Skip to content

disable qubes-icon-sender on sys-net and sys-usb #222

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Dec 27, 2024
Merged

Conversation

Guiiix
Copy link
Member

@Guiiix Guiiix commented Dec 21, 2024

Qubes icon sender allows to update applications windows icons. In practice, few windows are opened on the sys-vms. Disabling this service allows to recover some RAM without causing inconvenience.

Qubes icon sender allows to update applications windows icons. In practice, few windows are opened on the sys-vms. Disabling this service allows to recover some RAM without causing inconvenience
@marmarek
Copy link
Member

PipelineRetry

@marmarek marmarek merged commit bc42770 into QubesOS:main Dec 27, 2024
2 of 3 checks passed
@ben-grande
Copy link
Contributor

Took me a minute but for others that are reading and trying to understand why Exec=/usr/lib/qubes/qvm-service-wrapper program was not used instead, it is because qubes-icon-sender is not in $PATH so can't use basename which is necessary for the detection of /run/qubes-service/$service to work. Naming the service qubes-icon-sender and enabling by default in Qubes could be another solution, but as I see the minimal-(netvm|usbvm) being used elsewhere, I understand the reasoning now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants