Duplicate 'MX Tools' in Whisker Menu  [Solved]

Message
Author
AltTabDelete
Posts: 126
Joined: Sun Sep 05, 2021 9:29 am

Duplicate 'MX Tools' in Whisker Menu

#1 Post by AltTabDelete »

Screenshot won't allow me to take a shot of just the Whisker menu to show you, and a screenshot of the whole desktop (required to keep the Whisker Menu in view) is 1.5 MB - too big to be attached to the thread. Only relevant thread I found covered removing 'MX Tools' completely from Whisker Menu, not duplicates.

Code: Select all

System:    Kernel: 5.10.0-21-686-pae [5.10.162-1] i686 bits: 32 compiler: gcc v: 10.2.1 
           parameters: BOOT_IMAGE=/boot/vmlinuz-5.10.0-21-686-pae 
           root=UUID=<filter> ro quiet forcepae splash 
           Desktop: Xfce 4.18.1 tk: Gtk 3.24.24 info: xfce4-panel wm: xfwm 4.18.0 vt: 7 
           dm: LightDM 1.26.0 Distro: MX-21.3_386 Wildflower October 20  2021 
           base: Debian GNU/Linux 11 (bullseye) 
Machine:   Type: Portable System: Dell product: Latitude D800 v: N/A serial: <filter> Chassis: 
           type: 8 serial: <filter> 
           Mobo: Dell model: 01W890 serial: <filter> BIOS: Dell v: A13 date: 06/30/2005 
Battery:   ID-1: BAT0 charge: 68.6 Wh (100.0%) condition: 68.6/77.8 Wh (88.2%) volts: 12.3 
           min: 10.8 model: SMP DELL Y1635 type: Li-ion serial: <filter> status: Full 
CPU:       Info: Single Core model: Intel Pentium M bits: 32 type: MCP arch: M Banias family: 6 
           model-id: 9 stepping: 5 microcode: 7 cache: L2: 1024 KiB 
           flags: pae sse sse2 bogomips: 2797 
           Speed: 1000 MHz min/max: 600/1400 MHz Core speed (MHz): 1: 1000 
           Vulnerabilities: Type: itlb_multihit status: KVM: VMX unsupported 
           Type: l1tf mitigation: PTE Inversion 
           Type: mds status: Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled 
           Type: meltdown mitigation: PTI 
           Type: mmio_stale_data status: Unknown: No mitigations 
           Type: retbleed status: Not affected 
           Type: spec_store_bypass status: Vulnerable 
           Type: spectre_v1 mitigation: usercopy/swapgs barriers and __user pointer sanitization 
           Type: spectre_v2 
           mitigation: Retpolines, STIBP: disabled, RSB filling, PBRSB-eIBRS: Not affected 
           Type: srbds status: Not affected 
           Type: tsx_async_abort status: Not affected 
Graphics:  Device-1: NVIDIA NV34M [GeForce FX Go5200 64M] vendor: Dell driver: nouveau v: kernel 
           bus-ID: 01:00.0 chip-ID: 10de:0324 class-ID: 0300 
           Display: x11 server: X.Org 1.20.11 compositor: xfwm4 v: 4.18.0 driver: loaded: nouveau 
           unloaded: fbdev,modesetting,vesa alternate: nv display-ID: :0.0 screens: 1 
           Screen-1: 0 s-res: 1280x800 s-dpi: 96 s-size: 338x211mm (13.3x8.3") 
           s-diag: 398mm (15.7") 
           Monitor-1: LVDS-1 res: 1280x800 hz: 60 dpi: 98 size: 331x207mm (13.0x8.1") 
           diag: 390mm (15.4") 
           OpenGL: renderer: NV34 v: 1.5 Mesa 20.3.5 direct render: Yes 
Audio:     Device-1: Intel 82801DB/DBL/DBM AC97 Audio vendor: Dell driver: snd_intel8x0 v: kernel 
           bus-ID: 00:1f.5 chip-ID: 8086:24c5 class-ID: 0401 
           Sound Server-1: ALSA v: k5.10.0-21-686-pae running: yes 
           Sound Server-2: PulseAudio v: 14.2 running: yes 
Network:   Device-1: Broadcom NetXtreme BCM5705M Gigabit Ethernet vendor: Dell Latitude D400 
           driver: tg3 v: kernel port: b080 bus-ID: 02:00.0 chip-ID: 14e4:165d class-ID: 0200 
           IF: eth0 state: down mac: <filter> 
           Device-2: Qualcomm Atheros AR5212/5213/2414 Wireless Network Adapter driver: ath5k 
           v: kernel port: ecf8 bus-ID: 02:03.0 chip-ID: 168c:0013 class-ID: 0200 
           IF: wlan0 state: up mac: <filter> 
Bluetooth: Device-1: Dell Wireless 350 Bluetooth type: USB driver: btusb v: 0.8 bus-ID: 2-2:4 
           chip-ID: 413c:8103 class-ID: fe01 
           Report: hciconfig ID: hci0 rfk-id: 3 state: up address: <filter> bt-v: 1.1 lmp-v: 1.2 
           sub-v: 679 hci-v: 1.2 rev: 679 
           Info: acl-mtu: 384:8 sco-mtu: 64:8 link-policy: rswitch hold sniff park 
           link-mode: slave accept service-classes: rendering, capturing, object transfer, audio 
Drives:    Local Storage: total: 111.79 GiB used: 43.3 GiB (38.7%) 
           SMART Message: Unable to run smartctl. Root privileges required. 
           ID-1: /dev/sda maj-min: 8:0 vendor: Western Digital model: WD1200VE-22KWT0 
           size: 111.79 GiB block-size: physical: 512 B logical: 512 B speed: <unknown> type: N/A 
           serial: <filter> rev: 3K01 scheme: MBR 
Partition: ID-1: / raw-size: 10.75 GiB size: 10.47 GiB (97.48%) used: 7.95 GiB (75.9%) fs: ext4 
           dev: /dev/sda1 maj-min: 8:1 
           ID-2: /home raw-size: 98.92 GiB size: 96.81 GiB (97.86%) used: 35.3 GiB (36.5%) 
           fs: ext4 dev: /dev/dm-0 maj-min: 253:0 mapped: 1.home.fsm 
Swap:      Kernel: swappiness: 15 (default 60) cache-pressure: 100 (default) 
           ID-1: swap-1 type: partition size: 2.1 GiB used: 52.4 MiB (2.4%) priority: -2 
           dev: /dev/sda3 maj-min: 8:3 
Sensors:   System Temperatures: cpu: 52.0 C mobo: N/A 
           Fan Speeds (RPM): cpu: 3538 
Repos:     Packages: note: see --pkg apt: 2090 lib: 1065 flatpak: 0 
           No active apt repos in: /etc/apt/sources.list 
           Active apt repos in: /etc/apt/sources.list.d/debian-stable-updates.list 
           1: deb http://deb.debian.org/debian bullseye-updates main contrib non-free
           Active apt repos in: /etc/apt/sources.list.d/debian.list 
           1: deb http://deb.debian.org/debian bullseye main contrib non-free
           2: deb http://security.debian.org/debian-security bullseye-security main contrib non-free
           Active apt repos in: /etc/apt/sources.list.d/mx.list 
           1: deb http://mirrors.rit.edu/mxlinux/mx-packages/mx/repo/ bullseye main non-free
Info:      Processes: 193 Uptime: 3h 33m wakeups: 2 Memory: 1.97 GiB used: 1.09 GiB (55.2%) 
           Init: SysVinit v: 2.96 runlevel: 5 default: 5 tool: systemctl Compilers: gcc: 10.2.1 
           alt: 10 Client: shell wrapper v: 5.1.4-release inxi: 3.3.06 
Boot Mode: BIOS (legacy, CSM, MBR)

AltTabDelete
Posts: 126
Joined: Sun Sep 05, 2021 9:29 am

Re: Duplicate 'MX Tools' in Whisker Menu

#2 Post by AltTabDelete »

It might be fuzzy, but I took a screenshot of the screenshot:
Screenshot_2023-02-11_23-11-47.png
You do not have the required permissions to view the files attached to this post.

AltTabDelete
Posts: 126
Joined: Sun Sep 05, 2021 9:29 am

Re: Duplicate 'MX Tools' in Whisker Menu  [Solved]

#3 Post by AltTabDelete »

Nevermind, stumbled over it after posting (embarrased).

Code: Select all

rm ~/.config/menus/applications-merged/mx-tools.menu

User avatar
dolphin_oracle
Developer
Posts: 22342
Joined: Sun Dec 16, 2007 12:17 pm

Re: Duplicate 'MX Tools' in Whisker Menu

#4 Post by dolphin_oracle »

AltTabDelete wrote: Sun Feb 12, 2023 12:25 am Nevermind, stumbled over it after posting (embarrased).

Code: Select all

rm ~/.config/menus/applications-merged/mx-tools.menu
don't be embarrassed, it was our fault.
http://www.youtube.com/runwiththedolphin
lenovo ThinkPad X1 Extreme Gen 4 - MX-23
FYI: mx "test" repo is not the same thing as debian testing repo.

User avatar
Giovanni216
Posts: 1
Joined: Sat Jul 01, 2023 3:01 am

Re: Duplicate 'MX Tools' in Whisker Menu

#5 Post by Giovanni216 »

thanks I solved it

User avatar
susan707
Posts: 20
Joined: Sat May 09, 2020 11:50 am

Re: Duplicate 'MX Tools' in Whisker Menu

#6 Post by susan707 »

Thanks @AltTabDelete solved for me too twice, actually on two machines.

User avatar
Eadwine Rose
Administrator
Posts: 14805
Joined: Wed Jul 12, 2006 2:10 am

Re: Duplicate 'MX Tools' in Whisker Menu

#7 Post by Eadwine Rose »

Glad to hear that. Will lock this topic now.
MX-23.6_x64 July 31 2023 * 6.1.0-37amd64 ext4 Xfce 4.20.0 * 8-core AMD Ryzen 7 2700
Asus TUF B450-Plus Gaming UEFI * Asus GTX 1050 Ti Nvidia 535.247.01 * 2x16Gb DDR4 2666 Kingston HyperX Predator
Samsung 870EVO * Samsung S24D330 & P2250 * HP Envy 5030

Locked

Return to “XFCE Desktop Environment”