New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ERROR: Failed to kill old QubesDB instance #2369

Closed
qubenix opened this Issue Oct 8, 2016 · 17 comments

Comments

Projects
None yet
7 participants
@qubenix

qubenix commented Oct 8, 2016

Qubes OS version (e.g., R3.1):

R3.2

qubes-core-dom0-3.2.11-1.fc23.x86_64

Affected TemplateVMs (e.g., fedora-23, if applicable):

All VMs.


Expected behavior:

/var/run/qubes/qubesdb.{vm-name}.* should be rm'd when VM is shutdown.

Actual behavior:

Files persist and prevent future startup of VM.

Steps to reproduce the behavior:

Start a VM, shutdown VM, attempt to restart VM.

[user@dom0 ~]$ qvm-start media
--> Creating volatile image: /var/lib/qubes/appvms/media/volatile.img...
--> Loading the VM (type = AppVM)...
--> Starting Qubes DB...
--> Setting Qubes DB info for the VM...
--> Updating firewall rules...
--> Starting the VM...
--> Starting the qrexec daemon...
Waiting for VM's qrexec agent......connected
--> Starting Qubes GUId...
Connecting to VM's GUI agent: .connected
--> Sending monitor layout...
--> Waiting for qubes-session...
[user@dom0 ~]$ qvm-shutdown media
Shutting down VM: 'media'...
[user@dom0 ~]$ ls /var/run/qubes/ | grep media
qubesdb.media.pid
qubesdb.media.sock
[user@dom0 ~]$ qvm-start media
--> Creating volatile image: /var/lib/qubes/appvms/media/volatile.img...
--> Loading the VM (type = AppVM)...
--> Starting Qubes DB...
ERROR: Failed to kill old QubesDB instance (PID 13079
). Terminate it manually and retry. If that isn't QubesDB process, remove the pidfile: /var/run/qubes/qubesdb.media.pid

General notes:

In media vm:

user@host:~$ sudo dpkg --list | grep qubesdb
ii  libqubesdb                                     3.2.2-1+deb8u1                       amd64        QubesDB libs.
ii  qubesdb                                        3.2.2-1+deb8u1                       amd64        QubesDB management tools and daemon.
ii  qubesdb-vm                                     3.2.2-1+deb8u1                       amd64        QubesDB VM service.

Related issues:

#1745

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Oct 9, 2016

Member

Does this only occur when you rapidly attempt to restart a VM?

Member

andrewdavidwong commented Oct 9, 2016

Does this only occur when you rapidly attempt to restart a VM?

@qubenix

This comment has been minimized.

Show comment
Hide comment
@qubenix

qubenix Oct 9, 2016

No. The files persist until I manually rm them.

qubenix commented Oct 9, 2016

No. The files persist until I manually rm them.

@andrewdavidwong andrewdavidwong added this to the Release 3.2 milestone Oct 9, 2016

@qubenix

This comment has been minimized.

Show comment
Hide comment
@qubenix

qubenix Oct 13, 2016

Some output from sudo journalctl -f in dom0 during the shutdown of a VM:

Oct 12 20:30:38 dom0 block-cleaner-daemon.py[1861]: Error: Device 51760 not connected.
Oct 12 20:30:38 dom0 root[11583]: /etc/xen/scripts/block: remove XENBUS_PATH=backend/vbd/14/51744
Oct 12 20:30:38 dom0 root[11580]: /etc/xen/scripts/block: remove XENBUS_PATH=backend/vbd/14/51760
Oct 12 20:30:38 dom0 root[11582]: /etc/xen/scripts/block: remove XENBUS_PATH=backend/vbd/14/51728
Oct 12 20:30:38 dom0 root[11581]: /etc/xen/scripts/block-snapshot: remove XENBUS_PATH=backend/vbd/14/51712
Oct 12 20:30:39 dom0 block-cleaner-daemon.py[1861]: Error: Device 51744 not connected.
Oct 12 20:30:39 dom0 block-cleaner-daemon.py[1861]: Error: Device 51744 not connected.
Oct 12 20:30:40 dom0 block-cleaner-daemon.py[1861]: Error: Device 51728 not connected.
Oct 12 20:30:41 dom0 root[11679]: /etc/xen/scripts/block-snapshot: Device /dev/mapper/snapshot-fb01:11667029-fb01:11665979 still in use - not removing

Let me know if there are any other logs that I can give to help.

qubenix commented Oct 13, 2016

Some output from sudo journalctl -f in dom0 during the shutdown of a VM:

Oct 12 20:30:38 dom0 block-cleaner-daemon.py[1861]: Error: Device 51760 not connected.
Oct 12 20:30:38 dom0 root[11583]: /etc/xen/scripts/block: remove XENBUS_PATH=backend/vbd/14/51744
Oct 12 20:30:38 dom0 root[11580]: /etc/xen/scripts/block: remove XENBUS_PATH=backend/vbd/14/51760
Oct 12 20:30:38 dom0 root[11582]: /etc/xen/scripts/block: remove XENBUS_PATH=backend/vbd/14/51728
Oct 12 20:30:38 dom0 root[11581]: /etc/xen/scripts/block-snapshot: remove XENBUS_PATH=backend/vbd/14/51712
Oct 12 20:30:39 dom0 block-cleaner-daemon.py[1861]: Error: Device 51744 not connected.
Oct 12 20:30:39 dom0 block-cleaner-daemon.py[1861]: Error: Device 51744 not connected.
Oct 12 20:30:40 dom0 block-cleaner-daemon.py[1861]: Error: Device 51728 not connected.
Oct 12 20:30:41 dom0 root[11679]: /etc/xen/scripts/block-snapshot: Device /dev/mapper/snapshot-fb01:11667029-fb01:11665979 still in use - not removing

Let me know if there are any other logs that I can give to help.

@rustybird

This comment has been minimized.

Show comment
Hide comment
@rustybird

rustybird Oct 13, 2016

Had the same problem. Downgrading the qubes-db packages to 3.2.1 (from 3.2.2) fixed it:

sudo qubes-dom0-update qubes-db{,-dom0,-libs}-3.2.1-1.fc23

Somehow caused by commit daemon: remove pidfile and socket only when created by this instance then?

Had the same problem. Downgrading the qubes-db packages to 3.2.1 (from 3.2.2) fixed it:

sudo qubes-dom0-update qubes-db{,-dom0,-libs}-3.2.1-1.fc23

Somehow caused by commit daemon: remove pidfile and socket only when created by this instance then?

@cyrinux

This comment has been minimized.

Show comment
Hide comment
@cyrinux

cyrinux Oct 17, 2016

I had the same problem, same fix

cyrinux commented Oct 17, 2016

I had the same problem, same fix

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Oct 17, 2016

Member

Yes @rustybird you're right. There is inverted logic in stat() error checking...

Member

marmarek commented Oct 17, 2016

Yes @rustybird you're right. There is inverted logic in stat() error checking...

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Oct 18, 2016

Member

Automated announcement from builder-github

The package qubes-db-3.2.3-1.fc23 has been pushed to the r3.2 testing repository for the Fedora fc23 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.2-current-testing

Changes included in this update

Member

marmarek commented Oct 18, 2016

Automated announcement from builder-github

The package qubes-db-3.2.3-1.fc23 has been pushed to the r3.2 testing repository for the Fedora fc23 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.2-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Oct 18, 2016

Member

Automated announcement from builder-github

The package qubes-db-3.2.3-1.fc24 has been pushed to the r3.2 testing repository for the Fedora fc24 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.2-current-testing

Changes included in this update

Member

marmarek commented Oct 18, 2016

Automated announcement from builder-github

The package qubes-db-3.2.3-1.fc24 has been pushed to the r3.2 testing repository for the Fedora fc24 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.2-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Oct 18, 2016

Member

Automated announcement from builder-github

The package qubes-db-3.2.3-1.fc23 has been pushed to the r3.2 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Member

marmarek commented Oct 18, 2016

Automated announcement from builder-github

The package qubes-db-3.2.3-1.fc23 has been pushed to the r3.2 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Nov 17, 2016

Member

Automated announcement from builder-github

The package qubes-db-3.2.3-1.fc23 has been pushed to the r3.2 stable repository for the Fedora fc23 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

Member

marmarek commented Nov 17, 2016

Automated announcement from builder-github

The package qubes-db-3.2.3-1.fc23 has been pushed to the r3.2 stable repository for the Fedora fc23 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Nov 17, 2016

Member

Automated announcement from builder-github

The package qubes-db-3.2.3-1.fc24 has been pushed to the r3.2 stable repository for the Fedora fc24 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

Member

marmarek commented Nov 17, 2016

Automated announcement from builder-github

The package qubes-db-3.2.3-1.fc24 has been pushed to the r3.2 stable repository for the Fedora fc24 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Nov 17, 2016

Member

Automated announcement from builder-github

The package qubes-db-3.2.3-1.fc23 has been pushed to the r3.2 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Member

marmarek commented Nov 17, 2016

Automated announcement from builder-github

The package qubes-db-3.2.3-1.fc23 has been pushed to the r3.2 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Nov 18, 2016

Member

Automated announcement from builder-github

The package qubesdb_3.2.3-1+deb8u1 has been pushed to the r3.2 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Nov 18, 2016

Automated announcement from builder-github

The package qubesdb_3.2.3-1+deb8u1 has been pushed to the r3.2 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Nov 18, 2016

Member

Automated announcement from builder-github

The package qubesdb_3.2.3-1+deb9u1 has been pushed to the r3.2 testing repository for the Debian stretch template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Nov 18, 2016

Automated announcement from builder-github

The package qubesdb_3.2.3-1+deb9u1 has been pushed to the r3.2 testing repository for the Debian stretch template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Dec 4, 2016

Member

Automated announcement from builder-github

The package qubesdb_3.2.3-1+deb8u1 has been pushed to the r3.2 stable repository for the Debian jessie template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Dec 4, 2016

Automated announcement from builder-github

The package qubesdb_3.2.3-1+deb8u1 has been pushed to the r3.2 stable repository for the Debian jessie template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Dec 19, 2016

Automated announcement from builder-github

The package qubesdb_3.2.3-1+deb9u1 has been pushed to the r3.2 stable repository for the Debian stretch template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Automated announcement from builder-github

The package qubesdb_3.2.3-1+deb9u1 has been pushed to the r3.2 stable repository for the Debian stretch template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@hugoncosta

This comment has been minimized.

Show comment
Hide comment
@hugoncosta

hugoncosta Aug 10, 2017

Sorry to dig out this thread, but I'm faced with the error, only on my Win7 machine. Is the fix still rolling back the qubes packages?

Sorry to dig out this thread, but I'm faced with the error, only on my Win7 machine. Is the fix still rolling back the qubes packages?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment