Re: [qubes-users] Qubes OS 4.1-rc2 has been released!
On 11/17/21 3:22 AM, taran1s wrote: Andrew David Wong: Dear Qubes Community, We're pleased to announce the second release candidate for Qubes 4.1! [...] Is there any HCL list for Qubes 4.1? [...] Yes, simply go here and click on the "Qubes" column header to sort by Qubes release: https://www.qubes-os.org/hcl/ -- Andrew David Wong Community Manager The Qubes OS Project https://www.qubes-os.org -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/dafa0050-1d99-d154-cbef-55cf4d992047%40qubes-os.org.
Re: [qubes-users] null pointer reference in kernel-latest in QubesOS 4.0
Hi, Thanks for taking the time to have a look at my problem. On Thu, Nov 18, 2021 at 07:00:58PM +0900, Jin-oh Kang wrote: > libvirtd tried to assign the USB controller to a VM, and the USB controller > was already attached to the driver (xhci-pci) in dom0. The bug was > triggered while the driver was detaching itself. Interesting. I've not changed my setup and I'm currently writing this while running the same configuration with dom0 5.4.143-1.fc25.qubes.x86_64 So I think this bug is new. It was reproducable though. I've tried booting the 5.13.6-1.fc25.qubes.x86_64 from kernel-latest at least five times in a row to make sure it is no race condition. > Try one of the following: > > - Temporarily detach the USB controller from the VM. > - Blacklist the xhci-pci driver in dom0. (create a .conf file with line > "blacklist xhci-pci" in /etc/modprobe.d) I'm using an external keyboard, which is attached to my laptop through one of it's USB controllers. Because I've usually mounted the laptop on a stand, I don't want to be forced to use the internal keyboard to enter the LUKS passphrase. I will try blacklisting the xhci-pci as you suggested above and report later, whether this made a difference. Best regards, Peter Funk -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2028122123.GA13687%40artcom0-ac50365.artcom-gmbh.de.
Re: [qubes-users] null pointer reference in kernel-latest in QubesOS 4.0
libvirtd tried to assign the USB controller to a VM, and the USB controller was already attached to the driver (xhci-pci) in dom0. The bug was triggered while the driver was detaching itself. Try one of the following: - Temporarily detach the USB controller from the VM. - Blacklist the xhci-pci driver in dom0. (create a .conf file with line "blacklist xhci-pci" in /etc/modprobe.d) On Thu, Nov 18, 2021, 7:57 AM Peter Funk wrote: > In a QubesOS 4.0 dom0 terminal I've tried the command:: > >sudo qubes-dom0-update kernel-latest > > and discovered afterwards my Laptop reboots due to a kernel null > pointer reference during boot when I try this kernel. > The stable kernel works fine though. > > I've tried to make a photo of the error message (see attached > .jpg file). Has anyone tried to boot the kernel from package kernel-latest? > > Best regards, Peter Funk > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/2027225732.GA27178%40artcom0-ac50365.artcom-gmbh.de > . > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAMnQwqW3_N2YNzCzm8fVG2zrrKYfKyc_OHjdOJ49vpZfkDtBxw%40mail.gmail.com.