From 87ae5a3b65980201a97cf7171782d6373ea30ebe Mon Sep 17 00:00:00 2001 From: Bahtiar `kalkin-` Gadimov Date: Tue, 21 Jun 2016 17:03:04 +0200 Subject: [PATCH] Fix qvm-start --- qubes/tools/qvm_start.py | 8 -------- qubes/vm/mix/net.py | 2 +- 2 files changed, 1 insertion(+), 9 deletions(-) diff --git a/qubes/tools/qvm_start.py b/qubes/tools/qvm_start.py index bc376359..da7720ee 100644 --- a/qubes/tools/qvm_start.py +++ b/qubes/tools/qvm_start.py @@ -128,17 +128,9 @@ def main(args=None): vm.debug = args.debug try: - vm.verify_files() - except (IOError, OSError) as e: - parser.error( - 'error verifying files for domain {!r}: {!r}'.format(vm.name, e)) - - try: - #xid = vm.start( preparing_dvm=args.preparing_dvm, start_guid=args.start_guid) - # notify_function= except qubes.exc.QubesException as e: parser.error_runtime('Qubes error: {!r}'.format(e)) diff --git a/qubes/vm/mix/net.py b/qubes/vm/mix/net.py index acb70c58..cbb0034e 100644 --- a/qubes/vm/mix/net.py +++ b/qubes/vm/mix/net.py @@ -325,7 +325,7 @@ class NetVMMixin(qubes.events.Emitter): pass @qubes.events.handler('firewall-changed', 'domain-spawn') - def on_firewall_changed(self, event): + def on_firewall_changed(self, event, **kwargs): ''' Reloads the firewall if vm is running and has a NetVM assigned ''' # pylint: disable=unused-argument if self.is_running() and self.netvm: