On Fri, Mar 03, 2017 at 10:38:04PM +, Holger Levsen wrote:
> so I've read qubes-doc.git/configuration/salt.md and wonder, /srv/salt is
> installed by the qubes packages and the document says the Qubes salt API is
> supposed to change between minor release - so where am I supposed to put
> *my*
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Fabrizio Romano Genovese:
> I've built a little toggle script to automatically attach/detach my camera to
> an appvm. For the sake of completeness, I'd like to do the same for the
> internal microphone.
Hi Vít,
On Sat, Mar 04, 2017 at 09:53:31AM -0800, Vít Šesták wrote:
> Holger, restore is already implemented in some basic form. (I havre mentioned
> it here on Mar 1.)
I'm sorry, I was wrong indeed and a bit too sarcastic too. I guess this was
due to your initial mail where there was no
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Duncan:
> Coreboot was configured as follows: SeaBIOS as primary payload [...]
>
> The behavior of trying to boot a stock Qubes install that was installed
> using the installer booted by Coreboot, is that selecting the SSD to
> boot from just seems
Chris Laprise:
> On 03/05/2017 08:11 AM, sm8ax1 wrote:
>>
>> Thanks, I read the custom install page prior to installing, but I was
>> unaware of #2340.
>>
>> To be honest, when I decided I wanted BTRFS, I just sort of assumed that
>> guest disk images were logical volumes to begin with. The custom
On Sun, Mar 5, 2017 at 1:29 PM, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> from above only netcf-libs is required indirectly by xen
> related package. So is it safe to drop all other from above
> w/ rpm -e ?
Yes.
On Mon, Mar 06, 2017 at 08:26:30AM +0100, evo wrote:
>
>
> On 03/06/2017 12:41 AM, Unman wrote:
> > On Sun, Mar 05, 2017 at 10:26:22PM +0100, evo wrote:
> >>
> >>
> >> On 03/05/2017 10:22 PM, Unman wrote:
> >>> On Sun, Mar 05, 2017 at 10:12:15PM +0100, evo wrote:
> oh, thanks... i thought i
On 03/06/2017 02:55 PM, Unman wrote:
>> self._update_libvirt_domain()
>> File "/usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py",
>> line 755, in _update_libvirt_domain
>> raise e
>> libvirt.libvirtError: operation failed: domain 'debian-8-dvm' already
>> exists with uuid
Hello,
I have a UEFI system that I try to install Qubes 3.2 on.
This system only has a single USB port available. So I connected a hub to the
system and the USB disk is connected behind this Hub.
The installation starts but the usb disk is not recognized so the installation
fails because of
On Mon, Mar 06, 2017 at 09:41:56AM +0100, haaber wrote:
> On 03/06/2017 12:49 AM, Unman wrote:
> > On Sat, Mar 04, 2017 at 04:18:56AM +0100, haaber wrote:
> >> Hello,
> >>
> >> I want to base my disp-vm's on debian-8. So I run in dom0
> >>
> >>> [me@dom0 dvmdata]$ sudo qvm-create-default-dvm
Hi Rusty,
This workaround does indeed work. Thanks for your help!
D
Rusty Bird:
> Duncan:
>> Coreboot was configured as follows: SeaBIOS as primary payload [...]
>
>> The behavior of trying to boot a stock Qubes install that was installed
>> using the installer booted by Coreboot, is that
On Sun, Mar 5, 2017 at 11:39 PM, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2017-03-05 17:56, Franz wrote:
> > On Sun, Mar 5, 2017 at 10:39 PM, Andrew David Wong
> > wrote:
> >
> >> On 2017-03-05 14:18, Franz wrote:
Hi!
i read some posts about this and as i understood, it is not possible to
use optimus mode with nvidia and intel card on Qubes OS, is it right?
The thing with Bumblebee and bbswitch, which i don't fully understand,
seems not to work, or do somebody have some new tricks?
--
You received this
Well, you probably can use Optimus with QubesOS, except it is pretty useless,
because QubesOS renders everything in AppVMs on CPU. GPU is used:
a. In dom0, where integrated GPU is usually enough.
b. In HVMs if you use GPU passthrough. Note that you cannot start multiple VMs
with the same VM
Hi Holger,
I am generally OK with this level of sarcasm.
> But if you don't regularily test what you backup and test that you can
> actually restore, your backup is rather worthless. You don't want to find out
> your restore is broken, once your regular install is gone…
Sure. I remember
Hello,
I read the Installation page but there's not much to it so assumed that it
would be like a Linux desktop installation so I went into Disk management in
Windows 10 and created a new 200gb partition with the intention of testing it
out by way of dual booting.
There is just the one HDD in
I don't know the “auto” option, but it probably behaves the same as with Fedora.
Just a quick guess: Your Windows partition is still present on your HDD, but
you cannot boot Windows (see below why). I don't believe the installer to be so
stupid to replace existing partitions.
For security
On Mon, Mar 06, 2017 at 03:49:30PM +0100, Bernhard wrote:
>> On 03/06/2017 02:55 PM, Unman wrote:
self._update_libvirt_domain()
File "/usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py",
line 755, in _update_libvirt_domain
raise e
Thanks Rusty Bird, you made my day!
Cheers,
Fab
On Mon, Mar 6, 2017 at 1:15 PM, Rusty Bird
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Fabrizio Romano Genovese:
> > I've built a little toggle script to automatically attach/detach my
> camera to an
On Mon, Mar 6, 2017 at 1:02 AM, wrote:
> Hello,
>
> I'm looking at getting a new laptop in the next few months. I will, of
> course, run Qubes on this thing but since Qubes 4 is on the horizon I'm
> wondering how easy/difficult it will be to upgrade once it's out. Has
>
On Mon, Mar 06, 2017 at 03:49:30PM +0100, Bernhard wrote:
> On 03/06/2017 02:55 PM, Unman wrote:
> >> self._update_libvirt_domain()
> >> File "/usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py",
> >> line 755, in _update_libvirt_domain
> >> raise e
> >> libvirt.libvirtError:
On 03/06/2017 03:05 PM, Unman wrote:
> On Mon, Mar 06, 2017 at 08:26:30AM +0100, evo wrote:
>>
>>
>> On 03/06/2017 12:41 AM, Unman wrote:
>>> On Sun, Mar 05, 2017 at 10:26:22PM +0100, evo wrote:
On 03/05/2017 10:22 PM, Unman wrote:
> On Sun, Mar 05, 2017 at 10:12:15PM +0100,
I've been using i3 in dom0 for about a month now, and I wanted to share a few
tips and tricks (partly so I can have them in a centralized place for
reference):
1. To lock the screen on suspend and resume, you need to add a systemd target
in /etc/systemd/system. This has to use your username
On Sun, Mar 05, 2017 at 05:35:03PM -0800, Andrew David Wong wrote:
> Filed a bug report:
>
> https://github.com/QubesOS/qubes-issues/issues/2674
>
> Antoine, you didn't mention which version of Qubes or Debian you're
> using, so I assumed Qubes 3.2 and the Debian 8 TemplateVM.
In fact, I am
On Monday, March 6, 2017 at 7:07:18 PM UTC, Vít Šesták wrote:
> I don't know the “auto” option, but it probably behaves the same as with
> Fedora.
>
> Just a quick guess: Your Windows partition is still present on your HDD, but
> you cannot boot Windows (see below why). I don't believe the
On 03/06/2017 09:16 PM, Ted Brenner wrote:
Thanks for the details Ed. Did you have to start over from scratch or
were you able to remove QWT and then install the older version?
On Fri, Mar 3, 2017 at 8:46 PM, Ed Welch > wrote:
I figured out
Daniel Moerner:
> I've been using i3 in dom0 for about a month now, and I wanted to share a few
> tips and tricks (partly so I can have them in a centralized place for
> reference):
>
> 1. To lock the screen on suspend and resume, you need to add a systemd target
> in /etc/systemd/system. This
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-06 14:22, Antoine wrote:
> On Sun, Mar 05, 2017 at 05:35:03PM -0800, Andrew David Wong wrote:
>> Filed a bug report:
>>
>> https://github.com/QubesOS/qubes-issues/issues/2674
>>
>> Antoine, you didn't mention which version of Qubes or
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-06 06:40, Oleg Artemiev wrote:
> On Sun, Mar 5, 2017 at 1:29 PM, Andrew David Wong
> wrote:
>> from above only netcf-libs is required indirectly by xen
>> related package. So is it safe to drop all other from
Thanks for the details Ed. Did you have to start over from scratch or were
you able to remove QWT and then install the older version?
On Fri, Mar 3, 2017 at 8:46 PM, Ed Welch wrote:
> I figured out how to install an older version of qubes-windows-tools
> sudo dnf remove
On 03/05/2017 10:13 PM, andres...@gmail.com wrote:
> Hi!
>
> I saw in the repository some files about an Arch Linux Minimal template:
> https://github.com/QubesOS/qubes-builder-archlinux/blob/master/scripts/packages_minimal.list
>
> How should we install it? Must we build it?
Yes it must be
> Oiivier,
>
> Its great pacman is now supported for updating. When I was working with
> others to update the build and doc to work with newer archlinux versions I
> tried most everything asking many on the archlinux forum for help. No one
> could offer a good solution that did not break
On 03/06/2017 12:49 AM, Unman wrote:
> On Sat, Mar 04, 2017 at 04:18:56AM +0100, haaber wrote:
>> Hello,
>>
>> I want to base my disp-vm's on debian-8. So I run in dom0
>>
>>> [me@dom0 dvmdata]$ sudo qvm-create-default-dvm debian-8
>>> A VM with the name 'debian-8-dvm' does not exist in the
Em domingo, 5 de março de 2017 16:56:27 UTC-3, cooloutac escreveu:
> On Sunday, March 5, 2017 at 1:47:46 PM UTC-5, Amilton Justino wrote:
> > Hello all,
> >
> > I am not able to put ssh-agent and ssh-add to work automatically in an
> > AppVM with fedora 23.
> > Manually running every login works
34 matches
Mail list logo