Re: [qubes-users] Installing qr-exec on HVM

2018-10-12 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Oct 05, 2018 at 02:38:28PM -0700, Will Dizon wrote:
> Unfortunately, it didn't work still when qubes-gui-agent was running.
> 
> I tried recompiling everything again, and the results have changed quite a 
> bit.  Now, instead of autohiding the HVM window in dom0, I can see a very 
> clear failure which points me in the direction of Xorg instead.
> 
> Sadly, this feels like a regression, but alas... I'm sure I'll get there 
> eventually.
> 
> As far as "xl console lfs", dom0 reports "unable to attach console".  And in 
> terms of dom0, it is still giving no sense of failure:
> 
> $ qvm-run --pass-io personal whoami
> user
> $ qvm-run --pass-io lfs whoami
> $ qvm-run lfs "touch /tmp/dummy"
> Running 'touch /tmp/dummy' on lfs
> 
> Needless to say, /tmp/dummy doesn't ever emerge.
> 
> The new error is
> 
> systemctl status qubes-gui-agent.service
> ...
> Process: 660 ExecStart=/usr/bin/qubes-gui $GUI_OPTS (code=exited, 
> status=1/FAILURE)
> ...
> lfs qubes-gui[660]: XIO fatal IO error 11 (Resource temporarily unavailable 
> on X server ":0"
> lfs qubes-gui[660]: after 37 requests (36 known processed) with 0 events 
> remaining)
> 
> X works (startx shows me a desktop and consoles), but nothing yet from 
> getting Qubes GUI agent and qrexec.

qubes-gui-agent starts its own X server, on :0. So, it conflicts with
the one started manually with startx.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlvBRPgACgkQ24/THMrX
1yzOfAf/WdwNBlfHtR7Oin5+j3SV48z27ajfarE+UBOXrwZkrsl+mPDrvllou9Kq
uVUVOBBswJhAVT9hWhKJbOZvDPW9r4jyKpiidg3FvdRWX7i/Dci5UYK1qqrPuDtw
vZs3raKofxmprH7wKNcwcBVslr1SeTOOvbkNkv1WYbS46sGd1X//CWvXghYCQzqL
HTX3v732aYO9LADgNwHRV5AQKsBtYLM/Ej8QR2Amd3frHIx905hErix8ForYGzUp
JxRIR0ZuAmoK3aQglb1Jon2YmJ0MeOszMP9aqh1BTpTZ+JrM5/hWj2g0NN+rwRIo
GOYt7eTlrfmGfAeCgQitOOszc/oSzQ==
=g83e
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181013010601.GD5083%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installing qr-exec on HVM

2018-10-08 Thread Will Dizon
Update:

Got all services to run, including qubes-gui-agent.  Turns out the dependency 
it was failing on was meminfo-writer which was enabled in the 
/usr/lib/qubes/init/qubes-sysinit.sh script, but promptly disabled because it 
wasn't "checkmarked" in dom0's VM settings page.

That said, with all services running, still same behavior of getting no replies 
to "qvm-run --pass-io" nor does any qvm-run for executing commands, e.g., touch.

  qubes-db.service
  qubes-early-vm-config.service 
  qubes-meminfo-writer.service  
  qubes-mount-dirs.service
  qubes-qrexec-agent.service 
  qubes-sysinit.service 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5027edf3-e726-47c5-b75e-b6e95428baa7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installing qr-exec on HVM

2018-10-05 Thread Will Dizon
Unfortunately, it didn't work still when qubes-gui-agent was running.

I tried recompiling everything again, and the results have changed quite a bit. 
 Now, instead of autohiding the HVM window in dom0, I can see a very clear 
failure which points me in the direction of Xorg instead.

Sadly, this feels like a regression, but alas... I'm sure I'll get there 
eventually.

As far as "xl console lfs", dom0 reports "unable to attach console".  And in 
terms of dom0, it is still giving no sense of failure:

$ qvm-run --pass-io personal whoami
user
$ qvm-run --pass-io lfs whoami
$ qvm-run lfs "touch /tmp/dummy"
Running 'touch /tmp/dummy' on lfs

Needless to say, /tmp/dummy doesn't ever emerge.

The new error is

systemctl status qubes-gui-agent.service
...
Process: 660 ExecStart=/usr/bin/qubes-gui $GUI_OPTS (code=exited, 
status=1/FAILURE)
...
lfs qubes-gui[660]: XIO fatal IO error 11 (Resource temporarily unavailable on 
X server ":0"
lfs qubes-gui[660]: after 37 requests (36 known processed) with 0 events 
remaining)

X works (startx shows me a desktop and consoles), but nothing yet from getting 
Qubes GUI agent and qrexec.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/92378a13-da16-44e4-98b7-ee379179bbba%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installing qr-exec on HVM

2018-10-01 Thread 'awokd' via qubes-users

Will Dizon wrote on 9/28/18 10:04 PM:

I am currently working on trying to make a TemplateVM out of a Linux from 
Scratch installation (or more accurately, BLFS).

Progress has been immense, but I've run into a roadblock I'm not sure how to 
diagnose.

For starters, I've gone through and successfully compiled:

vmm-xen
core-vchan-xen
linux-utils
core-agent-linux
gui-common
gui-agent-linux

I've done the best I can to adapt Archlinux instructions, taking note of path 
modifications and installing everything, gruelingly by hand.  Everything built 
as best as I can tell, but I cannot get `qvm-run` to execute a command.  I'll 
try to give as much information as I can about the state of this systemd-based 
BLFS run.

1) lsmod shows xen_netfront, xen_netback, u2mfn loaded successfully on boot
2) The following systemd scripts are enabled (at boot) and run and exit cleanly:
   qubes-early-vm-config
   qubes-iptables
   qubes-misc-post
   qubes-mount-dirs
   qubes-sysinit
3) The following systemd scripts are enable and run in the background:
   qubes-qrexec-agent
   qubes-db

Any other services have been either a) mistakenly missed and not installed OR 
b) ignored as they implement a functionality I believe is non critical at the 
time, e.g., qubes-sync-time

If there are any other processes I've missed, please let me know, because it's 
probably just one of the make targets I've somehow overlooked.

4) /dev/xvdb mounted as /rw.  /rw/home and /rw/usrlocal all work as expected.  
xen mounted at /proc/xen also listed in fstab and seemingly working (based on 
xenstore-read name returning system name).

5) Lastly, theres qubes-gui-agent, which when run automatically hides the HVM 
window and makes it non-interact-able.  This is currently disabled in systemd, 
but is installed.

And this is where I'm stuck.

I'm trying on dom0: qvm-run lfs "shutdown now -h" and it returns "Running 'shutdown 
now -h' on lfs" but the VM never responds.

What else might I provide to help troubleshoot this and to detect what seems 
like the last-mile in getting this working as a template?


Does it work if qubes-gui-agent is running? You should still be able to 
get a console session with "sudo xl console VM". Never built my own 
template, though.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e2ba2c34-6262-bc77-521f-2bc0e951e800%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.