[qubes-users] HCL - Lenovo Thinkpad T540p

2016-12-09 Thread Andrew M
Everything works well. Some small inconsistencies between the VMs in 
terms of HiDPI scaling

but that is more an application issue rather than qubes specifically.

Suspend, Audio, Brightness all work.

Shutting down takes ages, and I often have to force shut-down after ~5m, 
though I see other

users with the same problem so unknown if hardware specific.

Install had to be done using BIOS/Legacy method, install USB would not 
boot otherwise.


Overall really happy with it :)

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3845ae3a-afaa-318a-cb37-86ab934d312a%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-LENOVO-20BECTO1WW-20161210-024247.yml
Description: application/yaml


[qubes-users] qmemman entries in the journal

2016-12-09 Thread Achim Patzner
Hi!


Could someone tell me what qmemman tries to tell me from time to time
when it is logging this (line wrapping by my editor):


Dez 10 03:29:05 dom0 qmemman.systemstate[2624]:
  Xen free = 61143341669 too small for satisfy assignments!
assigned_but_unused=61301070009L, domdict=
  {'1': {'last_target': 314572800, 'meminfo': None, 'memory_current':
312463360L, 'no_progress': False, 'memory_actual': 314572800,
'memory_maximum': 314572800, 'mem_used': None, 'id': '1',
'slow_memset_react': False},
   '0': {'last_target': 65586845881, 'meminfo': {'MemTotal': 4287901696,
'Cached': 1112002560, 'SwapFree': 63999832064, 'SwapTotal': 63999832064,
'MemFree': 2623762432, 'Buffers': 5431296}, 'memory_current':
4287885312L, 'no_progress': False, 'memory_actual': 65586845881,
'memory_maximum': 68578967552, 'mem_used': 546705408, 'id': '0',
'slow_memset_react': False},
   '3': {'last_target': 524288000, 'meminfo': None, 'memory_current':
524288000L, 'no_progress': False, 'memory_actual': 524288000L,
'memory_maximum': 3145728000, 'mem_used': None, 'id': '3',
'slow_memset_react': False},
   '2': {'last_target': 524288000, 'meminfo': None, 'memory_current':
524288000L, 'no_progress': False, 'memory_actual': 524288000L,
'memory_maximum': 3145728000, 'mem_used': None, 'id': '2',
'slow_memset_react': False},
   '4': {'last_target': 419430400, 'meminfo': None, 'memory_current':
419430400L, 'no_progress': False, 'memory_actual': 419430400L,
'memory_maximum': 4194304000, 'mem_used': None, 'id': '4',
'slow_memset_react': False}
  }

I'm not really running out of memory, am I? It is happening with about
10 template VMs running which could be using up 40 GB at most (as all
have a maximum of 4000 MB in their configurations).



Achim


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4ab62627-59c9-6135-4d26-7007a3fec59a%40noses.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 2/3 of VMs randomly lose network access; sys-net, sys-firewall, and others normal

2016-12-09 Thread Chris Laprise

On 12/09/2016 05:56 PM, Eva Star wrote:

On 12/07/2016 07:48 AM, Andrew David Wong wrote:

FWIW, `systemctl restart qubes-firewall` fixed it for me last time.

Today one my VM losses network 2 times. Every time I tried `systemctl 
restart qubes-firewall` and it not fix the issue. It's looks like the 
issue at VM. Maybe, fedora-25 will fix it...




Debian 8 & 9 have been working fine, BTW, and Debian has a more secure 
update than Fedora.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dc2f4bf6-f1a1-a09d-b718-d357a5b5f018%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: off topic - invite codes to 'riseup'

2016-12-09 Thread FuntooHacker
On Wed, Dec 07, 2016 at 07:55:31PM -0800, simmonsja...@gmail.com wrote:
> On Sunday, December 4, 2016 at 7:24:38 PM UTC-5, zachke...@gmail.com wrote:
> > Could you PM me one as well?
> 
> Could two people also send me two invitation codes (via email) so that I may 
> join the riseup.net email service?
> 
> Thank you in advance.

If someone (or two) would be so charitable, I'd like 2 invites to riseup also.
-- 
List replies preferred.

A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
A: Top-posting.
Q: What is the most annoying thing in e-mail?

Don't top-post: http://en.wikipedia.org/wiki/Top_post#Top-posting

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161210012519.GM27966%40server.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Digital signature


Re: [qubes-users] Installing on macOS Macbook

2016-12-09 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-08 21:11, Jean-Philippe Ouellet wrote:
> On Thu, Dec 8, 2016 at 6:37 AM, Andrew David Wong
>  wrote:
>> Qubes isn't supported on VirtualBox or on Macbooks
> 
> This is the first I've heard of MacBooks being "not supported".
> 

By "not supported," I mean that there are a lot of known problems
specific to Macbook compatibility, and we don't have any particular
commitment to changing Qubes in order to fix/circumvent those problems.

> I know at least one person personally who is currently running
> Qubes on a recent (<2yo) MacBook, and it is completely usable.
> 

"Not supported" does not (and has never) meant "unusable" or "cannot
be done." I'm not sure why you would think it does. (Frankly, your
interpretation is uncharitable, given that I pointed out that there
are threads on accomplishing each one separately and that it might be
possible through DIY hacking.)

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=EpU0
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5ee1b3f2-b51f-9a7b-b286-5f855820b316%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Fedora 23 EOL December 20; Update Your Templates!

2016-12-09 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-09 05:37, Daniel Moerner wrote:
> Hi all,
> 
> Just a friendly reminder that Fedora 23 End of Life is December 20.[1] You 
> may want to make sure you've updated your templates; there is a guide in the 
> Qubes Documentation.[2]
> 
> I know I don't get to decide what people talk about, but I'd like to ask that 
> people NOT use this thread to rehash the debate about the dom0 distribution. 
> :)
> 
> Best,
> Daniel
> 
> [1] https://fedoramagazine.org/fedora-23-end-of-life/
> [2] https://www.qubes-os.org/doc/template/fedora/upgrade-23-to-24/
> 

Thanks for the reminder, Daniel. I'll also take this
opportunity to re-share our announcement from last month:

https://www.qubes-os.org/news/2016/11/15/fedora-24-template-available/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=4HRE
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1bce03ca-648a-795e-95a5-f6cb25cc2530%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qvm-open-in-dvm opens files with wrong application

2016-12-09 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-09 03:53, rutger7...@gmail.com wrote:
> Using command 'qvm-open-in-dvm' in an AppVM opens all files in chromium.
> 
> I use a custom DispVM image based on the fedora-23-minimal template. On it I 
> have installed chromium and libreoffice. Opening files ending in .odt and 
> .docx using 'xdg-open' opens libreoffice. Opening files ending in .html and 
> .pdf using 'xdg-open' opens chromium. All is well in this aspect.
> 
> When the same files are opened from an AppVM using 'qvm-open-in-dvm' ALL 
> files, regardless of extension, are opened in chromium.
> 
> Searching Google for a way to change what software is used to open the files 
> when 'qvm-open-in-dvm' is used, yielded no results.
> 

It sounds like you need to change your MIME type associations:

https://unix.stackexchange.com/questions/154552/how-an-application-is-chosen-over-others-to-open-a-particular-filetype-in-linux

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=TdR7
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3adf5e2e-d1d6-4771-fc0e-927e10efd923%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 2/3 of VMs randomly lose network access; sys-net, sys-firewall, and others normal

2016-12-09 Thread Eva Star

On 12/07/2016 07:48 AM, Andrew David Wong wrote:

FWIW, `systemctl restart qubes-firewall` fixed it for me last time.

Today one my VM losses network 2 times. Every time I tried `systemctl 
restart qubes-firewall` and it not fix the issue. It's looks like the 
issue at VM. Maybe, fedora-25 will fix it...


--
Regards

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ddf52728-8c59-da2f-c32e-97c29655cd91%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] It's winter, my laptop is freezing (again!)

2016-12-09 Thread Simon

Hello everyone,

Following the latest Qubes update the Qubes seems again to randomly 
freeze every 1-2 day making it unusable.


After the last freeze I fetched the following error from dmesg (I'm 
using a Thinkpad T500):


--- 8< 

[18899.015916] audit: type=1110 audit(1481304606.026:978): pid=7687 
uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred 
grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? 
addr=? terminal=? res=success'
[18971.119105] radeon :01:00.0: ring 0 stalled for more than 
10372msec
[18971.119122] radeon :01:00.0: GPU lockup (current fence id 
0x0001950d last fence id 0x0001962b on ring 0)
[18971.354376] radeon :01:00.0: Saved 9145 dwords of commands on 
ring 0.

[18971.354394] radeon :01:00.0: GPU softreset: 0x0008
[18971.354398] radeon :01:00.0:   R_008010_GRBM_STATUS  = 
0xA0003030
[18971.354401] radeon :01:00.0:   R_008014_GRBM_STATUS2 = 
0x0003
[18971.354404] radeon :01:00.0:   R_000E50_SRBM_STATUS  = 
0x200010C0
[18971.354408] radeon :01:00.0:   R_008674_CP_STALLED_STAT1 = 
0x
[18971.354411] radeon :01:00.0:   R_008678_CP_STALLED_STAT2 = 
0x
[18971.354414] radeon :01:00.0:   R_00867C_CP_BUSY_STAT = 
0x00020186
[18971.354418] radeon :01:00.0:   R_008680_CP_STAT  = 
0x80028645
[18971.354421] radeon :01:00.0:   R_00D034_DMA_STATUS_REG   = 
0x44C83D57

[18971.410243] radeon :01:00.0: R_008020_GRBM_SOFT_RESET=0x4001
[18971.410299] radeon :01:00.0: SRBM_SOFT_RESET=0x0100
[18971.412443] radeon :01:00.0:   R_008010_GRBM_STATUS  = 
0xA0003030
[18971.412446] radeon :01:00.0:   R_008014_GRBM_STATUS2 = 
0x0003
[18971.412449] radeon :01:00.0:   R_000E50_SRBM_STATUS  = 
0x200080C0
[18971.412453] radeon :01:00.0:   R_008674_CP_STALLED_STAT1 = 
0x
[18971.412456] radeon :01:00.0:   R_008678_CP_STALLED_STAT2 = 
0x
[18971.412460] radeon :01:00.0:   R_00867C_CP_BUSY_STAT = 
0x
[18971.412463] radeon :01:00.0:   R_008680_CP_STAT  = 
0x8010
[18971.412467] radeon :01:00.0:   R_00D034_DMA_STATUS_REG   = 
0x44C83D57
[18971.412481] radeon :01:00.0: GPU reset succeeded, trying to 
resume
[18971.430177] [drm] PCIE GART of 512M enabled (table at 
0x00254000).

[18971.430200] radeon :01:00.0: WB enabled
[18971.430203] radeon :01:00.0: fence driver on ring 0 use gpu addr 
0x1c00 and cpu addr 0x88013a777c00
[18971.430981] radeon :01:00.0: fence driver on ring 5 use gpu addr 
0x000521d0 and cpu addr 0xc900014121d0

[18971.462438] [drm] ring test on 0 succeeded in 1 usecs
[18971.638803] [drm] ring test on 5 succeeded in 1 usecs
[18971.638811] [drm] UVD initialized successfully.
[18971.639046] switching from power state:
[18971.639048]  ui class: none
[18971.639050]  internal class: boot
[18971.639052]  caps: video
[18971.639055]  uvdvclk: 0 dclk: 0
[18971.639057]  power level 0sclk: 6 mclk: 7 vddc: 1100
[18971.639058]  power level 1sclk: 6 mclk: 7 vddc: 1100
[18971.639060]  power level 2sclk: 6 mclk: 7 vddc: 1100
[18971.639061]  status: c b
[18971.639063] switching to power state:
[18971.639064]  ui class: performance
[18971.639066]  internal class: none
[18971.639068]  caps: single_disp video
[18971.639071]  uvdvclk: 0 dclk: 0
[18971.639072]  power level 0sclk: 11000 mclk: 40500 vddc: 900
[18971.639074]  power level 1sclk: 3 mclk: 7 vddc: 1100
[18971.639075]  power level 2sclk: 6 mclk: 7 vddc: 1100
[18971.639076]  status: r
[18981.658102] radeon :01:00.0: ring 0 stalled for more than 
10020msec
[18981.658119] radeon :01:00.0: GPU lockup (current fence id 
0x0001950e last fence id 0x0001962c on ring 0)
[18981.658250] [drm:r600_ib_test [radeon]] *ERROR* radeon: fence wait 
failed (-35).
[18981.658330] [drm:radeon_ib_ring_tests [radeon]] *ERROR* radeon: 
failed testing IB on GFX ring (-35).

[18982.811925] audit_printk_skb: 15 callbacks suppressed
[18982.811929] audit: type=1130 audit(1481304689.822:984): pid=1 uid=0 
auid=4294967295 ses=4294967295 msg='unit=getty@tty2 comm="systemd" 
exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'


--- 8< 


It really seems I'm out-of-luck with Qubes freezes and, frankly, I feel 
a little depressed at the idea I may have to through it away to switch 
back to a more traditional Linux distro :'(.


For the record, I already encountered what appears to be the same 
freezes with Qubes R2, but setting KWin to use XRender instead of the 
OpenGL as the compositing engine definitively solved the issue with no 
noticeable drawback and gave me a rock solid Qubes (with full screen 
Youtube videos and all the fancy, good old times!).


Since Qubes R3.2 and its switch to XFCE, 

Re: [qubes-users] USB hardware firewall (was: epoxy on ram to prevent cold boot attacks?)

2016-12-09 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sun, Sep 04, 2016 at 06:35:42PM +1200, Robert Fisk wrote:
> On 09/01/2016 06:55 PM, johnyju...@sigaint.org wrote:
> > I was thinking earlier that some form of a "USB Firewall" hardware
> > device might be cool to create; one that goes into each USB port in
> > between each device and the PC, and only passes a specific device,
> > or only a HID device (and doesn't permit a drive to add another HID
> > identity).  Yet another side project for winter. :)  There may be
> > existing products.
> 
> 
> Ahem. Allow me to introduce you to a project I have been working on
> for a while now:
> 
> https://github.com/robertfisk/usg/wiki
> https://github.com/robertfisk/USG/wiki/FAQ
> 
> The USG (which is Good, not Bad) is a hardware firewall for your USB
> ports. It connects between your computer and your untrusted USB
> device, isolating the badness with two dedicated processors.
> 
> Features:
>  - Isolates low-level USB exploits by using a simple internal protocol
> with minimal attack surface
> 
>  - No hub support blocks 'hidden' malicious devices
> 
>  - Prevents devices changing their enumerated class after connection,
> stopping malicious class changes.
> 
> 
> Device support: mass storage (flash drives), keyboards, mice.
> 
> Project status: You can build your own USG v0.9 hardware out of
> development boards if you are handy with a soldering iron. End user
> hardware is approaching production-ready status, samples will be
> available in the coming months.
> 
> Feedback / pull requests / sales leads are welcome!

This project have great potential! The USB proxy hardware can be used
for somehow more secure USB keyboard usage on Qubes OS, when only a
single USB controller is available.
Take a look at this idea[1]:

Have a piece of hardware plugged between USB keyboard and PC (based on
https://github.com/robertfisk/USG?), to encrypt and integrity-protect
the events. And then decrypt them in dom0 and check integrity
protection, and only then pass them down to input devices stack. This
should at least partially guard against malicious USB VM. It still will
be able to perform timing based attacks to guess what you're typing -
not sure how accurate such attacks are currently. Such device could
introduce artificial delay (like - inject queued events every 50ms) to
at least partially mitigate such attacks.

What do you think about it? I think the hardware you've designed is
perfect for this!

[1]
https://github.com/QubesOS/qubes-issues/issues/2507#issuecomment-265894809

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYSwUuAAoJENuP0xzK19csXIYH/1Xw4r49ofa9P6RA3TJDqgv3
vN7+Qxzu6zXCIYt/TdWoaKtqvqsiHvhEHrFrTLE9+ysGcuiUtEzJtOBohw4WHFHd
1E1hOL14MTPUXEtu7Jrf2B5XYXQhnNTJgh58xG+nWqIpzi7/RkHz6lq9W8iRXfX2
qWfefAAH6PRywECaj6VEPh8PcbBtu9B3tn8977q1fKB3ZrltnFUjro0p9qLVQr6z
eXE6mBWKKmvTyVGCe1xe3yp7p9LGzoUgsecZEtERZHtxViOlk9faTAHwU4vOho0N
QlinJSUUdE8XWEVSGrNb+KB4Kbwikh7GoABWlSmYiJrOTxVMnOv7DE/mL5WEvtA=
=6Cbj
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161209192533.GA23647%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: off topic - invite codes to 'riseup'

2016-12-09 Thread grayishbluemarin
Could you PM me one as well?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7769b57e-3e2b-427a-b3ed-95e2eb619521%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: off topic - invite codes to 'riseup'

2016-12-09 Thread grayishbluemarin
Can anyone please send me a couple of invite codes that I might be able to sign 
up?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f536b3ca-b9f4-4e14-b9d7-9d28eb585c6e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Swappiness, Qubes, Microkernels

2016-12-09 Thread johnyjukya
> On Tuesday, 29 November 2016 09:44:17 UTC+11, Patrick Schleizer wrote:
>>
>> Would setting
>>
>> /etc/sysctl.d/swaplow.conf
>> vm.swappiness=0
>>
>> in Qubes by default make sense?
>>
>> If not effective at all, why is it not required?

Why do you thik it is not effective?  I've played around with swappiness a
lot.  It has the intended effect when I play with it, both in the vm's and
in dom0.  (I wrote a handy little dom0 memory monitor utility that shows
more details on all VM's, that I'll hopefully post  before long.)

> Question you have to ask yourself. : Do you have enough RAM to not need
> swap?
>
> Personally, I have no swap space.

I generally agree that is smart, especially in the VM's.  Although it's
nice to have in case you get one process get memory-hungry; it's nice not
to have things randomly killed.

vm.swappiness *does* have an affect.  With swappiness=0 swapping will only
happen when it really needs to; when cache/buffers have been taken back
and used, and there's just no more ram to allocate.

With higher swappiness values, infrequently-used data will be swapped out
to disk, even when it isn't necessary.  The higher the number, the more
aggressively this happens.  With a high number, only pages in active use
stay in memory.  Sounds good, but you shouldn't have a lot of inactive
stuff running in your VM's anyway.

With higher swappiness values, since the swapping isn't really necessary,
the result will be extra free ram in a VM, which Linux immediately starts
using for cache/buffers.

On bare hardware, this makes sense.  Unused memory is simply wasted, might
as well cache some data and code there until we need it.  It can't hurt.

*However*, inside a VM, it's stupid and wasteful to swap stuff out so you
can have more buffers/cache.

In fact, it's stupid and wasteful to even have buffers/cache inside a VM
at all.  Any cached data will also be cached in dom0, doing the .img
reads.

And since the templates root.img file (for example) is shared between
multiple domU's, having that cached in dom0 gives you a noticable
performance boost.

Having a virtual disks's contents *also* cached inside the VM, is
redundant, wastes memory and CPU, and makes the whole memory management
thing more awkward.  Having a block from root.img cached in dom0, as well
as every domU that uses that template, is nuts.

Qubes' memory manager deals with things as follows: for each VM, it
allocats what the VM indicates it is using, plus a "fudge factor" of 1.3x
(also known as the cache-margin-factor in /etc/qubes/qmmeman.conf, but I
think it's hard-coded elsewhere, ugh).

There's also a fudgey extra amount reserved for dom0, configurable in the
Qubes manager.  Adding more memory to this is a roundabout away of
cranking up dom0's cache, if you wish.

The memory manager, also takes any leftover memory on top of of the VM's
usage (+fudge factor) and divvies that memory up amongst all the VM's.

That's not exactly optimal.  Giving that extra memory to VM's that don't
really need it doesn't hurt anything memory-allocation-wise; if another VM
suddenly needs memory, VM's will give up the part they don't need.  It'd
result in a bit of extra unnecessarily memory shuffling and CPU usage
during memory reallocations.  I do notice the odd extra pause as memory
gets shuffled.

However, when qmemman bestows that extra memory on a Linux VM, Linux in
the VM will start using all of it for buffers/cache, which is redundant. 
The memory would be better used in dom0 caching, or for another VM doing
something useful.

I've cranked my cache-margin-factor down to 1.1, and it helps performance
for me.

The cache-margin-factor also acts as a bit of a pre-allocated margin for
memory growth, without having to request a qubes memory manager reshuffle.
 (I'm not super-thrilled with the somewhat implicit allocations of memory
to different key system purposes.  It's like controlling the system via a
bunch of loose rubber bands. :) )

On a Virtual machine system, swapping makes very little sense.  It's a
major performance killer, especially inside a VM.

About the main reason I keep it around is that if something does suddenly
take up memory, I'd rather critical processes not be killed.  But if it's
ever in use, you need to look into it.  (I have a dom0 utility which
reports on VM's swap space among other stuff.  Will post it at some
point.)

There's an argument that swapping lets unused stuff migrate to disk and
not take memory (like X server data in sys-net, or whatever).

But unless you're intentionally running very bloated AppVM's that start a
bunch of unnecessary stuff (not a great idea), swapping out unused stuff
buys you very little.

I've turned to using small fixed-size VM's for most service VM's (with my
own no-gui service flag, to avoid loading qubes-gui-agent and the X
server).  Same for pulseaudio, and other services that really don't need
to be everywhere.

That keeps the servicevm's from grabbing/releasing memory which only gets
used as a

[qubes-users] Installation failed, X failed

2016-12-09 Thread Baguette

Hello,

I attempted to install 3.2, but it failed to work. The boot failed to
get X going, and eventually it dumped me into a tmux-enabled anaconda
menu. I tried to use that menu to do the installation, but I couldn't
complete all the "spokes" (that was the word used in the anaconda
menu).

I tried to boot using the minimal graphics option for troubleshooting,
but that didn't help either. I did some searching around and found there
was this thread from 2013 that is linked on the Documentation page about
newer amd gpus, so I tried to follow that, but the link referenced in
there was broken. It talked about installing the linux-firmware package,
so I tried again to boot and when it failed I went to the terminal and
found the linux-firmware rpm and installed it, but that didn't change
anything.

The machine does have an amd radeon rx 480, but I think there are free
drivers for it.

I looked at the /tmp/X.log, and took a camera photo of the two attempts,
you can find them here: http://imgur.com/a/aaJxk

bt

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87r35hks5h.fsf%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installing on macOS Macbook

2016-12-09 Thread Chris Laprise

On 12/09/2016 12:11 AM, Jean-Philippe Ouellet wrote:

On Thu, Dec 8, 2016 at 6:37 AM, Andrew David Wong  wrote:

Qubes isn't supported on VirtualBox or on Macbooks

This is the first I've heard of MacBooks being "not supported".

I know at least one person personally who is currently running Qubes
on a recent (<2yo) MacBook, and it is completely usable.

The only issues were the need for qubes-input-proxy because the
keyboard attaches via USB, and needing to somehow bootstrap wireless
drivers, fetching them via another computer and transferring them (or
sources for building them) via flash drive.

YMMV



The qubes-input-proxy is a recent feature, and still leaves open the 
possibility of dom0 being attacked by a USB device. If you look at dev 
comments about Macs they're generally not recommended.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1230e0a7-0df3-5987-35df-e064143cdbe9%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Newbie surprises

2016-12-09 Thread Grzesiek Chodzicki
W dniu piątek, 9 grudnia 2016 09:11:39 UTC+1 użytkownik Zbigniew Łukasiak 
napisał:
> Two more surprises from me:
> 
> 1. I have USB headphones. So fare I have not yet found a way to make
> them work under Qubes - but I found some headphones with the old audio
> jack - and this works.
> 
> 2. Once I detached an USB memory device from a VM, before unmounting
> the device inside the VM. Then I could not unmount it anymore and I
> rebooted the VM. Maybe detaching should check if the device is used?
> 
> Cheers,
> Z.

1. Create a sys-usb qube
2. use qvm-usb tool in dom0 terminal to list available USB devices
3. note down the address of the USB headphones (one digit followed by two 
digits like this 1:23)
4. use qvm-usb -a vmname usbaddress
5. To detach use qvm-usb -d usbaddress

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f0b5bb0b-b562-4f05-8579-97660843b3fb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installing Qubes OS 3.2 on an external HDD possible?

2016-12-09 Thread Leeteqxv

On 09/12/16 14:53, stevenwinderl...@gmail.com wrote:

Hello everyone,

i would like to test out Qubes OS a bit and since it doesnt work in VmWare due 
to my hardware being pretty limited is it possible to install Qubes OS on an 
external USB 3.0 5400 RPM 500 GB Toshiba HDD?

To note is that some personal data including Image backups and ISO Files are on 
it currently.


Yes it is possible, but you need to dedicate a separate partition for it.
In your case, perhaps use Gparted or the like to resize your existing 
partition to free up space for Qubes to create a new one, and 
potentially also a SWAP partition. I have done this several times and 
never had a problem.


PS. As it is never 100% certain that a partition resize will be 
successful, you are strongly adviced to have a second copy of those data 
on another disk before you do the resize.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f326f5b9-e892-11de-744e-1ec9ac6270f7%40leeteq.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Installing Qubes OS 3.2 on an external HDD possible?

2016-12-09 Thread stevenwinderlich
Hello everyone,

i would like to test out Qubes OS a bit and since it doesnt work in VmWare due 
to my hardware being pretty limited is it possible to install Qubes OS on an 
external USB 3.0 5400 RPM 500 GB Toshiba HDD?

To note is that some personal data including Image backups and ISO Files are on 
it currently.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8bb27101-a7b6-4c24-832e-1bfc056fb91f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Fedora 23 EOL December 20; Update Your Templates!

2016-12-09 Thread Daniel Moerner
Hi all,

Just a friendly reminder that Fedora 23 End of Life is December 20.[1] You may 
want to make sure you've updated your templates; there is a guide in the Qubes 
Documentation.[2]

I know I don't get to decide what people talk about, but I'd like to ask that 
people NOT use this thread to rehash the debate about the dom0 distribution. :)

Best,
Daniel

[1] https://fedoramagazine.org/fedora-23-end-of-life/
[2] https://www.qubes-os.org/doc/template/fedora/upgrade-23-to-24/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ac8cfe18-866d-4611-9b75-bd038b671e20%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qvm-open-in-dvm opens files with wrong application

2016-12-09 Thread rutger7...@gmail.com
Using command 'qvm-open-in-dvm' in an AppVM opens all files in chromium.

I use a custom DispVM image based on the fedora-23-minimal template. On it I 
have installed chromium and libreoffice. Opening files ending in .odt and .docx 
using 'xdg-open' opens libreoffice. Opening files ending in .html and .pdf 
using 'xdg-open' opens chromium. All is well in this aspect.

When the same files are opened from an AppVM using 'qvm-open-in-dvm' ALL files, 
regardless of extension, are opened in chromium.

Searching Google for a way to change what software is used to open the files 
when 'qvm-open-in-dvm' is used, yielded no results.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/05c21a93-3c01-41c5-8fce-4443e99ae769%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Windows vm ctl+alt+del

2016-12-09 Thread Ronald Duncan
Any update on
https://github.com/QubesOS/qubes-issues/issues/1585

I could not get the work arounds to work.

Situation, could use sticky keys to get into vm and install qubes-windows-tools

Having installed qubes-tools sticky keys, onboard keyboard, and direct sending 
of ctl+alt+del and ctl+alt+home do not work??

Looks like qubes-windows-tools makes the situation worse for ctl+alt+del and so 
work around appreciated.

Thanks
Ronald
PS Need to access a windows domain account:)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4f5d27f6-721f-486a-a03e-6904e83809a4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Newbie surprises

2016-12-09 Thread Zbigniew Łukasiak
Two more surprises from me:

1. I have USB headphones. So fare I have not yet found a way to make
them work under Qubes - but I found some headphones with the old audio
jack - and this works.

2. Once I detached an USB memory device from a VM, before unmounting
the device inside the VM. Then I could not unmount it anymore and I
rebooted the VM. Maybe detaching should check if the device is used?

Cheers,
Z.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAGL_UUtLbgw-zb9%2BjXS1J28y2PQXHDRuB7GrU4qSzMUaKUqztA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.