Hi folks,
Occasionally I will have a VM lock up (UI remains on screen but windows Dow
not respond) and notice that the MEM size in xentop is greater than the
MAXMEM value in xentop, while at least one associated cpu is spinning
(xentop shows state as perpetually r aka running).
Memory ballooning
On Wednesday, July 29, 2020 at 2:33:29 AM UTC-4, Qubes wrote:
>
> On 7/29/20 1:56 AM, ludwig...@gmail.com wrote:
> > *What if it saves a spare set of encryption keys somewhere in its flash
> for
> > the "lawful investigator" to find?*
> >
> I am not aware of any proof to support this line of
On Sunday, July 12, 2020 at 2:51:25 PM UTC-4, pok...@gmail.com wrote:
>
> I have the W520 with CPU type i7-2630QM and Nvidia Quadro 2000M (Lenovo
> 4284-E78).
>
> https://ark.intel.com/content/www/us/en/ark/compare.html?productIds=52219,53474
>
> This laptop version doesnt have VT-d, but I complet
On Sunday, June 7, 2020 at 12:29:28 PM UTC-4, Andrew Sullivan wrote:
...
On the fedora-based VMs, the tool `gnome-disks` is a gui way of manually
mounting filesystems.
[I tend to forget the order of operations and/or flags for things like
mount (which is the mountpoint? which is the source devi
On Friday, May 29, 2020 at 6:15:31 AM UTC-4, donoban wrote:
>
> On 2020-05-29 02:34, brend...@gmail.com wrote:
> > Can Qubes support multiple X sessions in dom0?
> Or do you mean multiple X sessions with the same user?
>
Yes, exactly.
On Friday, May 29, 2020 at 6:23:19 AM UTC-4, Frédéric Pier
Can Qubes support multiple X sessions in dom0?
e.g. default session on primary terminal (via ctrl-alt-f1), then start
another session on the third pty (ctrl-alt-f3) after logging in as the
primary qubes user in dom0?
B
--
You received this message because you are subscribed to the Google Gro
On Saturday, May 23, 2020 at 11:32:31 AM UTC-4, Catacombs wrote:
>
> I see that Qubes does not announce planned new releases of Qubes, or state
> what should trigger an update.
>
> Just seems like it would be so much easier if we had an entire new version
> of Qubes, which I could install. At t
On Monday, May 18, 2020 at 6:01:13 PM UTC-4, TheGardner wrote:
>
> understood.
> Guess I have to do some backups, which I have to move to my NAS. The new
> machine will take two months longer. Have to come out with the current
> space until then.
>
>
Is it possible that you haven't invoked the -
On Monday, May 11, 2020 at 6:13:21 PM UTC-4, Rafael Reis wrote:
> My only concern right now is the decisions for the GUI of Qubes 4.1. I
> wonder if the separation of the GUI and dom0 would result in
> incompatibility with E5470 or even a big decrease in performance. This
> thing is perfect for
On Friday, May 1, 2020 at 12:39:54 AM UTC-4, seshu wrote:
>
> One question that just occured to me about upgrading the template VM's.
> Many of the comments and posts in this forum are assuming Qubes is
> installed on a laptop. I have it installed on a desktop, and my keyboard /
> mouse uses sys
Xen hypervisor overwrites memory before allocating it to a domU VM.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To v
On Saturday, April 11, 2020 at 7:10:18 PM UTC, Sven Semmler wrote:
>
> On Sat, Apr 11, 2020 at 02:48:17PM -0400, Chris Laprise wrote:
> > I've never had a problem with KDE in dom0 as long as the display manager
> is
> > switched to sddm and BIOS is set to integrated graphics. "Discrete
> graphi
On Wednesday, March 11, 2020 at 1:34:17 AM UTC, maiski wrote:
>
>
> Quoting brend...@gmail.com :
> >
> > Qubes 4.1 (in development) has added a warning (in addition to the
> current
> > lvm space usage warning) for lvm metadata usage above a threshold. 4.0
> > doesn't have the metadata nearing
On Tuesday, March 10, 2020 at 11:49:58 AM UTC, maiski wrote:
>
> Quoting Ulrich Windl >:
> > For some reason I have a "watch -n30 lvs" running in a big terminal.
> > On one of the op lines I see the usage of the thin pool. Of course
> > this only helps before the problem...
> >
> > But I t
The diskashur and similar projects will come under the same scrutiny as SED
devices’ built-in TCG Opal: that the encryption layer is closed source and not
publicly auditable (unlike LUKS w/dm-crypt under Linux which is auditable).
The summary of my position is: use the hw encryption features ava
PS - don't experiment with erasing drives on your daily driver. the drive
is going to do what you asked it to do, no matter, say, whether you booted
on that drive or not. POOF!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
On Wednesday, February 26, 2020 at 3:37:27 PM UTC, Steve Coleman wrote:
>
> On 2/26/20, ggg...@gmail.com >
> wrote:
>
> > I discovered there is no program to clear an SSD.
>
> If you are using an Opal 2 compliant SSD and had created an encrypted
> range before formatting your partition then al
On Wednesday, February 26, 2020 at 12:18:48 PM UTC, ggg...@gmail.com wrote:
>
> Boxes being the Sandboxing software available in Linux. It is my hunch,
> that the VM's are taking advantage of some hardware feature that insulates
> them that might be a security hole for Boxes. I dunno?
>
Backg
On Tue, Feb 18, 2020 at 8:41 PM Thierry Laurion - Insurgo Technologies
Libres / Open Technologies wrote:
> I'm talking on top of my head but snapshots are supposed to be taken
> automatically, with 2 reverts possible, by default.
This may be up to interpretation but...
I assumed the original q
Assuming a standard qubes 4.0.x install, just clone the VM each time you are
making risky changes...before each change of course.*
The use of lvm thin pool makes clones essentially use zero storage other that
the bits where they diverge from the original VM, where copy on write preserves
the di
I see reference to both /dev/sdc and /dev/sbc in your post. Which is it?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
Two inter-related arguments for switching to Coreboot so that one can replace
an Intel wireless card with another card:
1. Lenovo BIOS generally has a small whitelist of WiFi cards that work and
block all others.
2. Presumably the reason for this whitelist is support for AMT “out of band and
s
On Sunday, February 9, 2020 at 5:25:56 PM UTC, brend...@gmail.com wrote:
>
>
> Has anyone tried utilizing the xen command line options to mask bits in
> the cpuid, in particular section 1.2.35 cpuid_mask_ecx)?
>
> The man page below says that "Settings applied here take effect globally,
> includ
On Sunday, February 9, 2020 at 3:19:34 PM UTC, Claudia wrote:
>
> > marmarek:
> > This is a very bad idea to "fix" it. Those missing/changed CPUID bits
> later on will cause issues.
> > And given most of the microcode updates recently are about speculative
> execution, missing those
> > features
On Sun, Feb 9, 2020 at 9:15 AM Claudia wrote:
> From linuxreviews.org:
> "There have been reports of RDRAND issues after resuming from suspend on
> some AMD family 15h and family 16h systems. [...] RDRAND support is
> indicated by CPUID Fn0001_ECX[30]. This bit can be reset by clearing
> MSR
On Friday, February 7, 2020 at 9:35:25 PM UTC, zach...@gmail.com wrote:
>
> I preemptively submitted this PR to see what the Qubes team thinks.
> https://github.com/QubesOS/qubes-vmm-xen/pull/70
>
> I agree it probably should be fixed upstream, although I've seen the Qubes
> team make exceptions
On Sunday, February 2, 2020 at 1:06:45 PM UTC, M wrote:
>
> I can’t figure out how I can use the USB modem HUAWEI E3372h to connect to
> the internet in Qubes OS 4.0.3.
>
So having watched these threads over the past week, I have some comments:
First, you have a very finicky device. The mode is
Perhaps due to memory balancing being temporarily unable to service all AppVMs
upon dom0 wake?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubs
On Monday, January 27, 2020 at 8:34:33 PM UTC, Stumpy wrote:
>
> I am using remmina (1.3.10) on a debian (10) appvm to rdp into a win10
> box and it works fairly well, but there is some sort of issue with
> remmina grabbing the keystrokes?
> When i try to alt+tab in my rdp session xfce/qubes gra
I think some window managers allow one to pin certain applications to
particular virtual desktops. But those aren’t really security features, more
just window manager tricks to help users organize windows.
My preference would be something along the lines of support for allowing
multiple local x
Try running qvm-start-gui when the window doesn’t appear.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this
On Friday, January 17, 2020 at 11:01:05 PM UTC, Elliot Killick wrote:
>
> On 2020-01-15 01:36, shiftedreality wrote:
>
> > You pointed me in the right direction. I was using Debian 10 as my
> default
> > Qubes template.
> Debian 10 is supposed to be supported as a template. I didn't realize
>
Alt-space fullscreen doesn’t work?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web vi
Which template are you using?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
Having manually set up windows VMs in in the pst, I can say that Elliot’s work
here is quite the time saver.
Just invoke the script, go off and do something for a bit, come back later with
some windows VM installs completed, including the add on software you wanted.
Haven’t tried the newer ver
On Wednesday, January 8, 2020 at 4:29:57 PM UTC-5, Ryan Tate wrote:
> (The one thing that I do wonder is if is neccesary for sys-usb to bail
> out on boot when an assigned device is not present, maybe there could be
> a system for transient but assigned devices to be allowed to come online
> po
On Wednesday, January 8, 2020 at 6:19:54 AM UTC-5, Ryan Tate wrote:
>
> Does qubes block USB data on Thunderbolt ports?
>
So a few things:
1. Qubes has pcie hotplug disabled in the dom0 kernel, which TB uses for
PCIe-based thunderbolt devices. This is disabled for security reasons.
2. The TB al
On Friday, January 3, 2020 at 3:48:33 PM UTC-5, Claudia wrote:
>
> January 3, 2020 7:17 PM, brend...@gmail.com wrote:
>
> > Since it appears the old made-for-purpose USB 2.0 EHCI Debug port
> dongles are impossible to find
> > these days, I've been looking around for alternatives and stumbled upo
On Friday, January 3, 2020 at 12:53:31 PM UTC-5, Claudia wrote:
>
> January 1, 2020 5:09 PM, "Claudia" >
> wrote:
>
> I'll see if I can figure out how to apply the patch to the latest 4.1
> (F31-based) and try it from there. In the mean time, if anyone has any
> ideas please share.
>
Maybe not
On Monday, December 30, 2019 at 1:44:13 PM UTC-5, qubes123 wrote:
>
> Answering to your earlier question, my CPU capability information bits
> change like this after suspend:
>
> (XEN) Entering ACPI S3 state.
> (XEN) AMD-Vi: Applying erratum 746 workaround for IOMMU at :00:00.2
> (XEN) Finishi
On Monday, December 30, 2019 at 6:25:03 AM UTC-5, xao wrote:
>
> Don't know how I missed this link before, but after reading it, things got
> much clear. Thank you!
>
One important tenet of Qubes is that the security focus is primarily
protecting you from cross-domain (cross-VM) disclosure or ex
On Sunday, December 29, 2019 at 5:35:52 PM UTC-5, Blake S wrote:
>
> On Wednesday, December 25, 2019 at 10:09:24 PM UTC-6, brend...@gmail.com
> wrote:
>>
>> My own longterm Qubes primary has been a used W520 quad core with four
>> 8GB DIMMs for 32GB of RAM. Not bad for 2012 era laptop. [Avoid the
On Sunday, December 29, 2019 at 7:25:49 PM UTC-5, Claudia wrote:
>
> Ha. Now that you mention it, I do remember laptops used to have PCIe
> slots. But I think those days are pretty much over.
>
> On a side note, I remembered I saw some error about the IOMMU in the
> kernel logs at some point. I j
Older laptops w/ Optimus allowed choosing Integrated-only video (vs hybrid or
vs Discrete). I set up my W520 w/ the Integrated intel cpu and it has been a
workhorse.
Contemporary laptops w/ Optimus only allow Hybrid or Discrete. No way to choose
just Integrated. Qubes 4.0 and lower don’t handle
My own longterm Qubes primary has been a used W520 quad core with four 8GB
DIMMs for 32GB of RAM. Not bad for 2012 era laptop. [Avoid the dual core
versions: they only have two memory slots and can only support 16GB Max.]
Storage: 1 x mSATA (300MB/s) slot; 1 x SATA (600MB/s) main bay; 1 x SATA
Insurgo is providing a service.
If one can do the steps themselves, that’s fine.
If I were advising a somewhat less technical journalist or a potentially
targeted human-rights worker or politically targeted activist who just wanted
to get stuff done and had the resources, I’d point them to Ins
One additional thing: certain install-related,
VM-creation or volume-creation “fixes” across versions won’t be applied after
an upgrade.
E.g. there were volume mis-alignment fixes, that lead to better SSD and LVM
performance, made after 4.0, that aren’t auto-fixed for existing VMs or
templates.
On Monday, December 23, 2019 at 9:06:09 AM UTC-5, Spleen Productions wrote:
>
> I've setup a machine running R2 since i need audio working on Windows HVM.
>
> I would like to install QWT but when i run sudo-qubes-dom0-update i get
> the following error:
>
> One of the configured repositories faile
On Mon, Dec 23, 2019 at 9:46 AM Claudia wrote:
> Awesome, in time for Christmas even! Downloading it now. Looks like it
> failed a few tests, so I don't know if it'll be usable enough to really
> test suspend/resume on it but we'll see. Not sure if I'll get a chance to
> install it today but I'll
On Mon, Dec 23, 2019 at 6:45 AM Claudia wrote:
>
> I'm not sure this is the problem, though, because I get the same symptoms
> when suspending in a Fedora 25 livecd. Which makes me think it's a Fedora
> problem not a Xen problem, at least for R4.0. In Fedora 29 I think the
> symptoms were slight
Hi folks
[ calling @tasket !]
I'd like to have the system perform a thin_trim command across the primary
thin pool on Qubes startup and shutdown. The purpose would be opportunistic
erasure of deleted volumes in the pool (say, if they were removed without
blkdiscard being run against them first
On Friday, December 20, 2019 at 9:29:55 AM UTC-5, Claudia wrote:
>
> December 19, 2019 12:13 AM, "Claudia" >
> wrote:
>
> > This is R4.1 build 20191013
> >
> > It works pretty well, definitely better than 4.0, but there are some
> weird boot issues. If I let it
> > boot with everything as defaul
Use this one instead, previous one had a missing newline:
https://pastebin.com/JMtuns8g
Brendan
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsu
On Thursday, December 19, 2019 at 12:09:26 PM UTC-5, Brendan Hoar wrote:
>
> This script shows the approach I take for an ephemerally keyed lvm pool:
>
> https://pastebin.com/LDKKwsWW
>
>
And of course, since I was in a hurry, I see typos and better possible
edits in the e
This script shows the approach I take for an ephemerally keyed lvm pool:
https://pastebin.com/LDKKwsWW
Assuming you want a windows standalone work VM and one or more whonix
disposable VMs, you just need to change the two variables in the script and
launch it in dom0.
Be sure you know what yo
On Wednesday, December 18, 2019 at 10:04:40 AM UTC-5, steve.coleman wrote:
>
> On 2019-12-15 22:04, brend...@gmail.com wrote:
> My suggestion is, rather than the time consuming wiping of bits after
> the fact would be to instead create an encrypted volume/partiton/pool
> when launching a DispVM
On Monday, December 16, 2019 at 5:33:52 PM UTC-5, Claudia wrote:
>
> brend...@gmail.com :
> > Disposable VMs were not developed with anti-forensics in mind (e.g. no
> protection in jurisdictions where you can be forced to hand over your drive
> password
> Never thought about it, but that makes
As to the first question: with qubes 4.0 it is a bit difficult to effectively
wipe free space in the default thin pool.
One can create a thin volume and write to it until the thin pool reaches some
saturation level (99.5%), then hit that volume with blkdiscard before invoking
lvremove. Because
Disposable VMs were not developed with anti-forensics in mind (e.g. no
protection in jurisdictions where you can be forced to hand over your drive
password).
That being said...
In 4.0 (updated) qubes now calls blkdiscard on volumes being removed before
invoking lvremove. If you happen to use a
On Monday, September 23, 2019 at 11:57:22 AM UTC-4, steve.coleman wrote:
>
> On 2019-09-21 07:27, tetrahedra via qubes-users wrote:
> > Is there a way to turn currently-running DispVM instance into a regular
> > permanent AppVM, which I can delete later?
>
> I'm not sure it this helps or not, bu
Report below:
[MIRROR] qubes-template-fedora-30-minimal-4.0.1-201907160147.noarch.rpm:
> Curl error (60): SSL peer certificate or SSH remote key was not OK for
> https://mirrors.dgplug.org/qubes/repo/yum/r4.0/templates-itl/rpm/qubes-template-fedora-30-minimal-4.0.1-201907160147.noarch.rpm
>
>
On Sunday, September 22, 2019 at 7:37:40 AM UTC-4, one7...@gmail.com wrote:
>
> Hello,
>
> *Von:* tetrahedra via qubes-users
> *Betreff:* [qubes-users] Making a DispVM permanent
>
> Is there a way to turn currently-running DispVM instance into a regular
> permanent AppVM, which I can delete later?
On Tuesday, September 17, 2019 at 6:15:12 PM UTC-4, awokd wrote:
>
> On a side note, anyone know why "sudo fstrim -av" in dom0 now says 0
> bytes trimmed for root? I double-checked and have discard specified
> everywhere it should be. Only thing I don't remember seeing before is
> stripe=64 in t
On Tue, Sep 10, 2019 at 2:40 PM 'awokd' via qubes-users <
qubes-users@googlegroups.com> wrote:
> brendan.h...@gmail.com:
>
> > Under whonix-15, the whonix developers have inserted a presetting
> question
> > on startup allowing you to choose what you want the default on startup
> to
> > be, and th
On Tuesday, September 10, 2019 at 2:13:46 PM UTC-4, tetra...@danwin1210.me
wrote:
> Did upstream (Tor) also change the NoScript settings to block all
> javascript on all sites by default, even at the lowest Tor Browser
> security level?
>
Not exactly. Upstream intended the security slider to
FYI, running Thinkpad W520 running R4 w/ current-testing & kernel-latest,
updated to current-testing's bevy of updates this morning.
Everything is smooth so far.
Brendan
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
On Sat, Sep 7, 2019 at 3:04 PM Stumpy wrote:
> ...
Does the template for the VM have the ntfs-3g package installed?
B
>
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send a
On Thursday, September 5, 2019 at 4:33:31 AM UTC-4, awokd wrote:
> b@gmail.com:
>
> > USB: I generally have not attached USB drives (utilizing the USB IP support
> > via `qvm-usb` aka `qvm-device usb`) to VMs as I find it slow and sometimes
> > buggy.
>
> I don't do that either, but using qvm
On Wednesday, September 4, 2019 at 8:12:41 PM UTC-4, Stumpy wrote:
>
> I have a hard drive that i cant seem to connect to any of the appvms yet
> I can see and access it via dom0 (not good i know).
> I can attach a usb flash drive to my appvms but not the hard drive?
>
> This is on my laptop and
I would advise against wiping any disks until you are sure the full set of
restores are complete and tested.
I’ve learned the hard way to never put myself
into a situation where I cannot revert to my original configuration.
Brendan
--
You received this message because you are subscribed to the
On Fri, Aug 30, 2019 at 2:14 AM 799 wrote:
> Hello Brendan,
>
> Thanks for the improvement list. Some questions:
>
> schrieb am Do., 29. Aug. 2019, 15:27:
>
>> - Increasing the device-stub VM priority from 256 to 1000 during install
>> utilizing xl sched-credit. This dramatically increases the I
Couple more:
- As windows 7 does not support SCSI unmap, and C and E are on virtual SCSI
devices: install sdelete by default and schedule sdelete.exe -z C:\ and
sdelete -z E:\ ... largish zero writes are caught at the lvm later and
unallocated from storage - plus passed on as discards to physical
Hi crazyqube,
I've used this to generate 20-30 VMs.
I've noticed some incomplete installs (50/50). There do seem to be come
timing dependencies that sometimes cause failures. I'll be investigating
these further next week.
I have some thoughts on changes I'll work on, if you're not planning to
On Thu, Aug 29, 2019 at 3:02 AM rec wins wrote:
>
> OTP won't , if the key does more than U2F you may need to get a
> configuration application for the key and make sure it's U2F only
> slot 1 , 2 etc
>
Yubikey OTP works through a keyboard-like HID, which are blacklisted by
default in
On Tuesday, August 20, 2019 at 6:54:02 PM UTC-4, 799 wrote:
>
> Hello,
> On Tue, 20 Aug 2019 at 21:34, 'awokd' via qubes-users <
> qubes...@googlegroups.com > wrote:
>
>> 'crazyqube' via qubes-users:
>> > I just made my solution for fully automatically creating and installing
>> new Windows qubes
On Tuesday, August 20, 2019 at 9:57:51 AM UTC-4, Chris Laprise wrote:
>
> On 8/20/19 8:58 AM, unman wrote:
> > Otherwise seems fine to me, but I don't think I'm representative user.
> > Custom mens, Activities, Kwin stuff works fine.
> >
> > Can any other KDE users chip in with problems that th
On Monday, August 12, 2019 at 12:25:02 PM UTC-4, Chris Laprise wrote:
>
> On 8/12/19 10:50 AM, ger...@riseup.net wrote:
> > Chris Laprise:
> >> On 8/12/19 9:37 AM, ger...@riseup.net wrote:
> >>> Is there a possibility, to recover data after moving it with cut and
> >>> paste?
> >>>
> >>> De
On Thursday, August 15, 2019 at 8:24:58 AM UTC-4, unman wrote:
>
> On Wed, Aug 14, 2019 at 04:26:18PM -0700, brend...@gmail.com
> wrote:
> > 1. That first USB device, which does not state where it can be used is
> > either:
> > a) The USB 2.0 interface "available" via the expresscard interface
On Wednesday, August 14, 2019 at 7:53:38 PM UTC-4, 799 wrote:
>
> Hello Brendan,
> > schrieb am Do., 15. Aug. 2019, 01:26:
>
>> (...)
>>
>> 1. That first USB device, which does not state where it can be used is
>> either:
>> a) The USB 2.0 interface "available" via the expresscard interface (some
On Tuesday, August 13, 2019 at 3:54:58 PM UTC-4, 799 wrote:
> I have documented the Layout of the USB controllers here:
>
> https://github.com/one7two99/my-qubes/blob/master/docs/qubes-x230.md
>
> It shows which USB Controllers connects to which external USB Port and
> which internal USB Devices
On Tue, Aug 13, 2019 at 4:52 AM Franz <169...@gmail.com> wrote:
> @brendan, @Chris Many thanks
>
>
>> Also: dom0 VM usage as well as all combined domU VMs usage is allocated
>> from the same shared thinpool pool00 in a default setup.
>>
>
> Now I understand. Considering that Qubes-settings on Qub
On Monday, August 12, 2019 at 7:41:47 PM UTC-4, Francesco wrote:
>
> @Chris
> On Mon, Aug 12, 2019 at 1:22 PM Chris Laprise > wrote:
>
>> On 8/12/19 12:03 PM, Franz wrote:
>> > On the upper right corner of the screen a black message alert:
>> >
>> > Disk usage warning!
>> > You are running out of
M.2 NVME SSD devices are just PCIe devices with a special connector. If your
main board supports PCIe 3.0 then the adapter should work just like it was an
onboard M.2 slot, with one possible exception: depending on the BIOS, it might
not be a bootable device.
B
--
You received this message be
On Thursday, August 1, 2019 at 7:28:09 AM UTC-4, gerard ribas vicente wrote:
>
> The qubes-os operating system is compatible with the following SSD disk
> models:
>
> SAMSUNG 860 EVO?
> SAMSUNG860 QVO?
> SAMSUNG860 PRO?
>
Generally all contemporary SSDs are compatible. I have used the 860 EVO
(b
On Friday, July 26, 2019 at 1:24:57 PM UTC-4, Claudia wrote:
> Just to humor myself, I was going to try testing if I could hear sound
> from Qubes after resume, but it seems audio isn't working at all. Which
> is a whole 'nother problem. Aplay says "... unable to open slave; audio
> open error
On Fri, Jul 26, 2019 at 11:31 AM unman wrote:
> On Fri, Jul 26, 2019 at 05:57:02AM -0700, brendan wrote:
> > Or, should I just utilize the straightforward approach of adding the
> amount
> > of RAM I wish to use as a RAM disk to the baseline dom0 RAM
> configuration,
> > and then set up the RAM d
Hi,
Does XEN expose any sort of configuration-controlled feature or interface
that would sets aside XEN-owned memory in a way that can be exposed as a
block device within dom0, for use as a RAM disk?
Or, should I just utilize the straightforward approach of adding the amount
of RAM I wish to u
On Thursday, July 25, 2019 at 12:16:00 PM UTC-4, Chris Laprise wrote:
>
> On 7/25/19 11:04 AM, brend...@gmail.com wrote:
> > I was able to install that particular test build on a Thinkpad X230 for
> > testing: https://openqa.qubes-os.org/tests/3021
> >
> > (note: click on assets tab for link
Use xentop -f to show full names.
Those are likely the stub domains used for device handling, etc.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+un
On Thu, Jul 25, 2019 at 12:15 PM Chris Laprise wrote:
> If it doesn't work, then the problem is probably entirely in dom0 and
> Fedora 25. Assuming you already have the testing 4.19 kernel, have you
> thought of upgrading it to the even newer 5.x one as 'latest'? The
> latest kernel is installed
On Thursday, July 25, 2019 at 10:18:29 AM UTC-4, awokd wrote:
>
> > Are there any other Xen-based distros out there I could test?
>
> You can add Xen to your stock Fedora install. That takes it roughly to
> where Qubes begins, but you might want to use the same version of Fedora
> dom0 uses.
>
On Tuesday, July 16, 2019 at 10:35:11 AM UTC-4, unman wrote:
> I really do recommend using qubesctl for almost all system
> configuration. If only because it makes recovery so much easier.
> I see people saying "keep a list of packages you've installed" - if you
> keep state and use salt you can re
On Sunday, July 14, 2019 at 8:04:27 AM UTC-4, unman wrote:
> On Sun, Jul 14, 2019 at 04:34:04AM -0700, bxx...@gmail.com wrote:
> > When I run the above command, the memory column is always set to ???-??? in
> > the output. Am I using the wrong field name?
> No, right name but doesnt output. maxmem
Madmen=maxmem, thank you autocorrect. :/
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send ema
When I run the above command, the memory column is always set to “-“ in the
output. Am I using the wrong field name?
B
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an ema
I’m currently using:
VMs -> sys-mirage-fw-int -> sys-vpn-tasket-> sys-mirage-fw-ext -> sys-net
Benefit of mirage in this situation is that each one consumes only 32MB of RAM.
B
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe fro
I believe this is an upstream torbrowser decision.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group
On my machine I have a sys-usb for only the usb 2.0 controller and a separately
set up sys-usb-3 for the usb 3.0 controller.
I found the I/O performance of using qvm-usb ok for moving small amounts of
data on and off the system. For heavier I/O, I ensure the sys-usb-3 VM is shut
down and connec
On Monday, July 8, 2019 at 3:55:08 PM UTC-4, brend...@gmail.com wrote:
> On Monday, July 8, 2019 at 11:14:41 AM UTC-4, oak...@gmail.com wrote:
> > Easy question, but I'm a noob: What is the path to the usb drive that is
> > connecting through sys-usb? I am trying to get the usb to startup with a
On Monday, July 8, 2019 at 11:14:41 AM UTC-4, oak...@gmail.com wrote:
> Easy question, but I'm a noob: What is the path to the usb drive that is
> connecting through sys-usb? I am trying to get the usb to startup with a
> certain vm. Thanks.
Since the VMs use /dev/xvd[a-d] as the operational
1 - 100 of 209 matches
Mail list logo