2015-11-11 20:41:02 -05:00
---
layout: doc
title: Managing VM kernel
permalink: /doc/managing-vm-kernel/
redirect_from:
- /en/doc/managing-vm-kernel/
---
VM kernel managed by dom0
2016-08-04 06:54:56 -04:00
=========================
2015-11-11 20:41:02 -05:00
2018-02-12 09:35:56 -05:00
By default, VMs kernels are provided by dom0. This means that:
2016-05-16 01:51:23 -04:00
2018-02-12 09:35:56 -05:00
1. You can select the kernel version in VM settings;
2015-11-23 14:59:25 -05:00
2. You can modify kernel options in VM settings;
2018-02-12 09:35:56 -05:00
3. You can **not** modify any of the above from inside a VM;
2016-05-16 01:51:23 -04:00
4. Installing additional kernel modules is cumbersome.
2015-11-11 20:41:02 -05:00
2018-02-12 09:50:04 -05:00
*Note* In the examples below, although the specific version numbers might be old, the commands have been verified on R3.2 with debian-9 and fedora-26 templates.
At the time of writing, there is a blocking issue for R4.0 [3563 ](https://github.com/QubesOS/qubes-issues/issues/3563 ).
2018-02-12 09:35:56 -05:00
To select which kernel a given VM will use, you can either use Qubes Manager (VM settings, advanced tab), or the `qvm-prefs` tool:
2015-11-11 20:41:02 -05:00
~~~
2018-02-12 09:50:04 -05:00
[user@dom0 ~]$ qvm-prefs -s my-appvm kernel
2015-11-11 20:41:02 -05:00
Missing kernel version argument!
Possible values:
1) default
2) none (kernels subdir in VM)
3) < kernel version > , one of:
- 3.18.16-3
- 3.18.17-4
- 3.19.fc20
- 3.18.10-2
2018-02-12 09:50:04 -05:00
[user@dom0 ~]$ qvm-prefs -s my-appvm kernel 3.18.17-4
[user@dom0 ~]$ qvm-prefs -s my-appvm kernel default
2015-11-11 20:41:02 -05:00
~~~
2018-02-12 09:35:56 -05:00
To check/change the default kernel you can either go to "Global settings" in Qubes Manager, or use the `qubes-prefs` tool:
2015-11-11 20:41:02 -05:00
~~~
[user@dom0 ~]$ qubes-prefs
clockvm : sys-net
default-fw-netvm : sys-net
default-kernel : 3.18.17-4
default-netvm : sys-firewall
default-template : fedora-21
updatevm : sys-firewall
[user@dom0 ~]$ qubes-prefs -s default-kernel 3.19.fc20
~~~
Installing different kernel using Qubes kernel package
2016-08-04 06:54:56 -04:00
----------------------------------
2015-11-11 20:41:02 -05:00
2018-02-12 09:35:56 -05:00
VM kernels are packages by Qubes team in `kernel-qubes-vm` packages.
Generally, the system will keep the three newest available versions.
You can list them with the `rpm` command:
2015-11-11 20:41:02 -05:00
~~~
[user@dom0 ~]$ rpm -qa 'kernel-qubes-vm*'
kernel-qubes-vm-3.18.10-2.pvops.qubes.x86_64
kernel-qubes-vm-3.18.16-3.pvops.qubes.x86_64
kernel-qubes-vm-3.18.17-4.pvops.qubes.x86_64
~~~
2018-02-12 09:35:56 -05:00
If you want a more recent version, you can check the `qubes-dom0-unstable` repository.
2018-02-21 10:32:42 -05:00
There is also the `kernel-latest-qubes-vm` package which should provide a more recent (non-LTS) kernel, but has received much less testing.
As the names suggest, keep in mind that those packages may be less stable than the default ones.
2015-11-11 20:41:02 -05:00
2018-02-12 09:35:56 -05:00
To check available versions in the `qubes-dom0-unstable` repository:
2015-11-11 20:41:02 -05:00
~~~
2015-11-23 14:59:25 -05:00
[user@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable --action=list kernel-qubes-vm
2015-11-11 20:41:02 -05:00
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some time...
Running command on VM: 'sys-firewall'...
Loaded plugins: langpacks, post-transaction-actions, yum-qubes-hooks
Installed Packages
kernel-qubes-vm.x86_64 1000:3.18.10-2.pvops.qubes installed
kernel-qubes-vm.x86_64 1000:3.18.16-3.pvops.qubes installed
kernel-qubes-vm.x86_64 1000:3.18.17-4.pvops.qubes installed
Available Packages
kernel-qubes-vm.x86_64 1000:4.1.12-6.pvops.qubes qubes-dom0-unstable
No packages downloaded
Installed Packages
kernel-qubes-vm.x86_64 1000:3.18.10-2.pvops.qubes @anaconda/R3 .0
kernel-qubes-vm.x86_64 1000:3.18.16-3.pvops.qubes @/kernel -qubes-vm-3.18.16-3.pvops.qubes.x86_64
kernel-qubes-vm.x86_64 1000:3.18.17-4.pvops.qubes @qubes -dom0-cached
~~~
2018-02-12 09:35:56 -05:00
Installing a new version from `qubes-dom0-unstable` repository:
2015-11-11 20:41:02 -05:00
~~~
2015-11-23 14:59:25 -05:00
[user@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable kernel-qubes-vm
2015-11-11 20:41:02 -05:00
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some time...
Running command on VM: 'sys-firewall'...
Loaded plugins: langpacks, post-transaction-actions, yum-qubes-hooks
Resolving Dependencies
(...)
===========================================================================================
Package Arch Version Repository Size
===========================================================================================
Installing:
kernel-qubes-vm x86_64 1000:4.1.12-6.pvops.qubes qubes-dom0-cached 40 M
Removing:
kernel-qubes-vm x86_64 1000:3.18.10-2.pvops.qubes @anaconda/R3 .0 134 M
Transaction Summary
===========================================================================================
Install 1 Package
Remove 1 Package
Total download size: 40 M
Is this ok [y/d/N]: y
Downloading packages:
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction (shutdown inhibited)
Installing : 1000:kernel-qubes-vm-4.1.12-6.pvops.qubes.x86_64 1/2
mke2fs 1.42.12 (29-Aug-2014)
This kernel version is used by at least one VM, cannot remove
error: %preun(kernel-qubes-vm-1000:3.18.10-2.pvops.qubes.x86_64) scriptlet failed, exit status 1
Error in PREUN scriptlet in rpm package 1000:kernel-qubes-vm-3.18.10-2.pvops.qubes.x86_64
Verifying : 1000:kernel-qubes-vm-4.1.12-6.pvops.qubes.x86_64 1/2
Verifying : 1000:kernel-qubes-vm-3.18.10-2.pvops.qubes.x86_64 2/2
Installed:
kernel-qubes-vm.x86_64 1000:4.1.12-6.pvops.qubes
Failed:
kernel-qubes-vm.x86_64 1000:3.18.10-2.pvops.qubes
Complete!
2018-02-21 10:32:42 -05:00
[user@dom0 ~]$
2015-11-11 20:41:02 -05:00
~~~
2018-02-12 09:35:56 -05:00
In the above example, it tries to remove the 3.18.10-2.pvops.qubes kernel (to keep only three installed), but since some VM uses it, it fails.
Installation of the new package is unaffected by this event.
2015-11-11 20:41:02 -05:00
2018-02-12 09:35:56 -05:00
The newly installed package is set as the default VM kernel.
2015-11-11 20:41:02 -05:00
Installing different VM kernel based on dom0 kernel
2016-08-04 06:54:56 -04:00
---------------------------------------------------
2015-11-11 20:41:02 -05:00
2018-02-12 09:35:56 -05:00
It is possible to package a kernel installed in dom0 as a VM kernel.
This makes it possible to use a VM kernel which is not packaged by Qubes team.
This includes:
* using a Fedora kernel package
* using a manually compiled kernel
2015-11-11 20:41:02 -05:00
2018-02-12 09:35:56 -05:00
To prepare such a VM kernel, you need to install the `qubes-kernel-vm-support` package in dom0 and also have matching kernel headers installed (`kernel-devel` package in the case of a Fedora kernel package).
You can install requirements using `qubes-dom0-update` :
2015-11-11 20:41:02 -05:00
~~~
[user@dom0 ~]$ sudo qubes-dom0-update qubes-kernel-vm-support kernel-devel
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some time...
Running command on VM: 'sys-firewall'...
Loaded plugins: langpacks, post-transaction-actions, yum-qubes-hooks
Package 1000:kernel-devel-4.1.9-6.pvops.qubes.x86_64 already installed and latest version
Resolving Dependencies
(...)
================================================================================
Package Arch Version Repository Size
================================================================================
Installing:
qubes-kernel-vm-support x86_64 3.1.2-1.fc20 qubes-dom0-cached 9.2 k
Transaction Summary
================================================================================
Install 1 Package
Total download size: 9.2 k
Installed size: 13 k
Is this ok [y/d/N]: y
Downloading packages:
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction (shutdown inhibited)
Installing : qubes-kernel-vm-support-3.1.2-1.fc20.x86_64 1/1
Creating symlink /var/lib/dkms/u2mfn/3.1.2/source ->
/usr/src/u2mfn-3.1.2
DKMS: add completed.
Verifying : qubes-kernel-vm-support-3.1.2-1.fc20.x86_64 1/1
Installed:
qubes-kernel-vm-support.x86_64 0:3.1.2-1.fc20
Complete!
~~~
2018-02-12 09:35:56 -05:00
Then you can call the `qubes-prepare-vm-kernel` tool to actually package the kernel.
The first parameter is kernel version (exactly as seen by the kernel), the second one (optional) is short name.
This is visible in Qubes Manager and the `qvm-prefs` tool.
2015-11-11 20:41:02 -05:00
~~~
[user@dom0 ~]$ sudo qubes-prepare-vm-kernel 4.1.9-6.pvops.qubes.x86_64 4.1.qubes
--> Building files for 4.1.9-6.pvops.qubes.x86_64 in /var/lib/qubes/vm-kernels/4.1.qubes
---> Recompiling kernel module (u2mfn)
---> Generating modules.img
mke2fs 1.42.12 (29-Aug-2014)
---> Generating initramfs
--> Done.
~~~
Using kernel installed in the VM
2016-08-04 06:54:56 -04:00
--------------------------------
2015-11-11 20:41:02 -05:00
**This option is available only in Qubes R3.1 or newer**
2018-02-12 09:35:56 -05:00
It is possible to use a kernel installed in the VM (in most cases - TemplateVM).
This is possible thanks to PV GRUB2 - GRUB2 running in the VM.
2018-02-12 09:50:04 -05:00
To make it happen, at a high level you need to:
2015-11-11 20:41:02 -05:00
2018-02-12 09:50:04 -05:00
1. Install PV GRUB2 (`grub2-xen`) in dom0.
2. Install kernel in the VM (see below for Fedora and Debian steps).
As with all VM software installation - this needs to be done in a TemplateVM (or StandaloneVM if you are using one).
2018-02-12 09:35:56 -05:00
3. Set VM kernel to `pvgrub2` value.
2018-02-12 09:50:04 -05:00
You can use `pvgrub2` in selected VMs, but it's not necessary in all of them, even if its template has a kernel installed.
2018-02-12 09:35:56 -05:00
You can still use a dom0-provided kernel for selected VMs.
2015-11-11 20:41:02 -05:00
2018-02-12 09:35:56 -05:00
**WARNING: When using a kernel from within a VM, the `kernelopts` parameter is ignored.**
2015-11-11 20:41:02 -05:00
### Installing PV GRUB2
Simply execute:
~~~
sudo qubes-dom0-update grub2-xen
~~~
### Installing kernel in Fedora VM
2018-02-12 09:35:56 -05:00
In a Fedora based VM, you need to install the `qubes-kernel-vm-support` package.
This package includes the additional kernel module and initramfs addition required to start a Qubes VM (for details see [template implementation ](/doc/template-implementation/ )).
Additionally, you need some GRUB tools to create its configuration.
Note: You don't need an actual grub bootloader as it is provided by dom0, but having one shouldn't hurt.
2015-11-11 20:41:02 -05:00
~~~
2018-02-12 09:50:04 -05:00
sudo dnf install qubes-kernel-vm-support grub2-tools
2015-11-11 20:41:02 -05:00
~~~
2018-02-12 09:35:56 -05:00
Then install whatever kernel you want.
2018-02-12 09:50:04 -05:00
You need to also ensure you have the `kernel-devel` package for the same kernel version installed.
If you are using a distribution kernel package (`kernel` package), the initramfs and kernel modules may be handled automatically.
2018-02-12 09:35:56 -05:00
If you are using a manually built kernel, you need to handle this on your own.
2018-02-12 09:50:04 -05:00
Take a look at the `dkms` documentation, especially the `dkms autoinstall` command may be useful.
2018-02-23 05:01:57 -05:00
If you did not see the `kernel` install rebuild your initramfs, or are using a manually built kernel, you will need to rebuild it yourself with the following:
2015-11-11 20:41:02 -05:00
2018-02-12 09:50:04 -05:00
~~~
2018-04-01 15:21:59 -04:00
sudo dracut -f /boot/initramfs-$(uname -r).img $(uname -r)
2018-02-12 09:50:04 -05:00
~~~
Once the kernel is installed, you need to create a GRUB configuration.
2018-02-12 09:35:56 -05:00
You may want to adjust some settings in `/etc/default/grub` ; for example, lower `GRUB_TIMEOUT` to speed up VM startup.
Then, you need to generate the actual configuration:
In Fedora it can be done using the `grub2-mkconfig` tool:
2015-11-11 20:41:02 -05:00
~~~
sudo grub2-mkconfig -o /boot/grub2/grub.cfg
~~~
You can safely ignore this error message:
~~~
grub2-probe: error: cannot find a GRUB drive for /dev/mapper/dmroot. Check your device.map
~~~
2018-02-12 09:35:56 -05:00
Then shutdown the VM.
Now you can set `pvgrub2` as the VM kernel and it will start the kernel configured within your VM.
2015-11-11 20:41:02 -05:00
2018-02-12 09:50:04 -05:00
**Note:** On first boot the VM will automatically allocate swap space.
This can take a while to complete- longer than your `qrexec_timeout` setting, which will make the VM appear to have hung on boot.
To confirm this is the case, see [Troubleshooting ](/doc/managing-vm-kernel/#troubleshooting ) below or just wait for five minutes and shutdown the VM.
It should respond normally on future boots.
2015-11-11 20:41:02 -05:00
### Installing kernel in Debian VM
2018-02-12 09:35:56 -05:00
In a Debian based VM, you need to install the `qubes-kernel-vm-support` package.
This package includes the additional kernel module and initramfs addition required to start a Qubes VM (for details see [template implementation ](/doc/template-implementation/ )).
Additionally, you need some GRUB tools to create its configuration.
Note: You don't need an actual grub bootloader as it is provided by dom0, but having one shouldn't hurt.
2015-11-11 20:41:02 -05:00
~~~
2018-02-12 09:50:04 -05:00
sudo apt update
sudo apt install qubes-kernel-vm-support grub2-common
2015-11-11 20:41:02 -05:00
~~~
2018-02-12 09:50:04 -05:00
If prompted for a GRUB install device, choose `/dev/mapper/dmroot` .
You will receive an error about GRUB failed to install to it, but just continue anyways.
2018-02-21 10:32:42 -05:00
2015-11-11 20:41:02 -05:00
Ignore warnings about `version '...' has bad syntax` .
2018-02-12 09:35:56 -05:00
Then install whatever kernel you want.
If you are using a distribution kernel package (`linux-image-amd64` package), the initramfs and kernel modules should be handled automatically.
If not, or you are building the kernel manually, do this using `dkms` and `initramfs-tools` :
2016-07-20 07:06:56 -04:00
sudo dkms autoinstall -k < kernel-version > # replace this < kernel-version > with actual kernel version
sudo update-initramfs -u
The output should look like this:
$ sudo dkms autoinstall -k 3.16.0-4-amd64
u2mfn:
Running module version sanity check.
- Original module
- No original module exists within this kernel
- Installation
- Installing to /lib/modules/3.16.0-4-amd64/updates/dkms/
depmod....
DKMS: install completed.
$ sudo update-initramfs -u
update-initramfs: Generating /boot/initrd.img-3.16.0-4-amd64
2015-11-11 20:41:02 -05:00
2018-02-12 09:35:56 -05:00
When the kernel is installed, you need to create a GRUB configuration.
You may want to adjust some settings in `/etc/default/grub` ; for example, lower `GRUB_TIMEOUT` to speed up VM startup.
Then, you need to generate the actual configuration with the `update-grub2` tool:
2015-11-11 20:41:02 -05:00
~~~
sudo mkdir /boot/grub
sudo update-grub2
~~~
You can safely ignore this error message:
~~~
grub2-probe: error: cannot find a GRUB drive for /dev/mapper/dmroot. Check your device.map
~~~
2018-02-12 09:35:56 -05:00
Then shutdown the VM.
Now you can set `pvgrub2` as the VM kernel and it will start the kernel configured within your VM.
2016-10-15 21:10:26 -04:00
2018-02-12 09:35:56 -05:00
When starting the VM you can safely ignore any warnings about a missing module 'dummy-hcd'.
2015-11-11 20:41:02 -05:00
2018-02-12 09:50:04 -05:00
**Note:** on first boot the VM will automatically allocate swap space.
This can take a while to complete- longer than your `qrexec_timeout` setting, which will make the VM appear to have hung on boot.
To confirm this is the case, see [Troubleshooting ](/doc/managing-vm-kernel/#troubleshooting ) below or just wait for five minutes and shutdown the VM.
It should respond normally on future boots.
2015-11-11 20:41:02 -05:00
### Troubleshooting
2018-02-12 09:35:56 -05:00
In case of problems, you can access the VM console using `sudo xl console VMNAME` in dom0, then access the GRUB menu.
You need to call it just after starting the VM (until `GRUB_TIMEOUT` expires); for example, in a separate dom0 terminal window.
2015-11-11 20:41:02 -05:00
2018-02-12 09:35:56 -05:00
In any case you can later access the VM's logs (especially the VM console log `guest-VMNAME.log` ).
2015-11-11 20:41:02 -05:00
2018-02-12 09:35:56 -05:00
You can always set the kernel back to some dom0-provided value to fix a VM kernel installation.