New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Qubesd broken after rebooting dom0, updated fedora 25 #2960

Closed
0spinboson opened this Issue Aug 3, 2017 · 24 comments

Comments

Projects
None yet
5 participants
@0spinboson

0spinboson commented Aug 3, 2017

Qubes OS version (e.g., R3.2):

4.0rc1

tmp_img_20170803_0939111419151626

Rebooted machine, got this. No extra repo enabled beyond dom0 current testing.
First time I updated dom0 since installing 4rc1

Expected behavior:

Updating dom0 doesn't kill qubes-manager

@0spinboson

This comment has been minimized.

Show comment
Hide comment
@0spinboson

0spinboson Aug 3, 2017

The list of packages available atm
tmp_img_20170803_110120999613296

The list of packages available atm
tmp_img_20170803_110120999613296

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 3, 2017

Member

Updates list look normal (upstream Fedora updates). Previous error means something gone wrong with qubesd - see logs: sudo journalctl -u qubesd.

Member

marmarek commented Aug 3, 2017

Updates list look normal (upstream Fedora updates). Previous error means something gone wrong with qubesd - see logs: sudo journalctl -u qubesd.

@0spinboson

This comment has been minimized.

Show comment
Hide comment
@0spinboson

0spinboson Aug 3, 2017

After reinstalling rc1 a second time (to get that list), I haven't run into this again (and didn't screenshot log before doing so).

0spinboson commented Aug 3, 2017

After reinstalling rc1 a second time (to get that list), I haven't run into this again (and didn't screenshot log before doing so).

@0spinboson

This comment has been minimized.

Show comment
Hide comment
@0spinboson

0spinboson Aug 3, 2017

Seems I spoke to soon. Here you go.
2017-08-03 13 35 59

Seems I spoke to soon. Here you go.
2017-08-03 13 35 59

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 3, 2017

Member

Is this right after update? What version of qubes-core-dom0 package do you have?

Member

marmarek commented Aug 3, 2017

Is this right after update? What version of qubes-core-dom0 package do you have?

@0spinboson

This comment has been minimized.

Show comment
Hide comment
@0spinboson

0spinboson Aug 3, 2017

4.0.4. I haven't done anything weird in dom0, just update it and update VMs (which also took some effort, because of weird issues with getting f25 to act as netVM. Works some times, but at other times nothing is forwarded to sys-firewall. Debian-8 worked better, but when I cloned & upgraded that to d9, it started acting the same way. F25 misbehavior as netVM happens on both of my PCs).

0spinboson commented Aug 3, 2017

4.0.4. I haven't done anything weird in dom0, just update it and update VMs (which also took some effort, because of weird issues with getting f25 to act as netVM. Works some times, but at other times nothing is forwarded to sys-firewall. Debian-8 worked better, but when I cloned & upgraded that to d9, it started acting the same way. F25 misbehavior as netVM happens on both of my PCs).

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 3, 2017

Member

Try restarting the service: systemctl restart qubesd

Member

marmarek commented Aug 3, 2017

Try restarting the service: systemctl restart qubesd

@0spinboson

This comment has been minimized.

Show comment
Hide comment
@0spinboson

0spinboson Aug 3, 2017

That works, and I can start sys-net and -firewall now, but can't open a terminal window.

That works, and I can start sys-net and -firewall now, but can't open a terminal window.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 3, 2017

Member

Try qvm-start-gui --all

Member

marmarek commented Aug 3, 2017

Try qvm-start-gui --all

@0spinboson

This comment has been minimized.

Show comment
Hide comment
@0spinboson

0spinboson Aug 3, 2017

That also works

That also works

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 3, 2017

Member

Do you have terminal now?

Member

marmarek commented Aug 3, 2017

Do you have terminal now?

@0spinboson

This comment has been minimized.

Show comment
Hide comment

Yes.

@0spinboson

This comment has been minimized.

Show comment
Hide comment
@0spinboson

0spinboson Aug 3, 2017

After playing around a bit, a few remarks:

  1. (obviously) this fix isn't persistent across reboots. Also, the notification area widgets are missing.
  2. I have to run the qvm-start-gui every time I run something / start a new VM, to get those GUIs to show up.
  3. qvm-start-gui --all also 'fixes' another issue I was running into, namely that GUIs weren't showing up properly after I'd started/shutdown VMs a number of times. (I also start seeing warnings about thin provisioning assigning more space than this SSD has -- I posted a screenshot with the error in the rc1 thread in qubes-users).

0spinboson commented Aug 3, 2017

After playing around a bit, a few remarks:

  1. (obviously) this fix isn't persistent across reboots. Also, the notification area widgets are missing.
  2. I have to run the qvm-start-gui every time I run something / start a new VM, to get those GUIs to show up.
  3. qvm-start-gui --all also 'fixes' another issue I was running into, namely that GUIs weren't showing up properly after I'd started/shutdown VMs a number of times. (I also start seeing warnings about thin provisioning assigning more space than this SSD has -- I posted a screenshot with the error in the rc1 thread in qubes-users).
@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 3, 2017

Member

Ah, there is qvm-start-gui --all --watch. Check also ~/.xsession-errors - maybe there is some hint why it crashed.

Member

marmarek commented Aug 3, 2017

Ah, there is qvm-start-gui --all --watch. Check also ~/.xsession-errors - maybe there is some hint why it crashed.

@0spinboson

This comment has been minimized.

Show comment
Hide comment
@0spinboson

0spinboson Aug 3, 2017

xsession-errors.txt
a few errors at the top here, but since they lack timestamps I don't know what they correlate with.
more:
xsession-errors.old.txt

0spinboson commented Aug 3, 2017

xsession-errors.txt
a few errors at the top here, but since they lack timestamps I don't know what they correlate with.
more:
xsession-errors.old.txt

@0spinboson

This comment has been minimized.

Show comment
Hide comment
@0spinboson

0spinboson Aug 5, 2017

small update: even with 'qvm-start-gui --all --watch' running, it still misses updates (I get 1 or more from these messages "Unable to init server: could not connect: connection refused" / "failed to parse arguments: cannot open display" / "Failed to connect to Mir: Failed to connect to server socket"), at which point I have to run 'qvm-start-gui --all manually to get it working again, after which it's fine).

small update: even with 'qvm-start-gui --all --watch' running, it still misses updates (I get 1 or more from these messages "Unable to init server: could not connect: connection refused" / "failed to parse arguments: cannot open display" / "Failed to connect to Mir: Failed to connect to server socket"), at which point I have to run 'qvm-start-gui --all manually to get it working again, after which it's fine).

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 5, 2017

Member

Mir?! From where you've got it?

Member

marmarek commented Aug 5, 2017

Mir?! From where you've got it?

@0spinboson

This comment has been minimized.

Show comment
Hide comment
@0spinboson

0spinboson Aug 5, 2017

Xenial-based standalone vm. Was playing around a bit with it a while back.

0spinboson commented Aug 5, 2017

Xenial-based standalone vm. Was playing around a bit with it a while back.

@0spinboson 0spinboson changed the title from Updating dom0 fedora 25 breaks qubes manager to Qubesd broken after rebooting dom0, updated fedora 25 Aug 8, 2017

@marmarek marmarek referenced this issue in QubesOS/updates-status Aug 11, 2017

Closed

core-admin v4.0.5 (r4.0) #176

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 11, 2017

Member

(continuation of discussion from QubesOS/updates-status#176)
Can you post service start order from both failed and succeed boot? You can get it with:

journalctl -b -0 | grep 'systemd.*\(Start\|Fail\)'

And use -b -1 for previous boot, -2 for the boot before etc.

Member

marmarek commented Aug 11, 2017

(continuation of discussion from QubesOS/updates-status#176)
Can you post service start order from both failed and succeed boot? You can get it with:

journalctl -b -0 | grep 'systemd.*\(Start\|Fail\)'

And use -b -1 for previous boot, -2 for the boot before etc.

@0spinboson

This comment has been minimized.

Show comment
Hide comment
@0spinboson

0spinboson Aug 11, 2017

boot1.txt < success
boot0.txt < fail
here you go

boot1.txt < success
boot0.txt < fail
here you go

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 11, 2017

Member

Looks like startup ordering issue with "LVM2 PV scan on device 8:34". I'll add appropriate dependency.

Member

marmarek commented Aug 11, 2017

Looks like startup ordering issue with "LVM2 PV scan on device 8:34". I'll add appropriate dependency.

marmarek added a commit to marmarek/qubes-core-admin that referenced this issue Aug 12, 2017

Automatically restart qubesd when it crashes
qubesd service is critical for Qubes usage, so even in case of critical
error crashing the whole service, make sure it is restarted.
Set delay to 1s (default 100ms), to allow other services to restart too,
if crash was caused by some other service (like libvirtd crash).

QubesOS/qubes-issues#2960

marmarek added a commit to marmarek/qubes-core-admin that referenced this issue Aug 12, 2017

Order qubesd.service after lvm2-pvscan@.service
qubesd needs to list LVM volumes, so start it when the list is
available.

Fixes QubesOS/qubes-issues#2960

marmarek added a commit to marmarek/qubes-core-admin that referenced this issue Aug 12, 2017

storage/lvm: fix Volume() instance init when physical volume is unava…
…ilable

First, cache objects created with init_volume - this is the only place
where we have full volume configuration (including snap_on_start and
save_on_stop properties).
But also implement get_volume method, to get a volume instance for given
volume id. Such volume instance may be incomplete (other attributes are
available only in owning domain configuration), but it will be enough
for basic operations - like cheching and changing its size, cloning
etc.
Listing volumes still use list of physically present volumes.

This makes it possible to start qubesd service, without physical
presence of some storage devices. Starting VMs using such storage would
still fail, of course.

Fixes QubesOS/qubes-issues#2960
@seandilda

This comment has been minimized.

Show comment
Hide comment
@seandilda

seandilda Aug 17, 2017

Are packages with this fix available yet? I updated to current-testing this morning, and I'm still seeing the problem.

Are packages with this fix available yet? I updated to current-testing this morning, and I'm still seeing the problem.

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Aug 27, 2017

Automated announcement from builder-github

The package qubes-core-dom0-4.0.6-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Automated announcement from builder-github

The package qubes-core-dom0-4.0.6-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

@qubesos-bot qubesos-bot referenced this issue in QubesOS/updates-status Aug 27, 2017

Closed

core-admin v4.0.6 (r4.0) #194

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Oct 30, 2017

Automated announcement from builder-github

The package qubes-core-dom0-4.0.11-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Automated announcement from builder-github

The package qubes-core-dom0-4.0.11-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment