Re: [qubes-users] Re: kali failing to start as a HVM (bootable iso)

2017-07-06 Thread Andres MRM

[2017-07-06 17:18] Unman:

> Can you check the command line?
> In the thread it is incorrect and i want to make sure that you havent
> been misled.
> The correct format would be something like:
> qvm-start  --cdrom=:/home/user/kali.iso

Sure. This didn't work:

$ qvm-start hvm --cdrom=media:/home/user/a.iso

Then I copied the ISO to dom0 and this worked:

$ qvm-start hvm --cdrom=/home/user/a.iso

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/149937311226.6232.15817870788107264063%40localhost.localdomain.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: kali failing to start as a HVM (bootable iso)

2017-07-06 Thread Unman
On Thu, Jul 06, 2017 at 09:18:05PM +0100, Unman wrote:
> On Thu, Jul 06, 2017 at 04:51:59PM -0300, Andres MRM wrote:
> > 
> > I just copied the debian ISO to dom0 and it booted (installing at this very
> > moment, let's see if works).
> > So it can't boot the ISO from inside another VM... No idea why... And yes, I
> > checked the path many times, even moved and renamed to a short path
> > (/home/user/a.iso) and set permissions to 777.
> > 
> > 
> > [2017-07-06 12:20] Andres MRM:
> > 
> > > [2017-07-06 11:33] Unman:
> > > 
> > > > You can see packkage information from QubesManager - About - Qubes OS -
> > > > Version Information.
> > > 
> > > xen_version: 4.6.5
> > > Linux 4.4.38-11.pvops.qubes.x86_64
> > >   
> > > Installed Packages:  
> > >   
> > > i3-settings-qubes.x86_64  
> > >   1.2-1.fc23 
> > > kernel-qubes-vm.x86_64
> > >   1000:4.4.62-12.pvops.qubes 
> > > kernel-qubes-vm.x86_64
> > >   1000:4.4.67-12.pvops.qubes 
> > > kernel-qubes-vm.x86_64
> > >   1000:4.4.67-13.pvops.qubes 
> > > qubes-anaconda-addon.noarch   
> > >   3.2.3-1.fc23 
> > > qubes-artwork.noarch  
> > >   3.2.0-2.fc23 
> > > qubes-core-dom0.x86_64
> > >   3.2.14-1.fc23 
> > > qubes-core-dom0-doc.noarch
> > >   3.2.14-1 
> > > qubes-core-dom0-linux.x86_64
> > > 3.2.13-1.fc23 
> > > qubes-core-dom0-linux-kernel-install.x86_64  
> > > qubes-db.x86_64   
> > >   3.2.3-1.fc23 
> > > qubes-db-dom0.x86_64  
> > >   3.2.3-1.fc23 
> > > qubes-db-libs.x86_64  
> > >   3.2.3-1.fc23 
> > > qubes-gpg-split-dom0.x86_64   
> > >   2.0.24-1.fc23 
> > > qubes-gui-dom0.x86_64 
> > >   3.2.11-1.fc23 
> > > qubes-img-converter-dom0.x86_64 
> > > 1.2.3-1.fc23 
> > > qubes-input-proxy.x86_64  
> > >   1.0.8-1.fc23 
> > > qubes-libvchan-xen.x86_64 
> > >   3.2.1-1.fc23 
> > > qubes-manager.x86_64  
> > >   3.2.11-1.fc23 
> > > qubes-menus.noarch
> > >   2.0-1 
> > > qubes-mgmt-salt.noarch
> > >   3.2.5-1.fc23 
> > > qubes-mgmt-salt-admin-tools.noarch  
> > > 3.2.5-1.fc23 
> > > qubes-mgmt-salt-base.noarch   
> > >   3.2.2-1.fc23 
> > > qubes-mgmt-salt-base-config.noarch  
> > > 3.2.2-1.fc23 
> > > qubes-mgmt-salt-base-overrides.noarch
> > > qubes-mgmt-salt-base-overrides-libs.noarch   
> > > qubes-mgmt-salt-base-topd.noarch
> > > 3.2.1-1.fc23 
> > > qubes-mgmt-salt-config.noarch   
> > > 3.2.5-1.fc23 
> > > qubes-mgmt-salt-dom0.noarch   
> > >   3.2.5-1.fc23 
> > > qubes-mgmt-salt-dom0-qvm.noarch 
> > > 3.2.1-1.fc23 
> > > qubes-mgmt-salt-dom0-update.noarch  
> > > 3.2.0-1.fc23 
> > > qubes-mgmt-salt-dom0-virtual-machines.noarch 
> > > qubes-pdf-converter-dom0.x86_64 
> > > 2.1.2-1.fc23 
> > > qubes-release.noarch  
> > >   3.2-0.26 
> > > qubes-release-notes.noarch
> > >   3.2-0.26 
> > > qubes-template-archlinux.noarch 
> > > 3.0.6-201611130159 
> > > qubes-template-debian-8.noarch  
> > > 3.0.6-201608090120 
> > > qubes-template-fedora-23.noarch 
> > > 3.0.6-201608081228 
> > > qubes-template-whonix-gw.noarch 
> > > 3.0.6-201608050041 
> > > qubes-template-whonix-ws.noarch 
> > > 3.0.6-201608050146 
> > > qubes-usb-proxy-dom0.noarch   
> > >   1.0.5-1.fc23 
> > > qubes-utils.x86_64

Re: [qubes-users] Re: kali failing to start as a HVM (bootable iso)

2017-07-06 Thread Unman
On Thu, Jul 06, 2017 at 04:51:59PM -0300, Andres MRM wrote:
> 
> I just copied the debian ISO to dom0 and it booted (installing at this very
> moment, let's see if works).
> So it can't boot the ISO from inside another VM... No idea why... And yes, I
> checked the path many times, even moved and renamed to a short path
> (/home/user/a.iso) and set permissions to 777.
> 
> 
> [2017-07-06 12:20] Andres MRM:
> 
> > [2017-07-06 11:33] Unman:
> > 
> > > You can see packkage information from QubesManager - About - Qubes OS -
> > > Version Information.
> > 
> > xen_version: 4.6.5
> > Linux 4.4.38-11.pvops.qubes.x86_64
> >   
> > Installed Packages:  
> >   
> > i3-settings-qubes.x86_64
> > 1.2-1.fc23 
> > kernel-qubes-vm.x86_64  
> > 1000:4.4.62-12.pvops.qubes 
> > kernel-qubes-vm.x86_64  
> > 1000:4.4.67-12.pvops.qubes 
> > kernel-qubes-vm.x86_64  
> > 1000:4.4.67-13.pvops.qubes 
> > qubes-anaconda-addon.noarch 
> > 3.2.3-1.fc23 
> > qubes-artwork.noarch
> > 3.2.0-2.fc23 
> > qubes-core-dom0.x86_64  
> > 3.2.14-1.fc23 
> > qubes-core-dom0-doc.noarch  
> > 3.2.14-1 
> > qubes-core-dom0-linux.x86_64
> > 3.2.13-1.fc23 
> > qubes-core-dom0-linux-kernel-install.x86_64  
> > qubes-db.x86_64 
> > 3.2.3-1.fc23 
> > qubes-db-dom0.x86_64
> > 3.2.3-1.fc23 
> > qubes-db-libs.x86_64
> > 3.2.3-1.fc23 
> > qubes-gpg-split-dom0.x86_64 
> > 2.0.24-1.fc23 
> > qubes-gui-dom0.x86_64   
> > 3.2.11-1.fc23 
> > qubes-img-converter-dom0.x86_64 
> > 1.2.3-1.fc23 
> > qubes-input-proxy.x86_64
> > 1.0.8-1.fc23 
> > qubes-libvchan-xen.x86_64   
> > 3.2.1-1.fc23 
> > qubes-manager.x86_64
> > 3.2.11-1.fc23 
> > qubes-menus.noarch  
> > 2.0-1 
> > qubes-mgmt-salt.noarch  
> > 3.2.5-1.fc23 
> > qubes-mgmt-salt-admin-tools.noarch  
> > 3.2.5-1.fc23 
> > qubes-mgmt-salt-base.noarch 
> > 3.2.2-1.fc23 
> > qubes-mgmt-salt-base-config.noarch  
> > 3.2.2-1.fc23 
> > qubes-mgmt-salt-base-overrides.noarch
> > qubes-mgmt-salt-base-overrides-libs.noarch   
> > qubes-mgmt-salt-base-topd.noarch
> > 3.2.1-1.fc23 
> > qubes-mgmt-salt-config.noarch   
> > 3.2.5-1.fc23 
> > qubes-mgmt-salt-dom0.noarch 
> > 3.2.5-1.fc23 
> > qubes-mgmt-salt-dom0-qvm.noarch 
> > 3.2.1-1.fc23 
> > qubes-mgmt-salt-dom0-update.noarch  
> > 3.2.0-1.fc23 
> > qubes-mgmt-salt-dom0-virtual-machines.noarch 
> > qubes-pdf-converter-dom0.x86_64 
> > 2.1.2-1.fc23 
> > qubes-release.noarch
> > 3.2-0.26 
> > qubes-release-notes.noarch  
> > 3.2-0.26 
> > qubes-template-archlinux.noarch 
> > 3.0.6-201611130159 
> > qubes-template-debian-8.noarch  
> > 3.0.6-201608090120 
> > qubes-template-fedora-23.noarch 
> > 3.0.6-201608081228 
> > qubes-template-whonix-gw.noarch 
> > 3.0.6-201608050041 
> > qubes-template-whonix-ws.noarch 
> > 3.0.6-201608050146 
> > qubes-usb-proxy-dom0.noarch 
> > 1.0.5-1.fc23 
> > qubes-utils.x86_64  
> > 3.2.4-1.fc23 
> > qubes-utils-libs.x86_64 
> > 3.2.4-1.fc23 
> > xfce4-settings-qubes.x86_64

Re: [qubes-users] Re: kali failing to start as a HVM (bootable iso)

2017-07-06 Thread Andres MRM

I just copied the debian ISO to dom0 and it booted (installing at this very
moment, let's see if works).
So it can't boot the ISO from inside another VM... No idea why... And yes, I
checked the path many times, even moved and renamed to a short path
(/home/user/a.iso) and set permissions to 777.


[2017-07-06 12:20] Andres MRM:

> [2017-07-06 11:33] Unman:
> 
> > You can see packkage information from QubesManager - About - Qubes OS -
> > Version Information.
> 
> xen_version: 4.6.5
> Linux 4.4.38-11.pvops.qubes.x86_64
>   
> Installed Packages:  
>   
> i3-settings-qubes.x86_64  
>   1.2-1.fc23 
> kernel-qubes-vm.x86_64
>   1000:4.4.62-12.pvops.qubes 
> kernel-qubes-vm.x86_64
>   1000:4.4.67-12.pvops.qubes 
> kernel-qubes-vm.x86_64
>   1000:4.4.67-13.pvops.qubes 
> qubes-anaconda-addon.noarch   
>   3.2.3-1.fc23 
> qubes-artwork.noarch  
>   3.2.0-2.fc23 
> qubes-core-dom0.x86_64
>   3.2.14-1.fc23 
> qubes-core-dom0-doc.noarch
>   3.2.14-1 
> qubes-core-dom0-linux.x86_64
> 3.2.13-1.fc23 
> qubes-core-dom0-linux-kernel-install.x86_64  
> qubes-db.x86_64   
>   3.2.3-1.fc23 
> qubes-db-dom0.x86_64  
>   3.2.3-1.fc23 
> qubes-db-libs.x86_64  
>   3.2.3-1.fc23 
> qubes-gpg-split-dom0.x86_64   
>   2.0.24-1.fc23 
> qubes-gui-dom0.x86_64 
>   3.2.11-1.fc23 
> qubes-img-converter-dom0.x86_64 
> 1.2.3-1.fc23 
> qubes-input-proxy.x86_64  
>   1.0.8-1.fc23 
> qubes-libvchan-xen.x86_64 
>   3.2.1-1.fc23 
> qubes-manager.x86_64  
>   3.2.11-1.fc23 
> qubes-menus.noarch
>   2.0-1 
> qubes-mgmt-salt.noarch
>   3.2.5-1.fc23 
> qubes-mgmt-salt-admin-tools.noarch  
> 3.2.5-1.fc23 
> qubes-mgmt-salt-base.noarch   
>   3.2.2-1.fc23 
> qubes-mgmt-salt-base-config.noarch  
> 3.2.2-1.fc23 
> qubes-mgmt-salt-base-overrides.noarch
> qubes-mgmt-salt-base-overrides-libs.noarch   
> qubes-mgmt-salt-base-topd.noarch
> 3.2.1-1.fc23 
> qubes-mgmt-salt-config.noarch   
> 3.2.5-1.fc23 
> qubes-mgmt-salt-dom0.noarch   
>   3.2.5-1.fc23 
> qubes-mgmt-salt-dom0-qvm.noarch 
> 3.2.1-1.fc23 
> qubes-mgmt-salt-dom0-update.noarch  
> 3.2.0-1.fc23 
> qubes-mgmt-salt-dom0-virtual-machines.noarch 
> qubes-pdf-converter-dom0.x86_64 
> 2.1.2-1.fc23 
> qubes-release.noarch  
>   3.2-0.26 
> qubes-release-notes.noarch
>   3.2-0.26 
> qubes-template-archlinux.noarch 
> 3.0.6-201611130159 
> qubes-template-debian-8.noarch  
> 3.0.6-201608090120 
> qubes-template-fedora-23.noarch 
> 3.0.6-201608081228 
> qubes-template-whonix-gw.noarch 
> 3.0.6-201608050041 
> qubes-template-whonix-ws.noarch 
> 3.0.6-201608050146 
> qubes-usb-proxy-dom0.noarch   
>   1.0.5-1.fc23 
> qubes-utils.x86_64
>   3.2.4-1.fc23 
> qubes-utils-libs.x86_64   
>   3.2.4-1.fc23 
> xfce4-settings-qubes.x86_64   
>   3.2.2-1.fc23 
> 
> 
> > Are you using standard repositories, or have yu enabled testing?
> 
> Yes and no.
> 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop 

Re: [qubes-users] Re: kali failing to start as a HVM (bootable iso)

2017-07-06 Thread Andres MRM
[2017-07-06 11:33] Unman:

> You can see packkage information from QubesManager - About - Qubes OS -
> Version Information.

xen_version: 4.6.5
Linux 4.4.38-11.pvops.qubes.x86_64
  
Installed Packages:  
  
i3-settings-qubes.x86_64
1.2-1.fc23 
kernel-qubes-vm.x86_64  
1000:4.4.62-12.pvops.qubes 
kernel-qubes-vm.x86_64  
1000:4.4.67-12.pvops.qubes 
kernel-qubes-vm.x86_64  
1000:4.4.67-13.pvops.qubes 
qubes-anaconda-addon.noarch 
3.2.3-1.fc23 
qubes-artwork.noarch
3.2.0-2.fc23 
qubes-core-dom0.x86_64  
3.2.14-1.fc23 
qubes-core-dom0-doc.noarch  
3.2.14-1 
qubes-core-dom0-linux.x86_64
3.2.13-1.fc23 
qubes-core-dom0-linux-kernel-install.x86_64  
qubes-db.x86_64 
3.2.3-1.fc23 
qubes-db-dom0.x86_64
3.2.3-1.fc23 
qubes-db-libs.x86_64
3.2.3-1.fc23 
qubes-gpg-split-dom0.x86_64 
2.0.24-1.fc23 
qubes-gui-dom0.x86_64   
3.2.11-1.fc23 
qubes-img-converter-dom0.x86_64 
1.2.3-1.fc23 
qubes-input-proxy.x86_64
1.0.8-1.fc23 
qubes-libvchan-xen.x86_64   
3.2.1-1.fc23 
qubes-manager.x86_64
3.2.11-1.fc23 
qubes-menus.noarch  
2.0-1 
qubes-mgmt-salt.noarch  
3.2.5-1.fc23 
qubes-mgmt-salt-admin-tools.noarch  
3.2.5-1.fc23 
qubes-mgmt-salt-base.noarch 
3.2.2-1.fc23 
qubes-mgmt-salt-base-config.noarch  
3.2.2-1.fc23 
qubes-mgmt-salt-base-overrides.noarch
qubes-mgmt-salt-base-overrides-libs.noarch   
qubes-mgmt-salt-base-topd.noarch
3.2.1-1.fc23 
qubes-mgmt-salt-config.noarch   
3.2.5-1.fc23 
qubes-mgmt-salt-dom0.noarch 
3.2.5-1.fc23 
qubes-mgmt-salt-dom0-qvm.noarch 
3.2.1-1.fc23 
qubes-mgmt-salt-dom0-update.noarch  
3.2.0-1.fc23 
qubes-mgmt-salt-dom0-virtual-machines.noarch 
qubes-pdf-converter-dom0.x86_64 
2.1.2-1.fc23 
qubes-release.noarch
3.2-0.26 
qubes-release-notes.noarch  
3.2-0.26 
qubes-template-archlinux.noarch 
3.0.6-201611130159 
qubes-template-debian-8.noarch  
3.0.6-201608090120 
qubes-template-fedora-23.noarch 
3.0.6-201608081228 
qubes-template-whonix-gw.noarch 
3.0.6-201608050041 
qubes-template-whonix-ws.noarch 
3.0.6-201608050146 
qubes-usb-proxy-dom0.noarch 
1.0.5-1.fc23 
qubes-utils.x86_64  
3.2.4-1.fc23 
qubes-utils-libs.x86_64 
3.2.4-1.fc23 
xfce4-settings-qubes.x86_64 
3.2.2-1.fc23 


> Are you using standard repositories, or have yu enabled testing?

Yes and no.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/149935443037.7886.1054297749536477904%40localhost.localdomain.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: kali failing to start as a HVM (bootable iso)

2017-07-06 Thread Unman
On Thu, Jul 06, 2017 at 09:23:55AM -0300, Andres MRM wrote:
> [2017-07-05 19:30] Unman:
> 
> > I see this error if there's a typo in the filename or permissions are
> > wrong.
> > Otherwise it works as expected - what versions of the Qubes packages are
> > you using? What are specs of your box? Plenty of RAM?
> 
> Thanks for the reply!
> 
> I noticed it gives the same error for filename typos, so I checked the path
> multiple times and even copied the file to /a.iso to make sure.
> The permissions of the images are "-rw-r--r--" owned by user.
> 
> My RAM is 8GB, and the error seems to change when there isn't enough RAM (when
> many VMs are running), so I think this is not the case.
> 
> Not sure about Qubes packages version, but I just did a qubes-dom0-update to
> test, and still same error.

You can see packkage information from QubesManager - About - Qubes OS -
Version Information.

Are you using standard repositories, or have yu enabled testing?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170706143313.x5juns4z4atsaecz%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: kali failing to start as a HVM (bootable iso)

2017-07-06 Thread Andres MRM
[2017-07-05 19:30] Unman:

> I see this error if there's a typo in the filename or permissions are
> wrong.
> Otherwise it works as expected - what versions of the Qubes packages are
> you using? What are specs of your box? Plenty of RAM?

Thanks for the reply!

I noticed it gives the same error for filename typos, so I checked the path
multiple times and even copied the file to /a.iso to make sure.
The permissions of the images are "-rw-r--r--" owned by user.

My RAM is 8GB, and the error seems to change when there isn't enough RAM (when
many VMs are running), so I think this is not the case.

Not sure about Qubes packages version, but I just did a qubes-dom0-update to
test, and still same error.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/149934383589.7886.10799018145966845381%40localhost.localdomain.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: kali failing to start as a HVM (bootable iso)

2017-07-05 Thread Unman
On Wed, Jul 05, 2017 at 04:45:17AM -0700, andres...@gmail.com wrote:
> cubit 13/01/2017 20:31:05 UTC-2:
> > I'm trying to run the kali iso as a HVM but when running qvm-start in dom0  
> > it just fails with the errors below.  The template being used is a 
> > standalone HVM. Can anyone have pointers on how to work this?
> > 
> > $ qvm-start kali --cdrom work:/home/user/kali-linux-xfce-2016.2-amd64.iso
> > --> Loading the VM (type = HVM)...
> > Traceback (most recent call last):
> >   File "/usr/bin/qvm-start", line 136, in 
> >     main()
> >   File "/usr/bin/qvm-start", line 120, in main
> >     xid = vm.start(verbose=options.verbose, 
> > preparing_dvm=options.preparing_dvm, start_guid=not options.noguid, 
> > notify_function=tray_notify_generic if options.tray else None)
> >   File "/usr/lib64/python2.7/site-packages/qubes/modules/01QubesHVm.py", 
> > line 335, in start
> >     return super(QubesHVm, self).start(*args, **kwargs)
> >   File "/usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py", 
> > line 1966, in start
> >     self.libvirt_domain.createWithFlags(libvirt.VIR_DOMAIN_START_PAUSED)
> >   File "/usr/lib64/python2.7/site-packages/libvirt.py", line 1059, in 
> > createWithFlags
> >     if ret == -1: raise libvirtError ('virDomainCreateWithFlags() failed', 
> > dom=self)
> > libvirt.libvirtError: internal error: libxenlight failed to create new 
> > domain 'kali'
> 
> Any updates about this issue? I'm getting the same error trying to install 
> Debian 8 or Ubuntu 16.04 as HVM.
> 

I see this error if there's a typo in the filename or permissions are
wrong.
Otherwise it works as expected - what versions of the Qubes packages are
you using? What are specs of your box? Plenty of RAM?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170705223024.dhv53nx2ogjtos4z%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.