[:f0:1f.0] fault index 7986, iommu reg
= 82c0009f4000
Not sure how to upload the entire logs on google groups browser version?
On Friday, July 19, 2019 at 8:48:09 PM UTC, awokd wrote:
>
> Frozentime345:
> > After the latest update during boot it is showing messages like VT-D and
After the latest update during boot it is showing messages like VT-D and
others are not enabled. I tried to access this information using "sudo
journalctl -b" but found nothing.
Is there are any boot log that I can access to read and diagnose these
issues?
Also, does anyone know why these
Sometimes when I boot up the system freezes in the middle of typing my
encryption password and shuts down. Happens rarely.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
On Wednesday, June 19, 2019 at 10:55:13 PM UTC, awokd wrote:
> Frozentime345:
> > Does restoring automatically verify integrity? Or are we suppose to run
> > an integrity check before restoring?
> >
> Yes, restore uses the password you enter as both an encryption and
Does restoring automatically verify integrity? Or are we suppose to run
an integrity check before restoring?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
Okay thanks, should I post this in issues as a feature request?
On 4/21/19 4:06 PM, Zrubi wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 4/21/19 9:13 PM, Frozentime345 wrote:
Wondering how to log packets blocked and accepted by qubes firewall
for specific vm or all vms if thats
Wondering how to log packets blocked and accepted by qubes firewall for
specific vm or all vms if thats the only option? Couldn't find anything
in website or google or qvm-firewall
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
I like when it automatically gives focus to new windows most of the
time, but when Im entering passwords it's sometimes a pain. Any way to
off the feature for just one workspace?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
Is there any way to decrypt the hard drive using a shell and then boot
like that? Or otherwise modify the boot to accept a key-file(on a flash
drive) instead of a pass-phrase?
Ctrl+alt+f2 or any other combo doesn't seem to open a shell, is there
any way?
--
You received this message because
I was trying to follow the custom install guide to do this but keep
failing at "setting up installation environment". Preferably I would
want to use just the key and not have any pass phrase.
I learned that you can change the encryption key in dm-crypt so maybe
the easier method is to install
Along the lines of what I read in the anti-evil maid blog it would be
nice if you could have an image with the google 3M privacy filter behind
a pin available on the lock screen to verify this is your device. I
understand the anti evil maid test checks for all sorts of hardware
manipulation
Just a minor convenient feature would be to blacklist certain dom0 rpm
upgrades, the kernel updates keep breaking my Ethernet so I'm avoiding
them. I'm manually applying the other updates but dom0 is still saying
"has updates" so I also have to manually check whether new updates are
available.
On Tuesday, October 16, 2018 at 5:46:13 PM UTC, Frozentime345 wrote:
> System: Fedora 27/Debian 9 Templates, R3.2->upgrading to 4.0 soon
>
> I looked through rpc policy but I couldn't find anything like this, is there
> a way to only allow certain block devices for certain appvms?
System: Fedora 27/Debian 9 Templates, R3.2->upgrading to 4.0 soon
I looked through rpc policy but I couldn't find anything like this, is there
a way to only allow certain block devices for certain appvms? Doesn't
even have to be a secure feature just something to prevent user error,
but it has
I'm interested in drawing out characters as a method of invisibleish
input on either a touchpad or touchscreen since I want to bring my qubes
device anywhere. I couldn't find any mention of this in a fedora google
search or a qubes search nor in qubes settings. I doubt it exists but I
just
15 matches
Mail list logo