Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread Simon Gaiser
Marek Marczykowski-Górecki:> On Thu, Jan 18, 2018 at 03:06:00PM +, Simon Gaiser wrote: >> awokd: >>> On Thu, January 18, 2018 2:26 pm, "Marek Marczykowski-Górecki" wrote: >>> According to logs provided by mossy-nw permissive mode is correctly enabled in xen-pciback in dom0 for

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread 'awokd' via qubes-users
On Thu, January 18, 2018 2:26 pm, "Marek Marczykowski-Górecki" wrote: > > According to logs provided by mossy-nw permissive mode is correctly > enabled in xen-pciback in dom0 for this device. The question here is what > else is needed for HVM (using qemu in stubdomain). My dom0 log shows that

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Jan 18, 2018 at 02:12:26PM -, awokd wrote: > On Thu, January 18, 2018 1:17 am, Marek Marczykowski-Górecki wrote: > > On Thu, Jan 18, 2018 at 01:05:46AM +, mossy-nw wrote: > >>> On Wed, Jan 17, 2018 at 11:54:23PM +, mossy-nw

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread 'awokd' via qubes-users
On Thu, January 18, 2018 1:17 am, Marek Marczykowski-Górecki wrote: > On Thu, Jan 18, 2018 at 01:05:46AM +, mossy-nw wrote: >>> On Wed, Jan 17, 2018 at 11:54:23PM +, mossy-nw wrote: Has anyone using Qubes R4.0 been able to resolve any issues (e.g. with wifi) by setting PCI

Re: [qubes-users] Re: QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-18 Thread cooloutac
SO it doesn't look like 4th or 5th generation boards are going to get a bios patch. IS the bios patch nescessary? Or Should we just assume our desktop pc's are about as secure as android phones now? Are they no good after a year or two? I joke that real security costs alot of money because

Re: [qubes-users] Re: QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-18 Thread 'awokd' via qubes-users
On Thu, January 18, 2018 3:04 pm, cooloutac wrote: > But if you have to buy a new > mobo and pc every year or two to stay up to date that is a sad future for > most people. Most people, but not the Intel board members and stockholders! -- You received this message because you are subscribed to

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Jan 18, 2018 at 03:06:00PM +, Simon Gaiser wrote: > awokd: > > On Thu, January 18, 2018 2:26 pm, "Marek Marczykowski-Górecki" wrote: > > > >> > >> According to logs provided by mossy-nw permissive mode is correctly > >> enabled in

AW: Re: [qubes-users] How to play videos in qubes? says needs codec H.264, Mpeg-4 something

2018-01-18 Thread '[799]' via qubes-users
Tim W wrote: >> [799] wrote >> I have a complete How-to which you can just >> follow per copy & paste to get a multimedia >> AppVM which is based on Debian-8 and can >> be used to listen to Spotify, watch DVD and >> use Amazon Prime or Spotify. >> If you are interested I can send you the

[qubes-users] Re: HCL - Lenovo X250, Intel Core i7-5600U, 16GB Ram, 512GB SSD

2018-01-18 Thread juanjimenezbazzino
Hi Peter! Awesome to find someone else with an x250 trying qubes. Im having the same issue trying to install v3.2 but without success. Could you post a step-by-step of booting until the install splash screen? On Wednesday, September 14, 2016 at 9:48:40 AM UTC-3, Peter Völkl wrote: > Woks

Re: [qubes-users] How to play videos in qubes? says needs codec H.264, Mpeg-4 something

2018-01-18 Thread Steve Coleman
On 01/18/2018 11:12 AM, jerr...@disroot.org wrote: i installed kmplayer, still says need some additional codecs, refers me to the software program, finds gsstreamer multimedia codecs - H.264 , when i click install on this plugin it says enable third-party software source? gsstreamer

[qubes-users] Alt-Tab not passed through

2018-01-18 Thread '[799]' via qubes-users
Gesendet von ProtonMail mobile -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Jan 18, 2018 at 04:50:02PM +, mossy-nw wrote: > > > Marek Marczykowski-Górecki: > > On Thu, Jan 18, 2018 at 01:05:46AM +, mossy-nw wrote: > >> Marek Marczykowski-Górecki: > >>> On Wed, Jan 17, 2018 at 11:54:23PM +, mossy-nw

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread 'awokd' via qubes-users
On Thu, January 18, 2018 4:16 pm, "Marek Marczykowski-Górecki" wrote: > Not exactly... > > > 1. qvm-start sends a request to qubesd, using Admin API > 2. qubesd starts required netvm (recursively), if needed > 3. qubesd request qmemman to allocate needed memory for new VM > (according to VM's

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Jan 18, 2018 at 04:44:54PM -, awokd wrote: > On Thu, January 18, 2018 4:16 pm, "Marek Marczykowski-Górecki" wrote: > > > > Not exactly... > > > > > > 1. qvm-start sends a request to qubesd, using Admin API > > 2. qubesd starts required

Re: [qubes-users] Re: QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-18 Thread David Hobach
On 01/18/2018 04:04 PM, cooloutac wrote: SO it doesn't look like 4th or 5th generation boards are going to get a bios patch. IS the bios patch nescessary? Meltdown can be patched on Kernel and/or Hypervisor level with a performance loss by doing in the Kernel what should be done by the CPU.

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread 'awokd' via qubes-users
On Thu, January 18, 2018 3:06 pm, Simon Gaiser wrote: > awokd: > >> On Thu, January 18, 2018 2:26 pm, "Marek Marczykowski-Górecki" wrote: >> >> >>> >>> According to logs provided by mossy-nw permissive mode is correctly >>> enabled in xen-pciback in dom0 for this device. The question here is >>>

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread mossy-nw
Marek Marczykowski-Górecki: > On Thu, Jan 18, 2018 at 01:05:46AM +, mossy-nw wrote: >> Marek Marczykowski-Górecki: >>> On Wed, Jan 17, 2018 at 11:54:23PM +, mossy-nw wrote: Dear Qubes community, >>> Has anyone using Qubes R4.0 been able to resolve any issues (e.g. with

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Jan 18, 2018 at 03:42:43PM -, awokd wrote: > On Thu, January 18, 2018 3:06 pm, Simon Gaiser wrote: > > awokd: > > > >> On Thu, January 18, 2018 2:26 pm, "Marek Marczykowski-Górecki" wrote: > >> > >> > >>> > >>> According to logs provided

Re: [qubes-users] Re: QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-18 Thread Nik H
On Jan 16, 2018, at 2:56 AM, Vít Šesták wrote: > > * If an application does not mitigate Spectre and attacker finds useful entry > point, attacker can read memory of the application (but nothing more). > * If VM kernel does not

Re: [qubes-users] Re: QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-18 Thread 'awokd' via qubes-users
On Thu, January 18, 2018 6:00 pm, Nik H wrote: > Reasoning: The entire point of HW virtualization is to have very fast and > seamless context switching so that if I have 10 different VMs running, > the processor does not lose performance from that. So you keep caches, > and you keep speculatively

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread Marek Marczykowski-Górecki
On Thu, Jan 18, 2018 at 07:21:14PM +, mossy-nw wrote: > OK thanks, Marek. I'll try to help get that backup bug reproduced > then... should I file a permissive mode bug report based on this > discussion, or do you feel like all of the relevant folks are looped in > on this thread already?

[qubes-users] Created new fedora-26 dvm, how to delete old dvm

2018-01-18 Thread '[799]' via qubes-users
Hello, After migrating my templates to Fedora 26, I have also created a new disposable VM, based on a Fedora 26 template. I have set the new DVM to start, from all other AppVMs, as such the DVM should not be referenced to in any other app vm. I tried to remove the default DVM, but it didn't

Re: [qubes-users] Created new fedora-26 dvm, how to delete old dvm

2018-01-18 Thread donoban
On 01/18/2018 09:27 PM, '[799]' via qubes-users wrote: > Hello, > > After migrating my templates to Fedora 26, I have also created a new > disposable VM, based on a Fedora 26 template. > > I have set the new DVM to start, from all other AppVMs, as such the DVM > should not be referenced to in

Re: [qubes-users] Re: QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-18 Thread cooloutac
On Thursday, January 18, 2018 at 12:20:49 PM UTC-5, David Hobach wrote: > On 01/18/2018 04:04 PM, cooloutac wrote: > > SO it doesn't look like 4th or 5th generation boards are going to get a > > bios patch. IS the bios patch nescessary? > > Meltdown can be patched on Kernel and/or Hypervisor

Re: [qubes-users] Re: QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-18 Thread Vít Šesták
On Thursday, January 18, 2018 at 7:00:42 PM UTC+1, Nik H wrote: > On Jan 16, 2018, at 2:56 AM, Vít Šesták <…@v6ak.com> wrote: > > > > * If an application does not mitigate Spectre and attacker finds useful > > entry point, attacker can read memory of the application (but nothing more). > > * If

[qubes-users] Re: GPU?

2018-01-18 Thread Alex Dubois
On Thursday, 18 January 2018 21:00:19 UTC, Alex Dubois wrote: > On Sunday, 14 January 2018 07:12:24 UTC, ro...@tuta.io wrote: > > Is qubes able to use the computing power of the gpu or is the type of gpu > > installed a waste in this issue? > > You can use GPU computing in Dom0 with the

Re: [qubes-users] Created new fedora-26 dvm, how to delete old dvm

2018-01-18 Thread cooloutac
On Thursday, January 18, 2018 at 3:34:54 PM UTC-5, donoban wrote: > On 01/18/2018 09:27 PM, '[799]' via qubes-users wrote: > > Hello, > > > > After migrating my templates to Fedora 26, I have also created a new > > disposable VM, based on a Fedora 26 template. > > > > I have set the new DVM to

[qubes-users] Re: GPU?

2018-01-18 Thread Alex Dubois
On Sunday, 14 January 2018 07:12:24 UTC, ro...@tuta.io wrote: > Is qubes able to use the computing power of the gpu or is the type of gpu > installed a waste in this issue? You can use GPU computing in Dom0 with the assumption that: - You trust the software you plan on using - 3D design

Re: [qubes-users] Please help with 8th Generation Intel i5

2018-01-18 Thread donoban
On 01/18/2018 11:15 AM, Krišjānis Gross wrote:> I did navigate to /tmp and looked at some logs. Unfortunately I do not know what to look for there. Took some screen shots (attached). Does that ring any bells? I think the problem is: (EE) VESA(0): V_BIOS address 0xaa7a0 out of range I've

[qubes-users] Re: Sporadic Inter-VM Routing Issues with Qubes Updates Proxy

2018-01-18 Thread wordswithnemo
On Monday, January 15, 2018 at 12:39:41 PM UTC-5, Kiwi17 wrote: > Hi, I was hoping someone may be able to help make heads or tails of this > frustrating issue I'm having. > > > > Background > > I use a VPN configured as-per the Qubes recommended config for VPNs >

Re: [qubes-users] GPU?

2018-01-18 Thread 'Tom Zander' via qubes-users
On Sunday, 14 January 2018 08:12:24 CET r...@tuta.io wrote: > Is qubes able to use the computing power of the gpu or is the type of gpu > installed a waste in this issue? Relevant here is an email I wrote recently; https://groups.google.com/forum/#!msg/qubes-devel/40ImS390sAw/Z7M0E8RiAQAJ The

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread Simon Gaiser
awokd: > On Thu, January 18, 2018 2:26 pm, "Marek Marczykowski-Górecki" wrote: > >> >> According to logs provided by mossy-nw permissive mode is correctly >> enabled in xen-pciback in dom0 for this device. The question here is what >> else is needed for HVM (using qemu in stubdomain). > > My

[qubes-users] Re: GPU?

2018-01-18 Thread Vít Šesták
On Thursday, January 18, 2018 at 10:00:19 PM UTC+1, Alex Dubois wrote: > You can use GPU computing in Dom0 with the assumption that: > - You trust the software you plan on using >- 3D design software such as Blender >- GPU compute such as CUDA libs, Tensorflow, Keras, etc.. > - You only

AW: [qubes-users] Alt-Tab not passed through

2018-01-18 Thread '[799]' via qubes-users
Sorry for my first empty email, which has been send to early. I am using a fedora template which has wäre Horizon View installed, so that I can use the AppVM to access my corporate desktop. I can start the application, login, launch my virtual desktop and work with it. One very annoying thing

Re: [qubes-users] Re: sys-usb / template install yubikey tools ?

2018-01-18 Thread ThierryIT
Not familiar with this ... Will need procediure to follow. Le mercredi 17 janvier 2018 23:03:31 UTC+2, Alex Dubois a écrit : > On Wednesday, 17 January 2018 15:15:45 UTC, ThierryIT wrote: > > No, I am still under R3.2 > > > > Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit : > > > On

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread Simon Gaiser
Marek Marczykowski-Górecki: [...] > I don't see anything else related to this device. So until Simon gets > permissive mode sorted out, it look like you have to use that usb > ethernet. FYI: https://github.com/QubesOS/qubes-core-admin/pull/184 -- You received this message because you are

[qubes-users] Re: Just installed AEM(Anti-Evil-Made)...see an error:(

2018-01-18 Thread Tim W
On Sunday, January 14, 2018 at 11:06:56 AM UTC-5, vel...@tutamail.com wrote: > Managed to find what was causing the error and how to remove the error: > > https://askubuntu.com/questions/778875/tpm-error-6-when-booting-thinkpad > > https://bugzilla.redhat.com/show_bug.cgi?id=1413409 > > In my

Re: AW: [qubes-users] Alt-Tab not passed through

2018-01-18 Thread mossy-nw
'[799]' via qubes-users: > Sorry for my first empty email, which has been send to early. > > I am using a fedora template which has wäre Horizon View installed, so that I > can use the AppVM to access my corporate desktop. > > I can start the application, login, launch my virtual desktop and work

Re: [qubes-users] PCI passthrough working in Qubes R4.0?

2018-01-18 Thread mossy-nw
Marek Marczykowski-Górecki: > On Thu, Jan 18, 2018 at 07:21:14PM +, mossy-nw wrote: >> OK thanks, Marek. I'll try to help get that backup bug reproduced >> then... should I file a permissive mode bug report based on this >> discussion, or do you feel like all of the relevant folks are looped