[qubes-users] XPS 13 9310 - Installation fails at boot, Stuck at "xen is relinquishing vga console"

2020-11-28 Thread Fabrizio Romano Genovese

Hello all,

I just got a new lappy and I'm trying to install Qubes on it, which is my 
main OS. I understand that the hardware is very new, so problems are to be 
expected.

My main problem at the moment is that I cannot get the installation to 
boot. I prepared a usb medium, kept partition size under 8GB, and disabled 
secure boot in the firmware. 

Everything goes well and I can get xen to boot, but then it gets stuck at 
`xen is relinquishing vga console`, pretty much as it happens in this 
related issue: https://github.com/QubesOS/qubes-issues/issues/5165 

I've tried fiddling with different options found both in the Qubes Issues 
repo and in the UEFI throubleshooting, but I wasn't successful. 

Any help would be appreciated, starting from a very simple fact: Is there a 
way to access the xen boot logs? They go very fast on my screen and it's 
difficult to get what's going on.

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/27fd57ce-d105-4027-8121-1370089f8050n%40googlegroups.com.


Re: [qubes-users] Graphic Tablet Compatibility (basic features)

2018-01-17 Thread Fabrizio Romano Genovese
Well, I blacklisted the relevant module and recompiled the driver as the guide 
said. The hid-core.c file hasn't the line described in the guide tho: It has a 
definition by cases that collapses  the wacom driver to the standard one if 
wacom specific driver is not loaded. In doubt, I eliminated any reference to 
Wacom in the hid-core.c, and replaced the old drivers with the new one. Still, 
no effect whatsoever. 

Interestingly enough, giving 
cat /sys/kernel/debug/usb/devices
tells me that 
T:  Bus=01 Lev=01 Prnt=01 Port=00 Cnt=01 Dev#=  4 Spd=12   MxCh= 0
D:  Ver= 2.00 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=32 #Cfgs=  1
P:  Vendor=056a ProdID=00dd Rev= 1.02
S:  Manufacturer=Wacom Co.,Ltd.
S:  Product=CTL-470
C:* #Ifs= 2 Cfg#= 1 Atr=80 MxPwr= 98mA
I:* If#= 0 Alt= 0 #EPs= 1 Cls=03(HID  ) Sub=01 Prot=02 Driver=usbhid
E:  Ad=81(I) Atr=03(Int.) MxPS=  10 Ivl=2ms
I:* If#= 1 Alt= 0 #EPs= 1 Cls=03(HID  ) Sub=00 Prot=00 Driver=usbhid
E:  Ad=82(I) Atr=03(Int.) MxPS=  64 Ivl=2ms

So the driver used is the right one. Only, usbhid doesn't recognize my tablet 
as a mouse. I feel like I'm out of options :/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/27e9182d-6bb7-4271-83e8-1d81eee6bede%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Graphic Tablet Compatibility (basic features)

2018-01-16 Thread Fabrizio Romano Genovese
Sorry, when I tried to remove 
/lib/modules/4.9.56-21.pvops.qubes.x86_64/kernel/drivers/input/tablet/wacom_serial4.ko
 

I get the error

rm: cannot remove 
'/lib/modules/4.9.56-21.pvops.qubes.x86_64/kernel/drivers/input/tablet/wacom_serial4.ko':
 Read-only file system

(Not always I get ctrl+shift+v right :P)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/30ce8576-e378-4a93-9cd9-3cf05d7ee3a6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Graphic Tablet Compatibility (basic features)

2018-01-16 Thread Fabrizio Romano Genovese
I saw this reply only yesterday, unfortunately.

So, I followed your suggestion and looked around. I found this, that should do 
exactly what you say:
https://cwcode.wordpress.com/2014/01/14/compiling-a-new-kernel-module-to-use-hid-core-for-a-wacom-bamboo-pad/

Now, since this guide is not for fedora, I wanted to try something easier 
before. In the comments someone says

"I found it easier to add usbhid.quirks=0x056a:0x0318:0x4000 to the kernel 
commandline in /etc/default/grub.
0x4000 is HID_QUIRK_NO_IGNORE. The first two numbers is the device’s ID."

So I tried to do the same. I clone the template-vm on which sys-usb is based 
and I added in /etc/default/grub
usbhid.quirks=0x056a:0x00dd:0x4000

where 056a identifies wacom as producer and 00dd is my product number, found in
/sys/kernel/debug/usb/devices.

When I rebooted nothing happened. I also tried to put this line in grub.qubes, 
with no success whatsoever. Then I tried following the guide, but I fail pretty 
quicly: Trying to remove 

/lib/modules/4.9.56-21.pvops.qubes.x86_64/kernel/drivers/input/tablet/wacom_serial4.ko
 

Gives me the error

/lib/modules/4.9.56-21.pvops.qubes.x86_64/kernel/drivers/input/tablet/wacom_serial4.ko
 

Then I tried at least to monitor usb with usbmon. I gave

modprobe usbmon 

and then started monitoring my wacom tablet, that is on 2u, with:

sudo cat /sys/kernel/debug/usb/usbmon/2u

usbmon doesn't sense anything when I move the pen on the tablet, it only senses 
something when I connect/disconnect it. When I connect the tablet I get:

8cefcce66540 3453394997 C Ii:2:001:1 0:2048 2 = 0200
8cefcce66540 3453395017 S Ii:2:001:1 -115:2048 4 <
8cefca1b00c0 3453395039 S Ci:2:001:0 s a3 00  0001 0004 4 <
8cefca1b00c0 3453395053 C Ci:2:001:0 0 4 = 01010100
8cefca1b00c0 3453395057 S Co:2:001:0 s 23 01 0010 0001  0
8cefca1b00c0 3453395067 C Co:2:001:0 0 0
8cefca1b00c0 3453395072 S Ci:2:001:0 s a3 00  0001 0004 4 <
8cefca1b00c0 3453395086 C Ci:2:001:0 0 4 = 0101
8cefca1b00c0 3453422046 S Ci:2:001:0 s a3 00  0001 0004 4 <
8cefca1b00c0 3453422064 C Ci:2:001:0 0 4 = 0101
8cefca1b00c0 3453449146 S Ci:2:001:0 s a3 00  0001 0004 4 <
8cefca1b00c0 3453449166 C Ci:2:001:0 0 4 = 0101
8cefca1b00c0 3453476120 S Ci:2:001:0 s a3 00  0001 0004 4 <
8cefca1b00c0 3453476138 C Ci:2:001:0 0 4 = 0101
8cefca1b00c0 3453503126 S Ci:2:001:0 s a3 00  0001 0004 4 <
8cefca1b00c0 3453503155 C Ci:2:001:0 0 4 = 0101
8cefca1b00c0 3453503256 S Co:2:001:0 s 23 03 0004 0001  0
8cefca1b00c0 3453503279 C Co:2:001:0 0 0
8cefca1b00c0 3453555111 S Ci:2:001:0 s a3 00  0001 0004 4 <
8cefca1b00c0 3453555135 C Ci:2:001:0 0 4 = 1101
8cefca1b00c0 3453607116 S Ci:2:001:0 s a3 00  0001 0004 4 <
8cefca1b00c0 3453607141 C Ci:2:001:0 0 4 = 03011000
8cefca1b00c0 3453607152 S Co:2:001:0 s 23 01 0014 0001  0
8cefca1b00c0 3453607162 C Co:2:001:0 0 0
8cefca1b00c0 3453659185 S Ci:2:000:0 s 80 06 0100  0040 64 <
8cefca1b00c0 3453659601 C Ci:2:000:0 0 18 = 12010002 0020 6a05dd00 
02010102 0001
8cefca1b00c0 3453659620 S Co:2:001:0 s 23 03 0004 0001  0
8cefca1b00c0 3453659633 C Co:2:001:0 0 0
8cefca1b00c0 3453711790 S Ci:2:001:0 s a3 00  0001 0004 4 <
8cefca1b00c0 3453711808 C Ci:2:001:0 0 4 = 1101
8cefca1b00c0 3453763103 S Ci:2:001:0 s a3 00  0001 0004 4 <
8cefca1b00c0 3453763128 C Ci:2:001:0 0 4 = 03011000
8cefca1b00c0 3453763133 S Co:2:001:0 s 23 01 0014 0001  0
8cefca1b00c0 3453763143 C Co:2:001:0 0 0
8cefca1b00c0 3453827084 S Ci:2:006:0 s 80 06 0100  0012 18 <
8cefca1b00c0 3453827583 C Ci:2:006:0 0 18 = 12010002 0020 6a05dd00 
02010102 0001
8cefca1b00c0 3453827613 S Ci:2:006:0 s 80 06 0600  000a 10 <
8cefca1b00c0 3453827726 C Ci:2:006:0 -32 0
8cefca1b00c0 3453827741 S Ci:2:006:0 s 80 06 0600  000a 10 <
8cefca1b00c0 3453827856 C Ci:2:006:0 -32 0
8cefca1b00c0 3453827871 S Ci:2:006:0 s 80 06 0600  000a 10 <
8cefca1b00c0 3453828010 C Ci:2:006:0 -32 0
8cefca1b00c0 3453828038 S Ci:2:006:0 s 80 06 0200  0009 9 <
8cefca1b00c0 3453828359 C Ci:2:006:0 0 9 = 09023b00 02010080 31
8cefca1b00c0 3453828384 S Ci:2:006:0 s 80 06 0200  003b 59 <
8cefca1b00c0 3453829398 C Ci:2:006:0 0 59 = 09023b00 02010080 31090400 
00010301 02000921 10010001 22b80007 0581030a
8cefca1b00c0 3453829420 S Ci:2:006:0 s 80 06 0300  00ff 255 <
8cefca1b00c0 3453829624 C Ci:2:006:0 0 4 = 04030904
8cefca1b00c0 3453829642 S Ci:2:006:0 s 80 06 0302 0409 00ff 255 <
8cefca1b00c0 3453830002 C Ci:2:006:0 0 16 = 10034300 54004c00 2d003400 
37003000
8cefca1b00c0 3453830023 S Ci:2:006:0 s 80 06 0301 0409 00ff 255 <
8cefca1b00c0 3453830594 C Ci:2:006:0 0 30 = 1e035700 61006300 6f006d00 
20004300 6f002e00 2c004c00 74006400 2e00
8cefca1b0cc0 3453831094 S Co:2:006:0 s 00 09 0001   0

[qubes-users] Re: Qubes 4.0 rc3 boot and performance is quite slow

2018-01-08 Thread Fabrizio Romano Genovese
Well, I disabled intel speedstep in the bios and things seem to be better. 
Startup time now is around 1.20 mins (still better than 3mins), both in plugged 
and unplugged state (booting in plugged state was around 45 secs before tho). 
I'll use my PC for a bit more, trying another couple of reboots and then I'll 
confirm if and how this helped.

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/17c482cf-9274-4b62-aa94-9a0868465425%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Graphic Tablet Compatibility (basic features)

2018-01-08 Thread Fabrizio Romano Genovese
Hello all,

I'd like to use a wacom bamboo graphic tablet as an alternative pointing 
device, mainly to draw on virtual whiteboards to do maths in conference calls. 
At the moment, this is not possible: Connecting the graphic tablet and passing 
it to the relevant VM produces no effect whatsoever. The tablet is listed among 
the usb devices but, if for instance one is using the standard fedora template, 
nothing is shown clicking on the "wacom tablet" application that can be found 
in /urs/share/applications, nor is it possible to use it to draw stuff.

This looks like an old issue:
https://github.com/QubesOS/qubes-issues/issues/2715

I'd be interested in using only the basic tablet features (essentially moving 
the mouse and clicking around using the tablet would be enough). In the issue 
linked above it is said that 

"this in theory should be easy (a matter adding proper metadata - min/max - to 
the protocol handshake, and filtering events based on this info)"

I'd like to help with this, but I am no coder. I just know a bit of bash 
scripting and trying to check the code in 

https://github.com/QubesOS/qubes-app-linux-input-proxy/blob/master/src/protocol.h#L17-L28

didn't really help. I understand that developers are quite busy with much more 
hardcore problems to solve, but if someone could at least point me to the right 
research direction I could try to investigate this by myself.

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c5aeb07c-25ad-4d71-913d-369f08980fef%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 4.0 rc3 boot and performance is quite slow

2018-01-08 Thread Fabrizio Romano Genovese
No, my PC is a Dell XPS13, not a Latitude. But I have some news:

The booting problem is 100% dependent on being plugged or not. Precisely, I 
observed the following behaviors:

Booting plugged: Everything is normal, PC is fast. If I unplug it afterwards 
nothing really happens and performance stays the same.

Booting unplugged: FUBAR. Slow, unresponsive, battery draining over 9000. 
Plugging AC adapter in afterwards doesn't help at all.

Dunno if my intuition is the right one, but it may be that the booting process, 
when unplugged, triggers some sort of fucked up setting regarding power 
management that causes havoc. Note that, in my case, the only important factor 
to consider is if the AC adapter is plugged/unplugged AT BOOT. 
Connecting/disconnecting it afterwards has no effect whatsoever on performance.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a089f789-47ea-493e-be0a-dc8630ed8897%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4.0 rc3 boot and performance is quite slow

2018-01-07 Thread Fabrizio Romano Genovese
Ok, I dug a bit deeper into this. It doesn't look like a problem of how much 
memory I give to VMs. Essentially, my QubesOS boots in two different ways:

- When QubesOS is happy, it starts in ~1 min (yup, starting up all the VMs 
still takes a while). The overall system is very reactive, for instance if I 
type qvm-ls I obtain some output straight away. Moreover, if I start a VM the 
notification "VM blabla is starting" is displayed immediately.

- When QubesOS is not happy, it starts in ~3mins. The overall system is very 
slow, qvm-ls takes 3-4 seconds to display output, and starting a VM takes up to 
20 seconds. Even the notification "VM blabla is starting" is displayed 4-5 
seconds after the command is issued. Moreover the battery is drained much much 
quicker (200% quicker give or take).

What makes Qubes happy or not happy to start seems to be completely random. I 
have a slight suspect that this may depend on booting the laptop while 
plugged/unplugged, but I cannot confirm this.
Essentially my Qubes experience atm can be exemplified as follows: "At boot, 
throw a coin. If it's heads then it's fine, otherwise it's fubar". Any 
suggestion (or report of similar behavior) would be greatly appreciated!

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/938de199-7b6f-4132-983e-0720f1929720%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Netowork Manager not running (minimal VM)

2018-01-05 Thread Fabrizio Romano Genovese
Great! I just proposed some changes ^_^
https://github.com/QubesOS/qubes-doc/pull/508
Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/48939291-4b96-4530-9d11-bae7fe3c66e4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4.0 rc3, Whonix template: update-command-not-found

2018-01-05 Thread Fabrizio Romano Genovese
Yup, if you type curl it works, but you can't curl anything out of it because 
you don't have connection. To reproduce what I'm talking about, open a terminal 
in whonix-ws/gw and type some random stuff (like "sdshgow"). Press enter. 
Whonix will tell you

"Could not find the database of available applications, run 
update-command-not-found as root to fix this"

Equivalently, you may just directly try to type 'update-command-not-found' and 
find that the template tries to curl some files without success...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8561b5a9-7229-4035-ba65-05c40f298be4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4.0 rc3, Whonix template: update-command-not-found

2018-01-05 Thread Fabrizio Romano Genovese
Hello all,

This very very annoying thing happened to me also on Qubes 3.2. Essentially, on 
a whonix-based template, (whonix-ws or whonix-gw, doesn't really matter), every 
time I type something (aside of some basic commands such as sudo, firefox, ls 
etc) I receive the message:

"Could not find the database of available applications, run 
update-command-not-found as root to fix this"

If I try to give sudo update-command-not found then whonix tries to curl some 
files, but not having any connection (template vm) fails. The result of this is 
that I have to run this command directly in the interested appvm, EVERY TIME I 
start them up. Is there a way to make whonix communicate with the outside 
world, so that curl succeeds?

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20f4a89e-3012-4868-93df-a49c2b15d85c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Netowork Manager not running (minimal VM)

2018-01-05 Thread Fabrizio Romano Genovese
I obviously checked that page (it is the first thing I did, actually). But 
qubes-core-agent is not mentioned at all there. After hours of research, I 
stumbled into this thread 
https://github.com/QubesOS/qubes-issues/issues/2771

>From here, dnf search qubes-core-agent gave me what I needed. I'd suggest to 
>mention (at least) the existence of the qubes-core-agent-... packages in 
https://www.qubes-os.org/doc/software-update-vm/

I'd also suggest to mention qubes-core-agent-passwordless-root in 
https://www.qubes-os.org/doc/vm-sudo/

I am aware that building an entire operating system is a lot of work and there 
are literally thousands of packages, always changing, to consider. But pages 
like these should be kept up to date. I wouldn't suggest to edit them (some 
information that is still useful for previous qubes versions may be lost), but 
just to index them according to qubes new versions: I'd propose to have a qubes 
3.1, a qubes 3.2 and a qubes 4.0 section, for each page.

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fa908829-0448-4ba9-b68a-c9a39b839c73%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Netowork Manager not running (minimal VM)

2018-01-05 Thread Fabrizio Romano Genovese
Yo everyone,

For future reference, problem solved. The packages 
qubes-core-agent-nautilus
qubes-core-agent-networking
qubes-core-agent-network-manager
qubes-core-agent-passwordless-root
qubes-core-agent-dom0-updates
qubes-input-proxy-sender
qubes-usb-proxy
Are not included by default in the minimal template vm. The first one gives you 
the cute (send here/move there/open in dispVM) stuff in Nautilus. 
The next two are (I suppose) to make networking not a pain in the bum.
The fourth one should do what is done in https://www.qubes-os.org/doc/vm-sudo/ 
for you. 
The fifth one is needed if you are setting up a template you'll use as the 
underlying one for the vm that takes care of updating dom0. 
The last two are to set up a template for sys-usb.

All this information was somewhere between here and the github issues page, but 
it should really (REALLY) be listed in 
https://www.qubes-os.org/doc/templates/fedora-minimal/ since nearly always one 
will end up needing at least one of the packages listed above.
At the moment setting up a template based on a minimal fedora distribution 
looks like a treasure hunt, and I am pretty sure it would save people a lot of 
energy and time to have this stuff added to the fedora-minimal reference page.

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fff5052c-6739-4179-aeaf-2989fcb8ea07%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Netowork Manager not running (minimal VM)

2018-01-05 Thread Fabrizio Romano Genovese
Exciting news: I didn't know that polkit was a package, so even if I followed ( 
https://www.qubes-os.org/doc/vm-sudo/ ) in detail, nothing worked.

Giving sudo dnf install polkit in the minimal template vm solves the 
authorization problems, both for sys-usb and sys-net.

Now I am able to use the minimal template as the underlying one for sys-usb, 
but I still have problems with sys-net.

sys-net keeps telling me that NetworkManager is not running. If I open up a 
terminal and give sudo NetworkManager then i can see the networks clicking on 
the wifi tray icon, but I can't connect. If I click on a network nothing 
happens (no error displayed, of any kind. Just nothing). 

Any suggestions?

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5e1ebbf7-250c-46ac-b09d-41970235718e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Netowork Manager not running (minimal VM)

2018-01-05 Thread Fabrizio Romano Genovese
yes, I have network-manager listed in the services tabs for sys-net (I suppose 
that this what the service you were referring to. adding NetworkManager causes 
the VM startup to fail).

Moreover, if I try to use the same template for sys-usb and then try to open 
some usb stick, I get the message:

Not authorized to perform operation (polkit authority not available and caller 
is not uid0), so again an authorization issue. I suspect this may have 
something to do with the procedure to make the minimal template passwordless ( 
https://www.qubes-os.org/doc/vm-sudo/ )

If someone has some insight about this I'd really appreciate it :)

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/698af639-dd30-40b3-82cc-eb4db5f1f2e4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4rc3: More space needed on the / filesystem.

2018-01-04 Thread Fabrizio Romano Genovese
> On Wednesday, 3 January 2018 16:16:13 GMT Fabrizio Romano Genovese wrote:
> > I am trying to install texlive on a fedora-26 template vm. The package is
> > quite big, nevertheless it is correctly downloaded. After this, when the
> > actual installation process would be supposed to start, it fails with the
> > message:
> > 
> > At least *MB more space needed on the / filesystem
> 
> Have you considered making the root filesystem of your VM have more space?
> 
> In the settings dialog for a VM its the "System storage max size" item which 
> you can change. Be aware that the VM likely needs to restart to access the 
> extra space.

I did and I solved the problem now, thanks. I have to say that the problem here 
was the absence of qubes-manager: I wasn't able to see where to set the root 
partition dimensions. Also, I am using i3, so the idea of moving "all the 
relevant stuff" to the start menu is like saying "we really, really hate our i3 
users" :D

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21bfa3ea-93eb-48f8-8369-ba254e7e2207%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4.0 rc3 boot and performance is quite slow

2018-01-04 Thread Fabrizio Romano Genovese
As the title says, Qubes 4.0rc3 boot is very slow compared to Qubes 3.2.

Looking at the console messages at startup, it looks like the problem is that 
Qubes takes more than one minute to boot sys-net, sys-firewall, sys-usb and 
sys-whonix. That was not the case in 3.2. 

Also, when giving 
qvm-start someVM
the startup time is again quite slow. Could it be that my VMs are based on 
Fedora26?

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cf8c3f00-9b40-4f67-a633-233430679430%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Netowork Manager not running (minimal VM)

2018-01-04 Thread Fabrizio Romano Genovese
I am trying to set up a sys-net based on fedora-26-minimal. I installed all the 
suggested packages in https://www.qubes-os.org/doc/templates/fedora-minimal/

When I start sys-net I can see the network-manager applet, but if I click on it 
it says "NetworkManager is not running..."

If I manually give 
sudo NetworkManager then I can see all the wireless networks I usually see in 
my place (hence the network card is recognized) but when I try to connect to 
one of them I receive the message
(1) Not authorized to control networking.

I suspect there is some service that needs to be started when the VM boots that 
I haven't specified, but I don't know how to proceed.

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b9463d9-2407-45a1-9a3c-3e74d047785f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Disable root password on fedora-25-minimal (Qubes 4.0rc3)

2018-01-03 Thread Fabrizio Romano Genovese
Ok, so for future reference (I found the instructions in 
https://www.qubes-os.org/doc/vm-sudo/ to be not completely clear):

The files mentioned in the first part of https://www.qubes-os.org/doc/vm-sudo/, 
namely:

/etc/sudoers.d/qubes
/etc/polkit-1/rules.d/00-qubes-allow-all.rules 
/etc/polkit-1/localauthority/50-local.d/qubes-allow-all.pkla

are to be created/edited in the VM, not in Dom0. This effectively solves the 
problem.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2cd7e068-7238-4356-9220-9e8cafdc1718%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4rc3: More space needed on the / filesystem.

2018-01-03 Thread Fabrizio Romano Genovese
Hello everyone,

I am trying to install texlive on a fedora-26 template vm. The package is quite 
big, nevertheless it is correctly downloaded. After this, when the actual 
installation process would be supposed to start, it fails with the message:

At least *MB more space needed on the / filesystem

I have tried to use qvm-block to attach some cache file to the vm (as 
suggested, for instance, in ( 
https://www.qubes-os.org/doc/template/fedora/upgrade-21-to-23/ )
but giving 

qvm-block attach fedora-26 cachefile.img 

produces the error 

qvm-block: error: backend vm 'dom0' doesn't expose device 'cachefile.img'

How do I solve this? I read around that qvm-block is buggy with loop devices, 
but I am not sure this is the kind of problem I am facing. I also supposed this 
may have something to do with having a sys-usb VM (the references I found to 
qvm-block usage are all very outdated and antecedent to the sys-usb era), but 
then again I don't know precisely how should I proceed.

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d309ba18-bd7f-4612-9980-24d74da529d2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Disable root password on fedora-25-minimal (Qubes 4.0rc3)

2018-01-02 Thread Fabrizio Romano Genovese
Hello all,

Thanks for the replies! I have already installed sudo just doing 

qvm-run -u root fedora-25-minimal xterm

as Marek suggested, and then installing sudo as I usually do via dnf. The 
problem is that now sudo asks for the root password anyway. If for instance I 
give 

sudo dnf update

on a "standard" terminal shell, I will be prompted for a password. 

I already checked at 

https://www.qubes-os.org/doc/vm-sudo/

What I don't have there is the file and 
/etc/polkit-1/localauthority/50-local.d/qubes-allow-all.pkla. Should I add it?

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fa8ea166-ad10-412a-9a66-6d6a34037c01%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Disable root password on fedora-25-minimal (Qubes 4.0rc3)

2018-01-02 Thread Fabrizio Romano Genovese
As in https://github.com/QubesOS/qubes-issues/issues/3157, by default the 
fedora minimal template will ask for a password while trying to perform any 
action as root. The rationale behind this is that the "ask/don't ask for root" 
policy should be customizable by the user.

...But how? I tried editing the /etc/shadow file to remove the root password, 
with no success whatsoever. I basically would like my minimal template to 
behave like any other, that is, to have a passwordless root. Any help would be 
greatly appreciated!

Thanks for your Time,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9cfbdb37-f52f-4650-8c86-f1d2f98e0178%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Enable PCI_HOTPLUG

2017-12-30 Thread Fabrizio Romano Genovese
Hello everyone,

As in 
https://github.com/QubesOS/qubes-issues/issues/1673
It looks like PCI Hotplug is disabled by default in Qubes. I just bought a new 
laptop with thunderbolt port, and I really need PCI hotplug since I attach and 
detach it from my dockstation multiple times per day. 
I am aware of the risks of having PCI hotplug enabled, but I do not take my PC 
out of my house very often, so it is in general quite difficult for someone to 
have physical access to it. Moreover, I also use thunderbird port blockers 
(that are just some plastic caps that you stick into your port and can't take 
out without a particular key). Obviously this solution is still not 100% secure 
but, all things considered, it is enough for my use case.
So, how do I enable PCI hotplug? Do I have to manually compile the kernel? I'm 
a total noob when it comes to this sort of things so if someone could at least 
redirect me to a guide to do this I'd really appreciate it!

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2e720f96-f8c2-420a-8968-6a47c10bfd9f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Screensaver timer resets automatically

2017-03-24 Thread Fabrizio Romano Genovese
Hello All,

Just a very simple problem: My screenlock does not work. After fiddling around 
a lot I discovered that the screenlock starts correctly if I set the screen 
lock timer as 15 seconds or less.

Experimenting a bit more, I discovered that if I give, say,
xset s 30 30
then the screen never blanks. If I give 
xset s 5 5
then the screen blanks correctly after 5 seconds, but after some more seconds 
(~15 usually) my pc wakes up again, even if I do not touch mouse/keyboard at 
all. After 5 seconds this cycle starts again.

It is quite clear to me that there is something that is mistakenly registered 
as user activity and that periodically resets my screensaver timer, the only 
problem is that I do not know how to find which process/service/whatever causes 
this. Is there a way to find out what resets this timer?

Thanks for your Time,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2ae7ccb5-79ce-4689-8b8a-4f7dd23e04ac%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.0 RC2 on Alienware M17XR3: What works and what not.

2017-03-17 Thread Fabrizio Romano Genovese
Nope, no problems whatsoever for me during install, but mine was R3 so
things may be different. I remember I had a lot of problems while using the
system though, as an instance the screen did not wake up after sleep.
Needless to say, I completely gave up on using the Nvidia card and relied
entirely on the intel one.

At the end of the day, I bought a linux 100% compatible laptop and now I'm
happier than ever. I installed Windows and a shitload of emulators on the
good old Alienware and I use it for what is meant for, gaming. There is no
personal data whatsoever on the PC now, so this approach does not spoil my
privacy and security.

I'm pretty sure you can make a lot of stuff work with a sufficient amount
of headaches and swearing, but in the end some things won't be fixable
(drivers issues, mainly). Also, you should consider that Qubes won't make
justice to such a beautiful machine, and that you may not be able to use
most of the nice features of the Alienware. I love Qubes but according to
my experience Alienware is not the kind of computer you want it installed
on. This is obviously just my personal opinion, so take it for what is
worth (nothing :P )

Cheers,
Fab

On Fri, Mar 17, 2017 at 11:23 PM,  wrote:

> How did you get it installed? Did you do anything special?
>
> Im currently trying to install on an Alienware 17 r4; GeForce GTX 1060;
> and the GUI Installations Screens fail and the text based install has bugs
> that wont let me get past partitioning due to LUKS not getting a password.
>
> --
> You received this message because you are subscribed to a topic in the
> Google Groups "qubes-users" group.
> To unsubscribe from this topic, visit https://groups.google.com/d/
> topic/qubes-users/ogKupxioIAQ/unsubscribe.
> To unsubscribe from this group and all its topics, send an email to
> qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/07a22d4f-4fce-49cb-81ac-c92e48304100%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAAZqLaOR4YsdSHMSd7XsZNLSryg4VUMAWtEgxFw4xSeywNxf%3Dg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Assigning microphone to AppVM from terminal

2017-03-06 Thread Fabrizio Romano Genovese
Thanks Rusty Bird, you made my day!

Cheers,
Fab

On Mon, Mar 6, 2017 at 1:15 PM, Rusty Bird <rustyb...@openmailbox.org>
wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Fabrizio Romano Genovese:
> > I've built a little toggle script to automatically attach/detach my
> camera to an appvm. For the sake of completeness, I'd like to do the same
> for the internal microphone.
>
> https://github.com/rustybird/qubes-stuff/blob/master/dom0/
> bin/qvm-microphone
>
> Rusty
> -BEGIN PGP SIGNATURE-
>
> iQJ8BAEBCgBmBQJYvWDiXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
> ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0
> NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrfoD8P/1Of6v/HyTh/mw/P8+K/CARY
> H+4f1IvASKO5srRM2vYtDs+kEyU+ykN/Rs05ru3HCmI2NVRfrVQftRlZqx55JIgm
> 6/mEud28WuLAk+ZwRsDEtklgsdIc+XshbvoW9yjuVTruD7KoC361LfqLjG7NJRzO
> EEbKwjTK3PsZLpedUAzokE/xfEDhbxUhWDPZMKuOz5zkuMZVW8dQFU/va7+xsAHO
> IPB9FsJk0kTN43OaeUGado7z5N5UQOfmXMEM12fAj3KHbGm8nV9cyEF3xmN48ey9
> tZ/Zykmw7OahTBqXROzDLXLbkVFKpR86YQE1fIx7KM9Lqz6VGPn7L/zBsHz3dG4z
> RXpC9X/WibY1CZek3myI7Jstd4LkGW8WH7PTwgZwUP61LpnH/gsJukDM4CEjBWGX
> NuqRFmhokBqjkHGmumzW+h0I7DSnPULkGGy5tHULQ4HOm5r4o/O5LTTEgHMQHSPQ
> jaQxoSVRZ2fdpu1BE7nPTqlt0/gFP9HesEy7q6Q5OlQg38k7j+oe6LHtKWQ272B4
> 3LQbQXmvCkHXoIew72ywN8WkFEuBy6uArGwetIDZ53bderxep+Bvo1064DUwObf/
> KJ1rRYlIlapa5fECPZ6UJyseLlGOgOSCopSLEY6T83LC0ZmOa0HzJDKi8CfoNt/Z
> ltlD2fZXowwhhM8ToKpk
> =kAjE
> -END PGP SIGNATURE-
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAAZqLaNLRxgF8nC3JHwmA5Pk2bKafi7boxLg4SP4jtRgaoF%2BEQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Assigning microphone to AppVM from terminal

2017-03-04 Thread Fabrizio Romano Genovese
As the title says. I've built a little toggle script to automatically 
attach/detach my camera to an appvm. For the sake of completeness, I'd like to 
do the same for the internal microphone.

Since microphone can be attached/detached to/from an appvm using Qubes manager, 
I suppose there is some kind of script in dom0 that is invoked to perform this 
operation.The problem is that I don't know where I have to look to find it.

Can someone help me?

Thanks for your Time,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d36dae6c-98ca-4d3b-9893-cd5a1d648820%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Global updates question

2017-02-17 Thread Fabrizio Romano Genovese
Thanks everyone, that code does exactly what I wanted. Calling
bash /etc/qubes-rpc/qubes.InstallUpdatesGUI
with qvm-run for a given VM produces the same result of uptating the VM via
qubes-manager.

Thanks for your Time,
Fab

T

On Fri, Feb 17, 2017 at 4:18 AM, Jean-Philippe Ouellet <j...@vt.edu> wrote:

> On Thu, Feb 16, 2017 at 10:51 PM, Fabrizio Romano Genovese
> <themasterofdisast...@gmail.com> wrote:
> > Well, I have considered it, yes, and it's true that launching many
> terminals
> > can be resource intensive. But it's also faster:  Using & I can launch
> all
> > the terminals at the same time, while cycling as in the script you
> linked I
> > should wait for the previous update process to finish.
>
> Not if you just background the process, like:
>
> for dom in templateA templateB ...; do
> qvm-run -p -u root some-template 'dnf update' &
> done
>
> Anyway... the code you're looking for is here:
> https://github.com/QubesOS/qubes-core-agent-linux/blob/
> master/qubes-rpc/qubes.InstallUpdatesGUI
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAAZqLaPKZ0T5dgFhgSJo-kR2zwq1BUtY3S5YNmH0nCBcb6VC-A%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Global updates question

2017-02-16 Thread Fabrizio Romano Genovese
Well, I have considered it, yes, and it's true that launching many
terminals can be resource intensive. But it's also faster:  Using & I can
launch all the terminals at the same time, while cycling as in the script
you linked I should wait for the previous update process to finish.

Moreover, I confess that staring at the terminals for 5 mins every couple
of days relaxes me, so I like it better :)

Anyway I feel like I'm missing something, what I want to do doesn't look so
difficult and I'm not sure why it doesn't work!

Cheers,
Fab

On Fri, Feb 17, 2017 at 2:50 AM, Andrew David Wong <a...@qubes-os.org> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2017-02-16 18:20, Fabrizio Romano Genovese wrote:
> > Hello all,
> >
> > I'm trying to write a little script to globally update my qubes
> > templates. It should work more or less like this:
> >
> > - It prepares a window layout for i3, so that all the opening
> > terminals from the various templates will occupy the right place
> > in a dedicated desktop; - Then it launches the terminal in every
> > template vm, feeding it a nice 'sudo dnf update' - When the update
> > is finished, one should have the chance to close the vm by
> > pressing enter like it happens now on qubes manager.
> >
> > I already implemented the first point (window layout) but I'm
> > having problems at launching the terminals in the right way. I'm
> > basically passing to the vm commands like 'xterm -e "sudo dnf
> > update"', but what happens is that the terminal opens up, checks
> > for updates and then closes without giving me the chance to say
> > y/n.
> >
> > As I mentioned above, in qubes manager when one clicks on "update
> > vm" a nice terminal window opens up, does everything it has to do
> > and then asks you if you want to shutdown the vm or not by
> > pressing enter or control+c, respectively, if I remember well.
> > Since I would really like to have a similar feature in my script, I
> > am wondering if qubes-manager calls some script to behave like it
> > does.
> >
> > If this is the case, I could just call the same script once for
> > every template and solve my problems without struggle.
> >
> > Thanks for your Time, Fab
> >
>
> Have you considered not starting terminals in the TemplateVMs? By
> using --pass-io and not starting the GUI of each TemplateVM, you can
> save resources and hassle. Here's an example:
>
> https://gist.github.com/andrewdavidwong/d0b109186de65835255d467ae103c289
>
> - --
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
>
> iQIcBAEBCgAGBQJYpmTdAAoJENtN07w5UDAwIhkP/R81vgO979DTCObP/hKE2E5h
> 0m5ewGt3TH1Ing51Ueiws8PoYdNDyAkPogdXG4cQZX4a4kMzyzEjJ/zzEzddzoDQ
> 32uFSYzEq7el+eoKyS+OiYiniFlDy4RFAIsjDndkiC+ZPGbfEcvgrrzvm7Ggdcvt
> cD+ZGJaoVOuoN6bRRqNkE73VAkSFoIG0LOeaK/keqJwZobQo28UdMYtvsGvONsDR
> 2vWjDO0jT1K0UEsp0eYuqWDN9B8Ihzw+dYDhSzbKrF3nMGPNXxjcE4edsVdmvL6m
> LzCRisoi2k+C+w/AMFjHNjmxTUrx+Gw2/YoytWsXFrCXUIJSr5g/kWyoqVdKVCtx
> hwOxVFQQdTDJFUl5vbb+9CvAjc6EXddASslyfXXC3iB1mEAy7ATHvSsMiIup/Lx9
> mj2HUk3X6j8uxALo1/+31cqfegEYpuXRtYxRz8sRxFlo9AYDRRNGKgWIn9OJgxl8
> 6mZ/Cfj2qPDttKvPsYhtvUftiTALzy5g5wZLzQh6SEWCizwkR7dUxeX5k/XMWREg
> 9d4WgN2zQ3kTN2FtgNFhd37T/O5z4MZoXWMgcwGW3ZgygGNeO9g+t+OqAYypaHQZ
> 4I0iCIhZTaOC74x0o2yiGd6IKnWLHFXJj+igOKmRve1KE/x0e+EMgahcsKnY0dbM
> OmaMAnd1i7oT+ngnDdSJ
> =X6k5
> -END PGP SIGNATURE-
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAAZqLaPzjjwqchAfk3RXMBX6ff5yMdvW8cuKF3abTbEjYd053g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Global updates question

2017-02-16 Thread Fabrizio Romano Genovese
Hello all,

I'm trying to write a little script to globally update my qubes templates.
It should work more or less like this:

- It prepares a window layout for i3, so that all the opening terminals from 
the various templates will occupy the right place in a dedicated desktop;
- Then it launches the terminal in every template vm, feeding it a nice 'sudo 
dnf update'
- When the update is finished, one should have the chance to close the vm by 
pressing enter like it happens now on qubes manager.

I already implemented the first point (window layout) but I'm having problems 
at launching the terminals in the right way. I'm basically passing to the vm 
commands like 'xterm -e "sudo dnf update"', but what happens is that the 
terminal opens up, checks for updates and then closes without giving me the 
chance to say y/n. 

As I mentioned above, in qubes manager when one clicks on "update vm" a nice 
terminal window opens up, does everything it has to do and then asks you if you 
want to shutdown the vm or not by pressing enter or control+c, respectively, if 
I remember well.
Since I would really like to have a similar feature in my script, I am 
wondering if qubes-manager calls some script to behave like it does.

If this is the case, I could just call the same script once for every template 
and solve my problems without struggle.

Thanks for your Time,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bfd89968-9bb5-464c-a091-0f7f2e229ef1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qvm-trim-template fails (Qubes 3.2)

2016-11-24 Thread Fabrizio Romano Genovese
Looks like qubes-mgmt-salt-vm-connector is already installed in my templates. 
Are you sure the command is  

pkg.uptodate: []

? This looks right in the salt documentation, but there is nothing else I can 
think about...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1a41543f-21aa-40d6-aee6-11222a647ba1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qvm-trim-template fails (Qubes 3.2)

2016-11-24 Thread Fabrizio Romano Genovese
The error I get is 127, that should be "command not found" if I got it right...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/82b9ca5d-632a-4fdc-a2b7-2a47ad9bb88b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qvm-trim-template fails (Qubes 3.2)

2016-11-24 Thread Fabrizio Romano Genovese
Dear Marek,

I've tried the solution you proposed in that post. I've managed to make that 
little script to work (strangely enough, it looks like salt minds about 
indenting in the code. I'm mainly used to latex that doesn't care and this left 
me a bit surprised.

I created a file /srv/salt/update-templates.sls and wrote 

uptodate:
 pkg.uptodate: []

into it. Then I created /srv/salt/update-templates.top and wrote 

base:
 qubes:type:template:
  - match: pillar
  - update-templates 

into it. Then I gave ' sudo qubesctl top.enalbe update-templates ' and tested 
it with ' sudo qubesctl --all state.highstate ' (these commands don't work for 
me if I'm not superuser). unfortunately, this doesn't work for me. There is 
some green stuff going on (like qvm.exists and other things that I don't really 
understand). Then, it runs through the templates returning errors (it basically 
says, as an instance, 'fedora-23: ERROR'). On the app vm it just skips saying 
that there is nothing to do (and this is what it is supposed to do, so at least 
it recognizes that it has to run only on templates).

My feeling (that may be wrong, obviously) is that the command  pkg.uptodate: [] 
does not work for god only knows what reason. Any idea?

Cheers,
Fab.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/28a0a898-f265-4189-9d05-d3578eb2a1dc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Fedora 24 Network Manager icon is missing (and other small issues).

2016-11-24 Thread Fabrizio Romano Genovese
As the title says: I've cloned my fedora 23 templates and followed the 
procedure to upgrade them to fedora 24. Everything is splendid, the only two 
disappointing things are:

a) Network manager applet icon is missing. May this be related to the fact that 
my netvm runs on a minimal template?

b) Fonts look a bit changed. Again, not that much of a problem, it's just 
unexpected.

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/80a6a6a6-55de-400c-87a3-0c078d0bdeda%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qvm-trim-template fails (Qubes 3.2)

2016-11-22 Thread Fabrizio Romano Genovese
Thank you very much, your solution worked (actually I had to give  
virsh -c xen:/// undefine trim-fedora-23 
and not
virsh -c xen:/// undefine fedora-23-fstrim
and then I had to manually remove the trim-fedora-23 files in 
/var/lib/qubes/appvm).

The problem started when I decided to make a little script to automatize the 
trim process for all my templates at once, but it is evident that I must have 
made some mistake while doing it :D

Anyway, a "global trim function", as well as a "global update function" would 
be very helpful, updating/trimming of templates can be quite time consuming!

Cheers,
Fab.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/53fffefd-49a7-4422-82d1-1e2eacc144a2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qvm-trim-template fails (Qubes 3.2)

2016-11-22 Thread Fabrizio Romano Genovese
Hello all, I'm basically having the same error described here:
https://github.com/QubesOS/qubes-issues/issues/1910

When I try to perform qvm-trim-template on any template, the error 

'libvirterror operation failed: domain 'fedora-23-fstrim' already exists with 
uuid ' 
pops up. As in the linked thread, rebooting doesn't help. I don't understand 
the proposed solution. I tried to remove the temporary vm (that in my case it 
has name trim-template-name) giving 

'qvm-remove trim-template-name'

but I get the error

'A VM with the name 'trim-template-name' does not exist in the system.'

Can you help me? My Template VM are becoming a bit too big now...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/26eeb42b-9e46-410c-aee2-42a616e63307%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Needed Packages for sys-usb on Fedora-minimal

2016-10-05 Thread Fabrizio Romano Genovese
Ok, I figured out what the problem was: I was trying to use my phone as a usb 
storage in mtp mode. To do that you also need the package gvfs-mtp. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/398a403e-bf21-4a4a-aaf9-30bcbcb20c48%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Needed Packages for sys-usb on Fedora-minimal

2016-10-04 Thread Fabrizio Romano Genovese
Hello everyone,

I have installed the fedora-24-minimal template and I'm loving it. I'm using it 
as the underlying template in my Netvm and FirewallVM, I just followed the 
guide on Qubes website and everything went well. I'd like to do the same for my 
sys-usb vm but I'm clearly missing something, since if I plug a USB key in it 
doesn't get recognized. Any suggestion about what packages may I need for a 
smooth usb experience on this template?

Thanks for your help,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/db26a976-61e0-4834-ae54-d3f6f20b9422%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.