Re: [qubes-users] Help with "Missing Features HAP/SLAT/EPT/RVI, Interrupt Remapping"

2020-06-08 Thread 'Chris Jones' via qubes-users

On 09/06/2020 13:25, sysad.andes wrote:


 Original message From: 'Chris Jones' via qubes-users  Date: 6/8/20  22:16  (GMT-05:00) To: qubes-users@googlegroups.com Subject: 
[qubes-users] Help with "Missing Features HAP/SLAT/EPT/RVI, Interrupt Remapping" Hi all,New user here, trying and failing to install Qubes R4.0.3 on a new Dell Precision 
3630 Tower with Xeon E-2288G cpu.I verfied the ISO and wrote it to a USB stick with dd.If I set the BIOS to boot from the USB stick in UEFI mode then I get dump of registers and 
stack trace and it says "Panic on CPU 0: FATAL PAGE FAULT"If I set the BIOS to boot in Legacy External Devices mode, and boot from the USB stick, the Qubes installer menu 
comes up. If I select "Install Qubes R4.0.3" then I am offered the chance to select a language, after which an error window pops up: "Unsupported Hardware 
Detected"... "Missing Features: HAP/SLAT/EPT/RVI, Interrupt Remapping"In the BIOS settings I had already ticked "Enable Intel Virtualization Technology" and 
also "Enable VT for Direct I/O". It also does not seem to make any difference whether I tick "Trusted Execution" in the BIOS.I guess there is a possibility that 
there is a bug in the BIOS, I have R2.3.1 installed.Does anyone have any ideas?Thanks in advance,Chris>>Double check that any reference to any other virtualization technology 
is enabled in BIOS, specifically EPT/SLAT, ie extended paging tables, your processor seems to support this, but it sounds like the installation candidate isn't detecting the 
availability of the technology.-- You received this message because you are subscribed to the Google Groups "qubes-users" group.To unsubscribe from this group and stop 
receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.to view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/00ce4587-c920-040b-7d69-8da2fb9d5e4c%40yahoo.com.



Thank you very much for replying.

I can't see any other virtualization options in the BIOS that I could 
turn on. I think I must have tried just about everything there.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed6a71f4-c95f-d88a-b625-c51504dd91de%40yahoo.com.


RE: [qubes-users] Help with "Missing Features HAP/SLAT/EPT/RVI, Interrupt Remapping"

2020-06-08 Thread sysad.andes

 Original message From: 'Chris Jones' via qubes-users 
 Date: 6/8/20  22:16  (GMT-05:00) To: 
qubes-users@googlegroups.com Subject: [qubes-users] Help with "Missing Features 
HAP/SLAT/EPT/RVI, Interrupt Remapping" Hi all,New user here, trying and failing 
to install Qubes R4.0.3 on a new Dell Precision 3630 Tower with Xeon E-2288G 
cpu.I verfied the ISO and wrote it to a USB stick with dd.If I set the BIOS to 
boot from the USB stick in UEFI mode then I get dump of registers and stack 
trace and it says "Panic on CPU 0: FATAL PAGE FAULT"If I set the BIOS to boot 
in Legacy External Devices mode, and boot from the USB stick, the Qubes 
installer menu comes up. If I select "Install Qubes R4.0.3" then I am offered 
the chance to select a language, after which an error window pops up: 
"Unsupported Hardware Detected"... "Missing Features: HAP/SLAT/EPT/RVI, 
Interrupt Remapping"In the BIOS settings I had already ticked "Enable Intel 
Virtualization Technology" and also "Enable VT for Direct I/O". It also does 
not seem to make any difference whether I tick "Trusted Execution" in the 
BIOS.I guess there is a possibility that there is a bug in the BIOS, I have 
R2.3.1 installed.Does anyone have any ideas?Thanks in advance,Chris>>Double 
check that any reference to any other virtualization technology is enabled in 
BIOS, specifically EPT/SLAT, ie extended paging tables, your processor seems to 
support this, but it sounds like the installation candidate isn't detecting the 
availability of the technology.-- You received this message because you are 
subscribed to the Google Groups "qubes-users" group.To unsubscribe from this 
group and stop receiving emails from it, send an email to 
qubes-users+unsubscr...@googlegroups.com.to view this discussion on the web 
visit 
https://groups.google.com/d/msgid/qubes-users/00ce4587-c920-040b-7d69-8da2fb9d5e4c%40yahoo.com.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5edf0144.1c69fb81.5d2e8.10cb%40mx.google.com.


[qubes-users] Fedora template upgrades: recreating DispVM Template vs 'rebasing'

2020-06-08 Thread mvermaes
Hello there.

When upgrading a Qubes 4 system to a new Fedora template, what are the 
differences between regenerating the DisposableVM Template from the new 
template using step 3 from [1]:

[user@dom0 ~]$ qvm-create -l red -t new-template new-template-dvm
[user@dom0 ~]$ qvm-prefs new-template-dvm template_for_dispvms True
[user@dom0 ~]$ qvm-features new-template-dvm appmenus-dispvm 1 
[user@dom0 ~]$ qubes-prefs default-dispvm new-template-dvm

and changing the base template of the existing DisposableVM Template, 
either with Qubes Manager or:

qvm-prefs  template 

?

I've run the four steps above to regenerate the DispVM Template during 
previous upgrades, but swapping out the base template also seems to work.

I thought the reason the additional steps were recommended in the docs 
might be to encourage periodically cleaning out/resetting unneeded 
software/data from the DispVM Template. But that seems like a good practice 
for AppVMs as well. I only have some light customization of Firefox and a 
few other applications in the DispVM Template, so I'm wondering if just 
changing the base template is appropriate for me.

Thanks!

[1] https://www.qubes-os.org/doc/templates/#switching

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c8d958f1-9c7d-4e2f-86a1-7b1f87be8101o%40googlegroups.com.


[qubes-users] Help with "Missing Features HAP/SLAT/EPT/RVI, Interrupt Remapping"

2020-06-08 Thread 'Chris Jones' via qubes-users

Hi all,

New user here, trying and failing to install Qubes R4.0.3 on a new Dell 
Precision 3630 Tower with Xeon E-2288G cpu.


I verfied the ISO and wrote it to a USB stick with dd.

If I set the BIOS to boot from the USB stick in UEFI mode then I get 
dump of registers and stack trace and it says "Panic on CPU 0: FATAL 
PAGE FAULT"


If I set the BIOS to boot in Legacy External Devices mode, and boot from 
the USB stick, the Qubes installer menu comes up. If I select "Install 
Qubes R4.0.3" then I am offered the chance to select a language, after 
which an error window pops up: "Unsupported Hardware Detected"... 
"Missing Features: HAP/SLAT/EPT/RVI, Interrupt Remapping"


In the BIOS settings I had already ticked "Enable Intel Virtualization 
Technology" and also "Enable VT for Direct I/O". It also does not seem 
to make any difference whether I tick "Trusted Execution" in the BIOS.


I guess there is a possibility that there is a bug in the BIOS, I have 
R2.3.1 installed.


Does anyone have any ideas?

Thanks in advance,
Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/00ce4587-c920-040b-7d69-8da2fb9d5e4c%40yahoo.com.


[qubes-users] HCL - Dell Inc. Inspiron 3520

2020-06-08 Thread 'K' via qubes-users
All works really well, since r3.2 . Processor was upgraded to i7-2460M , not 
sure what the device originally shipped with.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3dUTMB3B9ydTLKH-tfI3MbPb7d9kzt3FfOfaF7GOmQ_khH0K_HJtuH0Fru53q9RjfW_aVkbnUGeMRNcRpU4-hjHEZE8sCgAwSocMqkfm_GU%3D%40protonmail.com.


[qubes-users] Re: Domain XXX has failed to start: volume qubes/BBB missing

2020-06-08 Thread Jules Diez
Oh and i forgot but i tried lvremove or other simple command but all failed 
with message

> Failed to ... because qubes/poolhd0 not accessible. Manual repair required 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/75195d17-de73-4a98-84a7-68d7490a4e2fo%40googlegroups.com.


[qubes-users] Does qubes protect against all firmware viruses ?

2020-06-08 Thread tomas . schutz707
I understand, that Qubes compartmentalizes OS and parts of OS don't have 
access to other parts of the OS. So even if you had virus in your firmware 
of a network card, it wouldn't matter. I know firmware viruses are rare, 
but still better safe than sorry. I am looking for safe OS to do online 
banking from. If i use live usb of QUBES, does that protect me against all 
firmware viruses ? I wonder. Even there is like 0.2% chance of being 
infected with it. Also i can't disable all my disks in BIOS, could that be 
problem ? I mean if i use live-usb and don't boot my main OS, when usb is 
plugged in. So my main OS can't compromise Qubes. And even if disks were 
enabled and i boot up Qubes from live usb, i am not sure if it could get 
infected, because these viruses has to be loaded somehow right ? But if 
they are passively on the disk and you launch 2nd OS from live-usb, not 
sure if it could get infected like this. I wanted to dedicate my old pc for 
online banking, but Qubes doesn't work there.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/269515e3-2863-4da4-8a17-c9b470df2166o%40googlegroups.com.


Re: [qubes-users] Re: Replacing SSD with larger SSD on Qubes System

2020-06-08 Thread Verifiable List
I figured out that I could restore as long as I allowed Qubes to set up 
sys-net, sys-firewall, etc. I wish there was an option during install 
for "restore Qubes from backup"... so you didn't need to create VMs 
you'd just need to delete later.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/db71674fee70370b84e9aa446bdedf5b%4086.is.


[qubes-users] How to set firewall rules for disp vms?

2020-06-08 Thread galthopimap
I need some help setting firewall rules for disp vms.

In my house I have:

router  192.168.0.1 
printer 192.168.0.123

and everything else is 192.168.0.X

For most of my app vms I want them to see the internet, printer and router 
but not any other device  so I apply these rules:

qvm-firewall email add action=accept 192.168.0.123/32
qvm-firewall email add action=accept 192.168.0.1/32
qvm-firewall email add action=drop 192.168.0.0/24
qvm-firewall email add action=accept 0.0.0.0/0

This works fine but when I open a document in a disp vm, the disp vm has 
access to everything. How can I apply the rules above to disp VMs?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8151cb2c-171a-4d74-85af-4282b6e8e5feo%40googlegroups.com.