Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upMissing steps while booting qube from cdrom #3113
Comments
marmarek
added
bug
C: qubes-manager
P: minor
labels
Sep 22, 2017
marmarek
added this to the Release 4.0 milestone
Sep 22, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
0spinboson
Sep 27, 2017
Kernel can only be set to none using qvm-prefs --set name kernel ''; when I try this via the GUI, I get an error, namely "kernel '(none)' not installed".
Additionally, when I try to install w7 via 'qvm-start w7 --cdrom=dom0:/run/media/etc/etc/etc.iso', qubesd appears to crash ("got empty response from qubesd, see journalctl").
relevant bits: w7iso.txt
0spinboson
commented
Sep 27, 2017
|
Kernel can only be set to none using qvm-prefs --set name kernel ''; when I try this via the GUI, I get an error, namely "kernel '(none)' not installed". Additionally, when I try to install w7 via 'qvm-start w7 --cdrom=dom0:/run/media/etc/etc/etc.iso', qubesd appears to crash ("got empty response from qubesd, see journalctl"). relevant bits: w7iso.txt |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Sep 27, 2017
Member
Relevant messages:
Sep 27 23:11:20 dom0 qubesdb-daemon[2895]: invalid message received from client 5
Sep 27 23:11:20 dom0 qubesd[13511]: python3: qdb-client.c:443: qdb_list: Assertion `hdr.type == QDB_RESP_LIST' failed.
Is it reproducible?
|
Relevant messages:
Is it reproducible? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
0spinboson
commented
Sep 28, 2017
|
Yes, this is the only thing it does -- it never works. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
0spinboson
Oct 4, 2017
additional info, no idea if it's useful: when I launch qubes-vm-boot-from-device from a shell and try it, it outputs this:
Traceback (most recent call last):
File "/usr/lib/python3.5/site-packages/qubesmanager/bootfromdevice.py", line 52, in save_and_apply
cdrom_location = self.vm_list[self.fileVM.currentIndex()] + ":" + self.pathText.text()
TypeError: unsupported operand type(s) for +: 'StandaloneVM' and 'str'
0spinboson
commented
Oct 4, 2017
•
|
additional info, no idea if it's useful: when I launch qubes-vm-boot-from-device from a shell and try it, it outputs this: Traceback (most recent call last): |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
I've reproduced both errors, working on the fix. |
marmarek
referenced this issue
Oct 4, 2017
Closed
qubesd crashes when starting a VM with cdrom (qvm-start --cdrom=...) #3146
marmarta
referenced this issue
in QubesOS/qubes-manager
Oct 4, 2017
Merged
Fixed issue#3113 - boot from cdrom #42
marmarek
closed this
Oct 5, 2017
marmarek
reopened this
Oct 5, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
0spinboson
Oct 8, 2017
I'm not getting the qubesd crash any more, but when I now try to mount an ISO file, I get the following warning:
traceback (most recent call last):
File "/usr/lib/python3.5/site-packages/qubesmanager/bootfromdevice.py", line 52, in save_and_apply
cdrom_location = self.vm_list[self.fileVM.currentIndex()] + ":" + self.pathText.text()
TypeError: unsupported operand type(s) for +: 'AppVM' and 'str'
VM type was set to 'StandaloneVM without template', so something may be wrong with the detection.
Possibly related: Oct 08 14:35:14 dom0 qubesd[2962]: QubesNoSuchPropertyError("Invalid property 'template' of w7",) while calling src=b'dom0' meth=b'admin.vm.property.Get' dest=b'w7' arg=b'template' len(untrusted_payload)=0
0spinboson
commented
Oct 8, 2017
|
I'm not getting the qubesd crash any more, but when I now try to mount an ISO file, I get the following warning: traceback (most recent call last): VM type was set to 'StandaloneVM without template', so something may be wrong with the detection. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Oct 8, 2017
Member
This one is already fixed in QubesOS/qubes-manager#42. Updated package will be in repo today.
|
This one is already fixed in QubesOS/qubes-manager#42. Updated package will be in repo today. |
kalkin
closed this
Oct 8, 2017
marmarek
reopened this
Oct 8, 2017
marmarek
added
the
C: doc
label
Oct 8, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
0spinboson
commented
Oct 9, 2017
|
did qubes-manager v4.0.6 get stuck in a pipe somewhere? :) |
kalkin
closed this
Oct 9, 2017
marmarek
reopened this
Oct 9, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Oct 9, 2017
Member
did qubes-manager v4.0.6 get stuck in a pipe somewhere? :)
Apparently, calling a plumber ;)
Apparently, calling a plumber ;) |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Oct 9, 2017
Automated announcement from builder-github
The package qubes-manager-4.0.6-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
qubesos-bot
commented
Oct 9, 2017
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-dom0-cur-test
label
Oct 9, 2017
qubesos-bot
referenced this issue
in QubesOS/updates-status
Oct 9, 2017
Closed
manager v4.0.6 (r4.0) #258
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
0spinboson
Oct 10, 2017
Thanks. :)
fyi: qubes-vm-boot-from-device doesn't load a GUI selection window any more, is broken.
0spinboson
commented
Oct 10, 2017
•
|
Thanks. :) fyi: qubes-vm-boot-from-device doesn't load a GUI selection window any more, is broken. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
0spinboson
Oct 10, 2017
also, when I try to attach a win7 installation image, libxenlight is unable to create a new domain. libxlDomainstart:1320: internal error: libxenlight failed to create new domain.
0spinboson
commented
Oct 10, 2017
|
also, when I try to attach a win7 installation image, libxenlight is unable to create a new domain. libxlDomainstart:1320: internal error: libxenlight failed to create new domain. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Check |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
0spinboson
Oct 10, 2017
2017-10-10 09:02:34.125+0000: libxl: libxl_dm.c:2103:stubdom_xswait_cb: Stubdom 38 for 37 startup: startup timed out
2017-10-10 09:02:34.125+0000: libxl: libxl_create.c:1541:domcreate_devmodel_started: device model did not start: -9
2017-10-10 09:02:34.235+0000: libxl: libxl_device.c:1074:device_backend_callback: unable to remove device with path /local/domain/8/backend/vbd/38/51840
2017-10-10 09:02:34.238+0000: libxl: libxl_device.c:1074:device_backend_callback: unable to remove device with path /local/domain/4/backend/vif/38/0
2017-10-10 09:02:34.276+0000: libxl: libxl_linux.c:155:libxl__loopdev_cleanup: unable to release device /dev/loop52: No such device or address
2017-10-10 09:02:34.281+0000: libxl: libxl_device.c:1074:device_backend_callback: unable to remove device with path /local/domain/8/backend/vbd/37/51840
2017-10-10 09:02:34.620+0000: libxl: libxl.c:1673:devices_destroy_cb: libxl__devices_destroy failed for 37
2017-10-10 09:02:34.663+0000: libxl: libxl.c:1673:devices_destroy_cb: libxl__devices_destroy failed for 38
0spinboson
commented
Oct 10, 2017
|
2017-10-10 09:02:34.125+0000: libxl: libxl_dm.c:2103:stubdom_xswait_cb: Stubdom 38 for 37 startup: startup timed out |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
0spinboson
Oct 10, 2017
oh, it seems this only affects loading the ISO via a VM. dom0 as a backend works. (qvm-start VMNAME --cdrom=dom0:/bla/)
Windows installation does now start and finish properly.
0spinboson
commented
Oct 10, 2017
•
|
oh, it seems this only affects loading the ISO via a VM. dom0 as a backend works. (qvm-start VMNAME --cdrom=dom0:/bla/) Windows installation does now start and finish properly. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Oct 17, 2017
Member
also, when I try to attach a win7 installation image, libxenlight is unable to create a new domain. libxlDomainstart:1320: internal error: libxenlight failed to create new domain.
This is #3172
This is #3172 |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Oct 17, 2017
Member
fyi: qubes-vm-boot-from-device doesn't load a GUI selection window any more, is broken.
Branched to #3182
Branched to #3182 |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
kalkin
Oct 18, 2017
Member
Sorry for closing this issue. It looks like my private repo where I merge changes closes an issue in another organization. Weird :-/
|
Sorry for closing this issue. It looks like my private repo where I merge changes closes an issue in another organization. Weird :-/ |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Oct 30, 2017
Automated announcement from builder-github
The package qubes-manager-4.0.8-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:
sudo qubes-dom0-update
Or update dom0 via Qubes Manager.
qubesos-bot
commented
Oct 30, 2017
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
qubesos-bot
added
r4.0-dom0-stable
and removed
r4.0-dom0-cur-test
labels
Oct 30, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
donob4n
Feb 15, 2018
Hi,
It seems that this issue stills in Qubes 4.0 rc4, at least in the part of:
New GUI for creating standalone qube and booting it from cdrom should set kernel to None (or empty string). Otherwise dom0-provided kernel will be used, instead of booting from provided cdrom.
What should be the right solution? Creating this VM's with kernel 'None' or skip the kernel value when starting with --cdrom option? I think that I could help there if needed.
donob4n
commented
Feb 15, 2018
•
|
Hi, It seems that this issue stills in Qubes 4.0 rc4, at least in the part of:
What should be the right solution? Creating this VM's with kernel 'None' or skip the kernel value when starting with --cdrom option? I think that I could help there if needed. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Feb 15, 2018
Member
This should be already fixed by QubesOS/qubes-manager#64, included in qubes-manager 4.0.14 package. What version do you have?
|
This should be already fixed by QubesOS/qubes-manager#64, included in qubes-manager 4.0.14 package. What version do you have? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
donob4n
Feb 16, 2018
Sorry @marmarek , I was running 4.0.13. After updating with testing repository and get 4.0.15 it works fine. Also I discovered Alpinelinux HVM works (without soft lockup due bochs_drm). I will investigate it in Qubes 3.2 (maybe dom0 kernel or xen version?).
donob4n
commented
Feb 16, 2018
|
Sorry @marmarek , I was running 4.0.13. After updating with testing repository and get 4.0.15 it works fine. Also I discovered Alpinelinux HVM works (without soft lockup due bochs_drm). I will investigate it in Qubes 3.2 (maybe dom0 kernel or xen version?). |
andrewdavidwong
modified the milestones:
Release 4.0,
Release 4.0 updates
Mar 31, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarta
Jul 15, 2018
I think this one is already fixed, judging from the discussion above. Closing, but if I'm wrong don't hesitate to reopen it.
marmarta
commented
Jul 15, 2018
|
I think this one is already fixed, judging from the discussion above. Closing, but if I'm wrong don't hesitate to reopen it. |
marmarek commentedSep 22, 2017
•
edited
Edited 1 time
-
marmarek
edited Jan 19, 2018 (most recent)
Qubes OS version (e.g.,
R3.2): R4.0New GUI for creating standalone qube and booting it from cdrom should set kernel to
None(or empty string). Otherwise dom0-provided kernel will be used, instead of booting from provided cdrom.Also
virt_modeneeds to behvm.Additionally, when one want to install Windows, some more steps are needed:
This probably should be covered in documentation: https://www.qubes-os.org/doc/windows-appvms/ (which currently link to https://www.qubes-os.org/doc/hvm/ for actual qube setup).