Re: [qubes-users] Re: Does Qubes support Intel Turbo Boost?

2018-12-18 Thread qubesusermarco
> Actually it has 4 cores and 8 threads. In xenpm's output, there're 2 lines 
> saying '[CPUx] failed to get cpufreq parameter', 'x' being 1 and 3.

This is a bug in xenpm when 'smt' is off, as discussed in here:
https://github.com/QubesOS/qubes-issues/issues/4456

Still need help with turbo boost. In vm, frequency shown in 'powertop' does 
indicate turbo boost's presence, but I highly doubt its reliability since the 
number never goes under max base frequency, and doesn't correspond to real cpu 
usage.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7947e2f5-f4da-4f08-9acb-75ac075130a0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes OS 4.0.1-rc2 has been released!

2018-12-18 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

We're pleased to announce the second release candidate for Qubes 4.0.1!
Features:

 - Fixes for bugs discovered in 4.0.1-rc1
 - All 4.0 dom0 updates to date
 - Fedora 29 TemplateVM
 - Debian 9 TemplateVM
 - Whonix 14 Gateway and Workstation TemplateVMs
 - Linux kernel 4.14

Qubes 4.0.1-rc2 is available on the Downloads page:

https://www.qubes-os.org/downloads/


What is a point release?
- 

A point release does not designate a separate, new version of Qubes OS.
Rather, it designates its respective major or minor release (in this
case, 4.0) inclusive of all updates up to a certain point. Installing
Qubes 4.0 and fully updating it results in the same system as installing
Qubes 4.0.1.


What should I do?
- -

If you're currently using an up-to-date Qubes 4.0 installation, then
your system is already equivalent to a Qubes 4.0.1 installation. No
action is needed.

Regardless of your current OS, if you wish to install (or reinstall)
Qubes 4.0 for any reason, then the 4.0.1 ISO will make this more
convenient and secure, since it bundles all Qubes 4.0 updates to date.
It will be especially helpful for users whose hardware is too new to be
compatible with the original Qubes 4.0 installer.


Release planning
- 

Since the most severe bugs related to Fedora 29 have been addressed, we
expect that this will be the final release candidate for 4.0.1. As
usual, you can help by reporting any bugs you encounter. [1] If no
major problems are discovered in this release candidate, 4.0.1 should
follow in approximately three weeks.


[1] https://www.qubes-os.org/doc/reporting-bugs/

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/12/18/qubes-401-rc2/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=kIol
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6fda2037-b0b5-c6c7-3f13-db0ebdafaf6a%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Does Qubes support Intel Turbo Boost?

2018-12-18 Thread qubesusermarco
On Wednesday, December 19, 2018 at 12:10:19 AM UTC-5, awokd wrote:
> I think xenpm is supposed to work the best. Qubes disables SMT for 
> security, so if you only have 2 real cores that's all you'll see.

Actually it has 4 cores and 8 threads. In xenpm's output, there're 2 lines 
saying '[CPUx] failed to get cpufreq parameter', 'x' being 1 and 3.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/62d87212-8736-41d6-aa14-1ed6d379ba64%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Does Qubes support Intel Turbo Boost?

2018-12-18 Thread 'awokd' via qubes-users

qubesuserma...@gmail.com:

The most promising result is given by xenpm, however only info of 2 cores out 
of 4 are listed.

I think xenpm is supposed to work the best. Qubes disables SMT for 
security, so if you only have 2 real cores that's all you'll see.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/42cf367c-8366-1ae5-699e-2b0cb4218010%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Updating to whonix-14. Error: "ImportError: No module named qubesadmin.exc"

2018-12-18 Thread 'awokd' via qubes-users

jeppewr...@gmail.com:

Hi all,

I'm quite new to Qubes and Linux in general yet I have manged to run Qubes OS 
as my main desktop for several weeks. At the moment I'm fiddling with 
networking, more specifically I'm trying to get whonix-14 working, as Qubes 
comes with an outdated version(!?).

First I removed all traces of the old outdated Whonix (including 
qubes-core-admin-addon-whonix.noarch) on my system. Then I ran "sudo qubesctl 
state.sls qvm.whonix-ws-dvm" according to the documentation: 
https://www.whonix.org/wiki/Qubes/Install

After getting "bash: qubesctl: command not found" i reinstalled 
"qubes-core-admin-addon-whonix.noarch" with no effect. After that I tried searhing dom0 repo for 
salt and found "qubes-mgmt-salt.noarch" witch i also installed, it seems to help the first problem, 
but qubesctl seems broken. When running the command i get this in return:

File "/usr/bin/qubescl", line 11, in 
  import qubessalt
File "/usr/bin/python2.7/site/packages/qubessalt/__init__.py", line 10, in 

  import qubesadmin.exc
ImportError: No module named qubesadmin.exc

How do i fix this and get whonix-14 installed properly? Thanks!

I'm wondering if removing qubes-core-admin-addon-whonix.noarch broke 
some other packages accidentally. Might be quickest to backup your 
AppVMs, reinstall, restore, and try again? You might want to manually 
install the newer Whonix templates (ws & gw) first, then try that "sudo 
qubesctl state.sls qvm.whonix-ws-dvm" command again.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a3a9ab08-41e4-7add-7421-a571dc99fa91%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] disk space management

2018-12-18 Thread 'awokd' via qubes-users




dimi:

On Monday, December 17, 2018 at 10:40:45 AM UTC+2, awokd wrote:



1) I usually use qvm-remove to delete VMs, but Qube Manager should do
exactly the same thing. Are you making sure they're shutdown before
deleting?
2) rm to delete the old menu entries and log files. I guess lvremove to
get rid of the old volumes listed with lvs, my assumption being Qubes
will realize they are gone and handle the entries in /dev/qubes_dom0
appropriately. Haven't encountered this problem before.
3) Also lvremove.


1) Yes, VM's are shutdown before removing. I am double, tripple checking before 
any delete action.
2) ok
3) ok

Thank you for teaching me awokd, lvremove /dev/qubes_dom0/vm-leftover-private 
did it.
Will reboot once i am done cleaning up, quiet a few leftovers here.
And you are saying that your lvs does not show you any traces of left over VM's?
How could i prevent that from future happing? Dreadfully go through a Qubes 
reinstall, i had some problems with Anaconda and restore backuped VMs?


Correct, no leftovers in my lvs and I've had 4.0 installed since it 
released and multiple VMs created and deleted, so I'm not really sure 
how you might have ended up with those!


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d7637b10-1d97-bd0c-7132-080d111fb986%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Does Qubes support Intel Turbo Boost?

2018-12-18 Thread qubesusermarco
The most promising result is given by xenpm, however only info of 2 cores out 
of 4 are listed.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d1f74554-6c6a-4c92-bd91-e73dea190896%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Does Qubes support Intel Turbo Boost?

2018-12-18 Thread qubesusermarco
Also, what would be the best way to check current CPU frequency on Qubes? I've 
tried multiple ways to get cpu frequency and turbo state, but they either give 
contradictory/fixed results or don't work.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0393633a-1fd7-476c-8e43-9406e4915ac9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Where is Qubes' idea of private image size coming from?

2018-12-18 Thread unman
On Tue, Dec 18, 2018 at 09:18:06PM +0100, Achim Patzner wrote:
> Hi!
> 
> I just ran out of space in my Bulder VM again and wanted to extend it a
> bit, but somehow PRIV-CURR and PRIV-MAX do not like each other that
> much:
> 
> [ap@dom0 bin]$ qvm-ls --disk BuilderNAME STATE   DISKPRIV-
> CURR  PRIV-MAX  PRIV-USED  ROOT-CURR  ROOT-MAX  ROOT-
> USEDBuilder  Halted  124948  124948 2048  6100%  0 
>  10240 0%[ap@dom0 bin]$ 
> 
> Before I start doing something stupid (like reporting a non-issue or
> shooting my own foot): Where is that 2GB PRIV-USED coming from and how
> do I correct it? The image file itself has a size of 128GB right now...
> 
> 
> Achim

6100% used. Impressive.

I'm not clear if you tried to extend first or checked the sizes first.

You can see the code in
/usr/lib/python3.5/site-packages/qubesadmin/tools

PRIV-MAX comes from vm.volumes[private].size - it's strange that that
should be showing the default 2G size.
Just to be safe I would backup anything you have on the BuilderVM.
What does qvm-volume info Builder:private show?

You could try then resizing with extend. 



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181218235307.55thugbyay2ttyk3%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Going old school

2018-12-18 Thread John Smiley
Just ordered a (native - no USB conversion) Logitech PS/2 keyboard and mouse 
and a PS/2 splitter since I only have one PS/2 port.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/76acc2ca-7c60-4f88-a431-3832b8d51215%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Where is Qubes' idea of private image size coming from?

2018-12-18 Thread Achim Patzner
Hi!

I just ran out of space in my Bulder VM again and wanted to extend it a
bit, but somehow PRIV-CURR and PRIV-MAX do not like each other that
much:

[ap@dom0 bin]$ qvm-ls --disk BuilderNAME STATE   DISKPRIV-
CURR  PRIV-MAX  PRIV-USED  ROOT-CURR  ROOT-MAX  ROOT-
USEDBuilder  Halted  124948  124948 2048  6100%  0 
 10240 0%[ap@dom0 bin]$ 

Before I start doing something stupid (like reporting a non-issue or
shooting my own foot): Where is that 2GB PRIV-USED coming from and how
do I correct it? The image file itself has a size of 128GB right now...


Achim

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1ac155022bbe53a17b5a28f8977d6c84e0468250.camel%40noses.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Dom (0) error under install. ver 4.0

2018-12-18 Thread Jorgen
tirsdag den 18. december 2018 kl. 19.52.57 UTC+1 skrev Jorgen:
> Hi
> 
> I am trying to install ver 4.0 on my HP Elitebook 2560P. It has a Intel core 
> i5 processor (2450m VT-X with EPT, more details here: https://goo.gl/iJTcdM), 
> so I guess it should be compatible?!
> 
> But I get the attached error at the end of the install, and after that no 
> VM's are available :-(
> 
> I really miss Qubes-OS so any help would be appreciated.
> 
> Best regards
> Jorgen




OH wait, it might be this issue: https://goo.gl/1gghEh
I will get back to you after trying to switch locale

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7bdd885c-abbd-4ebd-bfc7-510299799507%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: dom0 error

2018-12-18 Thread David Hobach

On 12/18/18 7:28 PM, cooloutac wrote:

On Sunday, December 16, 2018 at 8:13:52 AM UTC-5, Roy Bernat wrote:

while trying to update dom0

getting error sys-firewall command failed with code 1

Roy


I'm getting the same thing.  Updates go through but just wondering why the 
error and if it should be a concern.


https://github.com/QubesOS/qubes-issues/issues/4616

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7130ca43-bc26-e74e-f988-e3f3b2f9259d%40hackingthe.net.
For more options, visit https://groups.google.com/d/optout.


smime.p7s
Description: S/MIME Cryptographic Signature


[qubes-users] Re: dom0 error

2018-12-18 Thread cooloutac
On Sunday, December 16, 2018 at 8:13:52 AM UTC-5, Roy Bernat wrote:
> while trying to update dom0 
> 
> getting error sys-firewall command failed with code 1 
> 
> Roy

I'm getting the same thing.  Updates go through but just wondering why the 
error and if it should be a concern.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e9cfdfe5-509e-4db5-a8b1-94108fd97673%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] thunderbird, open link in AppVM

2018-12-18 Thread dimi
Since upgrade to new Template fedora 29 in R4, clicking links does not open up 
the menu. 
Email Attachments do start in dispVM.

Not sure if this link select AppVM feature was build into r4 or if i used some 
github repo. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4abf5d63-dfeb-49d2-ba8f-7e9e7ead6963%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] default-mgmt-dvm template switch

2018-12-18 Thread dimi
Just wanted to make sure that the new default-mgmt-dvm can be switched to use 
fedora-29 template in Qubes Manager?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c73d899d-e2ce-4361-9d6b-ede8c536c86a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Updated HCL report - Dell Precision 5520

2018-12-18 Thread smvicente
El martes, 18 de diciembre de 2018, 6:05:18 (UTC+1), Yassine  escribió:
> 
> Regarding issues with when unplugging thunderbolt after boot, this is due to 
> PCI hotplugging being disabled (for obvious security reasons) - more details 
> here https://github.com/QubesOS/qubes-issues/issues/1673
> 
> @Jim: following awokd's procedure you should be able to get UEFI working, 
> also the configuration that I described for installation and 
> post-installation were tested with UEFI only
> 
> Now if you reboot and the PCI devices served by the thunderbolt/usb-c are not 
> present anymore, you'll have to manually remove them from the list of pci 
> devices that are passed through to your NetVM or UsbVM.
> Same for when you boot with the thunderbolt attached, you'll have to reattach 
> the pci devices to the VM for passthrough.

Thank you Yassine! now I fully understand why this happens.

I don't really care if I have to reboot to make it work, but the problem is 
even after reboot, it is not detected, so I have to turn off sys-firewall + 
sys-net, unplug the adapter and plug it again and finally start the VMs again 
for it to work, what is a bit of a PITA. I'd be happy if it was recognized 
directly when booting, even if a later disconnects make it stop working... Have 
any of you been able to achieve something like this at least?

Thank you!!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bf3aaa23-f4d0-4a43-9116-b300c03cd67d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.