>
> It wasn't the boot sequence itself I thought might be unsafe, but the
> process of converting a functioning UEFI Qubes install over to it could
> pretty easily end up with a non-booting system. That could be painful to
> recover from, depending on one's comfort level. Let's call it a
What are (or how do I find on my system in /boot) the internal commands qubes
uses to assemble a raid, open a luks container in the raid and then recognize
and open an lvm? I'm working on recovering my system after a raid disk died,
forcing my raid to fall apart. I was able to reassemble raid,
'awokd' via qubes-users:
Claudia:
So I'm not sure why it would be unsafe. In fact I'm thinking about
manually enabling grub (in UEFI mode) just to ease troubleshooting in
the future should I ever run into any boot issues. Just my take, but I
could be wrong.
It wasn't the boot sequence itself
I don't see that option to set USB 3.0 to legacy mode, I believe all my USB
ports are 3.0
On Wednesday, September 18, 2019 at 1:11:43 PM UTC-5, Lorenzo Lamas wrote:
>
> Some of my USB thumb drives are not detected when trying to boot from
> them, others work fine though.
> Also, one of my
I have followed the instructions
(https://www.qubes-os.org/doc/resize-disk-image/) to down size the private
partition of Linux VM (after typing 4M instead of 4000M in the GUI,
gosh!).
However, now I can start the VM but I cannot start any application within.
"qvm-run personal-email xterm"
Claudia:
> So I'm not sure why it would be unsafe. In fact I'm thinking about
> manually enabling grub (in UEFI mode) just to ease troubleshooting in
> the future should I ever run into any boot issues. Just my take, but I
> could be wrong.
It wasn't the boot sequence itself I thought might be
'awokd' via qubes-users:
dimi:
Could not find a solution how, if even possible to pick which kernel to
boot or/and modify kernel parameters before booting like i am used from
grub by pressing 'e'.
Does UEFI Boot support this or/and how can i safely switch my setup to grub
boot? I would like to
'Andrzej Andrzej' via qubes-users:
> Recently, I created a virtual machine called sys-firewall-raspberrypi-2
> through the graphical wizard of virtual machines, then removed it with the
> qvm-remove sys-firewall-raspberrypi-2 command in the terminal. After
> deleting, there is something like
On 2019-09-18 08:43, unman wrote:
On Wed, Sep 18, 2019 at 02:04:53PM +0200, haaber wrote:
today I had a look in logs of my router, and discovered that it logs my
qubes machine as "sys-net". I did not change anything in my
"out-of-the-box" sys-net, so I presume that the observed behaviour is
brendan.h...@gmail.com:
> What I think you are seeing is this: Linux keeps tracks of discards in the
> current session and won't re-issue discards if it hasn't subsequently
> written to the already-discarded area. Reboot and try again. The first time
> after reboot, it should issue discards to
Some of my USB thumb drives are not detected when trying to boot from them,
others work fine though.
Also, one of my machine doesn't detect a USB thumb when trying to boot from
it in a USB 3.0 port, unless I go to Bios and set the USB 3.0 ports to
Legacy mode.
--
You received this message
> On Wednesday, September 18, 2019 2:14 PM, unman un...@thirdeyesecurity.org
> wrote:
>
> > 2. Cant help you with brave.
> > There's obviously something wrong with your browser/firefox
> > configuration in "untrusted"."x-www-browser: command not found" is
> > obviously wrong.
I
On 9/16/19 8:24 PM, Franz wrote:
On Mon, Sep 16, 2019 at 6:34 PM 'awokd' via qubes-users
mailto:qubes-users@googlegroups.com>> wrote:
'minttu.hopeasuo' via qubes-users:
> Hej...
>
> Any chance to get Q4 to work with this hardware?
> (HP Elitebook 820 G2 i5 / 16GB RAM
On Wednesday, September 18, 2019 2:14 PM, unman
wrote:
> 1. It's a security feature, asking for confirmation.
> If you dont want it -
> Set in /etc/qubes-rpc/policy/qubes.OpenURL:
> whatever $anyvm allow,target=untrusted
>
> This will set untrusted as default handler for
On Tue, Sep 17, 2019 at 11:48:02PM -0700, cxrv...@gmail.com wrote:
> My system doesn't support UEFI Firmware, The USB works fine on Rufus but
> whenever I try to boot from the USB via boot menu it's almost like it
> doesn't even detect my USB since every single boot device I've tried on the
>
On Wed, Sep 18, 2019 at 11:46:20AM +, 'Oli Sturm' via qubes-users wrote:
> Hi,
>
> I'm trying to set up URL handling along the lines
> of??https://micahflee.com/2016/06/qubes-tip-opening-links-in-your-preferred-appvm/??for
> my email vm. However, the qvm-open-in-vm command behaves strangely
dimi:
> Could not find a solution how, if even possible to pick which kernel to
> boot or/and modify kernel parameters before booting like i am used from
> grub by pressing 'e'.
> Does UEFI Boot support this or/and how can i safely switch my setup to grub
> boot? I would like to see what
On Wed, Sep 18, 2019 at 02:04:53PM +0200, haaber wrote:
> today I had a look in logs of my router, and discovered that it logs my
> qubes machine as "sys-net". I did not change anything in my
> "out-of-the-box" sys-net, so I presume that the observed behaviour is
> common to all standard qubes
today I had a look in logs of my router, and discovered that it logs my
qubes machine as "sys-net". I did not change anything in my
"out-of-the-box" sys-net, so I presume that the observed behaviour is
common to all standard qubes installs.
Q: is it a wanted feature that all wireless networks
Hi,
I'm trying to set up URL handling along the lines of
https://micahflee.com/2016/06/qubes-tip-opening-links-in-your-preferred-appvm/
for my email vm. However, the qvm-open-in-vm command behaves strangely in two
different ways.
1. Much less important than (2) but still irritating: I execute
On Tuesday, September 17, 2019 at 6:15:12 PM UTC-4, awokd wrote:
>
> On a side note, anyone know why "sudo fstrim -av" in dom0 now says 0
> bytes trimmed for root? I double-checked and have discard specified
> everywhere it should be. Only thing I don't remember seeing before is
> stripe=64 in
> Looks like you're using UEFI boot instead of grub, so kernel options are
> right next door to the Xen options in xen.cfg- look one line down for
> "kernel=". :) This is where I see rhgb quiet.
> Plymouth.ignore-serial-consoles is new; you might also try removing, but
> it could be there
My system doesn't support UEFI Firmware, The USB works fine on Rufus but
whenever I try to boot from the USB via boot menu it's almost like it
doesn't even detect my USB since every single boot device I've tried on the
boot menu I see that damn Windows logo every time. I already tried making
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2019-09-16 12:34 PM, Private Name wrote:
> One last error Ive bern seeing is no matter the Qube or domain, in
> the settings, under the firewall-rules tab, the same error always
> pops up no matter what I do, which isand which pops up if I simply
Recently, I created a virtual machine called sys-firewall-raspberrypi-2 through
the graphical wizard of virtual machines, then removed it with the qvm-remove
sys-firewall-raspberrypi-2 command in the terminal. After deleting, there is
something like this in the menu despite the fact that the
25 matches
Mail list logo