On 09/06/2020 13:25, sysad.andes wrote:
Original message From: 'Chris Jones' via qubes-users Date: 6/8/20 22:16 (GMT-05:00) To: qubes-users@googlegroups.com Subject:
[qubes-users] Help with "Missing Features HAP/SLAT/EPT/RVI, Interrupt Remapping" Hi all,New user here, trying
Original message From: 'Chris Jones' via qubes-users
Date: 6/8/20 22:16 (GMT-05:00) To:
qubes-users@googlegroups.com Subject: [qubes-users] Help with "Missing Features
HAP/SLAT/EPT/RVI, Interrupt Remapping" Hi all,New user here, trying and failing
to install Qubes R4.0.3 on
Hello there.
When upgrading a Qubes 4 system to a new Fedora template, what are the
differences between regenerating the DisposableVM Template from the new
template using step 3 from [1]:
[user@dom0 ~]$ qvm-create -l red -t new-template new-template-dvm
[user@dom0 ~]$ qvm-prefs new-template-dvm
Hi all,
New user here, trying and failing to install Qubes R4.0.3 on a new Dell
Precision 3630 Tower with Xeon E-2288G cpu.
I verfied the ISO and wrote it to a USB stick with dd.
If I set the BIOS to boot from the USB stick in UEFI mode then I get
dump of registers and stack trace and it say
All works really well, since r3.2 . Processor was upgraded to i7-2460M , not
sure what the device originally shipped with.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
Oh and i forgot but i tried lvremove or other simple command but all failed
with message
> Failed to ... because qubes/poolhd0 not accessible. Manual repair required
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
I understand, that Qubes compartmentalizes OS and parts of OS don't have
access to other parts of the OS. So even if you had virus in your firmware
of a network card, it wouldn't matter. I know firmware viruses are rare,
but still better safe than sorry. I am looking for safe OS to do online
ba
I figured out that I could restore as long as I allowed Qubes to set up
sys-net, sys-firewall, etc. I wish there was an option during install
for "restore Qubes from backup"... so you didn't need to create VMs
you'd just need to delete later.
--
You received this message because you are subscr
I need some help setting firewall rules for disp vms.
In my house I have:
router 192.168.0.1
printer 192.168.0.123
and everything else is 192.168.0.X
For most of my app vms I want them to see the internet, printer and router
but not any other device so I apply these rules:
qvm-firewall ema