New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

qvm-kill (and Manager) should be more defensive #1733

Closed
rootkovska opened this Issue Feb 9, 2016 · 3 comments

Comments

Projects
None yet
2 participants
@rootkovska
Member

rootkovska commented Feb 9, 2016

While resolving some problem I manually killed a domain using xl destroy (an old habit, sorry). The domain is still being listed by visrh list and qvm-ls, but not by xl list. This causes:

  1. Qubes Manager to pop up an exception and further become unusable...
  2. qvm-kill failing also with the following exception:
[joanna@dom0 ~]$ qvm-kill disp1
Traceback (most recent call last):
  File "/usr/bin/qvm-kill", line 56, in <module>
    main()
  File "/usr/bin/qvm-kill", line 50, in main
    vm.force_shutdown()
  File "/usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py", line 1989, in force_shutdown
    self.libvirt_domain.destroy()
  File "/usr/lib64/python2.7/site-packages/libvirt.py", line 1103, in destroy
    if ret == -1: raise libvirtError ('virDomainDestroy() failed', dom=self)
libvirt.libvirtError: internal error: Failed to destroy domain '30'

@rootkovska rootkovska added this to the Release 3.1 milestone Feb 9, 2016

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Feb 9, 2016

Member

Sorry, this is libvirt issue. If its internal state desynchronize with actual state, the only way (and sometimes not even enough) is to restart libvirt daemon. Other issues of this type:

I'll work with upstream on this, but probably after 3.1 final release.

Member

marmarek commented Feb 9, 2016

Sorry, this is libvirt issue. If its internal state desynchronize with actual state, the only way (and sometimes not even enough) is to restart libvirt daemon. Other issues of this type:

I'll work with upstream on this, but probably after 3.1 final release.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Feb 9, 2016

Member

As for unusable Qubes Manager - this is duplicate of #990

Member

marmarek commented Feb 9, 2016

As for unusable Qubes Manager - this is duplicate of #990

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 15, 2016

Member

Generally: not our bug.

Member

marmarek commented May 15, 2016

Generally: not our bug.

@marmarek marmarek closed this May 15, 2016

@marmarek marmarek added the invalid label May 15, 2016

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment