On Sun, Aug 21, 2022 at 10:29 AM 'unman' via qubes-users <
qubes-users@googlegroups.com> wrote:
> On Sat, Aug 13, 2022 at 10:02:15PM +0200, Qubes wrote:
>
> qubes-dom0-update --repo=qubes-contrib-dom0-r4.1-current --action=list
>
Q1: Is there any way to list these in a way that can actually be
On Sat, Aug 13, 2022 at 10:02:15PM +0200, Qubes wrote:
> Qubes wrote:
> > I guess one way to see what is available in the contrib repo is to look
> > on [Github][1], but is there a way to list the available packages in the
> > contrib repo from cli?
> >
> > Assuming that one has already added the
Aug 14, 2022, 7:46 PM by 169...@gmail.com:
> Hello friends,
>
> Laptop w520 thinkpad corebooted.
>
> I would like to be able to use an external monitor connected by the
> displayport.
>
> This coreboot tutorial > https://www.coreboot.org/Board:lenovo/w520
> suggest to run the following
Qubes writes:
> Does anybody know which directory(ies) and or file(s) need to binded with
> bind-dirs so that i don't have to add the printer i am using in my template? I
> would like to add the printer in my VM but i need to bind the directory(ies)
> and
> or file(s) in /rw so that my
Does anybody know which directory(ies) and or file(s) need to binded
with bind-dirs so that i don't have to add the printer i am using in my
template? I would like to add the printer in my VM but i need to bind
the directory(ies) and or file(s) in /rw so that my configuration sticks.
--
You
To follow up after a bit more experimentation.
- Using the boot param 'module_blacklist=i915' makes things work pretty
much ok. No obvious graphics glitches, it's able to play videos without
the fans spinning up like crazy.
- The PCI device for networking seems unsupported, so usb-wifi card
On 8/14/22 8:36 AM, 'Crsi' via qubes-users wrote:
> I also checked "verify backup" -- no error reported.
Just to clarify, the "verify only" option simulates a restore operation without
actually writing any data from the backup to disk. This has two implications:
1. This option is not at all
Hello friends,
Laptop w520 thinkpad corebooted.
I would like to be able to use an external monitor connected by the
displayport.
This coreboot tutorial https://www.coreboot.org/Board:lenovo/w520
suggest to run the following command:
sudo ./util/nvramtool/nvramtool -w hybrid_graphics_mode="Dual
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Crsi:
> However, I made sure no VM was running (my host system
> crashed previously anyways). That means there's a difference between
> powering down a VM (e.g. qvm-shutdown) and having a powered down VM due to
> crash / power loss? Am I right that
On 8/14/22 18:09, Qubes wrote:
Doing a gracefull shutdown or the VM crashing AFAIK is the same in
terms of the backup function as we have discussed. If your VM crashed
the state of the data on disk would still be the same compared to
gracefully shutting down the VM.
My VM didn't crash -- the
'Crsi' via qubes-users wrote:
> Do you often reboot your VMs? When Qubes creates a backup of a
running VM it will do the backup using the VM state at startup. So if
for example you started your VM (the ones with the outdated/missing
data) 6 weeks ago, but since starting you
> Do you often reboot your VMs? When Qubes creates a backup of a
running VM it will do the backup using the VM state at startup. So if
for example you started your VM (the ones with the outdated/missing
data) 6 weeks ago, but since starting you added/edited/deleted data and
you create a
'Crsi' via qubes-users wrote:
Hi,
I recently upgraded from R4.0 to R4.1 with a fresh installation.
I did make a backup of all my important Qubes to an external drive
beforehand and everything completed successfully. I also checked "verify
backup" -- no error reported.
Do you often reboot
Hi,
I recently upgraded from R4.0 to R4.1 with a fresh installation.
I did make a backup of all my important Qubes to an external drive
beforehand and everything completed successfully. I also checked "verify
backup" -- no error reported.
On the new installation, I restored all my Qubes from
Qubes wrote:
I guess one way to see what is available in the contrib repo is to look
on [Github][1], but is there a way to list the available packages in the
contrib repo from cli?
Assuming that one has already added the contrib repo,
```
sudo qubes-dom0-update qubes-repo-contrib
```
I guess one way to see what is available in the contrib repo is to look
on [Github][1], but is there a way to list the available packages in the
contrib repo from cli?
Assuming that one has already added the contrib repo,
```
sudo qubes-dom0-update qubes-repo-contrib
```
[1]:
I mentioned DNS pinning in the very end and posted a working solution there as
well.
I personally use it since about back then.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it,
On Thu, Aug 11, 2022, 3:10 PM Martin Holst Swende
wrote:
>
> On 8/11/22 11:38, Demi Marie Obenour wrote:
>
> 3. Does HVM sys-gui-gpu work? What about PV (not PVH!) sys-gui-gpu?
>
> I don't have a sys-gui-gpu at the moment, but will test that. This page
>
Sorry, I just noticed that I missed your answer because you did not
answer me directly, but only to the list. The issue you reference to is
quite long to read and parts of it are several years old, is there
something ready for testing?
You say "less often", for my imap-server imap.web.de this
Is there really no approach to fix this? What about a cron job which
checks for a change DNS resolve every now and then and updates the
ip-filter, for example?
Am 29.07.22 um 11:08 schrieb r.wiesb...@web.de:
Hi there,
many large providers use CDNs or similar structures, which results in
the
On 8/11/22 11:38, Demi Marie Obenour wrote:
3. Does HVM sys-gui-gpu work? What about PV (not PVH!) sys-gui-gpu?
I don't have a sys-gui-gpu at the moment, but will test that. This page
(https://www.qubes-os.org/doc/guivm-configuration/) is still the most
relevant/recent description, right?
I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Thu, Aug 11, 2022 at 11:30:50AM +0200, Martin Holst Swende wrote:
>
> On 8/11/22 10:59, Demi Marie Obenour wrote:
> > On Thu, Aug 11, 2022 at 09:07:22AM +0200, Martin Holst Swende wrote:
> >
> > >>> Happy to try out any suggestion/experiment.
>
On 8/11/22 10:59, Demi Marie Obenour wrote:
On Thu, Aug 11, 2022 at 09:07:22AM +0200, Martin Holst Swende wrote:
>>> Happy to try out any suggestion/experiment.
>>
>> 1. Does i915.enable_psr2_sel_fetch=0 help?
> No, no change that I can see.
Okay, so that is not the problem.
>> 2. What X11
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Thu, Aug 11, 2022 at 09:07:22AM +0200, Martin Holst Swende wrote:
>
> > > Happy to try out any suggestion/experiment.
> >
> > 1. Does i915.enable_psr2_sel_fetch=0 help?
>
> No, no change that I can see.
Okay, so that is not the problem.
> >
> Happy to try out any suggestion/experiment.
1. Does i915.enable_psr2_sel_fetch=0 help?
No, no change that I can see.
2. What X11 driver is Xorg using? If it is using Intel, does
modesetting help? If it is using modesetting, does Intel help?
More full logs/notes can be found at
Closing the loop on this for anyone in the future. In the end, I had to:
>From the working 4.0 host:
- Enable a local admin + login one time.
- Take a fresh backup.
On the target 4.1 host:
- Restore the backup
- in a dom0 terminal, run "qvm-prefs qrexec_timeout 6000"
< number is just a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Wed, Aug 10, 2022 at 08:36:33AM +0200, Martin Holst Swende wrote:
>
> On 8/10/22 05:10, Demi Marie Obenour wrote:
> > On Tue, Aug 09, 2022 at 08:11:35PM +0200, Martin Holst Swende wrote:
> > > Some follow-up. I tested also with a Fedora LiveCD,
On 8/10/22 05:10, Demi Marie Obenour wrote:
On Tue, Aug 09, 2022 at 08:11:35PM +0200, Martin Holst Swende wrote:
> Some follow-up. I tested also with a Fedora LiveCD, results are on
the gist
(here:https://gist.github.com/holiman/83c76e4cd98d087719773486a77d9112#file-fedora-live-txt
> ) .
>
On 8/9/22 12:40 PM, Franz wrote:
> On Tue, Aug 9, 2022 at 4:33 PM Qubes wrote:
>
>> Franz wrote:
>>> Hello, dear friends
>>>
>>> New installation 4.1.1
>>>
>>> I am trying to set debian-11-mu-dvm as default disp vm template for the
>>> whole system, but the command
>>>
>>> qvm-prefs
On 8/9/22 7:00 AM, roger paranoia wrote:
> Hello
>
> I would like to install ttf-mscorefonts-installer with the following
> command:
>
> sudo apt install ttf-mscorefonts-installer
>
> but as it privative stuff, it is not directly available in the regular
> repositories. It actually tries to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Tue, Aug 09, 2022 at 08:11:35PM +0200, Martin Holst Swende wrote:
> Some follow-up. I tested also with a Fedora LiveCD, results are on the gist
> (here:https://gist.github.com/holiman/83c76e4cd98d087719773486a77d9112#file-fedora-live-txt
> ) .
>
Thank you Martin for your HCL report. For now I filed it as works: 'no' ... let
us know when this becomes a 'partial' with 'troubleshooting required'.
Your report is
Update: I was able to restore my backup to a Qubes 4.0 system and it
worked. The new system is 4.1... That gives me something else to chase
down.
On Tuesday, August 9, 2022 at 1:44:14 PM UTC-5 EasyMac308 wrote:
> Hi folks,
>
> I had a catastrophic failure with my Librem 14v1 and am currently
On Tue, Aug 9, 2022 at 4:33 PM Qubes wrote:
> Franz wrote:
> > Hello, dear friends
> >
> > New installation 4.1.1
> >
> > I am trying to set debian-11-mu-dvm as default disp vm template for the
> > whole system, but the command
> >
> > qvm-prefs default_dispvm debian-11-mu-dvm
> >
> > replies
Franz wrote:
Hello, dear friends
New installation 4.1.1
I am trying to set debian-11-mu-dvm as default disp vm template for the
whole system, but the command
qvm-prefs default_dispvm debian-11-mu-dvm
replies
qvm-prefs: error: no such domain: 'default_dispvm'.
Global >
It seems it
Hello, dear friends
New installation 4.1.1
I am trying to set debian-11-mu-dvm as default disp vm template for the
whole system, but the command
qvm-prefs default_dispvm debian-11-mu-dvm
replies
qvm-prefs: error: no such domain: 'default_dispvm'.
It seems it expects a domain to make that
Hi folks,
I had a catastrophic failure with my Librem 14v1 and am currently trying to
get everything back up and running from my latest backup onto a new machine
(Dell Precision 7510), pending the return of my repaired Librem.
My Linux App VMs all seem good, but my Windows HVM is failing to
Some follow-up. I tested also with a Fedora LiveCD, results are on the
gist
(here:https://gist.github.com/holiman/83c76e4cd98d087719773486a77d9112#file-fedora-live-txt
) .
The Fedora livecd worked flawlessly, both wifi-wise and graphics-wise.
It was a fedora 36 -- whereas dom0 is still on
Hello
I would like to install ttf-mscorefonts-installer with the following
command:
sudo apt install ttf-mscorefonts-installer
but as it privative stuff, it is not directly available in the regular
repositories. It actually tries to connect to many urls so it can automate
an install of those
Hi,
I installed qubes on a brand new Lenovo X1 Carbon, but encountered a lot
of issues.
1. The wifi is unavailable. I have no idea why, but I did boot it into
an ubuntu live cd once, and the wifi card was found on ubuntu. This gist
On Mon, 8 Aug 2022, Ulrich WIndl wrote:
> Hi!
>
> I have a problem 8-(
>
> After using Qubes OS after a longer break, I tried to install all updates.
> That worked for all template VMs except debian-11. Even when re-trying after
> all the rest was updated and the system rebooted, it won't work.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Mon, Aug 08, 2022 at 11:29:57PM +0200, Ulrich WIndl wrote:
> Hi!
>
> I have a problem 8-(
>
> After using Qubes OS after a longer break, I tried to install all updates.
> That worked for all template VMs except debian-11. Even when re-trying
Hi!
I have a problem 8-(
After using Qubes OS after a longer break, I tried to install all
updates. That worked for all template VMs except debian-11. Even when
re-trying after all the rest was updated and the system rebooted, it
won't work.
Even worse I can start a debian-11-based app VM,
Hi, fresh installation of R4.1.1 on a ThinkPad P14s (latest BIOS version) with:
[x] Use sys-net qube for both networking and USB devices
(Because I want to use USB Wifi since the built-in Wifi does not work, which is
"Intel Corporation Wi-Fi 6 AX210/AX211/AX411 160MHz".)
'qvm-start sys-net'
Dear Qubes Community,
We have just published [Qubes Security Bulletin (QSB) 084: Split GPG: GnuPG
file descriptor confusion and file existence
leak](https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-084-2022.txt).
The text of this QSB is reproduced below. This QSB and its
On 8/5/22 17:00, Peter Palensky wrote:
Update: I can use newer kernels if I remove device "Realtek Semiconductor
Co., Ltd. RTS525A PCI Express Card Reader" from sys-usb VM.
If it _is_ attached to that VM, the entire computer crashes upon sys-usb
start (when newer kernels are in use, it is fine
Update: I can use newer kernels if I remove device "Realtek Semiconductor
Co., Ltd. RTS525A PCI Express Card Reader" from sys-usb VM.
If it _is_ attached to that VM, the entire computer crashes upon sys-usb
start (when newer kernels are in use, it is fine with [very] old ones).
So I guess not
Dear Qubes Community,
As [previously
announced](https://www.qubes-os.org/news/2022/07/04/qubes-os-4-0-eol-on-2022-08-04/),
all releases in the Qubes 4.0 series (which includes the most recent 4.0.4
patch release) have officially reached EOL (end-of-life) as of today,
2022-08-04. We strongly
Is there anybody out there using Krusader in a VM based on a Fedora
template?
I have been using Krusader for a very long time and up until now mostly
on Debian. I recently installed a Fedora based VM but i see Krusader now
apparently does not know of any file associations. Trying to set one
Doing "sudo dnf config-manager --set-enabled rpmfusion-free", gives me
an error, "Error: No matching repo to modify: rpmfusion-free".
This appears to be specific to the Fedora-xx-minimal template. I don't
know why, can someone give me a pointer?
Fedora minimal will not include the
On Mon, Aug 1, 2022, 9:27 AM Qubes wrote:
> Qubes wrote:
> > Is the documentation on this [page] to enable the rpmfusion repos still
> > relevant?
> >
> > Doing "sudo dnf config-manager --set-enabled rpmfusion-free", gives me
> > an error, "Error: No matching repo to modify: rpmfusion-free".
> >
Qubes wrote:
Is the documentation on this [page] to enable the rpmfusion repos still
relevant?
Doing "sudo dnf config-manager --set-enabled rpmfusion-free", gives me
an error, "Error: No matching repo to modify: rpmfusion-free".
This appears to be specific to the Fedora-xx-minimal
Is the documentation on this [page] to enable the rpmfusion repos still
relevant?
Doing "sudo dnf config-manager --set-enabled rpmfusion-free", gives me
an error, "Error: No matching repo to modify: rpmfusion-free".
[page] https://www.qubes-os.org/doc/how-to-install-software/
--
You
Can someone help me diagnose a problem that i have that seems to be
Qubes specific.
I use profile-sync-daemon with my web browser to run the entire browser
profile in memory. However, when i reboot (or shutodwn -> startup) a VM
somewhere there appears to be a timing problem with when
'felix' via qubes-users:
I want to reinstall Qubes 4.1, but I cannot select any templates in the
installer.
Qubes 4.0 and 4.1 were already running successfully on my device and
Qubes 4.0 can still be installed successfully.
In the install menu, Fedora, Debian and Whonix are missing from the
>
> Can you please comment on how it is possible, that
> "ConditionPathExists=/var/run/qubes-service/clocksync was not met" - and -
> ideally, how to resolve that issue.
>
That suggests that you do not have the clocksync service enabled.
Set it with `qvm-service --enable QUBE clocksync` or
Did you check any system errors during the update?
On Saturday, July 30, 2022 at 9:34:26 PM UTC-7 viktor@gmail.com wrote:
> Hello Community,
>
> No advice / feedback at all ?
>
> Viktor Ransmayr schrieb am Samstag, 23. Juli 2022 um 22:05:39 UTC+2:
>
>> Hello community,
>>
>> I do have issues
Hello Community,
No advice / feedback at all ?
Viktor Ransmayr schrieb am Samstag, 23. Juli 2022 um 22:05:39 UTC+2:
> Hello community,
>
> I do have issues with the timesychronization of VMs in my Qubes OS 4.1.1
> system.
>
> I was reading the information provided in [1] - and - verified that
You are in the current version of Qubes. You don't need to upgrade to
another fedora version as it is in 32. This might be Intel ME thing to
crash your PC. A full complete reinstallation is NOT required for your PC
as you need to try many times in order to work. The logs that output is
Dear all,
I was running on Qubes OS 4.1 with kernel 5.10.112
After updating with the Qubes Update Tool, my computer did not
reboot anymore - it froze at the point when the password for the
system needs to be entered. I still have the previous version, so
I can
https://alternativeto.net/software/dokuwiki/?license=opensource
On Friday, July 29, 2022 at 8:23:00 AM UTC-7 Qubes wrote:
> Slightly off topic, but can anybody recommend good wiki software that
> plays well with Qubes VMs?
>
> I am asking because i am having lots of issues setting up Dokuwiki,
Thanks
On Friday, July 29, 2022 at 5:26:58 AM UTC-7 unman wrote:
> On Wed, Jul 27, 2022 at 03:59:03PM -0700, Howard Chen wrote:
> > Currently, I am configuring my NetworkIT qube firewall with the
> > qvm-firewall command in dom0 terminal. However, when I entered this, it
> > showed this
See [1]. It happens less often than one might think though.
[1] https://github.com/QubesOS/qubes-issues/issues/5225
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
Slightly off topic, but can anybody recommend good wiki software that
plays well with Qubes VMs?
I am asking because i am having lots of issues setting up Dokuwiki,
perhaps there is a better one that can be recommended.
--
You received this message because you are subscribed to the Google
Dear Qubes Community,
In conjunction with [3mdeb](https://3mdeb.com/), the fourth edition of our
Qubes OS Summit will be held live this year from September 9 to 11 in Berlin,
Germany! For more information about this event, including the CFP (which is
open until August 29), please see:
On Wed, Jul 27, 2022 at 03:59:03PM -0700, Howard Chen wrote:
> Currently, I am configuring my NetworkIT qube firewall with the
> qvm-firewall command in dom0 terminal. However, when I entered this, it
> showed this following error:
>
> [Howard@dom0 ~]$ qvm-firewall NetworkIT add dsthost
Hi there,
many large providers use CDNs or similar structures, which results in
the same FQDN being resolved to different IPs.
Afaik the Qube-Firewall-Settings resolve a DNS entry only once (on
add/edit) and internaly use that IP. This is a problem with my
mail-provider (web.de) as well es for
On Wed, 27 Jul 2022 10:23:44 -0500
"'Stuart Perkins' via qubes-users" wrote:
>My setup:
>
>Lenovo T420i
>Coreboot
>Qubes OS 4.0
>xfce4 desktop
>fully encrypted disks, 250Gb SSD main, 2TBHD for the larger MV images.
>
>The problem cropped up the other day where my assigned solid color of black
Currently, I am configuring my NetworkIT qube firewall with the
qvm-firewall command in dom0 terminal. However, when I entered this, it
showed this following error:
[Howard@dom0 ~]$ qvm-firewall NetworkIT add dsthost 10.137.0.5
Traceback (most recent call last):
File "/usr/bin/qvm-firewall",
The problem cropped up the other day where my assigned solid color of black
background suddenly changed to gray. Using the system tools, desktop to change
it has no effect either on solid color or background image. Everything else is
working fine, but the sudden change is distressing.
My setup:
Lenovo T420i
Coreboot
Qubes OS 4.0
xfce4 desktop
fully encrypted disks, 250Gb SSD main, 2TBHD for the larger MV images.
The problem cropped up the other day where my assigned solid color of black
background suddenly changed to gray. Using the system tools, desktop to change
it has
Dear Qubes Community,
The Xen Project has released one or more Xen Security Advisories (XSAs).
The security of Qubes OS *is not affected*.
Therefore, *no user action is required*.
## XSAs that affect the security of Qubes OS (user action required)
The following XSAs *do affect* the security of
that should be the solution. Did it wrong also on my first try. After
editing the /etc/environment , it works...
a...@qubes-os.org schrieb am Dienstag, 26. Juli 2022 um 10:15:58 UTC+2:
> On 7/25/22 4:53 PM, 'taran1s' via qubes-users wrote:
> > I tried this but didn't succeed.
> >
> > sudo
On 7/25/22 4:53 PM, 'taran1s' via qubes-users wrote:
> I tried this but didn't succeed.
>
> sudo qubes-dom0-update qt5-qtstyleplugins
> sudo qubes-dom0-update
> export QT_QPA_PLATFORMTHEME=gtk2
>
> cat /etc/environment QT_QPA_PLATFORMTHEME=gtk2
> cat: 'QT_QPA_PLATFORMTHEME=gtk2': No such file or
I tried this but didn't succeed.
sudo qubes-dom0-update qt5-qtstyleplugins
sudo qubes-dom0-update
export QT_QPA_PLATFORMTHEME=gtk2
cat /etc/environment QT_QPA_PLATFORMTHEME=gtk2
cat: 'QT_QPA_PLATFORMTHEME=gtk2': No such file or directory
Qube Manager is still white ^^. Any ideas?
TheGardner:
I want to reinstall Qubes 4.1, but I cannot select any templates in the
installer.
Qubes 4.0 and 4.1 were already running successfully on my device and
Qubes 4.0 can still be installed successfully.
In the install menu, Fedora, Debian and Whonix are missing from the
software selection,
On 7/22/22 7:07 PM, Demi Marie Obenour wrote:
> [...]
>
> That reminds me: Marek, should we set repo_gpgcheck=1 and/or
> %_pkgverify_level all in dom0, to protect against mistakes like this?
FWIW: https://github.com/QubesOS/qubes-issues/issues/7628
--
You received this message because you are
Hello community,
I do have issues with the timesychronization of VMs in my Qubes OS 4.1.1
system.
I was reading the information provided in [1] - and - verified that
'sys-net' is my clock VM.
However I was not able to resolve my issues ...
Here are the logs:
[vr@dom0 ~]$ qubes-prefs
David Hobach wrote:
You can see your pool driver by executing `qvm-pool`.
And the latest version of my scripts will always be available at [1].
Btw somehow one gets used to the worse performance after a while...
[1] https://github.com/3hhh/qubes-performance
Thank you very much.
And i
You can see your pool driver by executing `qvm-pool`.
And the latest version of my scripts will always be available at [1].
Btw somehow one gets used to the worse performance after a while...
[1] https://github.com/3hhh/qubes-performance
Mine currently looks like this:
Qubes release 4.1
Thanks very much Demi Marie.
Then this should be the correct way:
Source & Info: https://github.com/QubesOS/qubes-issues/issues/7389
Install the package qt5-qtstyleplugins with:
sudo qubes-dom0-update qt5-qtstyleplugins
then insert in /etc/environment:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Fri, Jul 22, 2022 at 05:45:13PM -0700, TheGardner wrote:
> Great! It's working now with the following steps in dom0 terminal:
>
> Download qt5-qtstyleplugins RPM file from:
>
>
Great! It's working now with the following steps in dom0 terminal:
Download qt5-qtstyleplugins RPM file from:
https://kojipkgs.fedoraproject.org//packages/qt5-qtstyleplugins/5.0.0/39.fc32/x86_64/qt5-qtstyleplugins-5.0.0-39.fc32.x86_64.rpm
Move it from your AppVM to dom0 with:
qvm-run
David Hobach wrote:
There can be multiple reasons for a slower 4.1 experience. Known ones are:
1. CPU runs at ~800 MHz or so [1]
2. You're a file pool user. File pools were serialized in 4.1, likely
dropping their performance by ~30-50%. [2]
3. Possibly further issues in 4.1 [2].
[1]
There can be multiple reasons for a slower 4.1 experience. Known ones are:
1. CPU runs at ~800 MHz or so [1]
2. You're a file pool user. File pools were serialized in 4.1, likely dropping
their performance by ~30-50%. [2]
3. Possibly further issues in 4.1 [2].
[1]
seems so, my dark Qubes Manager went white from 4.0 to 4.1 and I didn't
understand why and how to change, since today
Qubes schrieb am Freitag, 22. Juli 2022 um 04:20:46 UTC-4:
> Sven Semmler wrote:
> > This is quite easy to fix by installing qt5-qtsyleplugins in dom0 and
> > exporting
Qubes wrote:
Qubes wrote:
Has the 4.1 as well as 4.1.1, because I did test on both, release
added additional overhead to the creation of a dvm?
I have identical dvm's for Firefox on 4.0 and 4.1 and on 4.1 it takes
almost, in the region of 0.5 - 0.75 seconds almost, **double** the
time for a
Qubes wrote:
Has the 4.1 as well as 4.1.1, because I did test on both, release added
additional overhead to the creation of a dvm?
I have identical dvm's for Firefox on 4.0 and 4.1 and on 4.1 it takes
almost, in the region of 0.5 - 0.75 seconds almost, **double** the time
for a new dvm to be
Sven Semmler wrote:
This is quite easy to fix by installing qt5-qtsyleplugins in dom0 and
exporting QT_QPA_PLATFORMTHEME=gtk2 in /etc/environment
--> https://github.com/QubesOS/qubes-issues/issues/7389
Did the Qubes Manager implementation change from 4.0 to 4.1? I am just
asking because i
Ahh, thanks for that info!
Wondered the last couple of month, if QubesOS team would fix that one any
day in the future. No I can help myself...
Cheers :)
sv...@svensemmler.org schrieb am Freitag, 22. Juli 2022 um 00:59:06 UTC+2:
> This is quite easy to fix by installing qt5-qtsyleplugins in
This is quite easy to fix by installing qt5-qtsyleplugins in dom0 and exporting
QT_QPA_PLATFORMTHEME=gtk2 in /etc/environment
--> https://github.com/QubesOS/qubes-issues/issues/7389
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
I have gone back and checked my 4.0 installation and on there Qubes
Manager definitely changes its colour scheme according to the "Style"
selected in
Qubes Menu -> System Tools -> Appearance
I like to use "Adwaita-dark". This changes everything to the dark theme
except Qubes Manager.
This
It might be the speed in which to generate a new random number for this
disposableVM and taking the file for a long time due to the size of that
one file.
On Thursday, July 21, 2022 at 2:13:37 PM UTC-7 Qubes wrote:
> Howard Chen wrote:
> > The problem lies within your computer processing speed
Howard Chen wrote:
The problem lies within your computer processing speed and the numbers of
qubes you has opened and active in one minute; This will significantly
increases the opening time. As a result, it doubles the time of opening and
activating the qubes to be online.
I didn't spell that
The problem lies within your computer processing speed and the numbers of
qubes you has opened and active in one minute; This will significantly
increases the opening time. As a result, it doubles the time of opening and
activating the qubes to be online.
On Thursday, July 21, 2022 at 2:02:12
Howard Chen wrote:
I have the similar as yours, but the time of one of my qubes cannot be open
because of light VM error that I got, which is error 135. The time doubling
effect is just to place for the computer took way too long on some
occasional reasons to go for it. Anyways, it's just the
In dom0 terminal:
> qvm-prefs [domain qubes name] qrexec_timeout 3600
On Thursday, July 21, 2022 at 1:56:35 PM UTC-7 Qubes wrote:
> Howard Chen wrote:
> > I have no ideas that are you talk about, but the R4.1 can be compatible
> > with R4.0's accessibility for your servers. However, it might be
I have the similar as yours, but the time of one of my qubes cannot be open
because of light VM error that I got, which is error 135. The time doubling
effect is just to place for the computer took way too long on some
occasional reasons to go for it. Anyways, it's just the distro issue from
Howard Chen wrote:
I have no ideas that are you talk about, but the R4.1 can be compatible
with R4.0's accessibility for your servers. However, it might be another
distro version problem(s) that R4.0 using Fedora 29 while R4.1 using Fedora
The version of Fedora you are referring to here is the
Has the 4.1 as well as 4.1.1, because I did test on both, release added
additional overhead to the creation of a dvm?
I have identical dvm's for Firefox on 4.0 and 4.1 and on 4.1 it takes
almost, in the region of 0.5 - 0.75 seconds almost, **double** the time
for a new dvm to be ready for
701 - 800 of 35383 matches
Mail list logo