On Tue, 3 Jul 2018 12:01:00 -0000
"awokd" <
aw...@danwin1210.me> wrote:
> On Mon, July 2, 2018 8:51 am, RSS wrote:
>
> > Strangely enough, I can umount /rw, but I cannot umount /home
> > without killing a bunch of "user" processes, and I have not found a
> > subset of user processes that releases /home for a umount *and*
> > leaves X standing. Nor am I able to get a root console on the VM
> > using Xen from dom0. (As I recall this was fairly trivial on Qubes
> > 3.)
>
> sudo xl console vmname
Thanks, that was the required medicine. Many moons ago I used this at
least once in Qubes 3.2, and spent a significant amount of time
searching for it this time, to no avail. I used a search engine and
grep'ed Qubes docs ("grep -ir xen * | grep -i console", among other
strings). Looking over those docs, I am not sure I can see a
straight-forward way to make it easier to find within the existing
structure.
(Well, except for an aesthetic nit-pick: IIRC the guidelines for Qubes
Docs mandate hard-wrapping one's markdown. It seems this is not
happening *a lot*, and that makes reading and using a text grep of the
doc's source much harder.)
For the archives, this is what I had to do once in possession of a root
console on the VM via xl console:
ps -ef | grep user
then killed all "user" processes in the VM
Some like systemd restarted themselves, but this was not an issue. Then
umount /rw
umount /home
umount /var/spool/cron
grep xvdb /etc/mtab
then produced null results, as /dev/xvdb was no longer mounted anywhere.
resize2fs /dev/xvdb
then prompted to first run fsck on /dev/xvdb. After this
resize2fs /dev/xvdb
just worked, the file system expanded to fill the volume, and
everything looks completely normal now after a reboot of the VM.
If someone believes there is a natural and desirable home for this
tidbit somewhere in the Qubes Docs, I would be happy to put in there.