New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

kernel 4.9 vs disposable VM online network change #2859

Closed
Zrubi opened this Issue Jun 19, 2017 · 9 comments

Comments

Projects
None yet
4 participants
@Zrubi
Member

Zrubi commented Jun 19, 2017

Qubes OS version (e.g., R3.2):

Qubes 3.2
xen: 4.6.5

Affected TemplateVMs (e.g., fedora-23, if applicable):

Fedora 24
VM kernel 4.9.31

Expected behavior:

Able to change the netvm of a running disposable VM

Actual behavior:

The Qubes manager shows it has been changed, however the VM has no networking. (as the default netvm is none)
I got this error in the VM:

kernel: EXT4-fs error (device xvdd): ext4_lookup:1583: inode #53358: comm systemd-udevd: deleted inode referenced: 59938
kernel: EXT4-fs (xvdd): previous I/O error to superblock detected
kernel: blk_update_request: I/O error, dev xvdd, sector 2
kernel: blk_update_request: I/O error, dev xvdd, sector 2
kernel: Buffer I/O error on dev xvdd, logical block 1, lost sync page write

And no network device appears in the VM.

while the same DVM works if I choose the VM kernel 4.4.x
kernel: xen_netfront: Initialising Xen virtual ethernet driver

And networking is working as expected.

Steps to reproduce the behavior:

  • set the initial netvm to none
  • regenerate the DVM template
  • set the VM kernel to 4.9.31
  • start a new DVM
  • try to change the netvm of the new running DVM

General notes:

the used template is up to date from all testing and security-testing repos are also enabled.


Related issues:

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jun 19, 2017

Member

Try regenerating DVM template after changing the kernel.

Member

marmarek commented Jun 19, 2017

Try regenerating DVM template after changing the kernel.

@Zrubi

This comment has been minimized.

Show comment
Hide comment
@Zrubi

Zrubi Jun 19, 2017

Member

Issue solved then.

Maybe the template regeneration should be forced after the kernel change?

Member

Zrubi commented Jun 19, 2017

Issue solved then.

Maybe the template regeneration should be forced after the kernel change?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jun 19, 2017

Member

Or savefile should also include kernel version (and properly report it). Which one is better?

Member

marmarek commented Jun 19, 2017

Or savefile should also include kernel version (and properly report it). Which one is better?

@Zrubi

This comment has been minimized.

Show comment
Hide comment
@Zrubi

Zrubi Jun 19, 2017

Member

While I don't see the background of the real problem here, If we can skip the "slow" template regeneration that would be nice.

Member

Zrubi commented Jun 19, 2017

While I don't see the background of the real problem here, If we can skip the "slow" template regeneration that would be nice.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jun 19, 2017

Member

The problem is that changing kernel also change disk image mounted as /lib/modules. And when savefile is generated, it is mounted there - so changing the image underneath result in what you see - kernel is confused.

Member

marmarek commented Jun 19, 2017

The problem is that changing kernel also change disk image mounted as /lib/modules. And when savefile is generated, it is mounted there - so changing the image underneath result in what you see - kernel is confused.

@Zrubi

This comment has been minimized.

Show comment
Hide comment
@Zrubi

Zrubi Jun 19, 2017

Member

So this problem not 4.9 related but affecting the "changing VM kernel" feature in general...

Member

Zrubi commented Jun 19, 2017

So this problem not 4.9 related but affecting the "changing VM kernel" feature in general...

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jun 19, 2017

Member

Yes, exactly.

Member

marmarek commented Jun 19, 2017

Yes, exactly.

@andrewdavidwong andrewdavidwong added this to the Far in the future milestone Jun 21, 2017

marmarek added a commit to QubesOS/qubes-core-admin that referenced this issue Jul 26, 2017

Force DispVM savefile regeneration after changing VM kernel
DispVM savefile contains references to mounted modules.img. Changing
kernel do change this image too, which ends up with confused kernel
inside.

Fixes QubesOS/qubes-issues#2859
@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Jul 26, 2017

Automated announcement from builder-github

The package qubes-core-dom0-3.2.15-1.fc23 has been pushed to the r3.2 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Automated announcement from builder-github

The package qubes-core-dom0-3.2.15-1.fc23 has been pushed to the r3.2 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

@qubesos-bot qubesos-bot referenced this issue in QubesOS/updates-status Jul 26, 2017

Closed

core-admin v3.2.15 (r3.2) #149

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Sep 18, 2017

Automated announcement from builder-github

The package qubes-core-dom0-3.2.15-1.fc23 has been pushed to the r3.2 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Automated announcement from builder-github

The package qubes-core-dom0-3.2.15-1.fc23 has been pushed to the r3.2 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment