thread Jinoh Kang
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/28/21 7:57 PM, donoban wrote:
> On 1/28/21 1:02 AM, Jinoh Kang wrote:
>> No, but this patch has been superseded by the latest intel xorg driver.
>> To try it, just enable the current-testing repo and upgrade
>> xorg-x11-drv-intel to at least v2.99.917-49.20210126.
>>
>> sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing 
>> --action=upgrade xorg-x11-drv-intel
>>
>> Discussion: 
>> https://github.com/QubesOS/qubes-issues/issues/6356#issuecomment-765952048
>>
> 
> Hi,
> 
> It seems that I had it already installed with standard dom0 updates.
> 
> Since I was on doubt, I started running 5.4.91 and I felt some
> strange visual effects compared to 5.4.83 which I was using
> previously.

FWIW this patch only fixes the issue related to the "failed to submit
rendering commands (Bad address)" message and nothing more.

If the issue starts to manifest without such message in the Xorg server
log, then it is highly likely to be platform-specific.

> Also I had a crash when waking up from suspend (I did not
> have one in months or maybe never on this laptop). After the crash I did
> three or four suspend/resume cycles without problems.

This is a news to me.  Has this issue been submitted to the tracker?
If not, can you post it there?

> 
> Today I am testing 5.10.8 and it seems working smooth, better than
> 5.4.83. Sadly I tried to suspend/resume before sending this email and it
> crashed. Then I did it again 4 o 5 five times without problems.

You can collect panic and oops logs with a kernel that has
CONFIG_EFI_VARS_PSTORE enabled.  If you don't already have one, you may
build qubes-linux-kernel via qubes-builder with the following line
added to `config-qubes`:

CONFIG_EFI_VARS_PSTORE=y

After booting the kernel, subsequent panic and oops will be recorded
in EFI variables, which will then appear as /sys/fs/pstore/dmesg-efi-* 
at the next boot.  Also note that the logs may be split into multiple
parts that are numbered in a reversed order.  For more information, see
https://www.kernel.org/doc/html/latest/admin-guide/pstore-blk.html

> 
> There are some kernel warnings that maybe help. First does not seem
> related with graphics, it only appears on 5.10.x versions and I think
> that there are one per each processor:
> https://share.riseup.net/#100I-6k6jsi4spX0BhGkzA
> 
> The other appears both on 5.4/5.10 with pretty different call trace:
> https://share.riseup.net/#X55SR3mgJPqOndr8Be_IQQ

Thanks for sharing.

> 
> Regards.
> 
- -- 
Sincerely,
Jinoh Kang
-BEGIN PGP SIGNATURE-
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=JU95
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2ed59e8c-a8d7-8422-1c51-c9b74b50a93d%40gmail.com.


[qubes-users] Win10VM: User name or password incorrect at startup

2021-01-29 Thread Steve Coleman
I have a situation with a Windows 10 AppVM that I am hoping someone with
more experience might be able to answer. I created my first Windows 10 VM a
few months ago using the qvm-create-windows-cube.sh script and it seemed to
work well enough.

But just recently when I just wanted to start it to update the OS software
it started up fine but claimed that my password had expired and it forced
me to change it. I do know what I set it to but now each time it starts it
says "Username or password incorrect" and then prompts me to login with a
valid password. I don't remember it ever prompting me before, and I don't
know what is even trying this other password that is evidently incorrect.

Q: Where is this other supposed/incorrect password being passed into it
from, and is there any way to go back to not needing this login
requirement?

thanks,

Steve

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ5FDniOsCzHBxkBRbmp2Ogorea2GoeY%3DHF24opGwUCdSFPfCw%40mail.gmail.com.


Re: [qubes-users] customizing Firefox in disp-vms

2021-01-29 Thread Sven Semmler

On 1/29/21 3:58 AM, Josefa Hays wrote:

I use dispvm's all the time (both Fedora and Debian dispvms). Thus, I
am quite annoyed to see varios "first run" issues every time i start 
Firefox in a disp-vm. I would like to perform the following changes

in the template-vms, preferably from CLI, so I don't have to start
Firefox in the template:


You wouldn't do that in the actual template but in the appvm that serves 
as a template for the dispvm:



fedora-32 -> dvm-online -> disp1234

So dvm-online would be the qube that has template_for_dispvms set to 
true. Maybe that's what you meant by template, but then I don't see the 
issue with running firefox for a moment here (it's the same like running 
it in any AppVM). You could even remove the netvm from dvm-online while 
making those changes.



* disable "first run" wellcome tabs * change startpage
tohttps://duckduckgo.com * In Fedora-30 dispvm: disable the
bookmark-bar in the top


If for some reason you really don't want to run Firefox in your 
equivalent of dvm-online, you could do all those things in an actual 
dispvm instance (i.e. disp1234) and then move the resulting .mozilla 
config directory into dvm-online.



I've been poking around in ~/.mozilla/ files and configs, but so far
no luck. Anybody got this working who can share their configs? (Maybe
we could put a guide on in wiki/docs? I guess it is quite a common
"problem" for people that use disp-vm's on a regular basis?)


Both approaches mentioned above will work. I just run firefox in 
dvm-online but don't go to any websites. Just make all the settings, 
plugins etc and then delete the cache in settings.


/Sven

--
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e364c044-0807-9a81-c1fe-daad6af07a55%40SvenSemmler.org.


OpenPGP_signature
Description: OpenPGP digital signature


Re: [qubes-users] customizing Firefox in disp-vms

2021-01-29 Thread David Hobach

On 1/29/21 7:27 PM, Sven Semmler wrote:

On 1/29/21 3:58 AM, Josefa Hays wrote:

I use dispvm's all the time (both Fedora and Debian dispvms). Thus, I
am quite annoyed to see varios "first run" issues every time i start Firefox in 
a disp-vm. I would like to perform the following changes
in the template-vms, preferably from CLI, so I don't have to start
Firefox in the template:


You wouldn't do that in the actual template but in the appvm that serves as a 
template for the dispvm:


fedora-32 -> dvm-online -> disp1234

So dvm-online would be the qube that has template_for_dispvms set to true. 
Maybe that's what you meant by template, but then I don't see the issue with 
running firefox for a moment here (it's the same like running it in any AppVM). 
You could even remove the netvm from dvm-online while making those changes.


* disable "first run" wellcome tabs * change startpage
tohttps://duckduckgo.com * In Fedora-30 dispvm: disable the
bookmark-bar in the top


If for some reason you really don't want to run Firefox in your equivalent of 
dvm-online, you could do all those things in an actual dispvm instance (i.e. 
disp1234) and then move the resulting .mozilla config directory into dvm-online.


I've been poking around in ~/.mozilla/ files and configs, but so far
no luck. Anybody got this working who can share their configs? (Maybe
we could put a guide on in wiki/docs? I guess it is quite a common
"problem" for people that use disp-vm's on a regular basis?)


Both approaches mentioned above will work. I just run firefox in dvm-online but 
don't go to any websites. Just make all the settings, plugins etc and then 
delete the cache in settings.


You can also manage your settings inside the user.js in dvm-online without 
using the GUI.

There's tons of doc and samples on the Internet, see github or e.g. [1].

[1] https://privacy-handbuch.de/download/moderat/user.js

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/755e0add-c426-8bc9-2473-3584410475fe%40hobach.de.


smime.p7s
Description: S/MIME Cryptographic Signature


Re: [qubes-users] Win10VM: User name or password incorrect at startup

2021-01-29 Thread 'awokd' via qubes-users

Steve Coleman:


Q: Where is this other supposed/incorrect password being passed into it
from, and is there any way to go back to not needing this login
requirement?


https://docs.microsoft.com/en-us/troubleshoot/windows-server/user-profiles-and-logon/turn-on-automatic-logon

--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dfe16d80-1a7e-2f85-f12d-9436eed6c00e%40danwin1210.me.


Re: [qubes-users] customizing Firefox in disp-vms

2021-01-29 Thread 'awokd' via qubes-users

Sven Semmler:

If for some reason you really don't want to run Firefox in your 
equivalent of dvm-online, you could do all those things in an actual 
dispvm instance (i.e. disp1234) and then move the resulting .mozilla 
config directory into dvm-online.


Be aware though that starting your dispvm's from a common .mozilla 
config instead of a freshly created one every time may result in 
increased fingerprintability. Some of the values in there seemed to be 
unique, and if unchanged between sessions could lead to correlation. May 
not be a concern depending on use cases.


--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/44214695-314b-0cbe-313c-ad36b6133e89%40danwin1210.me.


Re: [qubes-users] customizing Firefox in disp-vms

2021-01-29 Thread Sven Semmler

On 1/29/21 3:48 PM, 'awokd' via qubes-users wrote:
Be aware though that starting your dispvm's from a common .mozilla 
config instead of a freshly created one every time may result in 
increased fingerprintability. Some of the values in there seemed to be 
unique, and if unchanged between sessions could lead to correlation. May 
not be a concern depending on use cases.


Understood.

In use cases where that would be a concern, I wouldn't use 
Firefox/Clearnet but instead Tor Browser/Whonix completely unmodified 
and disposable.


In any case: NoScript. Even in 2021 I see no reason whatsoever to have 
JavaScript on by default. Without JavaScript you are a lot safer, faster 
and less annoyed. It's like magic ;-)


/Sven

--
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6f324a8b-93f2-af0b-5e4d-2ddb89963139%40SvenSemmler.org.


OpenPGP_signature
Description: OpenPGP digital signature


Re: [qubes-users] Win10VM: User name or password incorrect at startup

2021-01-29 Thread Steve Coleman
On Fri, Jan 29, 2021 at 4:43 PM 'awokd' via qubes-users <
qubes-users@googlegroups.com> wrote:

> Steve Coleman:
>
> > Q: Where is this other supposed/incorrect password being passed into it
> > from, and is there any way to go back to not needing this login
> > requirement?
>
>
> https://docs.microsoft.com/en-us/troubleshoot/windows-server/user-profiles-and-logon/turn-on-automatic-logon
>
>
Thanks awokd!

Just to follow up in case this happens to anyone else, the registry entry '
*DefaultPassword'* disappeared completely yet the 'AutoAdminLogon' was
still set to '1', unlike what the documentation says should happen.

I still need to figure out why a) the DefaultPassword entry disappeared, or
b) why the password was expiring and thus the system forced me to set an
actual password instead of what the qvm script had originally set up.  This
will likely remain a mystery but at least it's working again.

Steve

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ5FDnh7Ygh1_q1xg7b02%2BbYrUhQn0ugYteGOnCr%2BX-pbt9gXg%40mail.gmail.com.


Re: [qubes-users] customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian
> On 1/29/21 3:48 PM, 'awokd' via qubes-users wrote:
> > Be aware though that starting your dispvm's from a common .mozilla
> > config instead of a freshly created one every time may result in
> > increased fingerprintability. Some of the values in there seemed to be
> > unique, and if unchanged between sessions could lead to correlation. May
> > not be a concern depending on use cases.

Tor Browser is not appropriate for many use cases. Expect exit nodes to spy 
on all of your traffic if it's not encrypted.

The solutions I gave above which do not involve copying the .mozilla 
directory solve this problem without increasing fingerprintability (except 
to the extent that the settings you change increase fingerprintability 
inherently).

On Friday, January 29, 2021 at 2:40:15 PM UTC-8 sv...@svensemmler.org wrote:

> On 1/29/21 3:48 PM, 'awokd' via qubes-users wrote:
> > Be aware though that starting your dispvm's from a common .mozilla 
> > config instead of a freshly created one every time may result in 
> > increased fingerprintability. Some of the values in there seemed to be 
> > unique, and if unchanged between sessions could lead to correlation. May 
> > not be a concern depending on use cases.
>
> Understood.
>
> In use cases where that would be a concern, I wouldn't use 
> Firefox/Clearnet but instead Tor Browser/Whonix completely unmodified 
> and disposable.
>
> In any case: NoScript. Even in 2021 I see no reason whatsoever to have 
> JavaScript on by default. Without JavaScript you are a lot safer, faster 
> and less annoyed. It's like magic ;-)
>
> /Sven
>
> -- 
> public key: https://www.svensemmler.org/0x8F541FB6.asc
> fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b0d1e9b7-8eb9-4155-98bd-47df1aa93ef9n%40googlegroups.com.


[qubes-users] HELP! after update dom0 "no bootable device found"

2021-01-29 Thread haaber
The main line is in the title. I did a dom0 upgrade that installed kernel-latest. After reboot I got the freaky message

"No bootable device found, press F1... F2 .. F5.." -- it does not really say where it comes from, but it sounds like a BIOS message.

 

I have no idea where to start, so I give all I have here and ask for help. Please read quickly over it, any hint is appreciated.

(1) I did boot my computer with a live linux.

(2) The boot partition does exist. The qubes folder reads like this

 


-rwxr-xr-x 1 root root  24M Jan 29 17:57 initramfs-5.10.11-1.fc25.qubes.x86_64.img
-rwxr-xr-x 1 root root  24M Jan 12 15:27 initramfs-5.10.5-1.qubes.x86_64.img
-rwxr-xr-x 1 root root  23M Jan 24 09:41 initramfs-5.10.8-1.qubes.x86_64.img
-rwxr-xr-x 1 root root  24M Jan 24 09:39 initramfs-5.4.91-1.fc25.qubes.x86_64.img
-rwxr-xr-x 1 root root 7.9M Jan 29 17:57 vmlinuz-5.10.11-1.fc25.qubes.x86_64
-rwxr-xr-x 1 root root 7.9M Jan 12 15:27 vmlinuz-5.10.5-1.qubes.x86_64
-rwxr-xr-x 1 root root 7.9M Jan 24 09:41 vmlinuz-5.10.8-1.qubes.x86_64
-rwxr-xr-x 1 root root 6.9M Jan 24 09:39 vmlinuz-5.4.91-1.fc25.qubes.x86_64
-rwxr-xr-x 1 root root 2.0M Jan  4 00:43 xen-4.8.5-29.fc25.efi
-rwxr-xr-x 1 root root 1.4K Jan 29 20:57 xen.cfg
-rwxr-xr-x 1 root root 2.0M Jan  4 00:43 xen.efi

 

I am surprised by the sizes -- files seem small. Do the seem correct??  Are there files missing?? Could maybe someone check these md5sums, please?

 

1ff66a646f443da650caca5a71d14dc9  initramfs-5.10.11-1.fc25.qubes.x86_64.img
0ed0b625599395686c950b11ca626659  initramfs-5.10.5-1.qubes.x86_64.img
66ad105adc1bcf8543fde0be5e1cffa9  initramfs-5.10.8-1.qubes.x86_64.img
aa03e2e037aa2a173c4f9a2db6dd9096  initramfs-5.4.91-1.fc25.qubes.x86_64.img
36993c5ea1f93a37c548f8ac32b18baf  vmlinuz-5.10.11-1.fc25.qubes.x86_64
9669c095819240d8117f208748707b4c  vmlinuz-5.10.5-1.qubes.x86_64
3db1a8bdd97a608a5459ac5521052ab8  vmlinuz-5.10.8-1.qubes.x86_64
0834cc9a9bfbacb9cfc420f3b879bca7  vmlinuz-5.4.91-1.fc25.qubes.x86_64

 

If these files were corrupt, other error messages should appear, so it is, probably, somthing else. But still!

Next, my actual xen.cfg reads like this

 


[global]
default=5.4.91-1.fc25.qubes.x86_64

[5.10.5-1.qubes.x86_64]
options=loglvl=all dom0_mem=min:1024M dom0_mem=max:4096M iommu=no-igfx ucode=scan smt=off
kernel=vmlinuz-5.10.5-1.qubes.x86_64 root=/dev/mapper/qubes_dom0-root rd.luks.uuid=luks-5efeb9ad-e2a2-47ae-b8e2-d12180464e33 rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap i915.alpha_support=1 rhgb quiet rd.qubes.hide_all_usb plymouth.ignore-serial-consoles
ramdisk=initramfs-5.10.5-1.qubes.x86_64.img
[5.4.91-1.fc25.qubes.x86_64]
options=loglvl=all dom0_mem=min:1024M dom0_mem=max:4096M iommu=no-igfx ucode=scan smt=off
kernel=vmlinuz-5.4.91-1.fc25.qubes.x86_64 root=/dev/mapper/qubes_dom0-root rd.luks.uuid=luks-5efeb9ad-e2a2-47ae-b8e2-d12180464e33 rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap i915.alpha_support=1 rhgb quiet rd.qubes.hide_all_usb plymouth.ignore-serial-consoles
ramdisk=initramfs-5.4.91-1.fc25.qubes.x86_64.img
[5.10.11-1.fc25.qubes.x86_64]
options=loglvl=all dom0_mem=min:1024M dom0_mem=max:4096M iommu=no-igfx ucode=scan smt=off
kernel=vmlinuz-5.10.11-1.fc25.qubes.x86_64 root=/dev/mapper/qubes_dom0-root rd.luks.uuid=luks-5efeb9ad-e2a2-47ae-b8e2-d12180464e33 rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap i915.alpha_support=1 rhgb quiet rd.qubes.hide_all_usb plymouth.ignore-serial-consoles
ramdisk=initramfs-5.10.11-1.fc25.qubes.x86_64.img

 

these all look OK, a part from 5.10.8. being present as files, but not in the boot menu, which is strange.

 
 


(3) I could try the " efibootmgr " commands mentioned in UEFI troubleshooting, but I do not understand them, and I am afraid to f*ck it up even worse. If my harddrive-boot partition is mounted on /BOOT instead of /boot  , how would the command read, please??


 

 

 

Thank you very much,  Bernhard





-- 
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/trinity-9fc2348b-403a-4b48-a530-bda38d1047d6-1611992631199%403c-app-webde-bap08.