unman <un...@thirdeyesecurity.org> writes: > On Tue, Jan 18, 2022 at 12:49:34PM -0600, Eric W. Biederman wrote: >> >> Can someone tell me if I am missing something? >> >> I do a lot of testing of linux kernels. A bunch of that I have >> historically done in qemu with kvm support. Unfortunately nested >> hardware virtualization does not work. Which means for testing >> for race conditions and the like I need to run the kernels in >> their own HVM. >> >> I use an HVM so I can update the kernel in /boot and reboot the qube and >> be running the kernel I am testing. It would be nice if I could use a >> throw-away qube that just boots with a kernel of my choosing but using >> an stand-alone qube is fine. >> >> Where I run into practical problems is when I want to place specific >> files into my testing qube. I have not figured out how to ssh into >> the qube from another qube, nor have I figured out how to use qvm-copy. >> The best I have right now is to have an external machine that I copy >> things to and then copy them back, which seems like a real hack. >> >> I also have not figured out how to get a serial console from such a qube >> only a graphical one which makes it more difficult than I would like >> to capture errors. >> >> I looked at installing the qubes-core-agent package in my testing HVM >> but it has too many dependencies and installing it makes it impossible >> to test what I would like to test. That is assuming someone has even >> packaged it for the distro I need to test on. >> >> Am I missing something? Is there an easier more straight forward way to >> setup a testing qube? Is it possible to setup a virtual serial console >> to a qube? Is it possible to ssh to a qube from another qube? >> >> Eric > > Hi Eric > > You should probably check out the fine documentation: > https://www.qubes-os.org/doc/managing-vm-kernels/ has information about > using different kernels, including kernels provided by the qube.
I don't seem to be missing anything there. I could theoretically use a standalone PV style cube instead of a standalone HVM. But going that route I might not be able to see the output of a boot failure, and the grub timeout is made so small (when installing qubes-core-agent) I do not have enough time to mess with grub in case I install a broken kernel. > https://www.qubes-os.org/doc/firewall has information about enabling > networking between qubes. Unfortunately the formula given there to allow networking between hosts does not work for me and I am not certain why. I am using Qubes 4.0 and that is supposed to work. When I follow the instructions ping works fine but tcp connections make it to the firewall vm and I get a "no route to host" icmp reply. I am not certain what is the problem. I have been able to completely disable the qubes firewall and still the ssh packets are returned with a "no route to host" and icmp packets still make the round trip. It looks like there is some clever networking configuration that I have not figured out yet, which is causing the problem. I am going to spin up a second firewall vm and poke some more, and see if I can get somewhere. > If you are using HVMs you can, in some cases, install qubes packages, > and then use tools like qvm-copy. I say, in some cases, because this > wont work with some targets, like Ubuntu standalones. Yes. I have explored using qubes packages. My initial kernel test configuration is using debian11. Unfortunately the qubes packages make the HVM unusable for my testing. Pulling in a bunch of stuff I don't want and taking over configuration I need to control for my tests. Eric -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/87mtjr7fda.fsf%40email.froward.int.ebiederm.org.