mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-10-12 18:40:57 -04:00
Add prompts to all code blocks with bash session
This commit is contained in:
parent
b0395e618c
commit
2d2bcb06a6
72 changed files with 513 additions and 497 deletions
|
@ -208,8 +208,8 @@ Actual command lines for the menu shortcuts involve the ``qvm-run`` command whic
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-run -q -a --service -- %VMNAME% qubes.StartApp+firefox
|
||||
qvm-run -q -a --service -- %VMNAME% qubes.StartApp+7-Zip-7-Zip_File_Manager
|
||||
$ qvm-run -q -a --service -- %VMNAME% qubes.StartApp+firefox
|
||||
$ qvm-run -q -a --service -- %VMNAME% qubes.StartApp+7-Zip-7-Zip_File_Manager
|
||||
|
||||
|
||||
|
||||
|
@ -217,7 +217,7 @@ Note that you can create a shortcut that points to a ``.desktop`` file in your a
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-run -q -a --service -- personal qubes.StartApp+firefox
|
||||
$ qvm-run -q -a --service -- personal qubes.StartApp+firefox
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -17,7 +17,7 @@ After running the commands to update Debian or Whonix, hopefully everything will
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo apt-get update && sudo apt-get dist-upgrade
|
||||
$ sudo apt-get update && sudo apt-get dist-upgrade
|
||||
|
||||
|
||||
|
||||
|
@ -78,7 +78,7 @@ And then trying running the ``update`` and ``upgrade`` commands again.
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo apt-get update && sudo apt-get dist-upgrade
|
||||
$ sudo apt-get update && sudo apt-get dist-upgrade
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -30,7 +30,7 @@ In any case you’ll need some disk space to start the VM. Check ``df -h`` outpu
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo dnf clean all
|
||||
$ sudo dnf clean all
|
||||
|
||||
|
||||
|
||||
|
@ -38,7 +38,7 @@ In any case you’ll need some disk space to start the VM. Check ``df -h`` outpu
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-remove <VMname>
|
||||
$ qvm-remove <VMname>
|
||||
|
||||
|
||||
With this method, you lose the data of one VM, but it’ll work more reliably.
|
||||
|
@ -47,7 +47,7 @@ In any case you’ll need some disk space to start the VM. Check ``df -h`` outpu
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo tune2fs -m 4 /dev/mapper/vg_dom0-lv_root
|
||||
$ sudo tune2fs -m 4 /dev/mapper/vg_dom0-lv_root
|
||||
|
||||
|
||||
|
||||
|
@ -98,8 +98,8 @@ After freeing some initial space, it may be possible to recover more space by de
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-start <VMname>
|
||||
qvm-console-dispvm <VMname>
|
||||
$ qvm-start <VMname>
|
||||
$ qvm-console-dispvm <VMname>
|
||||
|
||||
|
||||
|
||||
|
@ -117,7 +117,7 @@ To fix this issue:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-console-dispvm sys-usb
|
||||
$ qvm-console-dispvm sys-usb
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -56,15 +56,15 @@ If you can start your VM, but can’t launch any applications, then you need to
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-start <VMname> # Make sure the VM is started
|
||||
qvm-console-dispvm <VMname>
|
||||
$ qvm-start <VMname> # Make sure the VM is started
|
||||
$ qvm-console-dispvm <VMname>
|
||||
|
||||
|
||||
After launching a VM console using ``qvm-console-dispvm``, you may look at the ``qubes-gui-agent`` service state with:
|
||||
|
||||
.. code:: console
|
||||
|
||||
systemctl status -l qubes-gui-agent
|
||||
$ systemctl status -l qubes-gui-agent
|
||||
|
||||
|
||||
|
||||
|
@ -80,8 +80,8 @@ During troubleshooting, you may be getting a lot of ‘audit’ messages which m
|
|||
|
||||
.. code:: console
|
||||
|
||||
previous_kernel_parameters=$(qvm-prefs --get <VMname> kernelopts) # Get current kernel parameters
|
||||
qvm-prefs --set <VMname> kernelopts "<previous_kernel_parameters> audit=0"
|
||||
$ previous_kernel_parameters=$(qvm-prefs --get <VMname> kernelopts) # Get current kernel parameters
|
||||
$ qvm-prefs --set <VMname> kernelopts "<previous_kernel_parameters> audit=0"
|
||||
|
||||
|
||||
Then, restart your VM.
|
||||
|
|
|
@ -11,7 +11,7 @@ By default, the kernel that is installed in dom0 comes from the ``kernel`` packa
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update kernel-latest
|
||||
$ sudo qubes-dom0-update kernel-latest
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -77,7 +77,7 @@ If you see a screen popup with SeaBios and 4 lines, last one being ``Probing EDD
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs <HVMname> kernel ""
|
||||
$ qvm-prefs <HVMname> kernel ""
|
||||
|
||||
|
||||
HVM crashes when booting from ISO
|
||||
|
@ -92,7 +92,7 @@ To give the VM a RAM of 2GB, open a terminal in ``dom0`` and enter:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs <HVMname> memory 2000
|
||||
$ qvm-prefs <HVMname> memory 2000
|
||||
|
||||
|
||||
Attached devices in Windows HVM stop working on suspend/resume
|
||||
|
|
|
@ -73,8 +73,8 @@ Using the command line
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo su
|
||||
echo -n "1" > /sys/bus/pci/devices/0000:03:00.0/remove
|
||||
$ sudo su
|
||||
$ echo -n "1" > /sys/bus/pci/devices/0000:03:00.0/remove
|
||||
|
||||
|
||||
|
||||
|
@ -109,7 +109,7 @@ NOTE: The ``permissive`` flag increases attack surface and possibility of `side
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-pci attach --persistent --option permissive=true --option no-strict-reset=true sys-usb dom0:<BDF_OF_DEVICE>
|
||||
$ qvm-pci attach --persistent --option permissive=true --option no-strict-reset=true sys-usb dom0:<BDF_OF_DEVICE>
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -113,7 +113,7 @@ Some firmware will not recognize the default Qubes EFI configuration. As such, i
|
|||
|
||||
.. code:: console
|
||||
|
||||
cp /mnt/sysimage/boot/efi/EFI/qubes/grubx64.efi /mnt/sysimage/boot/efi/EFI/BOOT/bootx64.efi
|
||||
$ cp /mnt/sysimage/boot/efi/EFI/qubes/grubx64.efi /mnt/sysimage/boot/efi/EFI/BOOT/bootx64.efi
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -43,7 +43,7 @@ Most likely the offending controller is a USB 3.0 device. You can remove this co
|
|||
|
||||
.. code:: console
|
||||
|
||||
lspci -nn | grep USB | cut -d '[' -f3 | cut -d ']' -f1 | xargs -I@ setpci -H1 -d @ d0.l=0
|
||||
$ lspci -nn | grep USB | cut -d '[' -f3 | cut -d ']' -f1 | xargs -I@ setpci -H1 -d @ d0.l=0
|
||||
|
||||
|
||||
|
||||
|
@ -74,7 +74,7 @@ Another solution would be to set the pci_strictreset option in dom0:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-pci attach --persistent --option no-strict-reset=true usbVM dom0:<BDF>
|
||||
$ qvm-pci attach --persistent --option no-strict-reset=true usbVM dom0:<BDF>
|
||||
|
||||
|
||||
|
||||
|
@ -82,7 +82,7 @@ Another solution would be to set the pci_strictreset option in dom0:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs usbVM -s pci_strictreset false
|
||||
$ qvm-prefs usbVM -s pci_strictreset false
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -11,7 +11,7 @@ Tips
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo journalctl -u qubes-vpn-handler
|
||||
$ sudo journalctl -u qubes-vpn-handler
|
||||
|
||||
|
||||
|
||||
|
@ -55,7 +55,7 @@ To check this tool is working properly run:
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo notify-send "$(hostname): Test notify-send OK" --icon=network-idle
|
||||
$ sudo notify-send "$(hostname): Test notify-send OK" --icon=network-idle
|
||||
|
||||
|
||||
You should see the ``info`` message appear on the top of your screen. If that is the case then ``notify-send`` is not the issue. If it is not, and you have an error of some sort you can:
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue