Workshop: How much mounted images after a fresh and raw debian 8 installation


sometimes one wonders about particular things, like this. From this lines below, I recognize only 2 lines proc and /dev/sda, the others bear all a story I would like to know sometime. It is an idea for a workshop…

root@ahostname:/tmp/qemuburotest# mount|wc
 24 144 1898
root@ahostname:/tmp/qemuburotest# mount
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,relatime,size=10240k,nr_inodes=28938,mode=755)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,relatime,size=49640k,mode=755)
/dev/sda1 on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,release_agent=/lib/systemd/systemd-cgroups-agent,name=systemd)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=22,pgrp=1,timeout=300,minproto=5,maxproto=5,direct)
mqueue on /dev/mqueue type mqueue (rw,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,relatime)





rally on launching useradd added user with X-server 2016| tee „medicalreadme“, deb jenkins preseedfiles

Hi everybody,

well orchestration of process xy: the yes-launch wrapper

in out recent podcast we try to -lets imaging just for entertainment- give you a some meditation about chasing a user’s account to X. Normally one can swear in the end – this will be end up bad, – in the first attempt, in the second and in those that could or should happen, right? Considered the underlying security policies, some how hiddenly, secret but existing, effective enough to be regarded, to say important. Well the point with my person is, that I know, to say I once knew a solution of these. And just for a „tanteo“ I walk out for the internet to – narrate. Ok, back to the question: So in reiterating already more or less successful -(in question having learned for the second time, e.g.) process, to say working steps one looks out typically to have the usage well orchestrated. Right? So what about testing about how a normal user could or should do? Is it necessarily that hard? Question?

Answer: Yes. It is:

See here how I had to rally the Google searching machine to find the relevant Information! Just the parameter display in the finale searches gives a relevantly filtered and sorted set of answers. Note that I was each step vague, that is expecting with next bet to hit,I did intents to 12 times, that is near the border of frustration, right? – and in the end I came through having found the name of the environment variable whatsitsname. Cause it is exactly, exactly what I should have learned or remember. There was a bash environment variable. A environment variable is a term from the bash – linux?- yes let us say environment. These problem is another rally of lock picking in the end. (On ubuntu you need to have not to come around a file called Xauthorities to be testifying your insistent will of launching that program, yes, yes, yes, once more yes and , yes having sayed yes enough times. „Yes launch!“ could be the, a name for a – orchestrated- program, a yes launch patch („patch“ is the relevant term, is not it?), filter or wrapper, snapping out to be put on the feature requests lists of whathisname. Yes and „on the way to to an „Yes-launch“ featured  X wrapper“ would be the name of the post? Right? Well I could drop at least some pseudocode staged work. No?

12:31 PM
linux user without display environment variable - Google-Suche

12:30 PM
user without x - Google-Suche

12:30 PM
bash environment variable for X - Google-Suche

12:30 PM
bash environment variable for X-server - Google-Suche

12:29 PM
bash "X=" - Google-Suche

12:29 PM
"X=" - Google-Suche

12:28 PM
linux useradd graphic with "X support" - Google-Suche

12:28 PM
linux useradd graphic with X support - Google-Suche

12:27 PM
linux useradd graphic - Google-Suche

12:27 PM
useradd graphic - Google-Suche

12:26 PM
bash user "without x" environment variable - Google-Suche

12:25 PM
bash user "without x" - Google-Suche

12:25 PM
bash user without x - Google-Suche

„the hassle explained: the birth of medical hint readme file“

You know why that all here? I just wanted set up a Document to write about the user interface of the, the preseeding machines on earth. The picking process can be imagined as „hassle“. It is a situation prevention against gain. Who is on the both sides is difficult to say, but there is more then play, there is fight. All barbarianism comprised since the myth of homer, attached with the good reason box against the someones different. I personally believe that the trick is, that ordinarily in a yesterdays might-be dragons, are probably not that effective anymore for the now. In other words the not having a of well orchestrated product for that, is therefore not necessarily bad will. The vagueness could be overwhelm, could not it? Any way, if this turned out to be question of a „review“, „dossier“, one could see the orchestrated ingredent the question of – another french word- prominence. It is prominence I guess. Well nothing else than a kind of today’s dragons stuff basic material. If this thing, this wrapper, of what is the speech of, is having a User interface for it, then there is ontologically seen, another human in game, – in a game where some of the humans, participants are criminal against him, types as him, specially against his intend of being integrated support part. So a user interface in a first and early conclusion needed comprise the criminal history of the intents against it as a necessary soft skill, this, in order to keep chance open to understand itself at all.  The cabinett hurdle. One could address it like that, but how sounded that? What about „prominence cabinett hurdle“ as a must-be-in-part of a user interface orchestration of any free software, any responsible free software? Well, in conclusion it is to point out, that free software in its core process is in a defensive position, when it comes to the efforts of privacy guarding. So it shall criticize high efforts to be charged. Their  is a rejection present to the take part in the battle against market access rights of humans, masked as prospective free software contributors. Which could by the way be called „cabinett NeWs“ of 2016. Some decent traits of being dragon swearing detected in the representation of free software rights, mark the domain of such a dragon in nowaday’s thinking.

So be aware that we tell you a new version of the criminal history in it and its explanation on it, and those you are supposed to be to what ever degree infected with and yet relying on. Any user should at some early point should test himself of being able to maintain himself by the together-relevant explanations and criminal history. Background: The narrative schisma is expression of a personal schismas derived from the enough-being-effective of its own phenomena. Now it comes clear, that the program’s exposition should do something „good“, something „healing“ even to the stage of medical realm. One stumbles all day with yesterday’s idiot crimes xyz and is getting set to so to be responsable to cases to intervene that far at least, if it is relevant for healing affairs. Well there is a need to point the user even in the license to that.
User23.445.332.944: Administrator, administrator help me!
Administrator: What?
User23.445.332.944: When I read you programs manual I experience myself as somebody that I have become crazy for some time?
Administrator: Have you read the healing hints of the „medical hints“ chapter?
User23.445.332.944: If feel diagnosed ill by it, so how is the situation about further coexistence of us two, and of it all?
Administrator: Have you read the Writer-User glad enlightenment“handshake“ thing in it to follow on?
So in Consequence (once more): Results of this: -request two last  paragraphs as medical hints readme-file between an any user interface documentation, intending to supporting the anyhow privacy guarding. Some kind of WHO illnesses catalog among, for those having got Monad , well, take this one at second paragraph sentence 1-3 for being urging to capture the imagination of a monad, qualified by „The concept was later adopted by other philosophers, such as Leibniz, who referred to the monad as an elementary particle“ equalizing a human no less.  Such ones as a any kind dragon swearer contributor of it namely for example here. We can not look upon that we a have always tons of them to be motivated somehow, to much to look upon the per visit count of the user interface. Some of the users could be got a kind to called reality shock, historic culture shock, well within the realm in which the program user interaction is intendedly to namely enlightened use and in any question rightful there. So one tackles with in a situation which can be qualified as: among ill. The secret of the situation is: Nobody knows that you, we all, are among ills. Intersection found: Group of criminals supposed to be there doing or having done the business of making use of the dragons technology thesedays xy unsolved A and Group of medically to be clasified ills, Dragonsswearers. Well es a first remedy and to the first newly caused effort, that is affront barbarism, set out in a sentence such as: So much have be meant to offend, insulted, libeled, even the word violated, got that from the dictionary for „beleidigend“ with that.
One can reach out for hand shake by:
-„for civiccooperation it were a being favorable of having phenomena from the monadology matter the most dealt with,
-something already supposed to included in the present private contract „as is
-and at it, signalizing that for explicit communicate it is needing time presently,
-from time to time, yes, too,
-instead of being even for a some kind of reason to dull for namely it
as in a „first moment narcisism“ patch,
-but as formulatable, well, a „as is“ agreement offer, a handshake.
Reading it yet and here, I deem thiiss „handshake“ thing recently written to be included in „medical hints for regressive users story“, right? Asked to me? Answer: Yes, do!
So having come once to the question of ontology and Monadology : Who is us then here in the game. We, yes we got an outlinedly sublime position in it. We are as well monades, – but ought to be in best case, hope to be labelled: as god monad. If questioning yes or not, one is to be forced to yes in the end of the day, current date, coordinates xyz in the present world.  It is not said that we are it, but we integrate to it. That I am prospective ingredient of such a good in the world, how not in world, set that one is one of those after the good, in any case not in any respect willingly evil. What ever we do, after overcome terrification, right? – it is to notice that there is medium around our doings that give them special impulse. Our, (the user‘ and mine, let us call it friendly) signaling to neighbor monads is out of a special substance. On the procedure of the happening happening it has first high effect, higher at least then thought, if of its effect could one have an imagination, at all. Well let us suppose of an imagination such! Within such society the users monad with the developers, the offerers, publishers of free software monad?
User23.445.332.944: Am I right if I label the sentence as agreed up: It is in the user’s profit, to get social with his free software  administration that far: Is my behavior here and now typed as important, as responsible for that effort, that consist of no less an occasionally or might be even criminally caused effect that discriminates, anyhow sending signs of endangering and threatening developers, especially then when they are kind of free software pioneers in a free software blind market segment and: at the time of following these his profites he will do nothing else than a big, could be biggest contribution to the whole to it?
-So imagined out to the few of the free software user their is a signaling of good within this signaling toolbox wares, it is likely the voice of sensibilite, quite holy in the instant, yes, and it stems directly out of the user’s software’s civic own private home workshop in the instant, too, in so far it is his problem.  The user’s first bet would be, if the devs could reach to compensate effectively any might be barbaric events at it or not? Often enough, however,  one might suppose this to be unfortunately not the case.
-Well, for good reasons I better gonna turn out to be the best „filter“ design for all anyway industrial „hell machine“
(well I this term needs clarification in a civic text like this, so the clarification providing answers straight here, find the existence’s mentioning of such a „Höllenmaschine“ there suggested once, go find it lately at Aphorismus 149, „Halblang“, at an orchestrated works passage 149 out of 159)
signaling against my tool’s development, one could think of.  And: Not to swear or stop swearing, comes with that to stand, that it is but sworn around one human, is hard a time for that human.
Admin: Ok. Phenomena like this could happen on the user interface.
User23.445.332.944: Seen it that way right: Best statement about devs: it is of most importance that they are let in peace thought of any case of questioning of such a subject; a fire man user could contribute constantly enough such to those, who are due to take part for any reason in the „discourses“.
Admin: Ok.

Back to the original problem whats about all the xauthorities whatsitsname?

So, third chapter of this post, will I soon have a key xlaunch? Question? Hm, there is solution for ssh relogin present, but nothing for to run: su root; su user3; startanx application such as libreoffice for this environment.

Can a userthread such as „su user; run xclock“ use the presently running xserver?


user1:/$ su user12; cd
Password: user12:/$ export|grep Xau
#declare -x XAUTHORITY="/home/user1/.Xauthority"
# well it is not connected to ones own file but to that of the neighbor user we a have been before. We decide to point this pass to our own such file. 
 cd; export XAUTHORITY=~/.Xauthority
:/$ export|grep Xau
#declare -x XAUTHORITY="/home/user12/.Xauthority"
ls -l ~/.Xa* 2>/dev/null||echo "got no such file sofar"
touch ".Xauthority"
#is that correct, what kind of language is that, 
#I remember of having known it. So which?
#No protocol specified
#Error: Can't open display: :0.0

If you must do this, at least do „xhost +localhost“ to avoid creating a security hole larger than you could get an elephant through.

Even better, enable X forwarding in ssh and do „ssh -l root localhost“.

This means that it is deprecated to use another users account not over ssh, you see. The late „do ssh!“ sign. If I did that I had even more trouble with other security files around.

using ‚xauth‘ to obtain a magic cookie from the owner of the Xserver, and placing it in the ‚cookie jar‘ (a what?) of the other user—see „Remote-X-Apps mini-HOWTO“

target user has a „restricted shell“, has he?

xhost +localhost #has to say, who when? #does it mean anyhow restart X?

user1$ xhost +localhost
localhost being added to access control list

export XAUTHORITY=~/.Xauthority;cd; touch „.Xauthority“;xclock
No protocol specified
Error: Can’t open display: :0.0

We see, we come not through, if an solution had been existed once, it could be prevented by a security human meanwhile? So which are the facilities to debug it, then?

They say their lived a X access control system, with six „mechanisms“# so what is about copying other people’s magic cookie?

One notices: That fullblown with sec stuff, that all question of usage are side streets. So then I need to steal the .Xauthority  MIT-MAGIC-COOKIE-1 from it jar? Hello? And next moment I find my self being root in order to debug security issue infected systems, question? There we go. Well, lets see if we need root?

ls -l .Xauthority
-rw——- 1 u u 178 Sep 20 14:26 .Xauthority

The answer is yes. One needs to be root. Actually one is to urged to become root or alternatively to do manual password entry each time for any debug kind testing of a  system, one is urged to endanger oneself just for using a free software in a use case that is unrecommended.

Well you should think of it as a two arms solution: first root does; once a session what can only comfortably done by him? Ok, he needs to be called once by session to spell:

sudo cp /home/user1/.Xauthority /home/user12/.Xauthority

sudo chown -R user12 /home/user12/

Then from another xterm – X-terminal one logs in manuallyonce per session once more, that is besides the one just done, by switching to root once per session.

xhost +localhost

su user12


export XAUTHORITY=~/.Xauthority;cd; touch „.Xauthority“;xclock;

#xclock appears

Fazit: The most comfortable solution of operation over the su interface consists of mutating into two, pardon thee different types of users. So you have no, should_ be let with no other option then typing in password. And it is true you are led by doing it through the ssh interface, when automating, Cause it offers a once in live key exchange, between the accounts. I vote for that a unlock-to-x wrapper should be implemented over the ssh library, in any case.

The unit test for it would be: Test_X_for_prospective_user_ready_on_generated_or_present_root_vms_including_non_interactive_ssh_key_exchange

Implementation probability in qemuburo: High, next …

But even with that late errors and not functioning status.

soffice & # xclocks started, but does no sign malfunctioning soffice, meanwhile leaving everybody wait to timeout.

libGL error: failed to open drm device: Permission denied
libGL error: failed to load driver: i965

#so more magic cookies even.

Comment 18 for bug 1302270
Daniel van Vugt (vanvugt) wrote on 2016-10-06: #18
Danny: This bug (bug 1415104) was marked as fix released on 2015-02-02. So if you’re still having problems please log a new bug.

I can already tell your problem is that the login hasn’t set correct permissions on /dev/dri/*. This is normal (not a bug) for tty logins, but should be resolved automatically with graphical logins (lightdm).

Please log a new bug here:

DRI? Dirty Rotten Imbecilles? Hm, there you get still saying to use ssh loging for a whole set of graphic applications. What nobody as known nor shown from the beginning, that it was made impossible or at least is in a impossible state the original plan of running X that way, this little fact nobody mentioned to the searching user. And that is a treatment that seems not quite: fair, not to be warned of something time consumingly upcomming bad. This could be, even, a bug on an side street interface of the distros X setup, half intended. Aha, aha, aha. (; Well, in our case it gonna leave with a good solution from it, because me, in little time I will end up implementing just ssh X unit tests, do not I?  I will follow my original usage case by using user1’s account.

Then, there is no way to obstinated on starting an x-app, no? So we go using the root cp file file2 method plus the „chown tatata“.

debian jenkins system

Now by the way, user interfacing thinking and travelling the rally tour. It pointed me by storm of odyssey to debian jenkins system, which I discovered. I went to preseeding.cfgs to do some statistics to learn from: Test_for_any_of_86_command_take_from_any_of_77_preseding_files_the_overall_hits_coverage OK

Test_for_any_of_86_command_with_in_take_from_any_of_77_preseding_files__the_hitting_files_list_per_command OK

Test_for_any_of_86_command_with_in_take_from_any_of_77_preseding_files__two_example_of_either_group_to_show_up_at_per_command OK

So: Conclusion: How is this done? Doubtable in bash, complexity higher than 0-dimensional variables and two for loops. If, then using templates, which are not there at the moment, at least not an extended. And one should have one.

-With respect to: magic-cookies for anything in Code then, IFS?, Arrays not recognized in arithmetic operations and overmore having monstrous names such ${indix[$index]}. A way out in this is to create filegroups from the templates, to stay down the complexity level of one for-loop.

mkdir ./, git clone git://; 

cd ~/
for i in *; do grep -v "#" $i>$i.strip; done

ls -l *.strip|cut -c30-33|sort|uniq>16sizesuniq
cat *.strip|grep [a-z]|sort|uniq>actuallycommands
for i in $(cat 16sizesuniq); do echo $i; cat lsl.out|grep $i|tail -n 1; done|cut -c48-|sort|grep [a-z]>filenamesof16
wc -l 16sizesuniq filenamesof16 actuallycommands 
# 15 16sizesuniq
# 15 filenamesof16
# 86 actuallycommands
# 116 total
#create extract of 16 files
for i in `cat filenamesof16`; do cat $i|grep "^[a-z]"|sort|uniq> f$i; done
wc fdebian* -l

# now hour of truth: there is easy way from file to variable: IFS
IFS=$'\n' read -d '' -r -a i < actuallycommands
echo ${#i[@]}#86 #his length, how ugly, ugly, is not is?
(for ((a=0; a <= LIMIT ; a++)); 
 do echo -n "";#Einwantnuts"$a"_"${i[$a]}"_;
 #echo "${i[$a]}";
 #grep -l "${i[$a]}" fdebian*
 i10=`grep -l "${i[$a]}" fdebian*|wc -l`

 #echo "eins von den ja files"
 i11=`grep -l "${i[$a]}" fdebian*|head -1`
 #echo "eins von den nein files"
 #grep -l -v "${i[$a]}" fdebian_sid_daily_*|head -1
 echo "$i10" "${i[$a]}"" " "$i11";

 done;) |sort -h
#|grep -v "15 "|grep -v "0 "|sort -h| grep partman
# so if you need partman support?
#grep -v 15|grep -v 0_|wc # after 64, around 20 commands in any file (or none) 

# just for sake of complete ness this
count=0;LIMIT=${#i[@]};echo $LIMIT;LIMITb=${#i1[@]};echo $LIMITb;
for ((a=1; a <= LIMIT ; a++)); 
 do echo -n "tell me wich filei1 ${i1[$ab]}";
 for ((ab=1; ab <= LIMITb ; ab++)); 
 do echo -n ${i1[$ab]}"____"$ab; 
 #grep "${i[$a]}" "${i1[$ab]}"
 # >/dev/null||i1_hits[$a]=$((${i1_hits[$a]}+1));
 echo stuff"${i1_hits[$a]}"_"${i[$a]}";

So we got it, in conclusion we got an overview of this: We have some errors around  truth 10 sluggish leak commands not found at all,  50% are used in every template, 20% more than once.  You got to most commands an exemplar, no less. Fine then.screenshot_preseed_tables_of_mine

So well, what is to comment is,

3 d-i grub-installer/bootdev string default fdebian_sid_daily_gnome_speakup_preseed.cfg.strip; so that says that they are busy testing „speakup“ the audio, aha, interesting to look up the code, reinventing wheel thing is were prominent: „lock picking hassle“ is done here, next comes X, X-window manager, no? How difficult would that be, to distract that info for the existing jenkins system? Why the hell swap something easy with .jaml? jaml.

4 d-i anna/choose_modules as well with moderated average. Anna? Here for example: fdebian-edu_stretch-daily-netinst_combi-server_preseed.cfg.strip

1 d-i preseed/early_command string sed -ie s/tty4/com0/ /etc/inittab ; kill -HUP 1 fdebian_sid_daily_hurd_lxde_preseed.cfg.strip
1 d-i preseed/late_command string apt-install xdm epiphany-browser ; echo /usr/bin/xdm >/target/etc/X11/default-display-manager fdebian_sid_daily_hurd_lxde_preseed.c

#funny with hurd late, early each 1, no less.

netcfg/choose_interface eth0 or auto, netcfg/gnetcfg/get_domain string intern or  unassigned-domain, netcfg/get_hostname string tjene or string workstation

That’s how they configure their network. Well it is calming to know, that all these commands are in order, no? So, if this is the news of the day from it:

Way to learch preseed API free.


debian jenkins system 2

So there must be all tresoso of picking done in this


„jobs“ templating. Jenkins „jobs“ which correspond on the python scripts, qemuburo is

out of.

So there should all „by-passing maybe security“ skill in that, maybe a history of it, within debian-jenkins ppl.

I need all parameters on the code concerned.

And Test_do_find_the_execution_flows_to_X_entrance_Or_X_install_making_noise_Or_User_X_login_

FAQ1: Are that scripts called „Simplistic“ Debian Jenkins, jobs, any readable and – retransferable to python Unit tests?


│   │   ├── images
│   │   │   ├── DebianLive7BootSplash.png


├── cucumber
│   ├── bin
│   │   └── run_test_suite

└── userContent
├── images
│   ├── debian-jenkins-24×24.png
│   ├── debian-jenkins-24×24.xcf
│   ├── debian-swirl-24×24.png
│   ├── jenkins.png
│   └── profitbricks-24×24.png


ls -l|wc
20 173 1498



/$ ls -lrS|cut -c43-

 594 Okt 18 03:59 Makefile
 1785 Okt 18 03:59 edu-packages.yaml
 1887 Okt 18 03:59 dpkg.yaml
 1993 Okt 18 03:59 self.yaml#?
 2054 Okt 18 03:59 d-i-overview.yaml#?
 2655 Okt 18 03:59 debsums-tests.yaml#?
 2723 Okt 18 03:59 udd.yaml#?
 2839 Okt 18 03:59 haskell-package-plan.yaml #?
 2884 Okt 18 03:59 packages-tests.yaml#?
 3153 Okt 18 03:59 lvc.yaml#?
 ___3366___ Okt 18 03:59 live.yaml <---- ok, this is interesting
 4049 Okt 18 03:59 schroot.yaml#?
 5003 Okt 18 03:59 piuparts.yaml#?
 5203 Okt 18 03:59
 __10465__ Okt 18 03:59 torbrowser-launcher.yaml  <---- ok, this is interesting
There should be hopefully the path to be found where there should be juggling, hm?
grep "\.sh" torbrowser-launcher.yaml |grep "/*/"|cut -c24-|wc #4
1. /srv/jenkins/bin/ torbrowser-launcher torbrowser-launcher-{dist} {dist}{my_prefix} awesome dbus xterm x11-utils x11-xserver-utils feh libnotify-bin figlet build-essential fakeroot devscripts git-buildpackage lintian python-all debhelper dh-apparmor lsb-release iceweasel ca-certificates{my_postfix}'
/srv/jenkins/bin/_____test_torbrowser-launcher.sh______________<-this one ................................

/srv/jenkins/bin/{my_opt_arg} {dist} git'
/srv/jenkins/bin/ unstable git merge debian/sid'

# 2 scripts found, one of them launched with several use cases.

 14614 Okt 18 03:59
 15187 Okt 18 03:59
 16661 Okt 18 03:59 g-i-installation.yaml #?graphical debian installer?
 39569 Okt 18 03:59 reproducible.yaml#?

du -sh .
852K  #1 MB Skripts? and Pictures!, reading, hm?

ls -lrS|cut -c43-|wc
71 #in kind 71 Files

bin$ cat |wc -l
817 #around 800 line this time? And then I get a main interence in them? main function?

grep -A40 -n „# main“ |grep [a-z]_[a-z]|grep download_and_launch

cat |grep -n download_an

cat |tail -n333 |head -n230>download_an.txt# two hundred lines


cat |grep -v „echo\|#“|grep [a-z]_[a-z]|grep -v „update_screenshot\|announce_problem_and_abort_silently\|prepare_lauchner_settings“|wc -l


Finding: „ffmpeg -y -f x11grab .(Xvfb -ac -br -screen 0 ${SIZE}x24 :$SCREEN &
).“ should be the technology how the do the screenshot, seemling the got even „film“ usecase handled , no idea where is the corresponding oracle ..


The function in small words: schroot is invoked 3 times, prepare_lauchner_settings this will make torbrowser screenshot-ready.

grep -r „oracle“ ../*|wc -l #0

schroot –run-session -c $SESSION –preserve-environment — mkdir -p $HOME/.config/torbrowser

–preserve-environment — /usr/bin/torbrowser-launcher prepare_lauchner_settings() sudo cp -pr README INSTALL TODO CONTRIBUTING d-i-preseed-cfgs /var/lib/jenkins/userContent/


bootstrap_system() {boot_system, qemu.–

Fazit: I do not find how in debian, jenkins bin, where are kinds of „oracles“, I know from python tdd and where they do they postinstall-boot „xdm lockpicking..  (

well actually later on this came:

# Copyright 2012-2015 Holger Levsen <>
# Copyright 2016 Philip Hands <>
# released under the GPLv=2

This seems to be the actually,

point of time meant by the word now,

elaborated to be „enlace“, for the happening of around 1000 heavy per time slice testing runs take place time, and I did not have found it myself, but was pointed to. One could find this things out on a systematic approach by using local git. This should fall out as heavily committed ultimately then.

To the question of oracles, the concept, naming scheme of: oracle is new to them. – Maybe it is the oracle trademark threat behind, these day.  On

, that is on line 1084 you got the oracles all, and one btw. sees how their (g-i-installation) testing is taking place: they do a screenshot and ocr it with gocr the line before, two lines before they issue key presses with vncdo, -there is no package of it- they need to download as  foreign, an strange, an external, an alien, lets cose the word: exile package from any github around.  Ready for that news? Debian is using for its own purpose, namely for the purpose of its own (test suit’s software) testing, a package from its own repository of any 100.000 packages in question? Looking out for effects of swearing that is self damaging brain wash, one finds immediately: They are any more not even able of integrating the tools that are they using for them selves. Is this brain leaking? A brain that leaks? Yes lets take it that instantly! It is symptom of mental hostage around the phenomenon of x-automation software these days. Asked me what do upon, I would deem, I would not know in consequence how to handle that „secrecy problem“ then in the future, but I anyway contradict sharply from the beginning agaist any human harmful practice, in this case at first our developers.

you got:

Then this:


hi, any small talk about the code? and the potential off technologies integrated in and such as
(Well, got banned out soon, offtopic: definitely they said ..)
vncdo -s $DISPLAY key ctrl || true
convert -fill black -opaque $VIDEOBGCOLOR snapshot_${PRINTF_NR}.png $GOCR.png
gocr $GOCR.png > $GOCR

vncdo, please which kind of program is this here existing along the schisma of the centuries? „vncdo“. Hey, come over. Yes, wait I first need some „vncdo“ before.‘ There is quite joke in it all the time over this case-historic impact. „vncdo?“, no „xautomation“, orphaned? AHK, what was their name? Windows. Windows offers freedom. AHK. AHK.-AHK.

How do they do the treasury picking then: with vncdo, they issue a pair of virtual key stokes to lightdm, do no what dm, here lightdm, lets assume the former, so this maintains the greeter’s screen physically visible for a physical user. Having achieved that, they do a picture, or even a film of that .mpg, to some preparation to feed it then: to the ocr machine; in its output, they search oracle’s text strings, originally to be read from the user dialogues. That is what I was after, thank you, everybody who helped me on that path! For any amount of sophisticated technologies I was looking out for, it seems that there nothing more or besides it. There for example I was pointed to, that there was no testing of sounds. X-manager break in turned out to wide open to private owner front door at lihghtdm era,

Open questions however left:

-Are there really no other tools for „lock picking“, such as those, that move the mouse pointer or manage a graphical programs user interface such a graphic webbrowser used? (Take in mind, that this is for nothing an idiotic question, not to be confounded with a question pose to mere idiots, of which could happen well case of, but is there something more suspicious than being too early offended by exactly this?)

-How do the debian-jenkins testers than effectively outline a tests goals, time and oracle design? There is not conceptual overview of „jobs“ „oracles“, so no design to hand out to newcomers, is the predefinite answer.


To mudancas: stage suite xuser ready

xterm: DISPLAY is not set

DISPLAY=:0 xterm

ps faux|grep -v „\[„|cut -c66-130|grep X|tail -n1|cut -c15-17>displaysshuser

E=`cat displaysshuser|sed -e „s/^[ ]*//“`; echo $E

DISPLAY=$E xterm #ok


dpkg --configure -a
ao="chromium ding dolphin cryptsetup hplip kate gimp git aspell-de kate libreoffice autokey-gtk autokey-qt xautomation uswsusp winpdb pdftk poppler-utils"
ssh -q -o 'StrictHostKeyChecking no' -p 2222 root@localhost "DEBIAN_FRONTEND=noninteractive apt-get --yes --force-yes install $ao" #>/t

The following NEW packages will be installed:
 avahi-daemon bind9-host ca-certificates ca-certificates-java chromium coinor-libcbc3
 coinor-libcgl1 coinor-libclp1 coinor-libcoinmp1 coinor-libcoinutils3 coinor-libosi1 cryptsetup
 cryptsetup-bin cups cups-client cups-common cups-core-drivers cups-filters
 cups-filters-core-drivers cups-ppdc cups-server-common default-jre default-jre-headless
 dh-python ding docbook-xml docbook-xsl dolphin dosfstools fonts-dejavu fonts-dejavu-extra
 fonts-freefont-ttf fonts-liberation fonts-opensymbol fonts-sil-gentium fonts-sil-gentium-basic
 fuse gdisk ghostscript gimp gimp-data git git-man gsfonts hplip hplip-data java-common
 javascript-common kate kate-data katepart kde-runtime kde-runtime-data kdelibs-bin
 kdelibs5-data kdelibs5-plugins kdoctools liba52-0.7.4 libabw-0.1-1 libass5 libauthen-sasl-perl
 libavc1394-0 libbaloocore4 libbaloofiles4 libbalooqueryparser4 libbaloowidgets4
 libbalooxapian4 libbind9-90 libcddb2 libcdio13 libcdr-0.1-1 libcmis-0.4-4 libdlrestrictions1
 libdns100 libe-book-0.1-1 libencode-locale-perl libeot0 libepub0 liberror-perl
 libetonyek-0.1-1 libexttextcat-2.0-0 libexttextcat-data libfam0 libfile-basedir-perl
 libfile-desktopentry-perl libfile-listing-perl libfile-mimeinfo-perl libfont-afm-perl
 libfreehand-0.1-1 libgconf2-4 libgimp2.0 libgltf-0.0-0 libgnome2-0 libgnome2-bin libgpgme++2
 libgs9 libgs9-common libhpmud0 libhsqldb1.8.0-java libhtml-form-perl libhtml-format-perl
 libhtml-parser-perl libhtml-tagset-perl libhtml-tree-perl libhttp-cookies-perl
 libhttp-daemon-perl libhttp-date-perl libhttp-message-perl libhttp-negotiate-perl libhyphen0
 libio-html-perl libio-socket-ssl-perl libisc95 libisccc90 libisccfg90 libiso9660-8
 libjbig2dec0 libjs-jquery libkactivities-bin libkactivities-models1 libkactivities6 libkate1
 libkateinterfaces4 libkatepartinterfaces4 libkcmutils4 libkde3support4 libkdeclarative5
 libkdecore5 libkdesu5 libkdeui5 libkdewebkit5 libkdnssd4 libkemoticons4 libkfile4
 libkfilemetadata4 libkhtml5 libkio5 libkjsapi4 libkjsembed4 libkmediaplayer4 libknewstuff3-4
 libknotifyconfig4 libkntlm4 libkonq-common libkonq5-templates libkonq5abi1 libkparts4 libkpty4
 libkrosscore4 libktexteditor4 libkxmlrpcclient4 liblangtag-common liblangtag1 libldb1
 liblircclient0 liblivemedia23 liblwp-mediatypes-perl liblwp-protocol-https-perl liblwres90
 libmad0 libmailtools-perl libmatroska6 libmhash2 libmodplug1 libmpcdec6 libmpdec2 libmpeg2-4
 libmspub-0.1-1 libmtp-common libmtp-runtime libmtp9 libmwaw-0.3-3 libmysqlclient18
 libmythes-1.2-0 libneon27-gnutls libnepomuk4 libnepomukcore4 libnepomukquery4a
 libnepomukutils4 libnet-dbus-perl libnet-http-perl libnet-smtp-ssl-perl libnet-ssleay-perl
 libnl-3-200 libnl-route-3-200 libnotify4 libnspr4 libnss-mdns libnss3 libntdb1 libntrack-qt4-1
 libntrack0 libodfgen-0.1-1 liborcus-0.8-0 libpaper-utils libparted2 libpcsclite1 libperl5.20
 libphonon4 libplasma3 libpolkit-qt-1-1 libpoppler-glib8 libpoppler-qt4-4 libpoppler46
 libpostproc52 libproxy-tools libpulse-mainloop-glib0 libpython2.7 libpython3-stdlib
 libpython3.4 libpython3.4-minimal libpython3.4-stdlib libqca2 libqjson0 libqmobipocket1
 libqpdf13 libqt4-declarative libqt4-designer libqt4-opengl libqt4-qt3support libqt4-script
 libqt4-sql libqt4-sql-mysql libqt4-svg libqt4-xmlpatterns libqtwebkit4 libraptor2-0 librasqal3
 librdf0 libreoffice libreoffice-avmedia-backend-gstreamer libreoffice-base
 libreoffice-base-core libreoffice-base-drivers libreoffice-calc libreoffice-common
 libreoffice-core libreoffice-draw libreoffice-impress libreoffice-java-common libreoffice-math
 libreoffice-report-builder-bin libreoffice-sdbc-firebird libreoffice-sdbc-hsqldb
 libreoffice-style-galaxy libreoffice-writer libresid-builder0c2a librevenge-0.0-0 libruby2.1
 libsane-hpaio libsctp1 libsdl-image1.2 libsensors4 libservlet2.5-java libshine3 libshout3
 libsidplay2 libsmbclient libsnmp-base libsnmp30 libsolid4 libsoprano4 libspeechd2 libspeexdsp1
 libssh-gcrypt-4 libstreamanalyzer0 libstreams0 libswscale3 libtag1-vanilla libtag1c2a
 libtalloc2 libtcl8.6 libtevent0 libthreadweaver4 libtie-ixhash-perl libtimedate-perl libtk8.6
 libtwolame0 libudisks2-0 libupnp6 libupower-glib3 liburi-perl libusageenvironment1 libva-drm1
 libva-x11-1 libvcdinfo0 libvisio-0.1-1 libvlc5 libvlccore8 libvncclient0 libwbclient0 libwebp5
 libwebpdemux1 libwebpmux1 libwmf0.2-7 libwpd-0.10-10 libwpg-0.3-3 libwps-0.3-3 libwww-perl
 libwww-robotrules-perl libx11-protocol-perl libxapian22 libxcb-composite0 libxcb-keysyms1
 libxcb-randr0 libxcb-xv0 libxml-parser-perl libxml-twig-perl libxml-xpathengine-perl
 libxml2-utils libxss1 libyajl2 libyaml-0-2 libzip2 libzvbi-common libzvbi0 lksctp-tools
 lp-solve mysql-common nepomuk-core-data notification-daemon ntfs-3g ntrack-module-libnl-0
 openjdk-7-jre openjdk-7-jre-headless oxygen-icon-theme parted patch phonon phonon-backend-vlc
 plasma-scriptengine-javascript poppler-data poppler-utils printer-driver-gutenprint
 printer-driver-hpcups printer-driver-postscript-hp python-cairo python-dbus python-dbus-dev
 python-gobject-2 python-gtk2 python-imaging python-numpy python-pexpect python-pil
 python-renderpm python-reportlab python-reportlab-accel python-support python-talloc python3
 python3-minimal python3-uno python3.4 python3.4-minimal qpdf rsync ruby ruby2.1
 rubygems-integration samba-libs sgml-data soprano-daemon tcl tcl8.6 tk tk8.6 trans-de-en
 tzdata-java udisks2 uno-libs3 upower ure vlc vlc-data vlc-nox vlc-plugin-notify
 vlc-plugin-pulse vlc-plugin-samba xdg-utils xz-utils
The following packages will be upgraded:
1 upgraded, 381 newly installed, 0 to remove and 0 not upgraded.
1 not fully installed or removed.
Need to get 0 B/360 MB of archives.
After this operation, 1181 MB of additional disk space will be used.
cp: failed to extend '/var/tmp/mkinitramfs_DZfPxe//lib64': No space left on device
^Cdpkg: error processing package initramfs-tools (--configure):
 subprocess installed post-installation script was interrupted
Setting up libmysqlclient18:amd64 (5.5.52-0+deb8u1) ...
dpkg: unrecoverable fatal error, aborting:
 unable to fill /var/lib/dpkg/updates/tmp.i with padding: No space left on device
root@ahostname:~# df
Filesystem 1K-blocks Used Available Use% Mounted on
/dev/sda1 2850296 2833904 0 100% /
udev 10240 0 10240 0% /dev
tmpfs 49640 8636 41004 18% /run
tmpfs 124092 0 124092 0% /dev/shm
tmpfs 5120 0 5120 0% /run/lock
tmpfs 124092 0 124092 0% /sys/fs/cgroup
tmpfs 24820 0 24820 0% /run/user/1000
root@ahostname:~# df -h
Filesystem Size Used Avail Use% Mounted on
/dev/sda1 2.8G 2.8G 0 100% /
udev 10M 0 10M 0% /dev
tmpfs 49M 8.5M 41M 18% /run
tmpfs 122M 0 122M 0% /dev/shm
tmpfs 5.0M 0 5.0M 0% /run/lock
tmpfs 122M 0 122M 0% /sys/fs/cgroup
tmpfs 25M 0 25M 0% /run/user/1000

So that is what happened, we got messed up, debian package system blow up the request for a libreoffice wordprocessor, a browser type chromium plus some gimmick, 2G, plus its swapping  you easily reach the limit. Give it more space next time is an answer, other: learn interaction with debian packaging system better, was not there debconf thing among? It is mandatory, seems to me.

Click here. No, not this one, pun intended (;:

Here is where, it suppoedly lives, even though not a 100% sure. There which kinds of request for which interfaces an which „times“ (reaction times)?

A Table like this:

Request, interface, times

-Give the space required for packages install!, apt-gets output to standard error?, 5 minutes reaction time

-Give me the „questions not yet answered“ for any package to be installed?, ,

-Put, answer, xy in to have package installation done non-interactively?, ,

debconf-getlang it templates > debconf-getlang --stats ...  


B. Question hierarchy  package/* shared templates and questions exist:
consists of stanzas??stancas? in a rfc-822 compliant format 

I like that this is a protocol. Has everybody heard? I have nothing against in claiming that protocol. But of what I am very fond of. is that these debian pioneers did not put their product on top lets imagine ISO-Standard, but rfc. Thank you having not driven mad, entirely.  However, we got our stances preserved sanely since 1982. Big Thank-You for that responsability, honestly. People today should have messed this with certain pointage.

 RFC # 822

 Obsoletes: RFC #733 (NIC #41952)



 August 13, 1982

 Revised by

 David H. Crocker

 Dept. of Electrical Engineering
 University of Delaware, Newark, DE 19711
 Network: DCrocker @ UDel-Relay

 Standard for ARPA Internet Text Messages


 PREFACE .................................................... ii

 1. INTRODUCTION ........................................... 1

 1.1. Scope ............................................ 1
 1.2. Communication Framework .......................... 2

 2. NOTATIONAL CONVENTIONS ................................. 3

 3. LEXICAL ANALYSIS OF MESSAGES ........................... 5

 3.1. General Description .............................. 5
 3.2. Header Field Definitions ......................... 9
 3.3. Lexical Tokens ................................... 10
 3.4. Clarifications ................................... 11

 4. MESSAGE SPECIFICATION .................................. 17

 4.1. Syntax ........................................... 17
 4.2. Forwarding ....................................... 19
 4.3. Trace Fields ..................................... 20
 4.4. Originator Fields ................................ 21
 4.5. Receiver Fields .................................. 23
 4.6. Reference Fields ................................. 23
 4.7. Other Fields ..................................... 24

 5. DATE AND TIME SPECIFICATION ............................ 26

 5.1. Syntax ........................................... 26
 5.2. Semantics ........................................ 26

 6. ADDRESS SPECIFICATION .................................. 27

 6.1. Syntax ........................................... 27
 6.2. Semantics ........................................ 27
 6.3. Reserved Address ................................. 33

 7. BIBLIOGRAPHY ........................................... 34


 A. EXAMPLES ............................................... 36
 B. SIMPLE FIELD PARSING ................................... 40
 C. DIFFERENCES FROM RFC #733 .............................. 41

 August 13, 1982 - i - RFC #822

talk to postinst scripts and other scripts as well, all using a special protocol.
Configuration management

Each (variable template) variable in the configuration space is associated with 
some meta-data. 
The minimum meta-data associated with a variable is: long and short description, 
type, and default value
Type string boolean select multiselect note text password title 

 Table 2. Numeric status codes

Range Description
0 success
1-9 reserved
10-19 invalid parameters
20-29 syntax errors
30-99 command-specific return codes
100-109 internal errors
110-255 reserved
INPUT priority question

This tells the frontend (of what? the users one is assumed) to display a question 
(or other type of item) to the user.
 question is the name of the item to display, all other information about the item 
is retrieved from the templates described previously. priority is how important it
 is that the user be prompted. The frontend need only ask this question if the
 priority is high enough. The question is not displayed until a go command
 is given. This allows us to ask multiple questions in a single screen. Once a
 question has been displayed to the user and the user has provided input, the
 frontend will set the seen flag.

Table 4. Supported priorities

Priority Description
low Very trivial items that have defaults that will work in the vast majority of cases.
medium Normal items that have reasonable defaults.
high Items that don't have a reasonable default.
critical Items that will probably break the system without user intervention.
Note that the frontend decides if the user is actually prompted or not. If the user has already answered a question, they are normally not asked it again even if input is called again. And if the user is ignoring low priority items, they will not see them. In either of these cases, this command returns the numeric return code 30.


Fazit now: Well, there are tools affected by an still unwritten history of human slavery of each others for modern days. Too much business is rolling on that secret streets, that not one decent historian may have chosen, to put these things decently for contemporary common sense. That is the situation, and it is insane, because: So the developers, little players in game, should fall into an attitude of swearing to the authorities, their tools are meant slavery means for. They, even defending themselves for doing nothing uncommon, thus nothing false, but are already prepared for swearing like this:

I would never ever help a production of a tool, with which one of YOUR historic graphical users could escape  YOUR,  the mighty and evil master’s,  due personal time control over this humans.



(Well, I thought, heard is it a „cart“ actually. )


-I got as well hooked up at ppas, too.

Only ubuntu they say, or: you hack them -maybe- back to debian. Good luck. The latter one required in any case a versatile skillfulness with debian tools, debconf included, I guess. The former recall on the initial approach and that is: that we take what ever it takes to reach to that ppa, even taking another vm to effectuate it via ubuntu, even changing the target vm to ubuntu. Thinks like this happen and that forces you to change your platform in the end. PPA. 

the preseed solution then


Half a year ago, when I was exhausted in a Doc mace, I found myself lost between interfaces like that  virt-install,qemu ,virtmanager,virsh ,presseed, boot prompt. Now after analysing the situation I can present this script as a tutorial and program

You find everything self-explanatory, including pointers to relevant howtos and even usable. Things one needed to understand where:
outside the scope ___remaster the ISO image ___developers‘ documentation for debian-installer
Note that it makes ___no sense when using __file or __network preseeding to preseed values for questions__(Which??) that are asked ___before the preconfiguration file is parsed.

There is one_ universal method for install preseeding: hacking the iso. So you hack the iso file, then you hack the initrd file in it, there you put the preseed file. You find the 71 Scripts documented (described prettily) in the internals doc. That is where you get into touch with it, understanding the execution flow and debug logging. Every other preseed interface (such as file or network) are limited, for not covering complete non-interactivity, to say for being useless, meanwhile: initrd injection can be used for any use case I can imagine. Lets say: You are invited in a house of a friend, they hand you out the CD. Only in case you really, really do not find a free software internet computer for manipulating you CD on the fly and by the way you prepare the preseed file anyway, you will opt learning the file interface. Is it functioning? – In case I had a server farm, opted pxe, which is bios, me? Never.

Hey, one is really comfortable with. One can even trace or track the preseed commands, to find out what they are. And even you are even tempted to by pass them. Especially, if for some magic, they leaved you helpless.

Problems like these?

So what is the preseed technology then in a few words? Debian installer is a program, which offers a script interface. This script is read at – the beginning – and: there is a data base, you know, called debconf. And for my superficial get-into-touch with it it is messy as hell, but it is smart enough the installer itself can read it. So if you got a working configuration,  shift it in, but without shifting a bit in it. Right? Then, well, after your preseed is registered in data base, in the course of installation it is worked out by the namely 70 scripts, among so called „categories“, „components“, „templates“ from fort nox „ramdisk“ to „target“. I did not get to early logs, but I get to late logs as noisy as necessary in the end.

There are still things to find out, fine grain monitor the process and fine grain controlling it: issuing a 7 seconds lasting installation step lets say 7, between 6 and 8. Do not know, if that is already implemented, among the present methods. This is to find out. I did not came to any insights in #debian-boot chat (; , Maybe if they see, that someone is actually checking out d-i source and compiling, people get more helpful recently. That is what my bet is. Even though there is not a feature like this in the end, the information were valuable, because then one could file/communicate a feature request for it. Fine grained process steps are needed, to fit into a unit test frame work, for development of free technology to be eased sufficiently. To say to lower the hurdle enough. Says I.

Yes, and what happened with virt-install? Is a part of the virtlib garden. For command line use they, redhead, developed a xml format, while still relying on VMs like qemu as a backend or frontend. Here is where you get into mace. One gets the impression that effects take place where things are uneased on purpose to sell them later better, expertism that drives itself important, in a scale – that someone likes to express that, here. To say to get into the – uncomfortable – situation of needing to criticize that as a by passer. Might be that things in modern industry got down to that normal level, I severely disapprove it. It is about betraying the humans where they might not and should not expect it. Well this is the tale about the holy working places behind it and the success behind it, that is a lie. With it I do not say, that there were not gradual trade offs in business practices rather than a subjective good-evil borderline, neither I should deem the problem to solved by superficial anti-discrimination, that is strictly maintaining people on earth without money at the hour of saying no to business whatsoever, that is without dignity, which is status quo to be fought against in the end of the day. Lets address that.

In order, namely, to issue the basic functionality such as network access from host to guest, qemu offers a interface that is recommended as well in debian howtos: <qemu:commandline>
<qemu:arg value=‘-redir’/>
<qemu:arg value=’tcp:5564::3389’/>

-redir option. Recently libvirt users 2011 came to that rabbit hole of connecting to their vms easily. There is to be setup a xml file, which is something like the representation, the setup of the virtual machine, to be used by one the interfaces virsh, virtlib or virtmanager. wo
Each time a new KVM guest is created using the virt-install tool, an XML file is created in the /etc/libvirt/qemu/guest_name.xml

Well, it did not surprise me, when I did not find a file created there or elsewhere. There is a function called –print-xml, so I found some xml code out of it. The way should then with virt-install to install a vm, without using this xml domain code but producing it, or lets say, producing a template of it. Hacking it by recently „leaked“ „secret backdoors“ and restarting it by virsh interface, which is supposed to have limitation given the late date of the „-redir“ access, right? How unfree is that?

The single user’s profit in domain representation should be the exchanging with the GUI virt-manager and with the management of VM parks. These are usecase designs that could_ come across. virt-manager at least seems, if GUI is questioned and it is, the better alternative than crippleware virtualbox.  And I believe_ xml between it and qemu. Well, one sees, its a side street, luckily because it is -kept- uncertain. It was a bad idea to start learning hacking out of a tool like virt-install, even though it gave quick results, later there is no way further designed: cul de sac.

Qemu, however, is quite community driven, because community relevant, the kernel linux maintains it for their own purposes. So there was my mistake and there was the point where I found at last the way out.

Virtmanager keeps sexy. Hm?