Giter Club home page Giter Club logo

qubes-issues's Introduction

Qubes Issues repository

This repository tracks issues and feature development progress for the Qubes OS Project. Please take a moment to read the following important information:

You can file a new issue or view all issues.

Notable issues

High-priority issues

By release

GitHub help

qubes-issues's People

Contributors

andrewdavidwong avatar jpouellet avatar marmarek avatar niccokunzmann avatar ninavizz avatar strugee avatar unman avatar woju avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

qubes-issues's Issues

NetVM

Reported by joanna on 1 Jul 2010 13:48 UTC
A working netvm. Perhaps we should consider using an HVM Linux for netvm -- this might result in better driver compatibility, since there would not be a problem of mfn!=pfn anymore.

TODO: can we have netbackend in HVM linux?

Migrated-From: https://wiki.qubes-os.org/ticket/49

Easy (default) netvm switching

Reported by joanna on 13 May 2010 18:28 UTC
User should be able to click on "Set default NetVM" menu in the manager, and then should be presented with a list of possible netvms (e.g. Dom0, netvm). The manager should take care about switching the netvm's, in particular should do the equivalents of the following:

  1. qubes_netvm stop
  2. rmmod xen-pciback; rmmod
  3. qvm-set-default-netvm
  4. qubes_netvm start

Migrated-From: https://wiki.qubes-os.org/ticket/34

Dom0 kernel: better nouveau suport

Reported by joanna on 6 Apr 2010 17:41 UTC
The currently used pvops0 kernel (2.6.32.9-7.qubes) is based on xen/stable-2.6.32.9 branch and Fedora backported nouveau's patches. This kernel, when run as Dom0 under Xen, doesn't support HW accel for nouveau driver, the default driver for NVidia graphics cards.

The users can still get around the problem, but this requires complicated setup, and also doesn't let the user to use various "desktop effects" in Dom0.

Migrated-From: https://wiki.qubes-os.org/ticket/15

VM xorg.conf template: properly set H/Vsync and Modeline

Reported by joanna on 1 Jul 2010 16:53 UTC
On high definition displays (e.g. 1600x900) the dummy driver we use in AppVMs refuses to accept the high resolutions, because hsync param being out of range.

We should figure out a correct way how to set hsync/vsync and modeline params for the vm dummy xorg driver, so that it always happily accept the resolution that the use has in Dom0.

Migrated-From: https://wiki.qubes-os.org/ticket/50

Split qubes repo

Reported by joanna on 8 Jun 2010 10:11 UTC

  1. First, according to release -- e.g. qubes-1, qubes-2, etc
  2. Second, distinguish between Dom0 repo and vm repos -- e.g. qubes-dom0, qubes-vm.
  3. Third, according to stability -- e.g. updates, testing

Update the template accordingly.

Migrated-From: https://wiki.qubes-os.org/ticket/43

Dom0 Window Manager: support for color titlebars

Reported by joanna on 26 Apr 2010 10:59 UTC
Currently we only draw color frames around each appviewer window (the color is specified by the VM's label), but it would be much more desirable to patch the Dom0's Window Manager (KDE) to draw the appviewer's window decorations (i.e. titlebar, frame), in the given color. Besides, having the WM drawing the window frame (instead the appviewer app) would be better, because the frame would not overlap with the window contents (currently this can be observed with a 2px frame and e.g. a terminal application -- the edges are a little cropped).

Migrated-From: https://wiki.qubes-os.org/ticket/26

Correctly maintain app's titlebar name

Reported by joanna on 26 Apr 2010 09:15 UTC
When an app changes its title bar contents, the appviewer ignores the change and keep the original name in the title bar. Some apps dynamically remap the title bar names at startup (e.g. Thunderbird, Dolphin), so it would be nice to have it correctly implemented, so that the user see something meaningful in the task bar.

Migrated-From: https://wiki.qubes-os.org/ticket/25

Verify if XShmPutImage() works fine when VT-d is enabled

Reported by joanna on 20 Apr 2010 22:06 UTC
According to this message:
http://groups.google.com/group/qubes-devel/msg/9d23cd9c26127ed7

The XShmPutImage() function, that is used by guid in Dom0 to draw the actual app's pixmap, might attempt to schedule a DMA from the SHM region to video memory. The SHM memory in our case belongs originaly to DomU and is being brought to Dom0 via xc_map_foreign_pages() (see http://qubes-os.org/gitweb/?p=rafal/gui.git;a=blob;f=shmoverride/shmoverride.c;h=77be2127948436013dc8a57ea069901a5d33ec03;hb=HEAD#l48).

If xc_map_foreign_pages() doesn't update IOMMU/VT-d tables so that the mapped pages belong also to Dom0, than the graphics card, that is VT-d assigned to Dom0, would not be able to do DMA read from those pages, and so the XShmPutImage() might not work correctly (not at all in fact).

TODO: check if xc_map_foreign_pages() updates IOMMU/VT-d tables, and if not discuss a way to add such behaviour on xen-devel and implement a patch.

Migrated-From: https://wiki.qubes-os.org/ticket/23

Appviewer windows becoming unstable while resizing

Reported by joanna on 16 May 2010 11:29 UTC
Sometime, when resizing an appviewer window, and especially when starting a new app that does some resizing on start, e.g. Firefox, the Window enters the "unstable" or "oscillation" phase, when its size changes back and forth between the two values tens of times per second. Quite annoying for your eyes, and the only way to get around it seems to be closing the app and starting it again.

Migrated-From: https://wiki.qubes-os.org/ticket/35

Support for easy template updates

Reported by joanna on 13 May 2010 18:22 UTC
User should be able to click the update button in the manager, and it should take care about:

  1. Stopping all the VMs (and getting user consent before if some apps are open)
  2. Starting template VM
  3. Starting kpackagekit in this VM.

Migrated-From: https://wiki.qubes-os.org/ticket/32

Sound Virtualization

Reported by wikimaster on 6 Apr 2010 17:15 UTC
Retrieve audio buffers from AppVMs via vchan (our library we use for GUI virtualization, based on Xen shared memory AKA Grant Tables) and mix together in Dom0.

Migrated-From: https://wiki.qubes-os.org/ticket/8

GUI agent exit: CREATE for already exisiting event

Reported by joanna on 9 May 2010 11:11 UTC
GUI agent exited, the following in the AppVM logs:

update_pixmap (one in 50) for 0x80002b x=1 y=151 w=1260 h=598
update_pixmap (one in 50) for 0x80002b x=1 y=242 w=1260 h=507
update_pixmap (one in 50) for 0x80002b x=1 y=216 w=1260 h=533
CREATE for already existing 0x1a00043

Perhaps we should do just a return instead of exit(1) in process_xevent_createnotify?

http://qubes-os.org/gitweb/?p=mainstream/gui.git;a=blob;f=gui-agent/vmside.c;h=90537f479a4f8e1cf14267333032e723dcc4c6d9;hb=HEAD#l106

Migrated-From: https://wiki.qubes-os.org/ticket/30

modifier keys not handled correctly

Reported by joanna on 16 May 2010 13:46 UTC
When a user presses one of the modifier keys (Ctrl, Alt, Shift) and then change focus to another appviewer window, belonging to a different AppVM, but still while holding the modifier key, then when returning to the original VM, it will consider the modifier key never been released and would interpret all the subsequent keystrokes as if entered together with the modifier key (that currently is not down).

Proposed solution: Check the status of all the modifier keys when an appviewer window obtains focus, and send key_down messages if necessary.

Migrated-From: https://wiki.qubes-os.org/ticket/36

Allow to grow the AppVM's private storage?

Reported by joanna on 6 Apr 2010 17:08 UTC
Research options for automatically or semi-automatically handling a situation when a given AppVM needs more storage (private.img) than originally assigned.

Currently if a user wants to extend private storage for an AppVM, the user must do something like this:

cd /var/lib/qubes/appvms/XXX/
mkdir mnt mnt.new
mount -o loop,ro private.img mnt
truncate -s <new_max_size> private-new.img
mkfs.ext4 private-new.img
mount -o loop private-new.img mnt.new
cp -pr mnt/* mnt.new/
umount mnt mnt.new
rm -f private.img mnt mnt.new
mv private-new.img private.img

... which is a bit, well, not user-friendly ;)

Migrated-From: https://wiki.qubes-os.org/ticket/5

gui: replace ugly 'xmessage' dialgos with something nicer

Reported by joanna on 6 May 2010 10:56 UTC
Currently xmessage is used by GUId to display some warnings, e.g. when an AppVM opens too many windows. xmessage reminds me the 80's, so should be replaced with e.g. kdialog or zenity. Preferably with kdialog, as we already use it e.g. in the file copying operations. Hard to not prefer a particular WM, sorry.

Migrated-From: https://wiki.qubes-os.org/ticket/28

Dom0 Window Manager integration

Reported by wikimaster on 6 Apr 2010 17:18 UTC

  • Make the windows decorations (titlebars) to be in the AppVM's label color,
  • Draw the frame as part of the window decoration, not its contents,

This will be Desktop Environment-specific (e.g. KDE-specific), so we should probably pick KDE.

Migrated-From: https://wiki.qubes-os.org/ticket/9

Correctly calculate free memory in the system

Reported by wikimaster on 6 Apr 2010 16:59 UTC
Currently qubes.py prevents starting a VM if the memory available for Dom0 was to go below a defined limit (700MB). On some systems, when Dom0 becomes short on memory (<500MB), and Dom0 starts using the swap file, the overall system performance drops down dramatically. This is most likely caused by the reduced filesystem caching, and is very apparent on systems with fast SSD drives, enabled full disk encryption, and _without_ the AES instruction in the CPU (in which case CPU is heavily loaded doing the crypto).

The QubesVM.start() method calculates the memory that will be left to Dom0 after the start of a new VM using this simple method:

dom0_mem_new = dom0_mem - mem_required

... and if dom0_mem_new is too small it raises an exception, which qvm-run handles and displays a message to the user that she should stop some running VMs before continuing.

However when the users stops a VM, Xen doesn't return the memory back to Dom0. This, in turn, makes it impossible for the user to start any new VM, without rebooting the system.

The proper solution should account for this "hidden" memory that has been freed when a user stopped a VM, and is available to other domains, but has not be returned to Dom0.

Migrated-From: https://wiki.qubes-os.org/ticket/3

GUI failure (SHM?)

Reported by joanna on 9 May 2010 09:53 UTC
Got a flash crash in AppVM (dmesg output):

npviewer.bin[segfault at 8 ip 00007f7259147a9b sp 00007fff1793b6f8 error 4 in libflashplayer.so[7f7258b15000+8d2000](1073]:)

And then the GUI for this particular AppVM has frozen -- i.e. the !AppViewer windows are still present, but are not operational, not only cannot operate their contents, but also cannot close them.

Both guid in Dom0, and gui_agent in the AppVM are still running:

  • GUI daemon:
(gdb) bt
#0  0x00007fce51c2c3c3 in __select_nocancel () from /lib64/libc.so.6
#1  0x0000000000405fb3 in wait_for_vchan_or_argfd_once ()
#2  0x000000000040616c in wait_for_vchan_or_argfd ()
#3  0x00000000004055d8 in main ()
  • GUI agent:
(gdb) bt
#0  0x00007f07fafab570 in __read_nocancel () from /lib64/libc.so.6
#1  0x00000000004022d6 in send_pixmap_mfns ()
#2  0x00000000004026e6 in process_xevent_configure ()
#3  0x0000000000402bbf in process_xevent ()
#4  0x00000000004039b4 in main ()

The GUI daemon keeps outputing the following into the logs:

ErrorHandler: BadValue (integer parameter out of range for operation)
                 Major opcode: 139 (MIT-SHM)
                 Minor opcode: 3 (X_ShmPutImage)
                 Value:        0x4fa
                 Failed serial number:  103729
                 Current serial number: 103730

even after the freeze, i.e. even now when the !AppViewer windows are not operational, still when I try to e.g. resize them, or just focus on them, I get the above messages in the Dom0 log.

No idea how to reproduce it: got it for the first time after several weeks of flawless operation.

Migrated-From: https://wiki.qubes-os.org/ticket/29

xen: get rid of the downloadable *unsigned* components

Reported by joanna on 30 Jun 2010 10:11 UTC
Xen Makefile downloads and builds some unsigned code, that we don't even use in Qubes (qemu, etc). Those files are downloaded over plaintext connection, so subject to easy subversion by an attacker in the middle. Such an attack might result in a compromised package or developers machine.

It's silly to have a signed xen package, that uses unsigned packages...

Migrated-From: https://wiki.qubes-os.org/ticket/48

Easy backups

Reported by joanna on 13 May 2010 18:24 UTC
User should be able to click "Make backup" in the manager and the system should proceed with the backup, taking care about shutting down each AppVM before backing up its private storage.

User should be able to tell which AppVMs should be part of the backup -- e.g. users might not want to backup the private storage of e.g. "random" VM.

Migrated-From: https://wiki.qubes-os.org/ticket/33

Mysterious GUId exit

Reported by joanna on 6 Apr 2010 23:00 UTC
Eventually managed to reproduce it! Logs from Dom0 and VM attached.

The guid in Dom0 exited:

<...>
move menu window ret=1 x=0 y=20 rx=11 ry=74 ox=0 oy=0 origid=0x3400007
xside: win 0x3400007(0x400039) type=4 button=1
xside: win 0x3400007(0x400039) type=5 button=1
handle_configure_from_vm, 1280/752, was 1280/752, ovr=0
libvchan_is_eof
release_all_mapped_mfns running
Obtained 8 stack frames.
/usr/bin/qubes_guid() [[0x404ce8](0x404c38]
/usr/bin/qubes_guid())
/lib64/libc.so.6(exit+0xe2) [[0x405f59](0x7fd840435b82]
/usr/bin/qubes_guid())
/usr/bin/qubes_guid() [[0x4055d8](0x40609e]
/usr/bin/qubes_guid())
/lib64/libc.so.6(__libc_start_main+0xfd) [[0x4025a9](0x7fd84041eb1d]
/usr/bin/qubes_guid())

The gui in the VM's still running:

[~](root@random)# gdb --pid 762
<...>
(gdb) bt
#0  0x00007f3477596570 in __read_nocancel () from /lib64/libc.so.6
#1  0x00007f34778495c2 in read_exact () from /usr/lib64/libxenctrl.so.3.4
#2  0x00007f347784d953 in xc_evtchn_pending ()
   from /usr/lib64/libxenctrl.so.3.4
#3  0x00007f3477c87987 in libvchan_wait (ctrl=0xe21010) at io.c:70
#4  0x00007f3477c879f7 in libvchan_write (ctrl=0xe21010, 
    data=0x7fffe611dc54 ",\266\022", size=236) at io.c:88
#5  0x0000000000403eb2 in write_data_exact ()
#6  0x0000000000403f0c in write_data ()
#7  0x0000000000402372 in send_pixmap_mfns ()
#8  0x00000000004023d7 in process_xevent_map ()
#9  0x0000000000402b7c in process_xevent ()
#10 0x00000000004039b4 in main ()
(gdb) 
#0  0x00007f3477596570 in __read_nocancel () from /lib64/libc.so.6
#1  0x00007f34778495c2 in read_exact () from /usr/lib64/libxenctrl.so.3.4
#2  0x00007f347784d953 in xc_evtchn_pending ()
   from /usr/lib64/libxenctrl.so.3.4
#3  0x00007f3477c87987 in libvchan_wait (ctrl=0xe21010) at io.c:70
#4  0x00007f3477c879f7 in libvchan_write (ctrl=0xe21010, 
    data=0x7fffe611dc54 ",\266\022", size=236) at io.c:88
#5  0x0000000000403eb2 in write_data_exact ()
#6  0x0000000000403f0c in write_data ()
#7  0x0000000000402372 in send_pixmap_mfns ()
#8  0x00000000004023d7 in process_xevent_map ()
#9  0x0000000000402b7c in process_xevent ()
#10 0x00000000004039b4 in main ()

Migrated-From: https://wiki.qubes-os.org/ticket/16

Improve focus management

Reported by joanna on 6 Apr 2010 17:21 UTC
When an AppViewer window is picked via the Expose-like effect in KDE,
the app in a AppVM doesn't get proper focus, and the user must use Alt-Tab to fix it. This is a bit annoying.

Migrated-From: https://wiki.qubes-os.org/ticket/11

backup/migration tool

Reported by joanna on 16 Jun 2010 13:11 UTC
A simple qvm-backup too that would let people:

  • backup their appvms
  • restore from backup -- taking care about also restoring qubes.xml and app menues.

The backup function should take into account whether given appvm is updatebable or not (if it is, it should also copy its cow storage). Also, any temaplate vms that are not installed from rpms (i.e. have been cloned) should be backed up.

This is needed now for people to smoothly transition from Alpha 1 to Alpha 2.

Migrated-From: https://wiki.qubes-os.org/ticket/47

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.