Re: [qubes-users] Error installing Debian-12 template

2023-08-28 Thread qubes-lists

+1
Same problem here.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d44e2700-5ba2-0cec-6725-3aad2ee3433d%40riseup.net.


Re: [qubes-users] dependency problem after upgrading standalone debian 11 VM

2023-04-15 Thread qubes-lists

When creating a backup while the broken VM was still
running I noticed the text saying that the VM backup will contain
the VM's state before it booted, which was a perfect solution to revert
everything I did since the VM started.

This should solve my problem by restoring that newly created backup.

thank you anyway for your help!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/771c3d49-f3e7-3862-1e97-27b92d76225c%40riseup.net.


Re: [qubes-users] dependency problem after upgrading standalone debian 11 VM

2023-04-14 Thread qubes-lists

Hi unman,


I'd probably be rolling back most of your recent changes, and starting
again, after making sure that I have a decent backup of the qube in its
current state.
You need to roll back those packages, and -f should work for the
install. I have some old templates hanging about - if you can wait until
tomorrow I'll pull one and work through the process in the morning.


thanks that is very kind, I'll wait until tomorrow then.

thank you!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5c010d4a-4136-ebae-bb3e-9e96a28678c1%40riseup.net.


Re: [qubes-users] dependency problem after upgrading standalone debian 11 VM

2023-04-14 Thread qubes-lists

Hi uman,

thanks for your reply.

'unman' via qubes-users:

Exactly this issue arose on GitHub - it is, as you say, because you did
not update the qubes repository definition in timely way.
You can read the issue 
[here](https://github.com/qubesos/qubes-issues/issues/7865)



The resolution is to follow the steps in the upgrade script - courtesy
of Marek:
```
The source of the problem is that in R4.1 we actually stopped shipping own 
duplicated xen packages, and are relying on those from official Debian 
repositories. But the upgrade path requires manual step because of that.
The in-place R4.0 -> R4.1 upgrade tool handle that automatically, but in case 
of manual upgrade, see this part:
https://github.com/QubesOS/qubes-dist-upgrade/blob/release4.0/scripts/upgrade-template-standalone.sh#L37-L72
```


Yes I know about this github ticket, I mentioned in my last email, but
I have the impression that these step can not be used _after_
running 'apt update; apt upgrade; apt dist-upgrade' anymore - which is the 
situation I'm in.

Is there also a way to recover a system after the 'apt upgrade' step happened 
already?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/34701d44-dc66-5341-c051-1c42da8fb5e6%40riseup.net.


Re: [qubes-users] dependency problem after upgrading standalone debian 11 VM

2023-04-12 Thread qubes-lists

Do you have any recommendation on how to solve this issue?


I also tried:
https://github.com/QubesOS/qubes-dist-upgrade/blob/release4.0/scripts/upgrade-template-standalone.sh#L37-L72

found via:
https://github.com/QubesOS/qubes-issues/issues/7865#issuecomment-1407236960

but running:
apt-get install --allow-downgrades -y \
'xen-utils-common=4.14*' \
'libxenstore3.0=4.14*' \
'xenstore-utils=4.14*'

fails because I did run
'apt upgrade; apt dist-upgrade'
already:

Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Selected version '4.14.5+94-ge49571868d-1' (Debian-Security:11/stable-security 
[amd64]) for 'xen-utils-common'
Selected version '4.14.5+94-ge49571868d-1' (Debian-Security:11/stable-security 
[amd64]) for 'libxenstore3.0'
Selected version '4.14.5+94-ge49571868d-1' (Debian-Security:11/stable-security 
[amd64]) for 'xenstore-utils'
You might want to run 'apt --fix-broken install' to correct these.
The following packages have unmet dependencies:
 qubes-core-agent : Depends: xen-utils-guest but it is not going to be installed
E: Unmet dependencies. Try 'apt --fix-broken install' with no packages (or 
specify a solution).
exit


Is there a way out?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4614fb88-814a-90a8-d68a-c52782b785ce%40riseup.net.


[qubes-users] dependency problem after upgrading standalone debian 11 VM

2023-04-12 Thread qubes-lists

Hello!

a while ago when migrating Qubes 4.0 to Qubes 4.1
I restored a standalone debian VM (created on r4.0) on a fresh r4.1 system and 
did not
notice that I also should replace the r4.0 repos _in_ the VM to r4.1 repos
but it still worked fine.

Today I replaced this line:
deb [arch=amd64] https://deb.qubes-os.org/r4.0/vm bullseye main

with this:
deb [arch=amd64] https://deb.qubes-os.org/r4.1/vm bullseye main

in the standalone VM.

After an
apt update
apt upgrade
apt dist-upgrade

I'm running into this error:


The following additional packages will be installed:
  xen-utils-guest
The following NEW packages will be installed:
  xen-utils-guest
0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
36 not fully installed or removed.
Need to get 0 B/30.1 kB of archives.
After this operation, 53.2 kB of additional disk space will be used.
Do you want to continue? [Y/n]
(Reading database ... 242630 files and directories currently installed.)
Preparing to unpack .../xen-utils-guest_4.14.5-20+deb11u1_amd64.deb ...
Unpacking xen-utils-guest (4.14.5-20+deb11u1) ...
dpkg: error processing archive 
/var/cache/apt/archives/xen-utils-guest_4.14.5-20+deb11u1_amd64.deb (--unpack):
 trying to overwrite '/lib/systemd/system/xendriverdomain.service', which is 
also in package xen-utils-common 2001:4.8.5-42+deb11u1
Errors were encountered while processing:
 /var/cache/apt/archives/xen-utils-guest_4.14.5-20+deb11u1_amd64.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)


Do you have any recommendation on how to solve this issue?

thanks!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4a0c67be-0d8a-662e-3c53-52bf8dcdef31%40riseup.net.


[qubes-users] U2F Proxy Support for OpenSSH / python-fido2

2022-10-08 Thread qubes-lists

Hello!

the U2F proxy supports browsers according to the documentation:
https://www.qubes-os.org/doc/u2f-proxy/

Approximately how far in the future will it support ssh as well?

Github issues:
https://github.com/QubesOS/qubes-issues/issues/6480
https://github.com/QubesOS/qubes-issues/issues/5501

thanks!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cf0ce96b-242b-e6f0-378e-dad44bae3679%40riseup.net.


Re: [qubes-users] debian 10 VM: "Unable to init server: Could not connect: Connection refused."

2021-02-20 Thread qubes-lists
solved: the disk of the template was full

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a354f75a-4aea-302a-8100-8b2637586263%40riseup.net.


[qubes-users] debian 10 VM: "Unable to init server: Could not connect: Connection refused."

2021-02-20 Thread qubes-lists
Hi,

Since today I'm unable to start any GUI application (testing with 
gnome-terminal and xterm) within a debian 10 based AppVM:

In Qubes Manager the VM shows the green state icon.

To collect logs I connected via 'xl console':

sudo xl console debian-10:

journalctl -f



Log output:

qrexec-agent[599]: executed user:QUBESRPC qubes.VMShell dom0 pid 24766
qrexec-agent[24766]: pam_unix(qrexec:session): session opened for user user by 
(uid=0)
systemd[1]: Started Session c17 of user user.
qubes.VMShell-dom0[24775]: .[0;1;39m.[0;1;31m.[0;1;39mUnable to init server: 
Could not connect: Connection refused.[0m
qrexec-agent[24766]: pam_unix(qrexec:session): session closed for user user
qrexec-agent[599]: send exit code 1
qrexec-agent[599]: pid 24766 exited with 1
qrexec-agent[599]: eintr
systemd[1]: session-c17.scope: Succeeded.

The last updates according to /var/log/apt/history.log within that VM:

Start-Date: 2021-02-01
Commandline: /usr/bin/apt-get -q -y -o DPkg::Options::=--force-confold -o 
DPkg::Options::=--force-confdef dist-upgrade
Install: linux-headers-4.19.0-14-amd64:amd64 (4.19.171-2, automatic), 
linux-headers-4.19.0-14-common:amd64 (4.19.171-2, automatic), 
linux-image-4.19.0-14-amd64:amd64 (4.19.171-2, automatic)
Upgrade: linux-libc-dev:amd64 (4.19.160-2, 4.19.171-2), 
linux-compiler-gcc-8-x86:amd64 (4.19.160-2, 4.19.171-2), 
linux-image-amd64:amd64 (4.19+105+deb10u8, 4.19+105+deb10u9), 
linux-headers-amd64:amd64 (4.19+105+deb10u8, 4.19+105+deb10u9), lightning:amd64 
(1:78.6.0-1~deb10u1, 1:78.7.0-1~deb10u1), thunderbird:amd64 
(1:78.6.0-1~deb10u1, 1:78.7.0-1~deb10u1), linux-kbuild-4.19:amd64 (4.19.160-2, 
4.19.171-2)



Any help to further debug or solve this issue is greatly appreciated.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a481cfc2-248d-b408-8650-babcb09bf4c6%40riseup.net.


[qubes-users] update error: Jinja variable 'dict object' has no attribute 'os'

2020-07-18 Thread qubes-lists
Hi,

I see the following error in the Qubes Update widget window after attempting to 
upgrade a Fedora 32 template:

Rendering SLS 'base:update.qubes-vm' failed: Jinja variable 'dict object' has 
no attribute 'os'


I switched the dvm template to fedora 32 as described in:

https://www.qubes-os.org/news/2020/06/30/fedora-32-templates-available/
https://www.qubes-os.org/doc/templates/#switching

I was not able to find an open issue about this on GH
https://github.com/QubesOS/qubes-issues/issues

Do you see the same error?

thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f03e5a68-5ed7-0f2e-236f-c12ec617c766%40riseup.net.


Re: [qubes-users] Is Qubes Split GPG safe?

2020-02-12 Thread qubes-lists


> As was pointed out in qubes-issues, this isn't the private key - it's a
> key pair that Enigmail creates for some purpose. It cant be used to
> encrypt/decrypt messages that use *your* key-pair.
> There is no problem here.

I'm glad my understanding of the setup is still valid then.
Would be nice for other people if you could link to that said issue.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dff946f7-b461-02c4-9710-c09b0041185c%40riseup.net.


Re: [qubes-users] Is Qubes Split GPG safe?

2020-02-09 Thread qubes-lists
Claudio Chinicz wrote:
> All the idea behind this is to keep your keys in a safe place (VM
> without network), isolated from your application VM.
> 
> I've installed the work-gpg (keys vault) and created a mail VM with
> Thunderbird and Enigmail.
> 
> While Enigmail cannot create new keys on the vault (I have to
> manually import them), it allows me to download/copy the contents of
> my keys (private).
> 
> So, if my mail VM is compromised my keys may be stolen/used
> regardless of my keys being kept in a vault!
> 
> So, what's the purpose of split gpg?

The private keys should never touch the online VM running thunderbird.
The keys should be generated on the offline VM and the only way to
perform operations that require the private key must be via the 
split GPG setup.

If you generated the key on the online VM it is probably best to
start with a new one if you would like to get the benefit of the split GPG
setup of Qubes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1be27134-6fa7-75eb-69e8-2e2047734116%40riseup.net.


Re: [qubes-users] debian-10-minimal: no IP addresses on interfaces?

2019-08-11 Thread qubes-lists


> Did you follow the advice in
> https://www.qubes-os.org/doc/templates/debian-minimal  ?

Thanks for the pointer, now I run into this issue:


apt install qubes-core-agent-networking

results in:

The following packages have unmet dependencies:
  qubes-core-agent-networking : Depends: qubes-core-agent (= 4.0.46-1+deb10u1) 
but 4.0.47-1+deb10u1 is to be installed
E: Unable to correct problems, youhave held broken packages.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6a30bf09-1d56-63c1-bbea-8e31d27c80e1%40riseup.net.


[qubes-users] debian-10-minimal: no IP addresses on interfaces?

2019-08-11 Thread qubes-lists
Hello!

I installed the debian-10-minimal template from the itl-testing repository
and used it for a proxyVM.

When starting the appVM that uses the debian-10-minimal based proxyVM.

The proxyVM gets the usual interfaces eth0 + vif.. but none of these interfaces
have an IP address assigned and are in state DOWN.

This issues does not occur when using the debian-10 (non minimal) version.

Is this a known limitation of the minimal version? 

thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a6c66f59-e132-8404-d58a-5f5bb868cff3%40riseup.net.


Re: [qubes-users] dom0 updates not visible?

2019-07-07 Thread qubes-lists



qubes-li...@riseup.net:
> Hi,
> 
> I fear I have an issue with dom0 updates.
> 
> I noticed that there is a newer release
> for 
> qubes-mgmt-salt-dom0-virtual-machines (4.0.16)
> 
> but I still have:
> 
> qubes-mgmt-salt-dom0-virtual-machines-4.0.15-1.fc25.noarch


Just to verify:

Do others have v4.0.16 installed for the package
qubes-mgmt-salt-dom0-virtual-machines
on your R4.0 systems without testing repos enabled? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8d44f9b2-68f0-7660-c7f9-032ec0434e28%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] dom0 updates not visible?

2019-07-07 Thread qubes-lists



unman:
> On Sun, Jul 07, 2019 at 01:40:00PM +, qubes-li...@riseup.net wrote:
>> Hi,
>>
>> I fear I have an issue with dom0 updates.
>>
>> I noticed that there is a newer release
>> for 
>> qubes-mgmt-salt-dom0-virtual-machines (4.0.16)
>>
>> but I still have:
>>
>> qubes-mgmt-salt-dom0-virtual-machines-4.0.15-1.fc25.noarch


> 
> This is, unfortunately, a known issue.
> You can manually install the "SKIPPED" packages by using dnf install.
> Your "dnf clean all" has scuppered that.
> Just try the update again, and if the same packages are downloaded, just
> install them yourself.


but the relevant package qubes-mgmt-salt-dom0-virtual-machines
is not even listed as skipped.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b956717-f232-bf99-2042-4fadc0be7e33%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] dom0 updates not visible?

2019-07-07 Thread qubes-lists
Hi,

I fear I have an issue with dom0 updates.

I noticed that there is a newer release
for 
qubes-mgmt-salt-dom0-virtual-machines (4.0.16)

but I still have:

qubes-mgmt-salt-dom0-virtual-machines-4.0.15-1.fc25.noarch

An update in dom0 doesn't install the update:

sudo qubes-dom0-update

Using sys-firewall as UpdateVM to download updates for Dom0; this may take some 
time...
Last metadata expiration check: 0:35:59 ago on Sun Jul  7 14:57:27 2019.
Dependencies resolved.

 Package  Arch   Version   Repository  Size

Reinstalling:
 anaconda-corex86_64 1000:25.20.9-14.fc25  qubes-dom0-current 1.5 M
 anaconda-gui x86_64 1000:25.20.9-14.fc25  qubes-dom0-current 386 k
 anaconda-tui x86_64 1000:25.20.9-14.fc25  qubes-dom0-current 186 k
 anaconda-widgets x86_64 1000:25.20.9-14.fc25  qubes-dom0-current 119 k
 garcon   x86_64 1000:0.5.0-1.fc25 qubes-dom0-current 179 k
 python3-blivet   noarch 2:2.1.6-5.fc25qubes-dom0-current 1.0 M
 python3-kickstartnoarch 1000:2.32-4.fc25  qubes-dom0-current 370 k
 qubes-anaconda-addon noarch 4.0.9-1.fc25  qubes-dom0-current  34 k
 xfwm4x86_64 1000:4.12.4-1.fc25qubes-dom0-current 636 k
 xorg-x11-drv-ati x86_64 18.0.1-1.fc25 qubes-dom0-current 168 k
 xorg-x11-drv-intel   x86_64 2.99.917-32.20171025.fc25 qubes-dom0-current 696 k

Transaction Summary


Total size: 5.1 M
Installed size: 19 M
DNF will only download packages for the transaction.
Downloading Packages:
[SKIPPED] anaconda-core-25.20.9-14.fc25.x86_64.rpm: Already downloaded 
[SKIPPED] anaconda-gui-25.20.9-14.fc25.x86_64.rpm: Already downloaded  
[SKIPPED] anaconda-tui-25.20.9-14.fc25.x86_64.rpm: Already downloaded  
[SKIPPED] anaconda-widgets-25.20.9-14.fc25.x86_64.rpm: Already downloaded  
[SKIPPED] garcon-0.5.0-1.fc25.x86_64.rpm: Already downloaded   
[SKIPPED] python3-blivet-2.1.6-5.fc25.noarch.rpm: Already downloaded   
[SKIPPED] python3-kickstart-2.32-4.fc25.noarch.rpm: Already downloaded 
[SKIPPED] qubes-anaconda-addon-4.0.9-1.fc25.noarch.rpm: Already downloaded 
[SKIPPED] xfwm4-4.12.4-1.fc25.x86_64.rpm: Already downloaded   
[SKIPPED] xorg-x11-drv-ati-18.0.1-1.fc25.x86_64.rpm: Already downloaded
[SKIPPED] xorg-x11-drv-intel-2.99.917-32.20171025.fc25.x86_64.rpm: Already 
downloaded
Complete!
The downloaded packages were saved in cache until the next successful 
transaction.
You can remove cached packages by executing 'dnf clean packages'.
Qubes OS Repository for Dom0   


I don't use the testing/unstable dom0 repos, just current.


I'm using sys-firewall (fedora-30) as update VM.

I also tried 
sudo dnf clean all

using Qubes R4.0 

Do you have recommendations on how to debug this?
thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/efc3bf7b-fd76-32df-b2ed-1f4fe78154d4%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] unable to use USB ports with R4.0.1-rc1 on X1 Carbon 6th

2018-12-03 Thread qubes-lists
Hi,

do you have any debugging hints to get USB ports working
either in sys-usb or in dom0 on an X1 carbon 6th generation?

the default sys-usb config does not work (usb functionality not available in VM)

then I tried to get it to work in dom0 by unassigning the devices from the 
sys-usb VM
and rebooting but with no success.

I updated to the bios version 1.34 released in November 2018.

thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b5da53fb-7d5c-f867-19ce-940efb4c70c3%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] dispvm at 100% after starting (basically freezing)

2018-09-20 Thread qubes-lists
Hi,

lately my dispvm (Qubes 3.2) are frequently reaching 100% immediately after 
starting
and basically freezing.

dispvm based on f28 template.

top shows the following to tasks in the running state:
ksoftirqd/0
rcu_sched

load: >12 


does anyone else observe this or similar issues?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dba632dd-539e-2b79-4911-6ba374beefe9%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] DispVM broken in 3.2? (xen-4.6.6-37)

2018-03-18 Thread qubes-lists

I used the following commands in dom0 to restore dispVM functionality: 
 

qubes-dom0-update  xen-libs-4.6.6-36.fc23.x86_64 
xen-hypervisor-4.6.6-36.fc23.x86_64 xen-runtime-4.6.6-36.fc23.x86_64 
xen-hvm-4.6.6-36.fc23.x86_64 xen-4.6.6-36.fc23.x86_64 
xen-license-4.6.6-36.fc23.x86_64

dnf downgrade xen-libs-4.6.6-36.fc23.x86_64 xen-hypervisor-4.6.6-36.fc23.x86_64 
xen-runtime-4.6.6-36.fc23.x86_64 xen-hvm-4.6.6-36.fc23.x86_64 
xen-4.6.6-36.fc23.x86_64 xen-license-4.6.6-36.fc23.x86_64


(downgrading the packages in the template was not necessary) 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f0a7a149-c5ed-c234-89ab-6ca26457f0d1%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] DispVM broken in 3.2?

2018-03-17 Thread qubes-lists
 What would be the step to downgrade to the previous version to
 get dispVMs working again?

 qubes-dom0-update --action=downgrade xen something like this or is it
 necessary to specify all packets individually?
>>>
>>> Depending on how attached you are to Fedora, you might want to temporarily
>>> try the Debian template instead of downgrading Xen?
>>
>>
>> I get the same error after switching to debian-9 as the dispVM template.
>>
>> So switching to debian-9 for dispVM is unfortunately _not_ a possible 
>> workaround for this.
> 
> You're using Testing arent you?

Yes, to be precise: 

qubes-dom0-current-testing is _not_ enabled.

qubes-dom0-security-testing _is_ enabled.


> You could downgrade to the 36 version of xen-libs and runtime etc. That
> should fix your problem until 6-38 is released
 
What would be the recommended way of downgrading? (and wouldn't it be
better to revert all packages of the given upgrade?)

qubes-dom0-update --action=downgrade xen-libs xen-runtime xen-hvm

Maybe lets add generic downgrade instructions for such cases (dom0) to the 
documentation?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/720d2245-2082-d12e-2d79-7abbe485b90c%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] unexpected hard reboot on xen-4.6.6-37 (in security-testing repo)

2018-03-17 Thread qubes-lists
Hi,

this is just a warning for those that have qubes-dom0-security-testing enabled
and did not upgrade yet.

Besides breaking dispVM functionality [1] I also had a strange
unexpected hard reboot since I upgraded to xen-4.6.6-37.
I don't know the root cause of the reboot but it _might_ be related
to the xen update. 


So if you enabled the dom0 security-testing repo you might want to
avoid upgrading just yet.




[1] https://github.com/QubesOS/qubes-issues/issues/3711

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6fa1fbd5-17d4-364a-b805-8a4993280f15%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] DispVM broken in 3.2?

2018-03-17 Thread qubes-lists


awokd:
> On Sat, March 17, 2018 7:57 pm, qubes-li...@riseup.net wrote:
> 
>> What would be the step to downgrade to the previous version to
>> get dispVMs working again?
>>
>> qubes-dom0-update --action=downgrade xen something like this or is it
>> necessary to specify all packets individually?
> 
> Depending on how attached you are to Fedora, you might want to temporarily
> try the Debian template instead of downgrading Xen?


I get the same error after switching to debian-9 as the dispVM template.

So switching to debian-9 for dispVM is unfortunately _not_ a possible 
workaround for this.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0f840e7d-5614-5db5-5338-33f436c84fc0%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] DispVM broken in 3.2?

2018-03-17 Thread qubes-lists


Andrew David Wong:
> On 2018-03-17 11:40, qubes-li...@riseup.net wrote:
> 
>>> Have you made sure that you have updated the packages in the 
>>> template and regenerated the DispVM? That's a common source of 
>>> these problems and fixed it for me.
> 
>> Yes I've updated and regenerated the dispvm after the dom0 update.
> 
> 
> Same here. Updating and regenerating did not resolve the issue.
> Tracking:
> 
> https://github.com/QubesOS/qubes-issues/issues/3711

thank you for filing it on gh!

Assuming the latest updates introduced this regression:

What would be the step to downgrade to the previous version to
get dispVMs working again?

qubes-dom0-update --action=downgrade xen
something like this or is it necessary to specify 
all packets individually?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1379ed33-c305-a7fd-77ea-d1ccfb3023a8%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] DispVM broken in 3.2?

2018-03-17 Thread qubes-lists

> Have you made sure that you have updated the packages in the template
> and regenerated the DispVM?
> That's a common source of these problems and fixed it for me.

Yes I've updated and regenerated the dispvm after the dom0 update.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ce5666fd-bf86-f2f0-25c7-7b0ce3fb9758%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] DispVM broken in 3.2?

2018-03-17 Thread qubes-lists
DispVM functionality does no longer work for me in Q3.2 since yesterday.

First I assumed the template is broken but after reinstalling the fedora-26 
template
from the rpm repo and recreating the DVM I get the very same error.

Has anyone else the same problem after installing the latest dom0 updates?

from the dom0 yum.log the latest installed updates were (2018-03-15):

 libgcc-5.3.1-6.qubes1.fc23.x86_64
 2001:xen-licenses-4.6.6-37.fc23.x86_64
 2001:xen-libs-4.6.6-37.fc23.x86_64
 2001:xen-hypervisor-4.6.6-37.fc23.x86_64
 2001:xen-runtime-4.6.6-37.fc23.x86_64
 libstdc++-5.3.1-6.qubes1.fc23.x86_64
 2001:xen-hvm-4.6.6-37.fc23.x86_64
 2001:xen-4.6.6-37.fc23.x86_64
 qubes-gpg-split-dom0-2.0.28-1.fc23.x86_64
 libgomp-5.3.1-6.qubes1.fc23.x86_64


I also tried a reboot but that did not change anything either.


This is the error I get when trying to start xterm (or anything else) in a 
DispVM:


echo xterm| /usr/lib/qubes/qfile-daemon-dvm qubes.VMShell dom0 DEFAULT red
time=1521287074.5, qfile-daemon-dvm init
time=1521287074.51, creating DispVM
time=1521287075.04, collection loaded
time=1521287075.05, VM created
time=1521287075.06, VM starting
time=1521287075.06, creating config file
time=1521287075.06, calling restore
Traceback (most recent call last):
  File "/usr/lib/qubes/qfile-daemon-dvm", line 217, in 
main()
  File "/usr/lib/qubes/qfile-daemon-dvm", line 205, in main
dispvm = qfile.get_dvm()
  File "/usr/lib/qubes/qfile-daemon-dvm", line 167, in get_dvm
return self.do_get_dvm()
  File "/usr/lib/qubes/qfile-daemon-dvm", line 103, in do_get_dvm
dispvm.start()
  File 
"/usr/lib64/python2.7/site-packages/qubes/modules/01QubesDisposableVm.py", line 
193, in start
domain_config, libvirt.VIR_DOMAIN_SAVE_PAUSED)
  File "/usr/lib64/python2.7/site-packages/libvirt.py", line 4405, in 
restoreFlags
if ret == -1: raise libvirtError ('virDomainRestoreFlags() failed', 
conn=self)
libvirt.libvirtError: internal error: libxenlight failed to restore domain 
'disp1'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/70bf5c3f-2eb2-023e-0944-1a3d1d31d47f%40riseup.net.
For more options, visit https://groups.google.com/d/optout.