[qubes-users] Re: XPS 13 9310 - Installation fails at boot, Stuck at "xen is relinquishing vga console"
Someone mailed me some suggestions, but probably did it directly and the email does not show in the thread. Anyway: -The installer can take a long time to show up, so I left the pc on overnight, but nothing happens. When I woke up I got the same black screen. - Keyboard layout is US International - My Chipset is Intel i7-1165G7, which comes with Intel Iris Xe Graphics. I have no other GPU on my pc. - For the boot messages yes, I can take pictures. The output is very arid tho. I managed to get more stuff printed on screen by following this suggestion: https://github.com/QubesOS/qubes-issues/issues/5165#issuecomment-511175580 ...In which case output goes on forever until it says that boot failed. I'll try to take some pictures of this later on today! Fab On Saturday, December 5, 2020 at 6:49:53 PM UTC+1 Fabrizio Romano Genovese wrote: > So, a small update: I downloaded the most recent 4.1 alpha ISO from > https://openqa.qubes-os.org hoping that a maybe a newer xen version/linux > kernel would have helped. The installer freezes anyway, and selecting the > verbose mode in the boot menu I get exactly the same message as before > before the black screen. I'm a bit at a loss here, any suggestion is > appreciated! > > Fab > > > On Saturday, November 28, 2020 at 7:02:53 PM UTC+1 Fabrizio Romano > Genovese wrote: > >> >> Hello all, >> >> I just got a new lappy and I'm trying to install Qubes on it, which is my >> main OS. I understand that the hardware is very new, so problems are to be >> expected. >> >> My main problem at the moment is that I cannot get the installation to >> boot. I prepared a usb medium, kept partition size under 8GB, and disabled >> secure boot in the firmware. >> >> Everything goes well and I can get xen to boot, but then it gets stuck at >> `xen is relinquishing vga console`, pretty much as it happens in this >> related issue: https://github.com/QubesOS/qubes-issues/issues/5165 >> >> I've tried fiddling with different options found both in the Qubes Issues >> repo and in the UEFI throubleshooting, but I wasn't successful. >> >> Any help would be appreciated, starting from a very simple fact: Is there >> a way to access the xen boot logs? They go very fast on my screen and it's >> difficult to get what's going on. >> >> Cheers, >> Fab >> > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/678cc12d-f238-4d26-8316-f068756a11d9n%40googlegroups.com.
[qubes-users] Re: Qubes Installer needs update (Part 3 of 3)
I second this idea. This should at least be an option you can enable by editing the boot config as explained here: https://www.qubes-os.org/doc/uefi-troubleshooting/ I'm in a similar situation, and my best option is taking picture of my boot screen with a phone. Fab On Saturday, December 5, 2020 at 10:29:25 PM UTC+1 Ulrich Windl wrote: > Final Hi! > > As can be seen from the issues reported before, it's _very_ hard for the > average or beginning user to diagnose when installation or boot fails. > Therefore (knowing it's bad security and privacy wise) I suggest an > addition "blackbox log" debugging aid: > Can't a log be written on the EFI partition (during install or during > boot). > Then in theory one could read that log using some common operating system > and send them for inspection. > > Frustrated, > Ulrich > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/473ca747-a3d6-4f6e-bed3-4d4734f69001n%40googlegroups.com.
[qubes-users] Re: XPS 13 9310 - Installation fails at boot, Stuck at "xen is relinquishing vga console"
So, a small update: I downloaded the most recent 4.1 alpha ISO from https://openqa.qubes-os.org hoping that a maybe a newer xen version/linux kernel would have helped. The installer freezes anyway, and selecting the verbose mode in the boot menu I get exactly the same message as before before the black screen. I'm a bit at a loss here, any suggestion is appreciated! Fab On Saturday, November 28, 2020 at 7:02:53 PM UTC+1 Fabrizio Romano Genovese wrote: > > Hello all, > > I just got a new lappy and I'm trying to install Qubes on it, which is my > main OS. I understand that the hardware is very new, so problems are to be > expected. > > My main problem at the moment is that I cannot get the installation to > boot. I prepared a usb medium, kept partition size under 8GB, and disabled > secure boot in the firmware. > > Everything goes well and I can get xen to boot, but then it gets stuck at > `xen is relinquishing vga console`, pretty much as it happens in this > related issue: https://github.com/QubesOS/qubes-issues/issues/5165 > > I've tried fiddling with different options found both in the Qubes Issues > repo and in the UEFI throubleshooting, but I wasn't successful. > > Any help would be appreciated, starting from a very simple fact: Is there > a way to access the xen boot logs? They go very fast on my screen and it's > difficult to get what's going on. > > Cheers, > Fab > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/80587275-ce83-4e35-837a-956374c6713dn%40googlegroups.com.
[qubes-users] XPS 13 9310 - Installation fails at boot, Stuck at "xen is relinquishing vga console"
Hello all, I just got a new lappy and I'm trying to install Qubes on it, which is my main OS. I understand that the hardware is very new, so problems are to be expected. My main problem at the moment is that I cannot get the installation to boot. I prepared a usb medium, kept partition size under 8GB, and disabled secure boot in the firmware. Everything goes well and I can get xen to boot, but then it gets stuck at `xen is relinquishing vga console`, pretty much as it happens in this related issue: https://github.com/QubesOS/qubes-issues/issues/5165 I've tried fiddling with different options found both in the Qubes Issues repo and in the UEFI throubleshooting, but I wasn't successful. Any help would be appreciated, starting from a very simple fact: Is there a way to access the xen boot logs? They go very fast on my screen and it's difficult to get what's going on. Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/27fd57ce-d105-4027-8121-1370089f8050n%40googlegroups.com.
Re: [qubes-users] Graphic Tablet Compatibility (basic features)
Well, I blacklisted the relevant module and recompiled the driver as the guide said. The hid-core.c file hasn't the line described in the guide tho: It has a definition by cases that collapses the wacom driver to the standard one if wacom specific driver is not loaded. In doubt, I eliminated any reference to Wacom in the hid-core.c, and replaced the old drivers with the new one. Still, no effect whatsoever. Interestingly enough, giving cat /sys/kernel/debug/usb/devices tells me that T: Bus=01 Lev=01 Prnt=01 Port=00 Cnt=01 Dev#= 4 Spd=12 MxCh= 0 D: Ver= 2.00 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=32 #Cfgs= 1 P: Vendor=056a ProdID=00dd Rev= 1.02 S: Manufacturer=Wacom Co.,Ltd. S: Product=CTL-470 C:* #Ifs= 2 Cfg#= 1 Atr=80 MxPwr= 98mA I:* If#= 0 Alt= 0 #EPs= 1 Cls=03(HID ) Sub=01 Prot=02 Driver=usbhid E: Ad=81(I) Atr=03(Int.) MxPS= 10 Ivl=2ms I:* If#= 1 Alt= 0 #EPs= 1 Cls=03(HID ) Sub=00 Prot=00 Driver=usbhid E: Ad=82(I) Atr=03(Int.) MxPS= 64 Ivl=2ms So the driver used is the right one. Only, usbhid doesn't recognize my tablet as a mouse. I feel like I'm out of options :/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/27e9182d-6bb7-4271-83e8-1d81eee6bede%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Graphic Tablet Compatibility (basic features)
Sorry, when I tried to remove /lib/modules/4.9.56-21.pvops.qubes.x86_64/kernel/drivers/input/tablet/wacom_serial4.ko I get the error rm: cannot remove '/lib/modules/4.9.56-21.pvops.qubes.x86_64/kernel/drivers/input/tablet/wacom_serial4.ko': Read-only file system (Not always I get ctrl+shift+v right :P) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/30ce8576-e378-4a93-9cd9-3cf05d7ee3a6%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Graphic Tablet Compatibility (basic features)
I saw this reply only yesterday, unfortunately. So, I followed your suggestion and looked around. I found this, that should do exactly what you say: https://cwcode.wordpress.com/2014/01/14/compiling-a-new-kernel-module-to-use-hid-core-for-a-wacom-bamboo-pad/ Now, since this guide is not for fedora, I wanted to try something easier before. In the comments someone says "I found it easier to add usbhid.quirks=0x056a:0x0318:0x4000 to the kernel commandline in /etc/default/grub. 0x4000 is HID_QUIRK_NO_IGNORE. The first two numbers is the device’s ID." So I tried to do the same. I clone the template-vm on which sys-usb is based and I added in /etc/default/grub usbhid.quirks=0x056a:0x00dd:0x4000 where 056a identifies wacom as producer and 00dd is my product number, found in /sys/kernel/debug/usb/devices. When I rebooted nothing happened. I also tried to put this line in grub.qubes, with no success whatsoever. Then I tried following the guide, but I fail pretty quicly: Trying to remove /lib/modules/4.9.56-21.pvops.qubes.x86_64/kernel/drivers/input/tablet/wacom_serial4.ko Gives me the error /lib/modules/4.9.56-21.pvops.qubes.x86_64/kernel/drivers/input/tablet/wacom_serial4.ko Then I tried at least to monitor usb with usbmon. I gave modprobe usbmon and then started monitoring my wacom tablet, that is on 2u, with: sudo cat /sys/kernel/debug/usb/usbmon/2u usbmon doesn't sense anything when I move the pen on the tablet, it only senses something when I connect/disconnect it. When I connect the tablet I get: 8cefcce66540 3453394997 C Ii:2:001:1 0:2048 2 = 0200 8cefcce66540 3453395017 S Ii:2:001:1 -115:2048 4 < 8cefca1b00c0 3453395039 S Ci:2:001:0 s a3 00 0001 0004 4 < 8cefca1b00c0 3453395053 C Ci:2:001:0 0 4 = 01010100 8cefca1b00c0 3453395057 S Co:2:001:0 s 23 01 0010 0001 0 8cefca1b00c0 3453395067 C Co:2:001:0 0 0 8cefca1b00c0 3453395072 S Ci:2:001:0 s a3 00 0001 0004 4 < 8cefca1b00c0 3453395086 C Ci:2:001:0 0 4 = 0101 8cefca1b00c0 3453422046 S Ci:2:001:0 s a3 00 0001 0004 4 < 8cefca1b00c0 3453422064 C Ci:2:001:0 0 4 = 0101 8cefca1b00c0 3453449146 S Ci:2:001:0 s a3 00 0001 0004 4 < 8cefca1b00c0 3453449166 C Ci:2:001:0 0 4 = 0101 8cefca1b00c0 3453476120 S Ci:2:001:0 s a3 00 0001 0004 4 < 8cefca1b00c0 3453476138 C Ci:2:001:0 0 4 = 0101 8cefca1b00c0 3453503126 S Ci:2:001:0 s a3 00 0001 0004 4 < 8cefca1b00c0 3453503155 C Ci:2:001:0 0 4 = 0101 8cefca1b00c0 3453503256 S Co:2:001:0 s 23 03 0004 0001 0 8cefca1b00c0 3453503279 C Co:2:001:0 0 0 8cefca1b00c0 3453555111 S Ci:2:001:0 s a3 00 0001 0004 4 < 8cefca1b00c0 3453555135 C Ci:2:001:0 0 4 = 1101 8cefca1b00c0 3453607116 S Ci:2:001:0 s a3 00 0001 0004 4 < 8cefca1b00c0 3453607141 C Ci:2:001:0 0 4 = 03011000 8cefca1b00c0 3453607152 S Co:2:001:0 s 23 01 0014 0001 0 8cefca1b00c0 3453607162 C Co:2:001:0 0 0 8cefca1b00c0 3453659185 S Ci:2:000:0 s 80 06 0100 0040 64 < 8cefca1b00c0 3453659601 C Ci:2:000:0 0 18 = 12010002 0020 6a05dd00 02010102 0001 8cefca1b00c0 3453659620 S Co:2:001:0 s 23 03 0004 0001 0 8cefca1b00c0 3453659633 C Co:2:001:0 0 0 8cefca1b00c0 3453711790 S Ci:2:001:0 s a3 00 0001 0004 4 < 8cefca1b00c0 3453711808 C Ci:2:001:0 0 4 = 1101 8cefca1b00c0 3453763103 S Ci:2:001:0 s a3 00 0001 0004 4 < 8cefca1b00c0 3453763128 C Ci:2:001:0 0 4 = 03011000 8cefca1b00c0 3453763133 S Co:2:001:0 s 23 01 0014 0001 0 8cefca1b00c0 3453763143 C Co:2:001:0 0 0 8cefca1b00c0 3453827084 S Ci:2:006:0 s 80 06 0100 0012 18 < 8cefca1b00c0 3453827583 C Ci:2:006:0 0 18 = 12010002 0020 6a05dd00 02010102 0001 8cefca1b00c0 3453827613 S Ci:2:006:0 s 80 06 0600 000a 10 < 8cefca1b00c0 3453827726 C Ci:2:006:0 -32 0 8cefca1b00c0 3453827741 S Ci:2:006:0 s 80 06 0600 000a 10 < 8cefca1b00c0 3453827856 C Ci:2:006:0 -32 0 8cefca1b00c0 3453827871 S Ci:2:006:0 s 80 06 0600 000a 10 < 8cefca1b00c0 3453828010 C Ci:2:006:0 -32 0 8cefca1b00c0 3453828038 S Ci:2:006:0 s 80 06 0200 0009 9 < 8cefca1b00c0 3453828359 C Ci:2:006:0 0 9 = 09023b00 02010080 31 8cefca1b00c0 3453828384 S Ci:2:006:0 s 80 06 0200 003b 59 < 8cefca1b00c0 3453829398 C Ci:2:006:0 0 59 = 09023b00 02010080 31090400 00010301 02000921 10010001 22b80007 0581030a 8cefca1b00c0 3453829420 S Ci:2:006:0 s 80 06 0300 00ff 255 < 8cefca1b00c0 3453829624 C Ci:2:006:0 0 4 = 04030904 8cefca1b00c0 3453829642 S Ci:2:006:0 s 80 06 0302 0409 00ff 255 < 8cefca1b00c0 3453830002 C Ci:2:006:0 0 16 = 10034300 54004c00 2d003400 37003000 8cefca1b00c0 3453830023 S Ci:2:006:0 s 80 06 0301 0409 00ff 255 < 8cefca1b00c0 3453830594 C Ci:2:006:0 0 30 = 1e035700 61006300 6f006d00 20004300 6f002e00 2c004c00 74006400 2e00 8cefca1b0cc0 3453831094 S Co:2:006:0 s 00 09 0001 0
[qubes-users] Re: Qubes 4.0 rc3 boot and performance is quite slow
Well, I disabled intel speedstep in the bios and things seem to be better. Startup time now is around 1.20 mins (still better than 3mins), both in plugged and unplugged state (booting in plugged state was around 45 secs before tho). I'll use my PC for a bit more, trying another couple of reboots and then I'll confirm if and how this helped. Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/17c482cf-9274-4b62-aa94-9a0868465425%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Graphic Tablet Compatibility (basic features)
Hello all, I'd like to use a wacom bamboo graphic tablet as an alternative pointing device, mainly to draw on virtual whiteboards to do maths in conference calls. At the moment, this is not possible: Connecting the graphic tablet and passing it to the relevant VM produces no effect whatsoever. The tablet is listed among the usb devices but, if for instance one is using the standard fedora template, nothing is shown clicking on the "wacom tablet" application that can be found in /urs/share/applications, nor is it possible to use it to draw stuff. This looks like an old issue: https://github.com/QubesOS/qubes-issues/issues/2715 I'd be interested in using only the basic tablet features (essentially moving the mouse and clicking around using the tablet would be enough). In the issue linked above it is said that "this in theory should be easy (a matter adding proper metadata - min/max - to the protocol handshake, and filtering events based on this info)" I'd like to help with this, but I am no coder. I just know a bit of bash scripting and trying to check the code in https://github.com/QubesOS/qubes-app-linux-input-proxy/blob/master/src/protocol.h#L17-L28 didn't really help. I understand that developers are quite busy with much more hardcore problems to solve, but if someone could at least point me to the right research direction I could try to investigate this by myself. Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c5aeb07c-25ad-4d71-913d-369f08980fef%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes 4.0 rc3 boot and performance is quite slow
No, my PC is a Dell XPS13, not a Latitude. But I have some news: The booting problem is 100% dependent on being plugged or not. Precisely, I observed the following behaviors: Booting plugged: Everything is normal, PC is fast. If I unplug it afterwards nothing really happens and performance stays the same. Booting unplugged: FUBAR. Slow, unresponsive, battery draining over 9000. Plugging AC adapter in afterwards doesn't help at all. Dunno if my intuition is the right one, but it may be that the booting process, when unplugged, triggers some sort of fucked up setting regarding power management that causes havoc. Note that, in my case, the only important factor to consider is if the AC adapter is plugged/unplugged AT BOOT. Connecting/disconnecting it afterwards has no effect whatsoever on performance. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a089f789-47ea-493e-be0a-dc8630ed8897%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 4.0 rc3 boot and performance is quite slow
Ok, I dug a bit deeper into this. It doesn't look like a problem of how much memory I give to VMs. Essentially, my QubesOS boots in two different ways: - When QubesOS is happy, it starts in ~1 min (yup, starting up all the VMs still takes a while). The overall system is very reactive, for instance if I type qvm-ls I obtain some output straight away. Moreover, if I start a VM the notification "VM blabla is starting" is displayed immediately. - When QubesOS is not happy, it starts in ~3mins. The overall system is very slow, qvm-ls takes 3-4 seconds to display output, and starting a VM takes up to 20 seconds. Even the notification "VM blabla is starting" is displayed 4-5 seconds after the command is issued. Moreover the battery is drained much much quicker (200% quicker give or take). What makes Qubes happy or not happy to start seems to be completely random. I have a slight suspect that this may depend on booting the laptop while plugged/unplugged, but I cannot confirm this. Essentially my Qubes experience atm can be exemplified as follows: "At boot, throw a coin. If it's heads then it's fine, otherwise it's fubar". Any suggestion (or report of similar behavior) would be greatly appreciated! Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/938de199-7b6f-4132-983e-0720f1929720%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Netowork Manager not running (minimal VM)
Great! I just proposed some changes ^_^ https://github.com/QubesOS/qubes-doc/pull/508 Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/48939291-4b96-4530-9d11-bae7fe3c66e4%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 4.0 rc3, Whonix template: update-command-not-found
Yup, if you type curl it works, but you can't curl anything out of it because you don't have connection. To reproduce what I'm talking about, open a terminal in whonix-ws/gw and type some random stuff (like "sdshgow"). Press enter. Whonix will tell you "Could not find the database of available applications, run update-command-not-found as root to fix this" Equivalently, you may just directly try to type 'update-command-not-found' and find that the template tries to curl some files without success... -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8561b5a9-7229-4035-ba65-05c40f298be4%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes 4.0 rc3, Whonix template: update-command-not-found
Hello all, This very very annoying thing happened to me also on Qubes 3.2. Essentially, on a whonix-based template, (whonix-ws or whonix-gw, doesn't really matter), every time I type something (aside of some basic commands such as sudo, firefox, ls etc) I receive the message: "Could not find the database of available applications, run update-command-not-found as root to fix this" If I try to give sudo update-command-not found then whonix tries to curl some files, but not having any connection (template vm) fails. The result of this is that I have to run this command directly in the interested appvm, EVERY TIME I start them up. Is there a way to make whonix communicate with the outside world, so that curl succeeds? Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20f4a89e-3012-4868-93df-a49c2b15d85c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Netowork Manager not running (minimal VM)
I obviously checked that page (it is the first thing I did, actually). But qubes-core-agent is not mentioned at all there. After hours of research, I stumbled into this thread https://github.com/QubesOS/qubes-issues/issues/2771 >From here, dnf search qubes-core-agent gave me what I needed. I'd suggest to >mention (at least) the existence of the qubes-core-agent-... packages in https://www.qubes-os.org/doc/software-update-vm/ I'd also suggest to mention qubes-core-agent-passwordless-root in https://www.qubes-os.org/doc/vm-sudo/ I am aware that building an entire operating system is a lot of work and there are literally thousands of packages, always changing, to consider. But pages like these should be kept up to date. I wouldn't suggest to edit them (some information that is still useful for previous qubes versions may be lost), but just to index them according to qubes new versions: I'd propose to have a qubes 3.1, a qubes 3.2 and a qubes 4.0 section, for each page. Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fa908829-0448-4ba9-b68a-c9a39b839c73%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Netowork Manager not running (minimal VM)
Yo everyone, For future reference, problem solved. The packages qubes-core-agent-nautilus qubes-core-agent-networking qubes-core-agent-network-manager qubes-core-agent-passwordless-root qubes-core-agent-dom0-updates qubes-input-proxy-sender qubes-usb-proxy Are not included by default in the minimal template vm. The first one gives you the cute (send here/move there/open in dispVM) stuff in Nautilus. The next two are (I suppose) to make networking not a pain in the bum. The fourth one should do what is done in https://www.qubes-os.org/doc/vm-sudo/ for you. The fifth one is needed if you are setting up a template you'll use as the underlying one for the vm that takes care of updating dom0. The last two are to set up a template for sys-usb. All this information was somewhere between here and the github issues page, but it should really (REALLY) be listed in https://www.qubes-os.org/doc/templates/fedora-minimal/ since nearly always one will end up needing at least one of the packages listed above. At the moment setting up a template based on a minimal fedora distribution looks like a treasure hunt, and I am pretty sure it would save people a lot of energy and time to have this stuff added to the fedora-minimal reference page. Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fff5052c-6739-4179-aeaf-2989fcb8ea07%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Netowork Manager not running (minimal VM)
Exciting news: I didn't know that polkit was a package, so even if I followed ( https://www.qubes-os.org/doc/vm-sudo/ ) in detail, nothing worked. Giving sudo dnf install polkit in the minimal template vm solves the authorization problems, both for sys-usb and sys-net. Now I am able to use the minimal template as the underlying one for sys-usb, but I still have problems with sys-net. sys-net keeps telling me that NetworkManager is not running. If I open up a terminal and give sudo NetworkManager then i can see the networks clicking on the wifi tray icon, but I can't connect. If I click on a network nothing happens (no error displayed, of any kind. Just nothing). Any suggestions? Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5e1ebbf7-250c-46ac-b09d-41970235718e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Netowork Manager not running (minimal VM)
yes, I have network-manager listed in the services tabs for sys-net (I suppose that this what the service you were referring to. adding NetworkManager causes the VM startup to fail). Moreover, if I try to use the same template for sys-usb and then try to open some usb stick, I get the message: Not authorized to perform operation (polkit authority not available and caller is not uid0), so again an authorization issue. I suspect this may have something to do with the procedure to make the minimal template passwordless ( https://www.qubes-os.org/doc/vm-sudo/ ) If someone has some insight about this I'd really appreciate it :) Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/698af639-dd30-40b3-82cc-eb4db5f1f2e4%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 4rc3: More space needed on the / filesystem.
> On Wednesday, 3 January 2018 16:16:13 GMT Fabrizio Romano Genovese wrote: > > I am trying to install texlive on a fedora-26 template vm. The package is > > quite big, nevertheless it is correctly downloaded. After this, when the > > actual installation process would be supposed to start, it fails with the > > message: > > > > At least *MB more space needed on the / filesystem > > Have you considered making the root filesystem of your VM have more space? > > In the settings dialog for a VM its the "System storage max size" item which > you can change. Be aware that the VM likely needs to restart to access the > extra space. I did and I solved the problem now, thanks. I have to say that the problem here was the absence of qubes-manager: I wasn't able to see where to set the root partition dimensions. Also, I am using i3, so the idea of moving "all the relevant stuff" to the start menu is like saying "we really, really hate our i3 users" :D Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/21bfa3ea-93eb-48f8-8369-ba254e7e2207%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes 4.0 rc3 boot and performance is quite slow
As the title says, Qubes 4.0rc3 boot is very slow compared to Qubes 3.2. Looking at the console messages at startup, it looks like the problem is that Qubes takes more than one minute to boot sys-net, sys-firewall, sys-usb and sys-whonix. That was not the case in 3.2. Also, when giving qvm-start someVM the startup time is again quite slow. Could it be that my VMs are based on Fedora26? Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cf8c3f00-9b40-4f67-a633-233430679430%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Netowork Manager not running (minimal VM)
I am trying to set up a sys-net based on fedora-26-minimal. I installed all the suggested packages in https://www.qubes-os.org/doc/templates/fedora-minimal/ When I start sys-net I can see the network-manager applet, but if I click on it it says "NetworkManager is not running..." If I manually give sudo NetworkManager then I can see all the wireless networks I usually see in my place (hence the network card is recognized) but when I try to connect to one of them I receive the message (1) Not authorized to control networking. I suspect there is some service that needs to be started when the VM boots that I haven't specified, but I don't know how to proceed. Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3b9463d9-2407-45a1-9a3c-3e74d047785f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Disable root password on fedora-25-minimal (Qubes 4.0rc3)
Ok, so for future reference (I found the instructions in https://www.qubes-os.org/doc/vm-sudo/ to be not completely clear): The files mentioned in the first part of https://www.qubes-os.org/doc/vm-sudo/, namely: /etc/sudoers.d/qubes /etc/polkit-1/rules.d/00-qubes-allow-all.rules /etc/polkit-1/localauthority/50-local.d/qubes-allow-all.pkla are to be created/edited in the VM, not in Dom0. This effectively solves the problem. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2cd7e068-7238-4356-9220-9e8cafdc1718%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes 4rc3: More space needed on the / filesystem.
Hello everyone, I am trying to install texlive on a fedora-26 template vm. The package is quite big, nevertheless it is correctly downloaded. After this, when the actual installation process would be supposed to start, it fails with the message: At least *MB more space needed on the / filesystem I have tried to use qvm-block to attach some cache file to the vm (as suggested, for instance, in ( https://www.qubes-os.org/doc/template/fedora/upgrade-21-to-23/ ) but giving qvm-block attach fedora-26 cachefile.img produces the error qvm-block: error: backend vm 'dom0' doesn't expose device 'cachefile.img' How do I solve this? I read around that qvm-block is buggy with loop devices, but I am not sure this is the kind of problem I am facing. I also supposed this may have something to do with having a sys-usb VM (the references I found to qvm-block usage are all very outdated and antecedent to the sys-usb era), but then again I don't know precisely how should I proceed. Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d309ba18-bd7f-4612-9980-24d74da529d2%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Disable root password on fedora-25-minimal (Qubes 4.0rc3)
Hello all, Thanks for the replies! I have already installed sudo just doing qvm-run -u root fedora-25-minimal xterm as Marek suggested, and then installing sudo as I usually do via dnf. The problem is that now sudo asks for the root password anyway. If for instance I give sudo dnf update on a "standard" terminal shell, I will be prompted for a password. I already checked at https://www.qubes-os.org/doc/vm-sudo/ What I don't have there is the file and /etc/polkit-1/localauthority/50-local.d/qubes-allow-all.pkla. Should I add it? Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fa8ea166-ad10-412a-9a66-6d6a34037c01%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Disable root password on fedora-25-minimal (Qubes 4.0rc3)
As in https://github.com/QubesOS/qubes-issues/issues/3157, by default the fedora minimal template will ask for a password while trying to perform any action as root. The rationale behind this is that the "ask/don't ask for root" policy should be customizable by the user. ...But how? I tried editing the /etc/shadow file to remove the root password, with no success whatsoever. I basically would like my minimal template to behave like any other, that is, to have a passwordless root. Any help would be greatly appreciated! Thanks for your Time, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9cfbdb37-f52f-4650-8c86-f1d2f98e0178%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Enable PCI_HOTPLUG
Hello everyone, As in https://github.com/QubesOS/qubes-issues/issues/1673 It looks like PCI Hotplug is disabled by default in Qubes. I just bought a new laptop with thunderbolt port, and I really need PCI hotplug since I attach and detach it from my dockstation multiple times per day. I am aware of the risks of having PCI hotplug enabled, but I do not take my PC out of my house very often, so it is in general quite difficult for someone to have physical access to it. Moreover, I also use thunderbird port blockers (that are just some plastic caps that you stick into your port and can't take out without a particular key). Obviously this solution is still not 100% secure but, all things considered, it is enough for my use case. So, how do I enable PCI hotplug? Do I have to manually compile the kernel? I'm a total noob when it comes to this sort of things so if someone could at least redirect me to a guide to do this I'd really appreciate it! Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2e720f96-f8c2-420a-8968-6a47c10bfd9f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Screensaver timer resets automatically
Hello All, Just a very simple problem: My screenlock does not work. After fiddling around a lot I discovered that the screenlock starts correctly if I set the screen lock timer as 15 seconds or less. Experimenting a bit more, I discovered that if I give, say, xset s 30 30 then the screen never blanks. If I give xset s 5 5 then the screen blanks correctly after 5 seconds, but after some more seconds (~15 usually) my pc wakes up again, even if I do not touch mouse/keyboard at all. After 5 seconds this cycle starts again. It is quite clear to me that there is something that is mistakenly registered as user activity and that periodically resets my screensaver timer, the only problem is that I do not know how to find which process/service/whatever causes this. Is there a way to find out what resets this timer? Thanks for your Time, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2ae7ccb5-79ce-4689-8b8a-4f7dd23e04ac%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 3.0 RC2 on Alienware M17XR3: What works and what not.
Nope, no problems whatsoever for me during install, but mine was R3 so things may be different. I remember I had a lot of problems while using the system though, as an instance the screen did not wake up after sleep. Needless to say, I completely gave up on using the Nvidia card and relied entirely on the intel one. At the end of the day, I bought a linux 100% compatible laptop and now I'm happier than ever. I installed Windows and a shitload of emulators on the good old Alienware and I use it for what is meant for, gaming. There is no personal data whatsoever on the PC now, so this approach does not spoil my privacy and security. I'm pretty sure you can make a lot of stuff work with a sufficient amount of headaches and swearing, but in the end some things won't be fixable (drivers issues, mainly). Also, you should consider that Qubes won't make justice to such a beautiful machine, and that you may not be able to use most of the nice features of the Alienware. I love Qubes but according to my experience Alienware is not the kind of computer you want it installed on. This is obviously just my personal opinion, so take it for what is worth (nothing :P ) Cheers, Fab On Fri, Mar 17, 2017 at 11:23 PM,wrote: > How did you get it installed? Did you do anything special? > > Im currently trying to install on an Alienware 17 r4; GeForce GTX 1060; > and the GUI Installations Screens fail and the text based install has bugs > that wont let me get past partitioning due to LUKS not getting a password. > > -- > You received this message because you are subscribed to a topic in the > Google Groups "qubes-users" group. > To unsubscribe from this topic, visit https://groups.google.com/d/ > topic/qubes-users/ogKupxioIAQ/unsubscribe. > To unsubscribe from this group and all its topics, send an email to > qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit https://groups.google.com/d/ > msgid/qubes-users/07a22d4f-4fce-49cb-81ac-c92e48304100%40googlegroups.com. > For more options, visit https://groups.google.com/d/optout. > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAAZqLaOR4YsdSHMSd7XsZNLSryg4VUMAWtEgxFw4xSeywNxf%3Dg%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Assigning microphone to AppVM from terminal
Thanks Rusty Bird, you made my day! Cheers, Fab On Mon, Mar 6, 2017 at 1:15 PM, Rusty Bird <rustyb...@openmailbox.org> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Fabrizio Romano Genovese: > > I've built a little toggle script to automatically attach/detach my > camera to an appvm. For the sake of completeness, I'd like to do the same > for the internal microphone. > > https://github.com/rustybird/qubes-stuff/blob/master/dom0/ > bin/qvm-microphone > > Rusty > -BEGIN PGP SIGNATURE- > > iQJ8BAEBCgBmBQJYvWDiXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w > ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0 > NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrfoD8P/1Of6v/HyTh/mw/P8+K/CARY > H+4f1IvASKO5srRM2vYtDs+kEyU+ykN/Rs05ru3HCmI2NVRfrVQftRlZqx55JIgm > 6/mEud28WuLAk+ZwRsDEtklgsdIc+XshbvoW9yjuVTruD7KoC361LfqLjG7NJRzO > EEbKwjTK3PsZLpedUAzokE/xfEDhbxUhWDPZMKuOz5zkuMZVW8dQFU/va7+xsAHO > IPB9FsJk0kTN43OaeUGado7z5N5UQOfmXMEM12fAj3KHbGm8nV9cyEF3xmN48ey9 > tZ/Zykmw7OahTBqXROzDLXLbkVFKpR86YQE1fIx7KM9Lqz6VGPn7L/zBsHz3dG4z > RXpC9X/WibY1CZek3myI7Jstd4LkGW8WH7PTwgZwUP61LpnH/gsJukDM4CEjBWGX > NuqRFmhokBqjkHGmumzW+h0I7DSnPULkGGy5tHULQ4HOm5r4o/O5LTTEgHMQHSPQ > jaQxoSVRZ2fdpu1BE7nPTqlt0/gFP9HesEy7q6Q5OlQg38k7j+oe6LHtKWQ272B4 > 3LQbQXmvCkHXoIew72ywN8WkFEuBy6uArGwetIDZ53bderxep+Bvo1064DUwObf/ > KJ1rRYlIlapa5fECPZ6UJyseLlGOgOSCopSLEY6T83LC0ZmOa0HzJDKi8CfoNt/Z > ltlD2fZXowwhhM8ToKpk > =kAjE > -END PGP SIGNATURE- > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAAZqLaNLRxgF8nC3JHwmA5Pk2bKafi7boxLg4SP4jtRgaoF%2BEQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Assigning microphone to AppVM from terminal
As the title says. I've built a little toggle script to automatically attach/detach my camera to an appvm. For the sake of completeness, I'd like to do the same for the internal microphone. Since microphone can be attached/detached to/from an appvm using Qubes manager, I suppose there is some kind of script in dom0 that is invoked to perform this operation.The problem is that I don't know where I have to look to find it. Can someone help me? Thanks for your Time, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d36dae6c-98ca-4d3b-9893-cd5a1d648820%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Global updates question
Thanks everyone, that code does exactly what I wanted. Calling bash /etc/qubes-rpc/qubes.InstallUpdatesGUI with qvm-run for a given VM produces the same result of uptating the VM via qubes-manager. Thanks for your Time, Fab T On Fri, Feb 17, 2017 at 4:18 AM, Jean-Philippe Ouellet <j...@vt.edu> wrote: > On Thu, Feb 16, 2017 at 10:51 PM, Fabrizio Romano Genovese > <themasterofdisast...@gmail.com> wrote: > > Well, I have considered it, yes, and it's true that launching many > terminals > > can be resource intensive. But it's also faster: Using & I can launch > all > > the terminals at the same time, while cycling as in the script you > linked I > > should wait for the previous update process to finish. > > Not if you just background the process, like: > > for dom in templateA templateB ...; do > qvm-run -p -u root some-template 'dnf update' & > done > > Anyway... the code you're looking for is here: > https://github.com/QubesOS/qubes-core-agent-linux/blob/ > master/qubes-rpc/qubes.InstallUpdatesGUI > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAAZqLaPKZ0T5dgFhgSJo-kR2zwq1BUtY3S5YNmH0nCBcb6VC-A%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Global updates question
Well, I have considered it, yes, and it's true that launching many terminals can be resource intensive. But it's also faster: Using & I can launch all the terminals at the same time, while cycling as in the script you linked I should wait for the previous update process to finish. Moreover, I confess that staring at the terminals for 5 mins every couple of days relaxes me, so I like it better :) Anyway I feel like I'm missing something, what I want to do doesn't look so difficult and I'm not sure why it doesn't work! Cheers, Fab On Fri, Feb 17, 2017 at 2:50 AM, Andrew David Wong <a...@qubes-os.org> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2017-02-16 18:20, Fabrizio Romano Genovese wrote: > > Hello all, > > > > I'm trying to write a little script to globally update my qubes > > templates. It should work more or less like this: > > > > - It prepares a window layout for i3, so that all the opening > > terminals from the various templates will occupy the right place > > in a dedicated desktop; - Then it launches the terminal in every > > template vm, feeding it a nice 'sudo dnf update' - When the update > > is finished, one should have the chance to close the vm by > > pressing enter like it happens now on qubes manager. > > > > I already implemented the first point (window layout) but I'm > > having problems at launching the terminals in the right way. I'm > > basically passing to the vm commands like 'xterm -e "sudo dnf > > update"', but what happens is that the terminal opens up, checks > > for updates and then closes without giving me the chance to say > > y/n. > > > > As I mentioned above, in qubes manager when one clicks on "update > > vm" a nice terminal window opens up, does everything it has to do > > and then asks you if you want to shutdown the vm or not by > > pressing enter or control+c, respectively, if I remember well. > > Since I would really like to have a similar feature in my script, I > > am wondering if qubes-manager calls some script to behave like it > > does. > > > > If this is the case, I could just call the same script once for > > every template and solve my problems without struggle. > > > > Thanks for your Time, Fab > > > > Have you considered not starting terminals in the TemplateVMs? By > using --pass-io and not starting the GUI of each TemplateVM, you can > save resources and hassle. Here's an example: > > https://gist.github.com/andrewdavidwong/d0b109186de65835255d467ae103c289 > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJYpmTdAAoJENtN07w5UDAwIhkP/R81vgO979DTCObP/hKE2E5h > 0m5ewGt3TH1Ing51Ueiws8PoYdNDyAkPogdXG4cQZX4a4kMzyzEjJ/zzEzddzoDQ > 32uFSYzEq7el+eoKyS+OiYiniFlDy4RFAIsjDndkiC+ZPGbfEcvgrrzvm7Ggdcvt > cD+ZGJaoVOuoN6bRRqNkE73VAkSFoIG0LOeaK/keqJwZobQo28UdMYtvsGvONsDR > 2vWjDO0jT1K0UEsp0eYuqWDN9B8Ihzw+dYDhSzbKrF3nMGPNXxjcE4edsVdmvL6m > LzCRisoi2k+C+w/AMFjHNjmxTUrx+Gw2/YoytWsXFrCXUIJSr5g/kWyoqVdKVCtx > hwOxVFQQdTDJFUl5vbb+9CvAjc6EXddASslyfXXC3iB1mEAy7ATHvSsMiIup/Lx9 > mj2HUk3X6j8uxALo1/+31cqfegEYpuXRtYxRz8sRxFlo9AYDRRNGKgWIn9OJgxl8 > 6mZ/Cfj2qPDttKvPsYhtvUftiTALzy5g5wZLzQh6SEWCizwkR7dUxeX5k/XMWREg > 9d4WgN2zQ3kTN2FtgNFhd37T/O5z4MZoXWMgcwGW3ZgygGNeO9g+t+OqAYypaHQZ > 4I0iCIhZTaOC74x0o2yiGd6IKnWLHFXJj+igOKmRve1KE/x0e+EMgahcsKnY0dbM > OmaMAnd1i7oT+ngnDdSJ > =X6k5 > -END PGP SIGNATURE- > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAAZqLaPzjjwqchAfk3RXMBX6ff5yMdvW8cuKF3abTbEjYd053g%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Global updates question
Hello all, I'm trying to write a little script to globally update my qubes templates. It should work more or less like this: - It prepares a window layout for i3, so that all the opening terminals from the various templates will occupy the right place in a dedicated desktop; - Then it launches the terminal in every template vm, feeding it a nice 'sudo dnf update' - When the update is finished, one should have the chance to close the vm by pressing enter like it happens now on qubes manager. I already implemented the first point (window layout) but I'm having problems at launching the terminals in the right way. I'm basically passing to the vm commands like 'xterm -e "sudo dnf update"', but what happens is that the terminal opens up, checks for updates and then closes without giving me the chance to say y/n. As I mentioned above, in qubes manager when one clicks on "update vm" a nice terminal window opens up, does everything it has to do and then asks you if you want to shutdown the vm or not by pressing enter or control+c, respectively, if I remember well. Since I would really like to have a similar feature in my script, I am wondering if qubes-manager calls some script to behave like it does. If this is the case, I could just call the same script once for every template and solve my problems without struggle. Thanks for your Time, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bfd89968-9bb5-464c-a091-0f7f2e229ef1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] qvm-trim-template fails (Qubes 3.2)
Looks like qubes-mgmt-salt-vm-connector is already installed in my templates. Are you sure the command is pkg.uptodate: [] ? This looks right in the salt documentation, but there is nothing else I can think about... -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1a41543f-21aa-40d6-aee6-11222a647ba1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] qvm-trim-template fails (Qubes 3.2)
The error I get is 127, that should be "command not found" if I got it right... -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/82b9ca5d-632a-4fdc-a2b7-2a47ad9bb88b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] qvm-trim-template fails (Qubes 3.2)
Dear Marek, I've tried the solution you proposed in that post. I've managed to make that little script to work (strangely enough, it looks like salt minds about indenting in the code. I'm mainly used to latex that doesn't care and this left me a bit surprised. I created a file /srv/salt/update-templates.sls and wrote uptodate: pkg.uptodate: [] into it. Then I created /srv/salt/update-templates.top and wrote base: qubes:type:template: - match: pillar - update-templates into it. Then I gave ' sudo qubesctl top.enalbe update-templates ' and tested it with ' sudo qubesctl --all state.highstate ' (these commands don't work for me if I'm not superuser). unfortunately, this doesn't work for me. There is some green stuff going on (like qvm.exists and other things that I don't really understand). Then, it runs through the templates returning errors (it basically says, as an instance, 'fedora-23: ERROR'). On the app vm it just skips saying that there is nothing to do (and this is what it is supposed to do, so at least it recognizes that it has to run only on templates). My feeling (that may be wrong, obviously) is that the command pkg.uptodate: [] does not work for god only knows what reason. Any idea? Cheers, Fab. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/28a0a898-f265-4189-9d05-d3578eb2a1dc%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Fedora 24 Network Manager icon is missing (and other small issues).
As the title says: I've cloned my fedora 23 templates and followed the procedure to upgrade them to fedora 24. Everything is splendid, the only two disappointing things are: a) Network manager applet icon is missing. May this be related to the fact that my netvm runs on a minimal template? b) Fonts look a bit changed. Again, not that much of a problem, it's just unexpected. Cheers, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/80a6a6a6-55de-400c-87a3-0c078d0bdeda%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] qvm-trim-template fails (Qubes 3.2)
Thank you very much, your solution worked (actually I had to give virsh -c xen:/// undefine trim-fedora-23 and not virsh -c xen:/// undefine fedora-23-fstrim and then I had to manually remove the trim-fedora-23 files in /var/lib/qubes/appvm). The problem started when I decided to make a little script to automatize the trim process for all my templates at once, but it is evident that I must have made some mistake while doing it :D Anyway, a "global trim function", as well as a "global update function" would be very helpful, updating/trimming of templates can be quite time consuming! Cheers, Fab. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/53fffefd-49a7-4422-82d1-1e2eacc144a2%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] qvm-trim-template fails (Qubes 3.2)
Hello all, I'm basically having the same error described here: https://github.com/QubesOS/qubes-issues/issues/1910 When I try to perform qvm-trim-template on any template, the error 'libvirterror operation failed: domain 'fedora-23-fstrim' already exists with uuid ' pops up. As in the linked thread, rebooting doesn't help. I don't understand the proposed solution. I tried to remove the temporary vm (that in my case it has name trim-template-name) giving 'qvm-remove trim-template-name' but I get the error 'A VM with the name 'trim-template-name' does not exist in the system.' Can you help me? My Template VM are becoming a bit too big now... -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/26eeb42b-9e46-410c-aee2-42a616e63307%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Needed Packages for sys-usb on Fedora-minimal
Ok, I figured out what the problem was: I was trying to use my phone as a usb storage in mtp mode. To do that you also need the package gvfs-mtp. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/398a403e-bf21-4a4a-aaf9-30bcbcb20c48%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Needed Packages for sys-usb on Fedora-minimal
Hello everyone, I have installed the fedora-24-minimal template and I'm loving it. I'm using it as the underlying template in my Netvm and FirewallVM, I just followed the guide on Qubes website and everything went well. I'd like to do the same for my sys-usb vm but I'm clearly missing something, since if I plug a USB key in it doesn't get recognized. Any suggestion about what packages may I need for a smooth usb experience on this template? Thanks for your help, Fab -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/db26a976-61e0-4834-ae54-d3f6f20b9422%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.