New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

sys-firewall broken, does not function as ProxyVM in R3.2 / xendriverdomain systemd service not enabled in Fedora #2141

Closed
adrelanos opened this Issue Jul 1, 2016 · 44 comments

Comments

@adrelanos
Member

adrelanos commented Jul 1, 2016

Qubes OS version (e.g., R3.1):

R3.2 (testing repository)

Affected TemplateVMs (e.g., fedora-23, if applicable):

Probably any.


Expected behavior:

An arbitrary proxy VM with NetVM set to sys-firewall should just work. (ping, nslookup, wget, etc.)

Actual behavior:

An arbitrary proxy VM with NetVM set to sys-firewall does not work (ping, nslookup, wget, etc.).

Steps to reproduce the behavior:

Unclear, since it seems to be happening only to me.

General notes:

An arbitrary proxy VM (debian based) does not work behind sys-firewall. It however works behind sys-net.

Although this breaks Whonix by default, this bug report has been produced independent from Whonix. (sys-whonix does not work with its NetVM set to sys-firewall but it does work fine when set to sys-net.)

I have collected a ton of debug output.


Related issues:

Perhaps #1067.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 1, 2016

Member

Can't reproduce...
Are you sure that proxyVM is really connected to sys-firewall? It's IP address (10.137.1.8) suggests rather being connected to sys-net. But I can't see route to in in your sys-net routing table.

Does it happen only after dynamically switching netvm? Or also after fresh startup of said proxyvm?

Member

marmarek commented Jul 1, 2016

Can't reproduce...
Are you sure that proxyVM is really connected to sys-firewall? It's IP address (10.137.1.8) suggests rather being connected to sys-net. But I can't see route to in in your sys-net routing table.

Does it happen only after dynamically switching netvm? Or also after fresh startup of said proxyvm?

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jul 1, 2016

Member

Are you sure that proxyVM is really connected to sys-firewall?

I am sure, but I will also test again.

Does it happen only after dynamically switching netvm? Or also after fresh startup of said proxyvm?

No dynamic netvm setting switching. Only manual fresh startup.

Member

adrelanos commented Jul 1, 2016

Are you sure that proxyVM is really connected to sys-firewall?

I am sure, but I will also test again.

Does it happen only after dynamically switching netvm? Or also after fresh startup of said proxyvm?

No dynamic netvm setting switching. Only manual fresh startup.

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jul 1, 2016

Member

Yes, proxyvmtest and sys-whonix were rightly connected to sys-firewall. Just now verified that.

I noticed something that may or may not be related. Boot takes a long time. (Booting from an external USB 2.0 80 GB HDD. So not the fastest.) During the bootscreen I could see that sys-net start took ~ 1:40 min.

I shut down all VMs and manually run qvm-start proxyvmtest which resulted in sys-net, sys-firewall followed up by proxyvmtest to start just right in order. After doing that, both proxyvmtest and sys-whonix had functional networking. So they did after another reboot.

Member

adrelanos commented Jul 1, 2016

Yes, proxyvmtest and sys-whonix were rightly connected to sys-firewall. Just now verified that.

I noticed something that may or may not be related. Boot takes a long time. (Booting from an external USB 2.0 80 GB HDD. So not the fastest.) During the bootscreen I could see that sys-net start took ~ 1:40 min.

I shut down all VMs and manually run qvm-start proxyvmtest which resulted in sys-net, sys-firewall followed up by proxyvmtest to start just right in order. After doing that, both proxyvmtest and sys-whonix had functional networking. So they did after another reboot.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 1, 2016

Member

This may be #1990.

Member

marmarek commented Jul 1, 2016

This may be #1990.

@tasket

This comment has been minimized.

Show comment
Hide comment
@tasket

tasket Jul 1, 2016

@adrelanos Setting sys-firewall or vpn as my sys-whonix netvm does work. Also if I do sys-whonix-> vpn-> sys-firewall-> sys-net. Do your vms stay green when you boot up and reproduce this?

tasket commented Jul 1, 2016

@adrelanos Setting sys-firewall or vpn as my sys-whonix netvm does work. Also if I do sys-whonix-> vpn-> sys-firewall-> sys-net. Do your vms stay green when you boot up and reproduce this?

@andrewdavidwong andrewdavidwong added this to the Release 3.2 milestone Jul 2, 2016

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jul 2, 2016

Member

I think they were all green.

(If they were not, I was discarding it as a minor unrelated bug #2128.)

Member

adrelanos commented Jul 2, 2016

I think they were all green.

(If they were not, I was discarding it as a minor unrelated bug #2128.)

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jul 2, 2016

Member

@marmarek:

This may be #1990.

Do you mean the former, this whole ticket could be another manifestation of #1990 or did you mean the latter, the slow sys-net bootup could be #1990?


  • I booted that system again and after boot networking was broken again in proxyvmtest and sys-whonix.
  • All VMs had the green status in QVMM.
  • The proxyvmtest was surely connected to sys-firewall, I double checked this using qvm-prefs -l proxyvmtest. Also double checked, that sys-firewall is connected to sys-net using the same method.
  • Browser AppVM was connected to sys-firewall and fully functional.
  • sys-firewall test wget google.com, nslookup google.com, ping 8.8.8.8 (destination host unreachable) all failed.
  • After shutting down all VMs and restarting sys-whonix (thereby automatically sys-net and sys-firewall starting) made connectivity work for sys-whonix and proxyvmtest.
  • After yet another reboot, exactly the same as above happened.

Therefore there is a good chance I will be able to reproduce this again. In such a situation, would you desire any debug output or so?

Member

adrelanos commented Jul 2, 2016

@marmarek:

This may be #1990.

Do you mean the former, this whole ticket could be another manifestation of #1990 or did you mean the latter, the slow sys-net bootup could be #1990?


  • I booted that system again and after boot networking was broken again in proxyvmtest and sys-whonix.
  • All VMs had the green status in QVMM.
  • The proxyvmtest was surely connected to sys-firewall, I double checked this using qvm-prefs -l proxyvmtest. Also double checked, that sys-firewall is connected to sys-net using the same method.
  • Browser AppVM was connected to sys-firewall and fully functional.
  • sys-firewall test wget google.com, nslookup google.com, ping 8.8.8.8 (destination host unreachable) all failed.
  • After shutting down all VMs and restarting sys-whonix (thereby automatically sys-net and sys-firewall starting) made connectivity work for sys-whonix and proxyvmtest.
  • After yet another reboot, exactly the same as above happened.

Therefore there is a good chance I will be able to reproduce this again. In such a situation, would you desire any debug output or so?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 3, 2016

Member

Do you mean the former, this whole ticket could be another manifestation of #1990

Yes.

Therefore there is a good chance I will be able to reproduce this again. In such a situation, would you desire any debug output or so?

Check status of all the network interfaces on the way (ifconfig -a or ip link). If any of them (including vif*) is not in UP state, this is #1990.
In such a case, you can additionally confirm this by following this:

  1. Take vif interface name, I'll use vif3.0 as an example.
  2. Get those two numbers from it (3, 0)
  3. Combine into xenstore path: backend/3/0/state
  4. Check its content (in the VM where that interface live): xenstore-read backend/3/0/state - it's probably 3 or 2
  5. Write the same value again: xenstore-write backend/3/0/state 2
  6. Now the network should be fixed.
Member

marmarek commented Jul 3, 2016

Do you mean the former, this whole ticket could be another manifestation of #1990

Yes.

Therefore there is a good chance I will be able to reproduce this again. In such a situation, would you desire any debug output or so?

Check status of all the network interfaces on the way (ifconfig -a or ip link). If any of them (including vif*) is not in UP state, this is #1990.
In such a case, you can additionally confirm this by following this:

  1. Take vif interface name, I'll use vif3.0 as an example.
  2. Get those two numbers from it (3, 0)
  3. Combine into xenstore path: backend/3/0/state
  4. Check its content (in the VM where that interface live): xenstore-read backend/3/0/state - it's probably 3 or 2
  5. Write the same value again: xenstore-write backend/3/0/state 2
  6. Now the network should be fixed.
@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jul 14, 2016

Member

I was hoping the updates from #1990 would fix this. But they did not.

I verified that I have the version numbers advertised in #1990 in dom0, fedora, debian and Whonix templates.

xenstore-read backend/3/0/state did not work. Cannot read xenstore path. (xenstore-write did also not write.) Interface was 3, 0. And that interface was not up.

Member

adrelanos commented Jul 14, 2016

I was hoping the updates from #1990 would fix this. But they did not.

I verified that I have the version numbers advertised in #1990 in dom0, fedora, debian and Whonix templates.

xenstore-read backend/3/0/state did not work. Cannot read xenstore path. (xenstore-write did also not write.) Interface was 3, 0. And that interface was not up.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 14, 2016

Member

xenstore-read backend/3/0/state did not work.

My bad - there should be backend/vif/3/0/state.

Member

marmarek commented Jul 14, 2016

xenstore-read backend/3/0/state did not work.

My bad - there should be backend/vif/3/0/state.

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jul 14, 2016

Member

xenstore-read/write works now. But the interface stays down so network cannot be restored that way. Updates from #1990 worsened the situation. Now also after shutting down all VMs and restarting them, connectivity cannot be restored and the vif interfaces stay downed.

Also since the #1990 updates, the VMs stay sometimes yellow in QVMM. Has this been reported somewhere already? May or may not be related.

Member

adrelanos commented Jul 14, 2016

xenstore-read/write works now. But the interface stays down so network cannot be restored that way. Updates from #1990 worsened the situation. Now also after shutting down all VMs and restarting them, connectivity cannot be restored and the vif interfaces stay downed.

Also since the #1990 updates, the VMs stay sometimes yellow in QVMM. Has this been reported somewhere already? May or may not be related.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 14, 2016

Member

What exactly version of qubes-core-agent do you have? 3.2.7 or 3.2.6?

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

Member

marmarek commented Jul 14, 2016

What exactly version of qubes-core-agent do you have? 3.2.7 or 3.2.6?

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jul 14, 2016

Member

sys-whonix qubes-core-agent 3.1.17-1
Debain qubes-core-agent 3.2.6-1
Fedora qubes-core-vm 3.2.7-1
dom0 qubes-core-dom0 3.2.5-1

At the moment even browser AppVM connected directly to NetVM has no more internet access.

Member

adrelanos commented Jul 14, 2016

sys-whonix qubes-core-agent 3.1.17-1
Debain qubes-core-agent 3.2.6-1
Fedora qubes-core-vm 3.2.7-1
dom0 qubes-core-dom0 3.2.5-1

At the moment even browser AppVM connected directly to NetVM has no more internet access.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 14, 2016

Member

There was a bug in upgrade path in 3.2.6 fixed in 3.2.7. In short: you need to enable xendriverdomain service.

Member

marmarek commented Jul 14, 2016

There was a bug in upgrade path in 3.2.6 fixed in 3.2.7. In short: you need to enable xendriverdomain service.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 14, 2016

Member

(3.2.7 for Debian will be in a 15min)

Member

marmarek commented Jul 14, 2016

(3.2.7 for Debian will be in a 15min)

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 14, 2016

Member

Hmm, but for Debian it isn't fixed there. Do you have sys-net/sys-firewall based on Debian? What is the status of xendriverdomain service there?

Member

marmarek commented Jul 14, 2016

Hmm, but for Debian it isn't fixed there. Do you have sys-net/sys-firewall based on Debian? What is the status of xendriverdomain service there?

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jul 14, 2016

Member

Marek Marczykowski-Górecki:

Do you have sys-net/sys-firewall based on Debian?

No.

Member

adrelanos commented Jul 14, 2016

Marek Marczykowski-Górecki:

Do you have sys-net/sys-firewall based on Debian?

No.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 14, 2016

Member

What is the status of xendriverdomain service there?

Member

marmarek commented Jul 14, 2016

What is the status of xendriverdomain service there?

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jul 15, 2016

Member

xendriverdomain was enabled (exit success) in Debian VMs. After upgrading to 3.2.7-1 this stayed the same. Exit success.

xendrivberdomain was previoulsy disabled indeed in Fedora template and enabling it fixed the networking issues.

Both, Fedora and Debian based browser VMs stay yellow in QVMM. Running konsole from QVMM keeps failing (tried 3 times each). QVMM reported qrexec not connected. Strangely however first try qvm-run browser konsole worked.

(Btw I didn't overlook your question. I wanted to answer an easy question (got Debian based sys-net|firewall?) first before I rebooted that broken system, gathered more debug output to answer the other question about xendriverdomain. Not sure that was useful or creating more confusion.)

Member

adrelanos commented Jul 15, 2016

xendriverdomain was enabled (exit success) in Debian VMs. After upgrading to 3.2.7-1 this stayed the same. Exit success.

xendrivberdomain was previoulsy disabled indeed in Fedora template and enabling it fixed the networking issues.

Both, Fedora and Debian based browser VMs stay yellow in QVMM. Running konsole from QVMM keeps failing (tried 3 times each). QVMM reported qrexec not connected. Strangely however first try qvm-run browser konsole worked.

(Btw I didn't overlook your question. I wanted to answer an easy question (got Debian based sys-net|firewall?) first before I rebooted that broken system, gathered more debug output to answer the other question about xendriverdomain. Not sure that was useful or creating more confusion.)

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 15, 2016

Member

xendrivberdomain was previoulsy disabled indeed in Fedora template and enabling it fixed the networking issues.

So apparently 3.2.7 didn't fix this either... It is strange because on my system it was properly enabled. Can you check updates installation order (qubes-core-vm-3.2.[567] and xen-4.6.1-18)? It should be in /var/log/dnf.rpm.log.

Member

marmarek commented Jul 15, 2016

xendrivberdomain was previoulsy disabled indeed in Fedora template and enabling it fixed the networking issues.

So apparently 3.2.7 didn't fix this either... It is strange because on my system it was properly enabled. Can you check updates installation order (qubes-core-vm-3.2.[567] and xen-4.6.1-18)? It should be in /var/log/dnf.rpm.log.

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jul 15, 2016

Member
Jul 14 22:21:28 INFO Upgraded: qubes-core-vm-3.2.7-1.fc23.x86_64
Jul 14 22:21:48 INFO Upgraded: xen-qubes-vm-2001:4.6.1-18.fc23.x86_64
Member

adrelanos commented Jul 15, 2016

Jul 14 22:21:28 INFO Upgraded: qubes-core-vm-3.2.7-1.fc23.x86_64
Jul 14 22:21:48 INFO Upgraded: xen-qubes-vm-2001:4.6.1-18.fc23.x86_64

@adrelanos adrelanos changed the title from sys-firewall broken, does not function as ProxyVM in R3.2 to sys-firewall broken, does not function as ProxyVM in R3.2 / xendriverdomain systemd service not enabled in Fedora Jul 16, 2016

marmarek added a commit to marmarek/old-qubes-vmm-xen that referenced this issue Jul 17, 2016

rpm: unconditionally enable xendriverdomain.service
Do not depend on preset file (which may or may not be updated at this
time). Qubes VM needs this service enabled. If someone want to disable
it anyway, he/she can always do this using drop-in file.

QubesOS/qubes-issues#2141

marmarek added a commit to marmarek/old-qubes-core-agent-linux that referenced this issue Jul 17, 2016

Revert "systemd: preset xendriverdomain on update"
This doesn't help when xen update is installed after this one. So, deal
with it in xen %post itself.
This reverts commit f2257e1.

QubesOS/qubes-issues#2141
@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 17, 2016

Member

Automated announcement from builder-github

The package xen-4.6.1-19.fc23 has been pushed to the r3.2 testing repository for the Fedora fc23 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.2-current-testing

Changes included in this update

Member

marmarek commented Jul 17, 2016

Automated announcement from builder-github

The package xen-4.6.1-19.fc23 has been pushed to the r3.2 testing repository for the Fedora fc23 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.2-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 17, 2016

Member

Automated announcement from builder-github

The package xen-4.6.1-19.fc24 has been pushed to the r3.2 testing repository for the Fedora fc24 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.2-current-testing

Changes included in this update

Member

marmarek commented Jul 17, 2016

Automated announcement from builder-github

The package xen-4.6.1-19.fc24 has been pushed to the r3.2 testing repository for the Fedora fc24 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.2-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 17, 2016

Member

Automated announcement from builder-github

The package xen-4.6.1-19.fc23 has been pushed to the r3.2 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Member

marmarek commented Jul 17, 2016

Automated announcement from builder-github

The package xen-4.6.1-19.fc23 has been pushed to the r3.2 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 17, 2016

Member

Automated announcement from builder-github

The package xen-4.6.1-19.fc21 has been pushed to the r3.1 testing repository for the Fedora fc21 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.1-current-testing

Changes included in this update

Member

marmarek commented Jul 17, 2016

Automated announcement from builder-github

The package xen-4.6.1-19.fc21 has been pushed to the r3.1 testing repository for the Fedora fc21 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.1-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 17, 2016

Member

Automated announcement from builder-github

The package xen-4.6.1-19.fc22 has been pushed to the r3.1 testing repository for the Fedora fc22 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.1-current-testing

Changes included in this update

Member

marmarek commented Jul 17, 2016

Automated announcement from builder-github

The package xen-4.6.1-19.fc22 has been pushed to the r3.1 testing repository for the Fedora fc22 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.1-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 17, 2016

Member

Automated announcement from builder-github

The package xen-4.6.1-19.fc23 has been pushed to the r3.1 testing repository for the Fedora fc23 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.1-current-testing

Changes included in this update

Member

marmarek commented Jul 17, 2016

Automated announcement from builder-github

The package xen-4.6.1-19.fc23 has been pushed to the r3.1 testing repository for the Fedora fc23 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.1-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 26, 2016

Member

Automated announcement from builder-github

The package xen-4.6.1-20.fc23 has been pushed to the r3.2 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Member

marmarek commented Jul 26, 2016

Automated announcement from builder-github

The package xen-4.6.1-20.fc23 has been pushed to the r3.2 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 26, 2016

Member

Automated announcement from builder-github

The package xen-4.6.1-20.fc20 has been pushed to the r3.1 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Member

marmarek commented Jul 26, 2016

Automated announcement from builder-github

The package xen-4.6.1-20.fc20 has been pushed to the r3.1 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 27, 2016

Member

Automated announcement from builder-github

The package xen_4.6.1-20+deb8u1 has been pushed to the r3.1 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Jul 27, 2016

Automated announcement from builder-github

The package xen_4.6.1-20+deb8u1 has been pushed to the r3.1 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 27, 2016

Member

Automated announcement from builder-github

The package xen_4.6.1-20+deb9u1 has been pushed to the r3.1 testing repository for the Debian stretch template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Jul 27, 2016

Automated announcement from builder-github

The package xen_4.6.1-20+deb9u1 has been pushed to the r3.1 testing repository for the Debian stretch template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 28, 2016

Member

Automated announcement from builder-github

The package xen-4.6.1-20.fc23 has been pushed to the r3.2 stable repository for the Fedora fc23 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

Member

marmarek commented Jul 28, 2016

Automated announcement from builder-github

The package xen-4.6.1-20.fc23 has been pushed to the r3.2 stable repository for the Fedora fc23 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jul 28, 2016

Member

Automated announcement from builder-github

The package xen-4.6.1-20.fc24 has been pushed to the r3.2 stable repository for the Fedora fc24 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

Member

marmarek commented Jul 28, 2016

Automated announcement from builder-github

The package xen-4.6.1-20.fc24 has been pushed to the r3.2 stable repository for the Fedora fc24 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 31, 2016

Member

Automated announcement from builder-github

The package xen_2001:4.6.1-20+deb8u1 has been pushed to the r3.2 stable repository for the Debian jessie template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Aug 31, 2016

Automated announcement from builder-github

The package xen_2001:4.6.1-20+deb8u1 has been pushed to the r3.2 stable repository for the Debian jessie template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 16, 2016

Member

Automated announcement from builder-github

The package xen-4.6.1-20.fc21 has been pushed to the r3.1 stable repository for the Fedora fc21 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

Member

marmarek commented Sep 16, 2016

Automated announcement from builder-github

The package xen-4.6.1-20.fc21 has been pushed to the r3.1 stable repository for the Fedora fc21 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 16, 2016

Member

Automated announcement from builder-github

The package xen-4.6.1-20.fc22 has been pushed to the r3.1 stable repository for the Fedora fc22 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

Member

marmarek commented Sep 16, 2016

Automated announcement from builder-github

The package xen-4.6.1-20.fc22 has been pushed to the r3.1 stable repository for the Fedora fc22 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 16, 2016

Member

Automated announcement from builder-github

The package xen-4.6.1-20.fc23 has been pushed to the r3.1 stable repository for the Fedora fc23 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

Member

marmarek commented Sep 16, 2016

Automated announcement from builder-github

The package xen-4.6.1-20.fc23 has been pushed to the r3.1 stable repository for the Fedora fc23 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

marmarek added a commit to QubesOS/qubes-core-agent-linux that referenced this issue Nov 20, 2016

Revert "systemd: preset xendriverdomain on update"
This doesn't help when xen update is installed after this one. So, deal
with it in xen %post itself.
This reverts commit f2257e1.

QubesOS/qubes-issues#2141

(cherry picked from commit 10cadc5)
@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Dec 5, 2016

Member

Automated announcement from builder-github

The package xen_2001:4.6.1-20+deb8u1 has been pushed to the r3.1 stable repository for the Debian jessie template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Dec 5, 2016

Automated announcement from builder-github

The package xen_2001:4.6.1-20+deb8u1 has been pushed to the r3.1 stable repository for the Debian jessie template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Dec 5, 2016

Member

Automated announcement from builder-github

The package xen_2001:4.6.1-20+deb9u1 has been pushed to the r3.1 stable repository for the Debian stretch template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Dec 5, 2016

Automated announcement from builder-github

The package xen_2001:4.6.1-20+deb9u1 has been pushed to the r3.1 stable repository for the Debian stretch template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Dec 5, 2016

Member

Automated announcement from builder-github

The package xen_2001:4.6.1-17+deb7u1 has been pushed to the r3.1 stable repository for the Debian wheezy template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Dec 5, 2016

Automated announcement from builder-github

The package xen_2001:4.6.1-17+deb7u1 has been pushed to the r3.1 stable repository for the Debian wheezy template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Dec 5, 2016

Member

Automated announcement from builder-github

The package xen_4.6.3-24+deb7u1 has been pushed to the r3.1 testing repository for the Debian wheezy template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing wheezy-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Dec 5, 2016

Automated announcement from builder-github

The package xen_4.6.3-24+deb7u1 has been pushed to the r3.1 testing repository for the Debian wheezy template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing wheezy-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment