Re: [qubes-users] Re: [PATCH v5.10] drm/i915/userptr: detect un-GUP-able pages early

2021-01-31 Thread Jinoh Kang
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/31/21 10:28 AM, donoban wrote:
> On 1/29/21 4:35 PM, Jinoh Kang wrote:
>> You can collect panic and oops logs with a kernel that has
>> CONFIG_EFI_VARS_PSTORE enabled.  If you don't already have one, you may
>> build qubes-linux-kernel via qubes-builder with the following line
>> added to `config-qubes`:
>>
>> CONFIG_EFI_VARS_PSTORE=y
>>
>> After booting the kernel, subsequent panic and oops will be recorded
>> in EFI variables, which will then appear as /sys/fs/pstore/dmesg-efi-*
>> at the next boot.  Also note that the logs may be split into multiple
>> parts that are numbered in a reversed order.  For more information, see
>> https://www.kernel.org/doc/html/latest/admin-guide/pstore-blk.html
> 
> Hi, after booting again 5.10.8 kernel (with 5.10.11 I can't start any VM
> but I think Marek is already aware) I can see the dmesg-efi "files".
> 
> Here is the concatenation of all files (probably in reverse or wrong order):
> blob:https://share.riseup.net/3360675c-292f-4114-a109-c410e2518295
> 
That's a wrong URL (blob:).  Maybe copy it again?

- -- 
Sincerely,
Jinoh Kang
-BEGIN PGP SIGNATURE-
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=XlUF
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2f6c6fe0-3ed4-bde2-3fad-2f17c39b2b8e%40gmail.com.


Re: [qubes-users] Re: VT-d on XPS 9310

2021-01-31 Thread Fabrizio Romano Genovese
Ok, my BIOS wasn't updated. That solved the VT-d problem.

Everything seems to work aside of wifi. I have a Killer AX500, which is 
currently supported only in kernel 5.10+. For what I understand, in Qubes 
Fedora comes with Kernel 5.4.something at the moment. I've found some 
tutorials to update a generic Fedora kernel to 5.10, but I suppose the 
kernel I'm running now is customized to be ran within a qubes environment. 
If I try to compile and update sys-net to kernel 5.10 how likely it is that 
I'll make a mess?

Fab
On Sunday, January 31, 2021 at 9:05:07 PM UTC+1 awokd wrote:

> donoban:
> > On 1/31/21 6:26 PM, Fabrizio Romano Genovese wrote:
> >> Ok, I found something: Running `xl dmesg` there's a line that says:
> >> (XEN) Failed to parse ACPI DMAR. Disabling VT-d.
> > 
> > I only think to try updating BIOS or using Qubes R4.1 which has newer
> > Xen version (although is pretty unstable yet). It will help to know if a
> > newer Xen version runs ok.
> > 
> Try donoban's suggestions for sure, but if that still doesn't help you 
> might get more pointers in the log from messages just prior to the one 
> quoted above. Disabling onboard/PCIe devices such as USB 
> controllers/network cards might let you work around the problem as well.
>
> -- 
> - don't top post
> Mailing list etiquette:
> - trim quoted reply to only relevant portions
> - when possible, copy and paste text instead of screenshots
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/78d15468-9d35-408f-8f29-9db18ef3f000n%40googlegroups.com.


[qubes-users] How to forward UPnP/1900 multicast to AppVM?

2021-01-31 Thread Josefa Hays
I have a service on LAN multicasting UPnP, port 1900. Other devices on
LAN discover the service without problems. My AppVM does not detect it. 

Packets from the server looks like "protocol: UDP, port: 1900, source
ip: $SERVER_LAN-IP, destination ip: 239.255.255.250"

How do I make the UPnP multicast reach an AppVM, i.e. how do I forward
the traffic on port 1900 to the relevant VM? 

I have played around with
https://www.qubes-os.org/doc/firewall/#port-forwarding-to-a-qube-from-the-outside-world
but without success. I am not completely new to IPTABLES, but somehow I
lost a point somewhere. When should I use 239.255.255.250 as destination
in iptables commands and should I use the IP of sys-firewall/app-vm.

(this is quite a replica of
https://groups.google.com/g/qubes-users/c/BrbVe6s0aqE/m/ZsGKsMruCAAJ
that didn't receive a follow-up answer)


Best regards,
Jo

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4f82341a5b0249a9d70b46afe9fc2b68%40riseup.net.


Re: [qubes-users] Re: VT-d on XPS 9310

2021-01-31 Thread 'awokd' via qubes-users

donoban:

On 1/31/21 6:26 PM, Fabrizio Romano Genovese wrote:

Ok, I found something: Running `xl dmesg` there's a line that says:
(XEN) Failed to parse ACPI DMAR. Disabling VT-d.


I only think to try updating BIOS or using Qubes R4.1 which has newer
Xen version (although is pretty unstable yet). It will help to know if a
newer Xen version runs ok.

Try donoban's suggestions for sure, but if that still doesn't help you 
might get more pointers in the log from messages just prior to the one 
quoted above. Disabling onboard/PCIe devices such as USB 
controllers/network cards might let you work around the problem as well.


--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/358b9be3-110f-eb9d-0090-e6b4c7fce3f6%40danwin1210.me.


Re: [qubes-users] Re: VT-d on XPS 9310

2021-01-31 Thread donoban
On 1/31/21 6:26 PM, Fabrizio Romano Genovese wrote:
> Ok, I found something: Running `xl dmesg` there's a line that says:
> (XEN) Failed to parse ACPI DMAR. Disabling VT-d.

I only think to try updating BIOS or using Qubes R4.1 which has newer
Xen version (although is pretty unstable yet). It will help to know if a
newer Xen version runs ok.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5d6d7e75-165e-80fc-c0cf-5d972df84eb9%40riseup.net.


OpenPGP_signature
Description: OpenPGP digital signature


[qubes-users] Re: VT-d on XPS 9310

2021-01-31 Thread Fabrizio Romano Genovese
Ok, I found something: Running `xl dmesg` there's a line that says:
(XEN) Failed to parse ACPI DMAR. Disabling VT-d.

The output of `dmesg` looks very technical and is unreadable to me if I 
don't know what I'm looking for.

...I guess VT-x is enabled as well. In bios I have only the options to 
enable VT and VT-d. I guess the former refers to VT-x?

Fab

On Sunday, January 31, 2021 at 5:46:30 PM UTC+1 qubesth...@gmail.com wrote:

>
> Probably a dumb question, but is VT-x also enabled?
> On Sunday, January 31, 2021 at 10:16:38 AM UTC-6 Fabrizio Romano Genovese 
> wrote:
>
>>
>> Hello all,
>>
>> My problem is quite simple: I tried to install qubes 4.0.4-rc2. During 
>> the installation procedure, it says that I don't have IOMMU/VT-d. 
>> Accordingly, I cannot even start sys-net once the installation completes 
>> because of lack of VT-d. 
>> The problem is that my computer supports VT-d (CPU is intel i7 1165G7). 
>> VT-d is moreover enabled in my bios. Any clue about what the problem could 
>> be?
>>
>> Fab
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a008af07-9a1a-4d13-9180-638bc03bad45n%40googlegroups.com.


[qubes-users] Re: VT-d on XPS 9310

2021-01-31 Thread qubesth...@gmail.com

Probably a dumb question, but is VT-x also enabled?
On Sunday, January 31, 2021 at 10:16:38 AM UTC-6 Fabrizio Romano Genovese 
wrote:

>
> Hello all,
>
> My problem is quite simple: I tried to install qubes 4.0.4-rc2. During the 
> installation procedure, it says that I don't have IOMMU/VT-d. Accordingly, 
> I cannot even start sys-net once the installation completes because of lack 
> of VT-d. 
> The problem is that my computer supports VT-d (CPU is intel i7 1165G7). 
> VT-d is moreover enabled in my bios. Any clue about what the problem could 
> be?
>
> Fab
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f2b4c00c-5326-4516-9566-db1df2803366n%40googlegroups.com.


Re: [qubes-users] VT-d on XPS 9310

2021-01-31 Thread donoban
On 1/31/21 5:37 PM, donoban wrote:
> Maybe dom0 'dmesg' and 'xml dmesg'  help. Also try to upgrade your BIOS.

Wops, I meant 'xl dmesg'.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9f2ff95f-b056-5f00-adf4-98ffdff6cf8b%40riseup.net.


OpenPGP_signature
Description: OpenPGP digital signature


Re: [qubes-users] VT-d on XPS 9310

2021-01-31 Thread donoban
On 1/31/21 5:16 PM, Fabrizio Romano Genovese wrote:
> 
> Hello all,
> 
> My problem is quite simple: I tried to install qubes 4.0.4-rc2. During
> the installation procedure, it says that I don't have IOMMU/VT-d.
> Accordingly, I cannot even start sys-net once the installation completes
> because of lack of VT-d.
> The problem is that my computer supports VT-d (CPU is intel i7 1165G7).
> VT-d is moreover enabled in my bios. Any clue about what the problem
> could be?
> 
> Fab
> 

Maybe dom0 'dmesg' and 'xml dmesg'  help. Also try to upgrade your BIOS.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6cc31997-e085-0a72-53e1-c030361f3347%40riseup.net.


OpenPGP_signature
Description: OpenPGP digital signature


[qubes-users] VT-d on XPS 9310

2021-01-31 Thread Fabrizio Romano Genovese

Hello all,

My problem is quite simple: I tried to install qubes 4.0.4-rc2. During the 
installation procedure, it says that I don't have IOMMU/VT-d. Accordingly, 
I cannot even start sys-net once the installation completes because of lack 
of VT-d. 
The problem is that my computer supports VT-d (CPU is intel i7 1165G7). 
VT-d is moreover enabled in my bios. Any clue about what the problem could 
be?

Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f1120e83-96c2-4acc-82ac-34bee3c9b6abn%40googlegroups.com.


Re: [qubes-users] cryptsetup concerns

2021-01-31 Thread unman
On Sun, Jan 31, 2021 at 09:07:07AM -0600, Mason wrote:
> Hi,
> 
> Anyone know why cryptsetup isn't updated to 2.3? I asked Andrew, and it
> appears that Qubes 4.1 is using 1.7..5 cryptsetup.. 2.2 cryptsetup has a
> vulnerability in it.
> https://nvd.nist.gov/vuln/detail/CVE-2020-14382#match-5995976 .
> 
> https://gitlab.com/cryptsetup/cryptsetup/-/wikis/FrequentlyAskedQuestions
> Though, since 1.7 the default hash is SHA256 ("LUKS1 used SHA1 (since
> version 1.7.0 it uses SHA256)".
> 
> Andrew suggested I post this in the mailing list.
> 
> Thanks,
> Mason
> 

I think you are wrong here - 4.1 will use Fedora 32 in dom0, and that
*will* have cryptsetup-2.3.4-1.fc32.(Available as security update in
32 since Sept 2020)
Qubes 4.0 which uses Fedora 25 in dom0 does have the older version.

In any case, this will only bite, I think, if you allow an attacker
to attach a crafted image to dom0 - in that case you are hosed in any
case imo. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20210131153452.GB572%40thirdeyesecurity.org.


Re: [qubes-users] Re: Someone should port this RDP Windows windower thing for Qubes

2021-01-31 Thread qubesth...@gmail.com
Some Reddit users are claiming RDP is working perfectly for them in Qubes: 

https://www.reddit.com/r/Qubes/comments/l1myt8/how_good_is_windows_vm_performance/gk1e15i?utm_source=share&utm_medium=web2x&context=3

On Tuesday, December 8, 2020 at 5:52:42 AM UTC-6 evado...@gmail.com wrote:

> :-( thanks for your research anyway
>
>> Chances we get seamless windows apps anytime soon are slim.
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bff21311-8f15-4fef-859b-ac22bb356de4n%40googlegroups.com.


[qubes-users] cryptsetup concerns

2021-01-31 Thread Mason
Hi,

Anyone know why cryptsetup isn't updated to 2.3? I asked Andrew, and it
appears that Qubes 4.1 is using 1.7..5 cryptsetup.. 2.2 cryptsetup has a
vulnerability in it.
https://nvd.nist.gov/vuln/detail/CVE-2020-14382#match-5995976 .

https://gitlab.com/cryptsetup/cryptsetup/-/wikis/FrequentlyAskedQuestions
Though, since 1.7 the default hash is SHA256 ("LUKS1 used SHA1 (since
version 1.7.0 it uses SHA256)".

Andrew suggested I post this in the mailing list.

Thanks,
Mason

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAOebxSS%3Dh%2B6kfpxiHSYfoWoFUQ3nZv7ZbqytizKYUPDJ1vRKnw%40mail.gmail.com.


SOLVED. Re: Aw: Re: [qubes-users] HELP! after update dom0 "no bootable device found"

2021-01-31 Thread haaber


It seems it ignores your mountpoint, you pass directly the hard disk and
EFI partition number (which should be the first) so in:
efibootmgr -v -c -u -L Qubes -l /EFI/qubes/xen.efi -d /dev/sda -p 1
"placeholder /mapbs /noexitboot"

You only have to worry about /dev/sda
-
Thank you very much Donoban. I tried:
root@debian:~# efibootmgr -v -c -u -L Qubes -l /EFI/qubes/xen.efi -d
/dev/nvme0n1 -p 1 "placeholder /mapbs /noexitboot"
efibootmgr: ** Warning ** : Boot0002 has same label Qubes
BootCurrent: 0001
Timeout: 0 seconds
BootOrder: ,0001
Boot0001* UEFI: KingstonDataTraveler 2.0PMAP, Partition 1
  PciRoot(0x0)/Pci(0x14,0x0)/USB(8,0)/HD(1,MBR,0x51f9fa69,0x630,0x1700)
Boot0002* Qubes
  
HD(1,GPT,13cfa870-22a0-4035-8a48-d3cb09dcfb92,0x800,0x64000)/File(\EFI\qubes\xen.efi)placeholder
 /mapbs /noexitboot
Boot0006* CD/DVD/CD-RW Drive    BBS(CDROM,CD/DVD/CD-RW Drive,0x0)
Boot0007* Onboard NIC    BBS(Network,IBA CL Slot 00FE v0112,0x0)
Boot* Qubes
  
HD(1,GPT,13cfa870-22a0-4035-8a48-d3cb09dcfb92,0x800,0x64000)/File(\EFI\qubes\xen.efi)placeholder
 /mapbs /noexitboot
what you see is that Qubes was still in the UEFI "line" now at position
0002. I will have to try a reboot - don't like it, because it is a pain
in the neck to re-install wireless on debian; I hope that I downloaded
all packages I need on /boot of my life system ... otherwise I will
become silent for a while!    Cheers


I tried a reboot after an extra-emergeny backup (luks-by-hand training:)
and your efibootmgr command worked. qubes is back!  Thank you so much.

Bernhard

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d127edb5-6ecc-e4cf-814d-dbf602c30907%40web.de.


[qubes-users] Wifi driver needs to be blacklisted to be reloaded on suspend/resume since one of the last updates

2021-01-31 Thread Markus Kilås
Hi all,

After one of the recent updates (in January 2021 maybe?), after resuming
from suspend the wifi is not reconnected as it previously were.

This was also seen by somebody else in below (invalid) bug report:
https://github.com/QubesOS/qubes-issues/issues/6370

I just want to mention that the proposed solution is working for me:
https://www.qubes-os.org/doc/suspend-resume-troubleshooting/#drivers-do-not-reload-automatically-on-suspendresume


Putting "iwlwifi" in /rw/config/suspend-module-blacklist of sys-net
resolved the issue.


Cheers,
Markus

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/825615c7-de17-8600-dbfe-7ee2c884e7f1%40xn--kils-soa.se.


Re: [qubes-users] Re: [PATCH v5.10] drm/i915/userptr: detect un-GUP-able pages early

2021-01-31 Thread donoban
On 1/29/21 4:35 PM, Jinoh Kang wrote:
> You can collect panic and oops logs with a kernel that has
> CONFIG_EFI_VARS_PSTORE enabled.  If you don't already have one, you may
> build qubes-linux-kernel via qubes-builder with the following line
> added to `config-qubes`:
> 
> CONFIG_EFI_VARS_PSTORE=y
> 
> After booting the kernel, subsequent panic and oops will be recorded
> in EFI variables, which will then appear as /sys/fs/pstore/dmesg-efi-*
> at the next boot.  Also note that the logs may be split into multiple
> parts that are numbered in a reversed order.  For more information, see
> https://www.kernel.org/doc/html/latest/admin-guide/pstore-blk.html

Hi, after booting again 5.10.8 kernel (with 5.10.11 I can't start any VM
but I think Marek is already aware) I can see the dmesg-efi "files".

Here is the concatenation of all files (probably in reverse or wrong order):
blob:https://share.riseup.net/3360675c-292f-4114-a109-c410e2518295

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5d2e2e8b-d1e0-7d56-6948-9de7c363dc54%40riseup.net.


OpenPGP_signature
Description: OpenPGP digital signature


[qubes-users] Audio / Video in Q4 Windows 10 HVM via USB possible?

2021-01-31 Thread 799
Hello,

I have installed Windows 10 Pro in a Qubes 4 HVM and was very satisfied,
that the Installation was very easy (compared to the hazzle I had ~ 2 years
ago).
I just followed the "official" Qubes documentation and was also able to get
Qubes Windows Tools running.

Working for an IT solution provider and because of the Covid-19 situation I
need Audio within Windows.
Because it is not possible to pass USB devices via sys-usb to the Windows
HVM, what are best practises to do so?

My ideas so far:

1) buy a PCMCIA Express USB card and pass it over to the Windows Qube

2) pass the internal USB Controller (PCI device) to the Windows Qube (which
would also remove some other internal devices from sys-usb)

I could then connect my USB Headset to USB ports which are terminated in
the Windows Qubes.

Has anyone being able to get Audio working and are there any other approach
doing this?
Unified Communication/Audio is the only reason why I am not using Qubes as
my main OS for business use.

Regards

-799

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2uSavSqbU7tWCn34ZLtRu8Jhq-Vx2GhvVycqH%3Dnti2CyQ%40mail.gmail.com.