Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upUSBVMs based on fedora-23-minimal do not properly pass block devices #2018
Comments
andrewdavidwong
added
bug
C: core
P: minor
labels
May 23, 2016
andrewdavidwong
added this to the Release 3.1 milestone
May 23, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
entr0py
May 25, 2016
Is it proper form to cross-post with qubes-users? or is one preferred over the other?
Marek Marczykowski-Górecki:
Check for other xvd* device (for example xvdj). Also you may try
xl block-list, especially look at "state" column - should be "4". Normal
AppVM has 4 disks, so 5th should be your usb stick.
xl block-list shows it as state "3"! No sign of it using fdisk (no abnormal xvd*'s)
#Before attaching...
[user@dom0 ~]$ xl block-list appVM
Vdev BE handle state evt-ch ring-ref BE-path
51712 0 7 4 17 8 /local/domain/0/backend/vbd/7/51712
51728 0 7 4 18 9 /local/domain/0/backend/vbd/7/51728
51744 0 7 4 19 10 /local/domain/0/backend/vbd/7/51744
51760 0 7 4 20 11 /local/domain/0/backend/vbd/7/51760
# After attaching...
[user@dom0 ~]$ xl block-list appVM
Vdev BE handle state evt-ch ring-ref BE-path
51712 0 7 4 17 8 /local/domain/0/backend/vbd/7/51712
51728 0 7 4 18 9 /local/domain/0/backend/vbd/7/51728
51744 0 7 4 19 10 /local/domain/0/backend/vbd/7/51744
51760 0 7 4 20 11 /local/domain/0/backend/vbd/7/51760
51840 3 7 3 25 868 /local/domain/3/backend/vbd/7/51840
entr0py
commented
May 25, 2016
|
Is it proper form to cross-post with qubes-users? or is one preferred over the other? Marek Marczykowski-Górecki:
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
May 25, 2016
Member
Is it proper form to cross-post with qubes-users? or is one preferred over the other?
I think it's fine in this case. It depends on the situation.
I think it's fine in this case. It depends on the situation. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
entr0py
Jun 4, 2016
XenbusStateInitialised = 3, /* Initialised and waiting for a connection from the peer. */
So I've been trying to troubleshoot this issue rather blindly... by comparing fedora-23 template to fedora-23-minimal template:
- checked qvm-prefs & *.conf files
lsmodshows the same modules running on both systems- Kernel configs (from /proc/config.gz) have identical checksums.
dnf list installed *guess*in both systems to see which packages are missing. Installing missing packages in the minimal template and rebooting have not resolved. "guess" includes, xen, qubes, qvm, bus, virt, virsh, usb, blk, block, qxl, qemu, whatever else I could think of...qubes-template-minimal-stub.speccomplicates this but don't see any obvious candidates in there that might resolve this.
Can anyone point me in some kind of direction? Thanks!
entr0py
commented
Jun 4, 2016
|
So I've been trying to troubleshoot this issue rather blindly... by comparing fedora-23 template to fedora-23-minimal template:
Can anyone point me in some kind of direction? Thanks! |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Jun 4, 2016
Member
Take a look at /var/log/xen/xen-hotplug.log - maybe there you'll find something helpful.
|
Take a look at |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
entr0py
Jun 4, 2016
Thank you!
SOLVED! fedora-23-minimal template requires perl to be installed in order to function as a usbVM.
sigh... could live another lifetime with all the hours wasted from not knowing where to look :)
entr0py
commented
Jun 4, 2016
|
Thank you! SOLVED! fedora-23-minimal template requires sigh... could live another lifetime with all the hours wasted from not knowing where to look :) |
andrewdavidwong
closed this
Jun 4, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Jun 4, 2016
Member
@marmarek, do you want to include perl in fedora-*-minimal templates by default, or instead note in the documentation that the user must install perl in order to use a fedora-*-minimal-based VM as a USB VM?
|
@marmarek, do you want to include |
andrewdavidwong
reopened this
Jun 4, 2016
marmarek
modified the milestones:
Release 3.1 updates,
Release 3.1
Jun 5, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Jun 5, 2016
Member
If possible, I'd like to not depend on perl for USBVM. But if not, add a documentation about this requirement. It looks like the only perl usage there is in locking mechanism.
I think the whole locking in this script isn't really needed in USBVM (but it is in dom0, and it is the same script). Will think of something...
|
If possible, I'd like to not depend on |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
ptitdoc
Jun 6, 2016
I will also take a look at it in order to add it as a (optional?) dependency in archlinux.
ptitdoc
commented
Jun 6, 2016
|
I will also take a look at it in order to add it as a (optional?) dependency in archlinux. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
unman
Apr 14, 2017
Member
@andrewdavidwong Fedora 23 is eol, and the issue doesn't arise with Fedora24-minimal on r3.2, so I believe this can now be closed.
|
@andrewdavidwong Fedora 23 is eol, and the issue doesn't arise with Fedora24-minimal on r3.2, so I believe this can now be closed. |
andrewdavidwong commentedMay 23, 2016
Qubes OS version (e.g.,
R3.1):R3.1
Affected TemplateVMs (e.g.,
fedora-23, if applicable):fedora-23-minimalSteps to reproduce the behavior:
fedora-23-minimal.testvmbased onfedora-23.testvm.qvm-block -lclaims it's attached totestvmasxvdi.testvm. There is no/dev/xvdi.General notes:
Changing the USBVM from
fedora-23-minimaltofedora-23avoids the problem.Thread: https://groups.google.com/d/msgid/qubes-users/5743431F.2060607%40vfemail.net