Ray Joseph:
> I opened sys-usb settings and found the controller listed in the settings
> pane (on the right). The control button/bar at the bottom entitled
> "Configure strict reset for PCI devices". I clicked on the controller in
> the ‘selected’ window, then clicked the strict reset
On Saturday, December 14, 2019 at 12:29:03 PM UTC-6, awokd wrote:
>
> r...@aarden.me :
>
> > It has taken four years to get to here. I have tried this with Debian
> and
> > Qube OS. I could not get Xen on Debian to work due to my wireless only
> > networking of my laptop. With Qubes, it has
r...@aarden.me:
> It has taken four years to get to here. I have tried this with Debian and
> Qube OS. I could not get Xen on Debian to work due to my wireless only
> networking of my laptop. With Qubes, it has been getting wireless and USB
> to both work. This time, wireless worked maybe.
>
> These are notes on the solution path used. rc2 was tried one day, rc3 the
> next.
20191212
Qubes OS R4.02-rc2-86_64
I would like to have network connection and USB support. On installation
to a Toshiba laptop and booting up the first time, I was able to use a USB
mouse and selected
Ray Joseph:
I very much appreciate all the input. The keyboard is a PS/2. I am in
question. We are talking about creating a new AppVM for usb. Is this any
different than running:
qubesctl state.sls qvm.sys-usb
Only other thing that does is add rd.qubes.hide_all_usb to your Linux
boot
I very much appreciate all the input. The keyboard is a PS/2. I am in
question. We are talking about creating a new AppVM for usb. Is this any
different than running:
qubesctl state.sls qvm.sys-usb
After entering the above command for usb, the output addressed sys-net:
Comment: The
unman:
Not quite as simple as that.
sys-usb is created with label red, mem 300, and virt-mode hvm.
Also autostart is True, and pci_strictreset is false.
You also need to disable memory balancing. However, only that and HVM
mode are required in the VM config to support a sys-usb, and both are
On Thu, May 02, 2019 at 11:40:48PM +, 'awokd' via qubes-users wrote:
> Ray Joseph wrote on 4/28/19 5:21 AM:
> >
> > jrsm,
> >
> > Thank you, that was a lot of info. This took me to here:
> > https://www.qubes-os.org/doc/usb-qubes/
> >
> > From which as root, I executed:
> > qubesctl
Ray Joseph wrote on 4/28/19 5:21 AM:
jrsm,
Thank you, that was a lot of info. This took me to here:
https://www.qubes-os.org/doc/usb-qubes/
From which as root, I executed:
qubesctl state.sls qvm.sys-usb
4 succeeded and 1 failed.
In sequence:
ID: hide-usb-from-dom0-legacy
Function:
Ray Joseph wrote on 4/28/19 5:21 AM:
jrsm,
Thank you, that was a lot of info. This took me to here:
https://www.qubes-os.org/doc/usb-qubes/
From which as root, I executed:
qubesctl state.sls qvm.sys-usb
4 succeeded and 1 failed.
In sequence:
ID: hide-usb-from-dom0-legacy
Function:
jrsm,
Thank you, that was a lot of info. This took me to here:
https://www.qubes-os.org/doc/usb-qubes/
>From which as root, I executed:
qubesctl state.sls qvm.sys-usb
4 succeeded and 1 failed.
In sequence:
ID: hide-usb-from-dom0-legacy
Function: file.append
Name: /etc/default/grub
... This
11 matches
Mail list logo