Maybe the phone resets its USB connection at that point (as it was unplugged
and plugged again), so it appears in sys-usb again. Do you see it here?
Workarounds:
* Ideally, there would be a way to tell sys-usb not to communicate to the
device when it reconnects and to somehow reconnect it as so
If you have issues with recent hardware, but you can install and boot it, you
can try installing kernel from unstable repo. This version has resolved my
issues.
The command from installing is cca: sudo qubes-dom0-update
--enablerepo=qubes-dom0-unstable kernel, but I am writing it by heart, so t
Hmm. Two devices with the same major:minor numbers? /dev/mapper/dmroot &
/dev/dm-0
/dev/mapper/dmroot does not appear in Dom0, nor does any error appear in
journalctl. I do find that device in sys-{net,firewall,whonix,usb} and in
those cases it always appears as:
ls -l /dev/mapper/dmroot
brw
On Saturday, May 13, 2017 at 12:18:19 PM UTC-7, Ed wrote:
> I had the same problem with a lenovo x1 carbon, there are a lot of threads
> out there with this issue, with a lot of fixes (such as update the bios), but
> for me I fixed it by disabling the security module (TPM) in bios.
>
> Ed
Than
sara.m.antichi-re5jqeeqqe8avxtiumw...@public.gmane.org:
> Hey guys. I need two codes. If you could PM them to me that would be great!
>
I have endless codes, but just read the whonix docs, and riseup sounds a
bit dubious at this point, if thats ok with you ...please show you
perused the whonix thr
I've tried both in a Fedora AppVM and in dom0 to create a 2nd language
input, however the Super+space doesn't change the language in gedit
nor libreoffice, after rebooting the AppVM
Is this supposed to work ? if so how or what am I not doing correct?
I've seen this type of interface in the sett
On Thursday, May 11, 2017 at 6:20:58 PM UTC-4, Alex wrote:
> On 11 May 2017 23:05:42 BST, PR wrote:
>
>
>
> Hello Alex,
>
>
>
> On 05/11/2017 11:41 PM, Alex wrote:
>
>
>
> I'm connecting my Android phone over USB to my Qubes 3.2 host and...
> nothing happens.
On Saturday, May 13, 2017 at 1:07:21 PM UTC-4, lok...@gmail.com wrote:
> On Sunday, 14 May 2017 00:50:01 UTC+8, Grzesiek Chodzicki wrote:
> > W dniu sobota, 13 maja 2017 15:30:07 UTC+2 użytkownik lok...@gmail.com
> > napisał:
> > > I am about to buy a new laptop, and jst about the only requiremen
On Saturday, May 13, 2017 at 3:50:36 PM UTC-4, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2017-05-09 14:54, cooloutac wrote:
> > On Tuesday, May 9, 2017 at 1:40:03 AM UTC-4, Andrew David Wong
> > wrote: On 2017-05-08 23:47, cooloutac wrote:
> On Tuesd
On Sat, May 13, 2017 at 02:38:18PM +0200, Bernhard wrote:
> Hello,
> I ask again about a debian-8/9-minimal (preferably with coldkernel). I
> know there was already a discussion on the subject, but I could not
> gather enough information yet to start myself. There is a conf file
> debian-8-minimal-
On Tuesday, March 7, 2017 at 2:04:18 AM UTC-6, qub...@tutanota.com wrote:
> Back in July 16 Joanna announced
> (http://qubesos4z6n4.onion/news/2016/07/21/new-hw-certification-for-q4)
> that Qubes 4 was due to be released later that year in Sept 16.
> Has Qubes 4 been scrapped? Anyone any idea
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-05-09 15:33, qubenix wrote:
> his page (maybe more?):
> http://qubesos4z6n4.onion/doc/firewall/ gets stuck in a
> redirection loop.
>
Thank you for reporting this. Tracking:
https://github.com/QubesOS/qubes-issues/issues/2807
- --
An
Took me a while to come back to this. Removing the interface and adding it
again in sys-net did help.
Thanks, Rainer
> Am 11.03.2017 um 17:51 schrieb Unman :
>
> On Sat, Mar 11, 2017 at 07:42:23AM -0800, Rainer Hörbe wrote:
>> I installed Qubes R3.2 on a Gigabyte Brix and it worked nicely for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-05-13 14:27, Zbigniew Łukasiak wrote:
> This is something I am also struggling with - but shouldn't there
> be a sign-off line in all the commit comments as described in
> https://www.qubes-os.org/doc/license/ ?
No, that only applies to Qub
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-05-11 20:53, Manuel Amador (Rudd-O) wrote:
> On 05/09/2017 07:54 PM, cooloutac wrote:
>> On Tuesday, May 9, 2017 at 1:40:03 AM UTC-4, Andrew David Wong
>> wrote:
>>
>> Why? No need to encrypt the database file if the whole VM is
>> encrypt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-05-12 06:53, Holger Levsen wrote:
> On Sun, May 07, 2017 at 12:23:47PM -0500, Andrew David Wong wrote:
>> 1. LUKS passphrase 2. Backup passphrase 3. Screen locker
>> passphrase Managing these three allows me to have an arbitrary
>> number of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-05-09 14:54, cooloutac wrote:
> On Tuesday, May 9, 2017 at 1:40:03 AM UTC-4, Andrew David Wong
> wrote: On 2017-05-08 23:47, cooloutac wrote:
On Tuesday, May 9, 2017 at 12:47:11 AM UTC-4, cooloutac
wrote:
> On Sunday, May 7, 2
This is something I am also struggling with - but shouldn't there be a
sign-off line in all the commit comments as described in
https://www.qubes-os.org/doc/license/ ? And by the way - shouldn't
that be somehow linked (or maybe moved into) from
https://github.com/QubesOS/qubes-doc/blob/master/CONTR
On May 13, 2017 1:54 PM, Myron Weber wrote:
>
> I had v3.2 installed and running great with VT-d disabled. When I enabled it
> in the BIOS, everything else seems OK but when the laptop suspends, it will
> no longer wake up. I have to hold down the power button for a hard power off
> to restart
On 02/11/2017 07:58 AM, kevin.allem...@gmail.com wrote:
Hi !
I have some problem to install Qubes OS with USB.
When I boot on USB key with UEFI mode, Qubes OS install freeze after
initrd.img. I have message like this :
Xen 4.6.1 (c/s) EFI loader
Using configuration file 'Xen.cfg'
vmlinuz : 0x0
I had v3.2 installed and running great with VT-d disabled. When I enabled it in
the BIOS, everything else seems OK but when the laptop suspends, it will no
longer wake up. I have to hold down the power button for a hard power off to
restart.
This is a recent, new install of Qubes OS v. 3.2 on
On Sunday, 14 May 2017 00:50:01 UTC+8, Grzesiek Chodzicki wrote:
> W dniu sobota, 13 maja 2017 15:30:07 UTC+2 użytkownik lok...@gmail.com
> napisał:
> > I am about to buy a new laptop, and jst about the only requirements I have
> > is that it should be reasonably small, and that I am able to use
W dniu sobota, 13 maja 2017 15:30:07 UTC+2 użytkownik lok...@gmail.com napisał:
> I am about to buy a new laptop, and jst about the only requirements I have is
> that it should be reasonably small, and that I am able to use the GPU in it.
> The latter is because I need to do some development whic
Are these instructions of any help? You basically just follow the
instructions for building Arch.
https://groups.google.com/d/msgid/qubes-users/20170428154944.xt4ggq6xhhd3wxe3%40bestemt.no
--
ubestemt
--
You received this message because you are subscribed to the Google Groups
"qubes-users" g
W dniu sobota, 13 maja 2017 13:21:54 UTC+2 użytkownik dev...@gmail.com napisał:
> Ok, for anyone else who makes such a stupid mistake, you can change the
> templates of all the VM's through the Dom0 command line. To get the list of
> properties of a VM, use:
>
> qvm-prefs -l
>
> Then, change
Since posting my question above I found the following
https://groups.google.com/forum/#!topic/qubes-users/23tna6I9gE4
It guided me to a solution which was to run
rm -rf /var/lib/qubes/appvms/trim-debian-8
virsh -c xen:/// undefine trim-debian-8
qvm-trim-template debian-8
This fixes the pro
On 05/12/2017 03:02 PM, Tom Hutchinson wrote:
> Thanks for the contribution Manuel. I'll check it out.
My pleasure :-)
Agreed about the passwords thing!
--
Rudd-O
http://rudd-o.com/
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To u
On 05/12/2017 11:53 AM, Holger Levsen wrote:
> On Sun, May 07, 2017 at 12:23:47PM -0500, Andrew David Wong wrote:
>> 1. LUKS passphrase
>> 2. Backup passphrase
>> 3. Screen locker passphrase
>> Managing these three allows me to have an arbitrary number of
>> additional secrets in VMs without having
I am about to buy a new laptop, and jst about the only requirements I have is
that it should be reasonably small, and that I am able to use the GPU in it.
The latter is because I need to do some development which requires it.
I am OK with installing Nvidia's proprietary drivers on dom0. I'm awar
I'm getting this error in a popup login:
> Oops!
> We're sorry, it looks like root=/dev/mapper/dmroot crashed.
> Please contact the developer if you want to report the issue.
I haven't identified any problems, though. It happened subsequent to this
mistake and repair:
https://groups.google.com
Got it to work thanks! I'll try to add it to the hardware compatibility
list. I had to do the wireless troubleshooting step of re-loading iwlmvm
firmware that Qubes suggests on their website. Aside from that everything
seems to work properly. It was even easier to configure than Debian.
On Sat, Ma
Hello,
I ask again about a debian-8/9-minimal (preferably with coldkernel). I
know there was already a discussion on the subject, but I could not
gather enough information yet to start myself. There is a conf file
debian-8-minimal-3.0.2-201505170018.conf on github. The date "2015" is
not completely
Hello,
I have the following error when I try to trim my debian-8 template VM
qvm-trim-template debian-8
Disk usage before:
6212224 /var/lib/qubes/vm-templates/debian-8/root.img
Creating temporary VM...
Traceback (most recent call last):
File "/usr/bin/qvm-trim-template
Ok, for anyone else who makes such a stupid mistake, you can change the
templates of all the VM's through the Dom0 command line. To get the list of
properties of a VM, use:
qvm-prefs -l
Then, change the the template property (not the root_img property) for each of
the VM's:
qvm-prefs -s t
I followed the steps here to upgrade the Fedora-23 template to Fedora-25
(rather than 24): https://www.qubes-os.org/doc/template/fedora/upgrade-23-to-24/
I did everything as described until missing a key step at the end. I checked
that the Fedora-23 template was not running, cloned it, upgraded
Dear all,
I'm using Qubes R3.2 with XFCE4 and I'm trying to have an uniform look for my
desktop appearance between the dom0 desktop and the AppVMs using the Numix
theme which makes notably dom0 panel bar almost black.
AppVM trayicons such as nm-applet of the sys-net remains with a white
backgr
It's been more than 9 months and yet the Qubes OS proposal
gathered only 109 commits,
https://area51.stackexchange.com/proposals/98519/qubes-os
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emai
37 matches
Mail list logo