Re: [qubes-users] Audio CD via USB drive

2017-02-11 Thread Pawel Debski
W dniu wtorek, 7 lutego 2017 12:08:56 UTC+1 użytkownik 
timo.ve...@googlemail.com napisał:
> I tried it already with the same result. 
> 
> Is there no way to prevent Qubes from exposing a block device?

This is a known problem in Qubes. I had similiar problem with data CDs with no 
solution. Gave up.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/28276105-9173-4cde-ba07-79d6ecc67786%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Audio CD via USB drive

2017-02-07 Thread timo.verhoeven via qubes-users
I tried it already with the same result. 

Is there no way to prevent Qubes from exposing a block device? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e74ffa31-aeb4-47ed-a74c-175ffce8f86c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Audio CD via USB drive

2017-02-07 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-02-06 12:02, timo.verhoeven via qubes-users wrote:
> Hi qubes-users!
> 
> I'm trying to extract audio from a cd on my qubes (3.2) notebook. After 
> reading thru the various pages of the docs section and searching the 
> mailing-list, I thought the following setup would be my best option:
> 
> * usb-dvd-drive attached to a USB 2 port
> * use a sys-usb vm
> * attach the drive-device via qvm-usb to a target appvm (fedora-24 based)
> * start "sound-juicer" in appvm to extract audio
> 
> Unfortunately, I now have to following problem: When I insert a cd into the 
> drive, qubes immediately takes control of it, so that sound-juicer can no 
> longer access the drive.
> 
> I can see, that a /dev/sr0 device pops up in the appvm, which the 
> sound-juicer app then tries to access. But qubes attempts to expose the drive 
> as a block device makes it unaccessible to sound-juicer.
> 
> Is there a way to prevent this? E. g. prevent qubes from exposing a certain 
> device in a certain appvm?
> 
> Best regards,
> Timo
> 

Not sure if this is an option for you, but have you tried running Sound
Juicer in sys-usb?

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=3qEY
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8d07ddb6-fdf0-3859-ac6d-bb8c0cda7b74%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.