Re: [qubes-users] AEM boot option causes hard reboot/partial shutdown (Lenovo T450s)

2016-05-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-05-29 16:34, Marek Marczykowski-Górecki wrote:
> On Fri, May 27, 2016 at 03:27:50AM -0700, Andrew David Wong wrote:
>> On 2016-05-19 02:34, Frank Schäckermann wrote:
>>> There should be a bootable BIOS-Updater-Image that can be
>>> burned to a CD and booted on the TP to get the BIOS updated. At
>>> least there was one for my Lenovo W530 a couple of weeks ago.
>>> Practically hassle free - not counting getting the CD burned on
>>> Qubes OS. ;-) But than again... the T450 mileage may vary...
> 
>> Thanks, Frank. Unfortunately, even after successfully updating
>> the BIOS to the latest version, AEM is still not working (fails
>> the same way as before). I really thought updating the BIOS would
>> fix it, since there's a TPM-related fix in the BIOS patch notes.
> 
>> Marek, I noticed that the version of tboot being used is somewhat
>> old (July 2014). Would upgrading tboot itself break compatibility
>> with AEM? If so, are there any plans to upgrade AEM to be
>> compatible with a newer version of tboot?
> 
> I think newer tboot shouldn't break anything. The only reason for
> this particular version (1.8.2) is a package in Fedora. And I see
> even in Fedora 23 (planned as dom0 for Qubes 3.2), it's still at
> 1.8.2.
> 

Would it be as simple as "qubes-dom0-update tboot" or more complicated?

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=l84H
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c9a8c6bf-cb9a-8b93-33e9-fdafa0066a1f%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Some thoughts about improvements in backup ui

2016-05-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-05-29 14:19, Arqwer wrote:
> R3.0 1. After I open backup dialog, qubes manager fades out. It is
>  uncomfortable: I might want to use it. For example, I selected
> which VMs i'm going to backup, and realized, that my external drive
> is not connected now. I want to use qubes manager to attach
> external drive, but it is unavailable. Or I want to shut down some
> VMs, or start VM to send backup there.
> 
> 2. Backup process does not block me from turning on VM that is now
> in backup process. That makes no sense. If VM should be turned off
> during backup, I should not be able to turn it on. At least without
> --force flags.
> 

Thanks for the feedback! I've added your comment to the issue that is
tracking the current Qubes Manager revamp:

https://github.com/QubesOS/qubes-issues/issues/1870#issuecomment-
222416613

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=krn9
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8225ccc5-e7da-b5e5-810d-a4da2241d485%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] btrfs vs lvm?

2016-05-29 Thread Franz
On Sun, May 29, 2016 at 8:27 PM, Chris Laprise 
wrote:

>
>
> On 05/29/2016 03:36 PM, Niels Kobschaetzki wrote:
>
>> Hi,
>>
>> is it just me or is in the documentation no explanation why one should
>> use over the other? I also couldn't really find anything in the
>> ML-archive.
>>
>> Why should I use btrfs or lvm with QubesOS? I have in my head somewhere
>> looming with real problems when there is not a lot of space available,
>> up to a system that is not bootable anymore. Do the tools provided by
>> Qubes use features of btrfs like snapshoting or what else it has up its
>> sleeves? What problems might arise when one uses btrfs? Is it really
>> stable enough nowadays?
>>
>> Niels
>>
>>
> Hi Niels,
>
> There is one case where I would use lvm over btrfs at this point: RAID
> configurations. I think they were still trying to get the bugs out of btrfs
> RAID as recently as last year.
>
> Otherwise, btrfs has been great with Qubes and I highly recommend it on a
> normal PC or laptop. Its been very stable for me and is now faster[1] and
> more versatile than other options. For instance, if I want to experiment
> with a number of different templates or appvms, Qubes will reflink the disk
> images instead of duplicating them. The reflinked copies occur instantly,
> and only use extra disk blocks when changes are made to the original or the
> copies. AFAIK, this capability is unique to btrfs and requires only a
> simple 'cp --reflink' which Qubes does automatically in the case of vm
> images.
>
> Btrfs also has differential send/receive backup and restore. Qubes backup
> doesn't take advantage of this yet, but its still something you can
> configure yourself.
>
> I haven't had any issues with disk space, though I generally keep more
> than 20GB free.
>
> Chris
>
> 1. https://www.diva-portal.org/smash/get/diva2:822493/FULLTEXT01.pdf
>
>
Very interesting post! Thanks Chris



> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/574B7AE3.6020006%40openmailbox.org
> .
>
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qC72Tx9q0LrKu9zt1b8H-mz0NdaH%3Db9brCwYQJjXCnU1g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: can't build stretch

2016-05-29 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, May 30, 2016 at 12:59:49AM +0200, tom.tomson wrote:
> it seems commit 2232f46 broke something.
> what i tried now:
> * in file Makefile replace the line
> get-sources-sort = $(filter $(BUILDER_PLUGINS), $(COMPONENTS)) $(filter-out
> $(BUILDER_PLUGINS), $(COMPONENTS_NO_BUILDER))
> with
> get-sources-sort = $(BUILDER_PLUGINS) $(filter-out $(BUILDER_PLUGINS),
> $(COMPONENTS_NO_BUILDER))
> this basically reverts commit 2232f46
> (i guess the sources for debian builder were not downloaded).

Should be fixed now. Previous fix worked only for full build, not
template only... You'll need to incorporate changes from
example-configs/template.conf into builder.conf. Or regenerate it again.

> * execute 'make get-sources' again
> * execute 'make qubes-vm'
> * get the error from
> https://groups.google.com/forum/#!searchin/qubes-users/stretch/qubes-users/FKCFjel98rQ/l2c7AfrJJwAJ
> and fix it as described there
> * execute 'make qubes-vm'
> i got an error from something with salt (strange, because i did not select
> anything with salt)
> (see log mgmt-salt-vm-stretch.log)
> * in qubes-src: "rm -rf mgmt-salt*"
> * execute 'make qubes-vm' again. this time it worked!
> * execute "make template"
> got errors again.
> something about "chroot: cannot change root directory to
> 'debconf-set-selections': No such file or directory"

Apparently I've forgot to push recent builder-debian changes. Done now.
Retry with `make get-sources`.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXS3zDAAoJENuP0xzK19csgI0H/R91enObsRD+nN+tBvD9WAc1
gGJ/CKzFurLVacXji+UrN7ZEiAWZCrENPMDxG9iLiKxdzFajHwEHs5373u/eeGvx
9tRXJLOpm9HImpWxcP98MgbJp2ObCKkfXuYxZimqT2edanY9mgR4GjfzyfDHLchc
6XB0lB9hOrIx094hwQCEvk2SWB3ZTYUxylVuAt1G7uMKi2EQr7PJgsoNJxxuE4N2
4442cVRHqvi4j5lfHX0VERcB8wBX6vvcsT/6muFNEQeQhUplg2D/q7LHWjMD4OIC
5XyiRR2KrCTiODUA0cKrtU4p5kGMBl728DPAvDvjBbok4evBdm4yBRXRIn/LF88=
=LCNF
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160529233531.GE2191%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: HCL - Lenovo ThinkPad T460s (20F9CTO1WW)

2016-05-29 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, May 26, 2016 at 08:25:48PM -0700, patientz...@terminalmoronicy.com 
wrote:
> I also have a t460s and encountered many of the problems above.  I updated 
> the qubes patches (excluding pvusb) to apply against kernel v4.5.2 and tossed 
> in an out-of-tree patch for Skylake.  Bumping to 4.5.5 didn't require any 
> further patch-wrangling (except that the Skylake patch had been merged in the 
> meantime).

Was that patch backported also to 4.4.11?

> I've been running the result for a few days and everything seems to be 
> working well.
> 
> https://github.com/patientnil/qubes-linux-kernel/tree/devel-4.5
> 
> Notes:
> 
> - The pvusb patch looks the trickiest to port, and the associated tools show 
> that scary experimental warning. I didn't pursue it, it's sitting there 
> commented out.

Yes, ignore it. In fact it is already commented out in series.conf file
for some time.

> - Sound, trackpoint buttons, wifi, suspend all work (though I haven't tried 
> reenabling TPM yet).  
> 
> - I get occasional screen artifacting (horizontal lines) but I am using the 
> qubes-R3.1 display packages - before a reinstall I had better luck with 
> updates in the unstable repo.

Are those artifacts across the whole screen, or only particular windows?

> - While updating the kernel config, I had some sort of snafu, and I later had 
> to go reenable a bunch of fundamental things like IP_MASQ.  The config should 
> be reexamined (I'm planning to pare it down to just the things I need).  If 
> this was to be merged to the main tree it should be redone.  Presumably there 
> are rules of some sort as to what to include?

Generally the rule is "enable all drivers are modules".

> - I'm not sending a pull request since Marek mentioned the preference for 
> longterm kernels - but perhaps the updated can be useful anyway if the next 
> target is similar enough to 4.5?  
> 
> - If there's interest I could post RPMs and could possibly update this 
> occasionally to keep up with 4.5 (which seems to be the sweet spot for 
> Skylake right now)
> 
> -tom
> 


- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXS3yPAAoJENuP0xzK19cs388H/jpa1S1hCKYp965Srdij+1OC
dPNBWL6jRr7zWlel38vyCaAbhB1/TN8C7NCkthz6B423hsN2+GE1PD/lK3bQe+ia
Xif7tzWQwNAhc7KOi8DNyftWUPdc4NZ1AhcT8+Cav5abACJhkzwS6uYI9RNDWiSG
o6+CP5K6aNAuOpruLjKbJImT/qr7pKu8R9Ry4uPeJTCC+tbhLANgwRODTEWzJPEa
jDZlJfUivjXDGKNumwoA2pdSghGX9aJJN3x+bfjxKatJs1NAmDOHUTastlAqIzUF
a1CMqI2jZflK4WTQ1A2oEXzel+dT+a0hmrjcOQIlOijrYdmEp2pDmveCF8DK/xg=
=96Y/
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160529233439.GC2191%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: HP EliteBook 8460p not cooperating update.

2016-05-29 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, May 24, 2016 at 06:00:51PM -0700, Gaiko wrote:
> On Saturday, May 21, 2016 at 11:47:33 AM UTC+11, Gaiko wrote:
> > Hi I responded to the HP EliteBook 8460p results/report 
> > (https://groups.google.com/forum/#!msg/qubes-users/xVMe56e4BXQ/lJVUTqC1a2oJ)
> >  about issues I was having with trying to install 3.1 on my 8460p. After 
> > setting the bios (68scf ver F61; 2015/06/11) to all defaults, then turning 
> > on only virtualization and making sure UEFI was off (and this time the 
> > qubes boot disk showed up during legacy booting) I came to a "regular" 
> > error screen instead of the "four penguins" (which somehow brings to mind 
> > the four horsemen, though perhaps that is just them dashing my hopes of an 
> > easy installation).
> > 
> > Anyway, since I got a command prompt this time I was able to copy the 
> > rdsosreport which I am hoping will help shed some light on what the problem 
> > is.
> > 
> > I admittedly wasn't able to make much sense of it, I did notice things like:
> > HEST is not enabled!
> > Warning: Processor Platform Limit not supported. (this really doesn't look 
> > good)
> > and of course
> > Warning: Could not boot.
> > Warning: /dev/root does not exist
> > 
> > I thought that ggroups had an attachment option but as it doesn't I will 
> > provide a temp link (https://tresor.it/s#wDR0xyEIGKgW-juT_V5CyA) and c/p 
> > the info below (apologies if this is bad etiquette):
> > 
> > 
> > + cat /lib/dracut/dracut-037-13.git20150518.fc20
> > dracut-037-13.git20150518.fc20
> > + cat /proc/cmdline
> > inst.stage2=hd:LABEL=QUBES\x20R3_1\x20 i915.preliminary_hw_support=1 quiet 
> > rhgb

I see spurious space (\x20) in LABEL entry - remove the one at the end
of label (pres TAB during boot menu to edit the entry). 

(...)

> > ID_FS_LABEL=QUBES_R3_1
> > ID_FS_LABEL_ENC=QUBES\x20R3_1
> > ID_FS_UUID=8605-C73C
> > ID_FS_UUID_ENC=8605-C73C
> > ID_FS_TYPE=vfat
> > ID_FS_PARTUUID=08f8d95c-01

Here indeed label is "QUBES\x20R3_1", not "QUBES\x20R3_1\x20".

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXS3x+AAoJENuP0xzK19csE6UH/2ElCX2RT70KvIF3ZlpRPaLw
bwT1KHEIgjeZEatSrWhMFj/jIXdEB6mgiwpRgJ4UaC3nyBzFIn3nK4hZder91IXg
3W1Dho/2qzQoZQ6nbgVGYpMjzMQONQ+omUDsBlmyep51zZ/09IVIO/VwWL/vChA+
upJnMSIi2iTVLytWHVW0BqFUY/vWjP8HFogTsbrJiMDCtDIkrm9IRL93drvLUu6w
QekWFGI0GI8/ZoIwqNPG/XQQST1ozHRf5usAQHyjJXi7vcjP4T9mGFt/dQxbr3iH
m9iz7MeY5JhbEgWOMDkU5LhJexfik85uaQgfbyZFl23IUgzcM6uztIKzWoUYDmA=
=jdpB
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160529233422.GA2191%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] AEM boot option causes hard reboot/partial shutdown (Lenovo T450s)

2016-05-29 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, May 27, 2016 at 03:27:50AM -0700, Andrew David Wong wrote:
> On 2016-05-19 02:34, Frank Schäckermann wrote:
> > There should be a bootable BIOS-Updater-Image that can be burned to
> > a CD and booted on the TP to get the BIOS updated. At least there
> > was one for my Lenovo W530 a couple of weeks ago. Practically
> > hassle free - not counting getting the CD burned on Qubes OS. ;-)
> > But than again... the T450 mileage may vary...
> 
> Thanks, Frank. Unfortunately, even after successfully updating the BIOS
> to the latest version, AEM is still not working (fails the same way as
> before). I really thought updating the BIOS would fix it, since
> there's a TPM-related fix in the BIOS patch notes.
> 
> Marek, I noticed that the version of tboot being used is somewhat old
> (July 2014). Would upgrading tboot itself break compatibility with
> AEM? If so, are there any plans to upgrade AEM to be compatible with a
> newer version of tboot?

I think newer tboot shouldn't break anything. The only reason for this
particular version (1.8.2) is a package in Fedora. And I see even in
Fedora 23 (planned as dom0 for Qubes 3.2), it's still at 1.8.2.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXS3yWAAoJENuP0xzK19cs15cH/itnEnSnnnXnVZxRITtWqSE3
mFxwG34GcwV01+ZuIQ/7tbKaU9owAo8b1vKq9zJS63pEkmSSIcwXu1h3jC52AiIG
Oeq+FEcu3P79a4c8D8q1lXi50Urcw/ibRAnXpQQDfPzzdlwAoBbcyYMwspC08HTl
xfRljhxWxp95GUlc3C+JXvI5yXZExT6SD86SBfmpJdQP1UaAw4BNbyHJVpA2SRh6
HR2MFERzEK3CmzF9X/3uAZTv3bgcbgFwyuLe/NaY3eWDdrkzAglX3kbiPcHmyR6/
3xBJgwZ80Y2pH0ONEp7dtTwvaoRN1fcizmGvDQXF+Maf1wuFtpbao5YbuIs45DI=
=VCk5
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160529233447.GD2191%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is it possible to turn a Template HVM into an HVM?

2016-05-29 Thread Chris Laprise



On 05/29/2016 04:32 PM, Achim Patzner wrote:

Am 29.05.2016 um 21:05 schrieb Chris Laprise:


You could create a new standalone hvm using the template as a source
(in the dialog, click standalone first, then hvm, then select the
template).

Note to self: Think harder before asking... Done; worked. Thank you.


Achim


Actually, its not that obvious in the GUI. The dialog is sort of broken 
(issue was created for it) and you have to know what order to click on 
things. I found this out by accident.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/574B7C12.9050105%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] btrfs vs lvm?

2016-05-29 Thread Chris Laprise



On 05/29/2016 03:36 PM, Niels Kobschaetzki wrote:

Hi,

is it just me or is in the documentation no explanation why one should
use over the other? I also couldn't really find anything in the
ML-archive.

Why should I use btrfs or lvm with QubesOS? I have in my head somewhere
looming with real problems when there is not a lot of space available,
up to a system that is not bootable anymore. Do the tools provided by
Qubes use features of btrfs like snapshoting or what else it has up its
sleeves? What problems might arise when one uses btrfs? Is it really
stable enough nowadays?

Niels



Hi Niels,

There is one case where I would use lvm over btrfs at this point: RAID 
configurations. I think they were still trying to get the bugs out of 
btrfs RAID as recently as last year.


Otherwise, btrfs has been great with Qubes and I highly recommend it on 
a normal PC or laptop. Its been very stable for me and is now faster[1] 
and more versatile than other options. For instance, if I want to 
experiment with a number of different templates or appvms, Qubes will 
reflink the disk images instead of duplicating them. The reflinked 
copies occur instantly, and only use extra disk blocks when changes are 
made to the original or the copies. AFAIK, this capability is unique to 
btrfs and requires only a simple 'cp --reflink' which Qubes does 
automatically in the case of vm images.


Btrfs also has differential send/receive backup and restore. Qubes 
backup doesn't take advantage of this yet, but its still something you 
can configure yourself.


I haven't had any issues with disk space, though I generally keep more 
than 20GB free.


Chris

1. https://www.diva-portal.org/smash/get/diva2:822493/FULLTEXT01.pdf

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/574B7AE3.6020006%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: can't build stretch

2016-05-29 Thread tom.tomson

it seems commit 2232f46 broke something.
what i tried now:
* in file Makefile replace the line
get-sources-sort = $(filter $(BUILDER_PLUGINS), $(COMPONENTS)) 
$(filter-out $(BUILDER_PLUGINS), $(COMPONENTS_NO_BUILDER))

with
get-sources-sort = $(BUILDER_PLUGINS) $(filter-out $(BUILDER_PLUGINS), 
$(COMPONENTS_NO_BUILDER))

this basically reverts commit 2232f46
(i guess the sources for debian builder were not downloaded).
* execute 'make get-sources' again
* execute 'make qubes-vm'
* get the error from
https://groups.google.com/forum/#!searchin/qubes-users/stretch/qubes-users/FKCFjel98rQ/l2c7AfrJJwAJ
and fix it as described there
* execute 'make qubes-vm'
i got an error from something with salt (strange, because i did not 
select anything with salt)

(see log mgmt-salt-vm-stretch.log)
* in qubes-src: "rm -rf mgmt-salt*"
* execute 'make qubes-vm' again. this time it worked!
* execute "make template"
got errors again.
something about "chroot: cannot change root directory to 
'debconf-set-selections': No such file or directory"

(see log)
* edited 'qubes-src/builder-debian/template_debian/distribution.sh' and 
added
if ! [ -d debconf-set-selections ]; then mkdir 
debconf-set-selections;fi;

above the line
chroot debconf-set-selections /tmp/keyboard.conf
* execute "make template"
got the error:
"chroot: failed to run command '/tmp/keyboard.conf': No such file or 
directory"


here everything i tried to do failed, since i don't really know what 
should happen.
(i tried using mnt as dir to chroot to or copy the file in an subdir of 
debconf-set-selections)


so all of this seems somewhat broken.
additionally i don't know how much i broke with my "fixes" (i just tried 
random things i thought may could work).


so, can anyone tell me how to fix this?

tom

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/49621abb-4806-6602-63c2-a2a343253124%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.
╔══ DEBUG ══
║ Repo Variables
╠───
║ SRC_DIR: qubes-src
║ CHROOT_DIR:  /home/user/builder/chroot-stretch
║ CHROOT_REPO_DIR: chroot-debian
║ CHROOT_DEBIAN_DIR:   
/home/user/builder/chroot-stretch//home/user/qubes-src/mgmt-salt/debian
║ BUILDER_REPO_DIR:/home/user/builder/qubes-packages-mirror-repo/stretch
╠───
║ Chroot Variables
╠───
║ DIST_BUILD_DIR:  /home/user
║ DIST_SRC:/home/user/qubes-src/mgmt-salt
║ DIST_SRC_DEBIAN_DIR: /home/user/qubes-src/mgmt-salt/debian
╠───
║ Build Variables
╠───
║ DEBIAN_PARSER:   
/home/user/builder/qubes-src/builder-debian//scripts/debian-parser
║ DEBIAN_PLUGIN_DIR:   /home/user/builder/qubes-src/builder-debian/
║ OUTPUT_DIR:  pkgs/stretch
║ PACKAGE_LIST:debian
║ DISTRIBUTION:debian
║ DIST:stretch
║ DEBIANVERSION:   stretch
║ DEBIAN_DEPENDENCIES: dpkg-dev debootstrap
║ UPDATE_REPO: 
║ REPO_SUFFIX: 
║ DISTRIBUTION_CAP:Debian
║ REPO_PROXY:  
║ APT_GET_OPTIONS: 
║ CHROOT_ENV:  BACKEND_VMM=xen
╚═══
/home/user/builder/qubes-src/builder-debian//update-local-repo.sh stretch
~/builder/qubes-packages-mirror-repo/stretch ~/builder
dpkg-scanpackages: info: Wrote 41 entries to output Packages file.
~/builder
sudo chroot /home/user/builder/chroot-stretch apt-get  update
Get:1 file:/tmp/qubes-deb stretch InRelease
Ign:1 file:/tmp/qubes-deb stretch InRelease
Get:2 file:/tmp/qubes-deb stretch Release [293 B]
Get:2 file:/tmp/qubes-deb stretch Release [293 B]
Get:3 file:/tmp/qubes-deb stretch Release.gpg
Ign:3 file:/tmp/qubes-deb stretch Release.gpg
Get:4 file:/tmp/qubes-deb stretch/main amd64 Packages
Ign:4 file:/tmp/qubes-deb stretch/main amd64 Packages
Get:5 file:/tmp/qubes-deb stretch/main Translation-en
Ign:5 file:/tmp/qubes-deb stretch/main Translation-en
Get:4 file:/tmp/qubes-deb stretch/main amd64 Packages
Ign:4 file:/tmp/qubes-deb stretch/main amd64 Packages
Get:5 file:/tmp/qubes-deb stretch/main Translation-en
Ign:5 file:/tmp/qubes-deb stretch/main Translation-en
Get:4 file:/tmp/qubes-deb stretch/main amd64 Packages
Ign:4 file:/tmp/qubes-deb stretch/main amd64 Packages
Get:5 file:/tmp/qubes-deb stretch

[qubes-users] Some thoughts about improvements in backup ui

2016-05-29 Thread Arqwer
R3.0
1. After I open backup dialog, qubes manager fades out. It is 
uncomfortable: I might want to use it. For example, I selected which VMs 
i'm going to backup, and realized, that my external drive is not connected 
now. I want to use qubes manager to attach external drive, but it is 
unavailable. Or I want to shut down some VMs, or start VM to send backup 
there.

2. Backup process does not block me from turning on VM that is now in 
backup process. That makes no sense. If VM should be turned off during 
backup, I should not be able to turn it on. At least without  --force 
flags. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/42aefe58-331c-498c-964f-dbc4d0d183b9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installing additional firmware

2016-05-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-05-29 06:14, Achim Patzner wrote:
> Am 29.05.2016 um 03:31 schrieb Andrew David Wong:
>> On 2016-05-28 11:38, Achim Patzner wrote:
>>> Hi!
>> 
>>> Is it only me or are there some more people who seriously hate
>>>  having to add firmware for virtual machines?
>> 
>> I'm not sure I understand.
> 
> My mistake. I wanted to write _modules_ and constantly wrote 
> "firmware". "You should not post at 3 in the morning after 27
> hours of work", I guess.
> 
>> Is this some kind of special procedure required by your 
>> particular needs?
> 
> Yes. For some reasons I'm running around with a collection of USB 
> WLAN devices and I have to install the appropriate drivers (and 
> firmware) for them whenever I update the kernel. I wouldn't really 
> mind it so much if they were really exotic hardware but most of 
> them are Ralink and Realtek based "IT-groceries" found at every 
> corner. This is annoying me quite a bit.
> 
> 
> Achim
> 

Ah, I see. Is the Fedora template upgrade procedure applicable? Maybe
it would be easier to make room by bind mounting a temp directory over
/usr/lib/modules as described here:

https://www.qubes-os.org/doc/fedora-template-upgrade-21/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJXS1rxAAoJENtN07w5UDAwNVQQAJ1gp//jJ2HH6QGb7t91aRX3
MfCAP+S3tZ4vTWkCgxr/iQlxEgGrQ689XJwZk3jZFoZq8ofmqEAX3SNsoxEMCL3M
YiFvRBip57EdMqW84r9V4hdqBmAEBjQcYsg78QNQXYbB2nP8q8fV6665CEJZPoJy
NcDIbv3dnVFKVcADtXqtR0ssvQbQzoNkGqvkgQQK1NduyZl4AI/PTbhAF/qSa5//
ocm0k/rdyBxda/9ZuVg5M2MdFJMyVq7h8v0ApAXV4cIudu3ki9n/9A+ZrlRImQdM
ksfQW3i91BOMQ4dvo8KyF9u7/evR01y0/eHeg9d/DLdFafVfa4EeQM3n8cH5Ehqz
tZdhY48WTYDSx1aze6gnQcBAHqCUmNMM8L34j+5gyGVr77eeSdkKR9e4WK+ktXTI
rFrOWYC+RsJRpWTy5Na8Y0RWNOmYYE+FoCZUfKgUFV75UwvW8I4/gU+SVvOwZkHm
27d+vzND/ysrm2m/xsGPru3JWtj4Y2EyD6goRGsbEe8VPDQhcohQz9Kb7AZExAHg
BjGGHSDxJYi49hfVcg7zQWo4sC8kazssHYf4sNMy0pefuYd9ruUbHSF1VsUvZUvC
bVUQw20TRiqyYxREzHofCLMXlUEUP1Vp3EsTZuWCiwlmMWvhI9Ep9yN3bZtwaBOa
Geuvsx1H2c4BtMHRNpMw
=NwnS
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b07dfd31-d571-7477-acba-c499bec975a4%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] btrfs vs lvm?

2016-05-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-05-29 12:36, Niels Kobschaetzki wrote:
> Hi,
> 
> is it just me or is in the documentation no explanation why one
> should use over the other? I also couldn't really find anything in
> the ML-archive.
> 
> Why should I use btrfs or lvm with QubesOS? I have in my head
> somewhere looming with real problems when there is not a lot of
> space available, up to a system that is not bootable anymore. Do
> the tools provided by Qubes use features of btrfs like snapshoting
> or what else it has up its sleeves? What problems might arise when
> one uses btrfs? Is it really stable enough nowadays?
> 
> Niels
> 

IMHO, Btrfs vs. LVM is beyond the scope of Qubes. One may be better
than the other for you depending on your needs, but neither is required.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=x7Nv
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2b2c7edc-2bdc-a064-6d87-2457e63a2393%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is it possible to turn a Template HVM into an HVM?

2016-05-29 Thread Achim Patzner
Am 29.05.2016 um 21:05 schrieb Chris Laprise:

> You could create a new standalone hvm using the template as a source
> (in the dialog, click standalone first, then hvm, then select the
> template).

Note to self: Think harder before asking... Done; worked. Thank you.


Achim

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/337053f7-95dc-1743-95ee-9028f1f11d74%40noses.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] a few mundane usability questions

2016-05-29 Thread trevor . watson . at . home
On Sunday, 29 May 2016 20:37:52 UTC+8, Andrew David Wong  wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2016-05-29 05:34, trevor.watson.at.h...@gmail.com wrote:
> > On Wednesday, 5 June 2013 07:23:47 UTC+8, Marek
> > Marczykowski-Górecki  wrote:
> > 
> >> You should be able to install rpmfusion repositories in standard
> >> way (in template of course).
> >> 
> > 
> > Sorry, how do you do that?
> > 
> > I've googled and tried the instructions from rpmfusion without
> > success.
> > 
> 
> Try this (in your Fedora template of choice):
> 
> $ sudo dnf config-manager --set-enabled rpmfusion-free rpmfusion-nonfree
> $ sudo dnf upgrade --refresh
> 
Thanks Andrew, that worked, the instructions on the rpmfusion site have you 
adding the repos using urls which doesn't work

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b2c53e02-342d-4728-89fd-3ac9d12d0464%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] btrfs vs lvm?

2016-05-29 Thread Niels Kobschaetzki

Hi,

is it just me or is in the documentation no explanation why one should
use over the other? I also couldn't really find anything in the
ML-archive.

Why should I use btrfs or lvm with QubesOS? I have in my head somewhere
looming with real problems when there is not a lot of space available,
up to a system that is not bootable anymore. Do the tools provided by
Qubes use features of btrfs like snapshoting or what else it has up its
sleeves? What problems might arise when one uses btrfs? Is it really
stable enough nowadays?

Niels

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160529193638.GA1163%40untrusted.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is it possible to turn a Template HVM into an HVM?

2016-05-29 Thread Chris Laprise



On 05/29/2016 10:31 AM, Achim Patzner wrote:

Hi!


I guess the subject said it already: If someone created a (Windows
7-based) Template HVM based on the assumption it would be a good idea to
do this to derive a number of HVMs from it but had to agree that it was
not one of his brightest ideas, is it possible to turn this Template HVM
into a standalone HVM?



Achim



You could create a new standalone hvm using the template as a source (in 
the dialog, click standalone first, then hvm, then select the template). 
If you're on btrfs, Qubes will create a reflink from the original disk 
images, so it will be instant and take no extra space.


If not on btrfs, then it will duplicate all the data from the template 
images. To avoid this, you can create a regular hvm (click hvm in the 
dialog and standalone should grey-out) then manually move the root.img 
and private.img files from the template to the new hvm.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/574B3D64.7070005%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Where to install wireshark?

2016-05-29 Thread Chris Laprise



On 05/29/2016 11:46 AM, qazx...@sigaint.org wrote:

Hi.

I just installed Qubes, and I'm doing a tor -> proxy setup with whonix
(Because of CloudFlare...), and I want to make sure it's working properly
by looking at the traffic after it leaves whonix gateway. On my old system
I'd just install wireshark on my host, but this is obviously not possible
in Qubes. My current understanding of Qubes leads me to believe it'd make
the most sense to install wireshark @ sys-net.

I'd just like to hear if there's any reason to NOT do this before I proceed.

Thanks in advance.

Also, thanks to the developers for creating a really awesome OS :-)



The sys-net vm may be compromised, so a better place is an intermediate 
proxy vm like sys-firewall.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/574B3AFA.7060601%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Where to install wireshark?

2016-05-29 Thread qazxasz
Hi.

I just installed Qubes, and I'm doing a tor -> proxy setup with whonix
(Because of CloudFlare...), and I want to make sure it's working properly
by looking at the traffic after it leaves whonix gateway. On my old system
I'd just install wireshark on my host, but this is obviously not possible
in Qubes. My current understanding of Qubes leads me to believe it'd make
the most sense to install wireshark @ sys-net.

I'd just like to hear if there's any reason to NOT do this before I proceed.

Thanks in advance.

Also, thanks to the developers for creating a really awesome OS :-)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a389a18b42f387102fa8de513d7731a8.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Is it possible to turn a Template HVM into an HVM?

2016-05-29 Thread Achim Patzner
Hi!


I guess the subject said it already: If someone created a (Windows
7-based) Template HVM based on the assumption it would be a good idea to
do this to derive a number of HVMs from it but had to agree that it was
not one of his brightest ideas, is it possible to turn this Template HVM
into a standalone HVM?



Achim


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b778cd3-e9ea-f5ef-ebbd-a0cdb1c5e12e%40noses.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Some Progress: Windows 7 (with Qubes Windows Tools) in Qubes OS 3.1 (Full Desktop Mode works)

2016-05-29 Thread Marcus at WetwareLabs
Piit,

thanks for your investigation and nice tutorial!

Have you managed to get Windows HVM into real full screen mode without 
installing Windows Tools GUI? Setting *allow_fullscreen=true* in 
*/etc/qubes/guid.conf 
*does not seem to enable it anyway (it stays grayed out on window bar -> 
More actions -menu). 

I have dual monitor setup (1920x1200 Displayport-0 and 1920x1080 DVI-0), 
but  I've managed  to install GUI tools (as you did) by only setting dom0 
resolution the same as in Windows and detaching the other monitor. As soon 
I add the other monitor, Windows wouldn't start no matter if seamless mode 
is on or off.   HOWEVER if I add the 2nd monitor only AFTER starting 
Windows, it works nicely and I can use Windows both in full screen mode (in 
1st or 2nd monitor) or in seamless mode. Also switching between seamless 
and normal mode from VM Manager is possible in real-time :)

Some things I noticed (only 1 monitor in use):
- some of the Windows Updates have incompatibilities with QWT. Whether 
Network Tools are installed or not, DHCP would not work, but manual 
configuration would resolve situation. 
- Seamless mode starts anyway even if it is not enabled in VM Manager when 
the VM is booted the first time after GUI tools installation. After that, 
it boots as it is configured in VM manager.
- starting in seamless mode is very erratic (about 50% of the times the 
startup fails and restart is needed).
- starting without seamless mode works slightly better (starts in full 
screen by default but works as windowed as well), but can get stuck as well 
during boot
- shutdown from VM Manager does not work (seamless or not), but "shutdown 
/s /t 0" from windows command line works even in seamless mode

After changing between seamless and normal modes and booting few times, the 
VM would not start anymore (stuck at Starting Windows screen). Only after 
many restarts between normal and safe mode (which works), would normal mode 
boot again..

Here are attached logs from one of the times it was stuck during boot (one 
monitor):
http://txt.do/5bcf7
http://txt.do/5bcf2
http://txt.do/5bcfv
http://txt.do/5bcfn
http://txt.do/5bcfw
http://txt.do/5bcfb
http://txt.do/5bcf3
http://txt.do/5bcfi

and logs when starting with two monitors (always gets stuck):
http://txt.do/5bcp6 
http://txt.do/5bcpj 
http://txt.do/5bcp4 
http://txt.do/5bcpl 
http://txt.do/5bcpq 
http://txt.do/5bcpc 
http://txt.do/5bcpm 
http://txt.do/5bcph 
http://txt.do/5bcpx 
http://txt.do/5bcpu 
http://txt.do/5bcpf 
http://txt.do/5bcpz 

I noticed there was 2 different log files for qga and 4 for qrexec-wrapper. 
But I deleted all logs in safe mode before starting VM in normal mode, so 
these logs should be only from one run.

I noticed that behaviour got more erratic after setting more verbose log 
levels (5) and sometimes it would BSOD as well (SYSTEM_SERVICE_EXCEPTION, 
STOP: 0x003B (...) ). Maybe race condition? I can send dump files and 
Xen logs somewhere also if you're interested.

Using Q3.1 with stock kernel 4.1.13-9 and latest QWT (3.0.4-1). HW: Intel 
i7-5820K with Asrock X99 WS. GFX card is GTX980 with stock Nouveau driver.




On Wednesday, March 16, 2016 at 12:26:49 AM UTC+2, piitb...@gmail.com wrote:
>
> Hello, 
>
> after spending some more hours trying to figure out what breaks my windows 
> 7 VM as soon as I install the Qubes Windows Tools, I would like to share 
> what I found out so far. 
>
> In short: 
> It seems that the installation of the "Qubes GUI Agent" within the Qubes 
> Windows Tools create some kind of problem on the Windows 7 VM, as this 
> triggers if I can use the VM or not. 
>
> More detailed description to revalidate my experience. 
> (as this is targeted also at newbies, which will find this via Google, 
> while troubleshooting, I have included every step), sorr :-) 
>
>
> Install a Win7 VM in Qubes OS 3.1 
> = 
>
> - Create Windows VM 
>   qvm-create win7 --hvm --label orange 
>
> - Increase initial RAM and max RAM to 4GB (4096) 
>
> - Install Windows from .ISO 
>   qvm-start win7 --cdrom=/home/piit/Downloads/windows_7-Pro-64bit-DE.iso 
>
> - Several reboots (=restarts) until Windows is running 
>
> - Start VM as final test -> GUI available? 
>   qvm-start --debug win7 
>
> - Clone VM to have a working copy if you screw up during the next steps 
> (win7-plain) 
>
> - Install qubes-windows-tools 
>   qubes-dom0-update --enablerepo=qubes*testing qubes-windows-tools 
>   or: 
>   sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing 
> qubes-windows-tools 
>
> - Disable User Login 
>   Start > cmd.exe (as Administrator) 
>   netplwiz 
>   Uncheck "Users must enter a user name and password to use this computer" 
>   Double check

Re: [qubes-users] a few mundane usability questions

2016-05-29 Thread Achim Patzner
Am 29.05.2016 um 14:37 schrieb Andrew David Wong:
> Try this (in your Fedora template of choice):
>
> $ sudo dnf config-manager --set-enabled rpmfusion-free rpmfusion-nonfree
> $ sudo dnf upgrade --refresh

I guess that actually was his problem. Unless you're enabling a lot more
than just *-free and *-nonfree you won't really get much from them. Take
a look at the appropriate files in /etc/yum.conf.d/ and enable at least
the *-update sections, too.


Achim

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/13b3cedd-d65f-449d-55fa-f63bd906180b%40noses.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installing additional firmware

2016-05-29 Thread Achim Patzner
Am 29.05.2016 um 03:31 schrieb Andrew David Wong:
> On 2016-05-28 11:38, Achim Patzner wrote:
> > Hi!
>
> > Is it only me or are there some more people who seriously hate
> > having to add firmware for virtual machines?
>
> I'm not sure I understand.

My mistake. I wanted to write _modules_ and constantly wrote "firmware".
"You should not post at 3 in the morning after 27 hours of work", I guess.

> Is this some kind of special procedure required by your particular needs?

Yes. For some reasons I'm running around with a collection of USB WLAN
devices and I have to install the appropriate drivers (and firmware) for
them whenever I update the kernel. I wouldn't really mind it so much if
they were really exotic hardware but most of them are Ralink and Realtek
based "IT-groceries" found at every corner. This is annoying me quite a bit.


Achim

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/de33ac98-d0ec-bbd3-0f76-7ac1b8a5d7d7%40noses.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] a few mundane usability questions

2016-05-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-05-29 05:34, trevor.watson.at.h...@gmail.com wrote:
> On Wednesday, 5 June 2013 07:23:47 UTC+8, Marek
> Marczykowski-Górecki  wrote:
> 
>> You should be able to install rpmfusion repositories in standard
>> way (in template of course).
>> 
> 
> Sorry, how do you do that?
> 
> I've googled and tried the instructions from rpmfusion without
> success.
> 

Try this (in your Fedora template of choice):

$ sudo dnf config-manager --set-enabled rpmfusion-free rpmfusion-nonfree
$ sudo dnf upgrade --refresh

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=SCn9
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/492d494f-78a0-ce8f-ce7e-dbbaca2cb243%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] a few mundane usability questions

2016-05-29 Thread trevor . watson . at . home
On Wednesday, 5 June 2013 07:23:47 UTC+8, Marek Marczykowski-Górecki  wrote:

> You should be able to install rpmfusion repositories in standard way (in
> template of course).
> 

Sorry, how do you do that?

I've googled and tried the instructions from rpmfusion without success.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fef93cf1-1def-4a78-bfb1-c07f18f82882%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: "failed to prepare PCI device 07:00.0" error when trying to start netvm

2016-05-29 Thread Marcus at WetwareLabs
Hello,

I can confirm that this bug with VM Manager is still lurking somewhere. 
I've been using Qubes 3.1 for few days now and suddenly after booting the 
sys-net won't start (Error starting VM 'sys-net': PCI device 08:00.0 does 
not exist (domain sys-net)).  Funny thing, I even don't have a PCI device 
with that address..  

In Qubes VM Manager in Devices tab theres 00:19.0 (Intel network adapter) 
attached, but no 08:00.0. But when listing attached devices with
qvm-pci -l sys-net
it shows
['00:19.0' , '08:00.0']
Then
qvm-pci -d sys-net 08:00.0
resolves the situation.

So at least theres still the bug that VM Manager does not list attached 
(but non-existing) devices, and that is now preventing from starting VMs

I don't know what caused this. Only thing that can come to mind is that 
I've tried the PCI passthrough reset relaxation for USB VM (explained here 
https://www.qubes-os.org/doc/assigning-devices/ ), but that would not work, 
so I looked at the Xen pages and their example lists command
echo :08:00.0 > /sys/bus/pci/drivers/pciback/permissive
instead of 
echo :04:00.0 > /sys/bus/pci/drivers/pciback/permissive
So I modified the qubes-pre-netvm.service accordingly.

At first I thought these were some kind of general configuration flags for 
setting permissive mode, but then I realised these are actually just 
example PCI addresses and have to be changed to reflect the address of the 
actual USB controller! :) However at this point I've already tried setting 
the pci_strictreset false with qvm-prefs and that worked, so I forgot about 
the pre-netvm service until this happened. Interestingly, just disabling 
the problem causing service would not be enough to resolve the situation, 
but I had to use qvm-pci manually (only once) to remove the attachment. So 
somehow these settings survive the restart..?


On Sunday, December 7, 2014 at 5:49:07 AM UTC+2, Eric Smith wrote:
>
> Yeah, I am wondering what this means.  I can start appvms but can't start 
> any that depend on netvm.  
> Then, to get more info, I tried a qubes-dom0-update in Konsole.  This 
> time, it told me that:
> "/usr/lib/qubes/unbind-pci-device.sh:  line 47: echo: write error: No such 
> device"
> So I looked at the code and appearent it didn't like what was in the $BIND 
> variable and appearently
> could not find the driver whose name was stored in the $BIND variable 
> appearently.
> This problem started after I had to turn off the computer manually because 
> it froze.  
> I rebooted about 4 times but the problem persists.  I can start the usbvm 
> because it's a Standalone
> vm and does not depend on netvm, but not the others.  I wonder how I could 
> fix this.
>   
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b5efb10a-07db-4a23-bd5e-e28cf5901e9e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] using a vpn through tor

2016-05-29 Thread tom.tomson



Tor does not support UDP traffic.

thanks!
i guess i will use tcp.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8fb1ba0f-6f06-f795-0d39-7c00ea65e448%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Schenker Workstations as Notebooks / QubesOS?

2016-05-29 Thread JPL


On Sunday, May 29, 2016 at 8:03:33 AM UTC+1, 
31093847109243781094378091437810943780194378 wrote:
>
> Hello,
>
> today some nice configurations with strong GPU power will be available on 
> the market like:
>
> https://www.mysn.de/schenker-mobile-workstations/schenker-w706
>
> But how can I boot QubesOS one time with the full GPU support and another 
> time in the secure mode without GPUs?
>
> So I could adapt the performance and security like I need it in the 
> different situations?
>
> Kind Regards
>

nVidia GPUs are tricky (although improving) with Linux in general and Qubes 
in particular. If you search this list for "nVidia" you'll see what I mean! 
Good luck. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/de3ad167-6490-459a-bd7e-6ac8935ff735%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Web proxy in AppVM

2016-05-29 Thread JPL
I want to set up a web proxy in a Debian-based AppVM but I don't want to do 
it in the template VM as last time I tried that I screwed lots of things up 
and it was never the same again.

I don't mind if it's not persistent because I am just experimenting. 
Lacking the usual Gnome systems tool I don't how how to do it. I have a URL 
of a PAC file http://xyz.pac on the proxy server I want to use.  

Can someone tell me how to do this please?

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8b69d1cb-29d4-4dd8-a272-c068eb1814c5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Schenker Workstations as Notebooks / QubesOS?

2016-05-29 Thread 31093847109243781094378091437810943780194378
Hello,

today some nice configurations with strong GPU power will be available on the 
market like:

https://www.mysn.de/schenker-mobile-workstations/schenker-w706

But how can I boot QubesOS one time with the full GPU support and another time 
in the secure mode without GPUs?

So I could adapt the performance and security like I need it in the different 
situations?

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ce76db2a-44e3-4bdf-abd5-5e08d1e1b4d3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.