New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing fails (4.0RC1) #3110

Closed
mannp opened this Issue Sep 22, 2017 · 14 comments

Comments

Projects
None yet
2 participants
@mannp

mannp commented Sep 22, 2017

Qubes OS version:

4.0RC1

Affected TemplateVMs:

dom0

Expected behavior:

Usual access to system tools following an update to current testing and a reboot.

Actual behavior:

After updating my system to current testing repo all was well until I rebooted. After I rebooted I was unable to use qubes-dom0-update, qvm-ls or see which vm's are actually running.

http://safe.dsh.re/download/8ab76516-37c7-4e79-afdf-171eefec237d

The system is borked, including the network related system, so I am unable to get a copy of the error directly, so I have attached a screenshot.

Steps to reproduce the behavior:

Update system to current testing and reboot.

Have reinstalled and repeated, so it is reproducable.

General notes:


Related issues:

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 22, 2017

Member

That url returns 404. Anyway, check journalctl -u qubesd for details.

Member

marmarek commented Sep 22, 2017

That url returns 404. Anyway, check journalctl -u qubesd for details.

@mannp

This comment has been minimized.

Show comment
Hide comment

mannp commented Sep 22, 2017

@mannp

This comment has been minimized.

Show comment
Hide comment
@mannp

mannp Sep 22, 2017

@marmarek is this something I can recover from without internet access?

Thanks

mannp commented Sep 22, 2017

@marmarek is this something I can recover from without internet access?

Thanks

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 22, 2017

Member

Looks like there is something wrong with default template. Check /var/lib/qubes/qubes.xml, you should have something like this near the top:

<property name="default_template">fedora-25</property>
Member

marmarek commented Sep 22, 2017

Looks like there is something wrong with default template. Check /var/lib/qubes/qubes.xml, you should have something like this near the top:

<property name="default_template">fedora-25</property>
@mannp

This comment has been minimized.

Show comment
Hide comment
@mannp

mannp Sep 22, 2017

Yes i have that file and the property name is as you have it there and the file is not corrupt or anything.

The second file I uploaded has the detailed logs.

mannp commented Sep 22, 2017

Yes i have that file and the property name is as you have it there and the file is not corrupt or anything.

The second file I uploaded has the detailed logs.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 22, 2017

Member

Maybe you have some AppVM without template set? Check qubes.xml, each <domain class="AppVM"> object for <property name="template"> and if it points to an existing template.
I could write a one-line xpath expression to help with that, but it will be quite long, so it will be faster to check this manually. Unless you have a lot of VMs there.

Member

marmarek commented Sep 22, 2017

Maybe you have some AppVM without template set? Check qubes.xml, each <domain class="AppVM"> object for <property name="template"> and if it points to an existing template.
I could write a one-line xpath expression to help with that, but it will be quite long, so it will be faster to check this manually. Unless you have a lot of VMs there.

@mannp

This comment has been minimized.

Show comment
Hide comment
@mannp

mannp Sep 22, 2017

Ok will do.

I also tried to restart the qubesd daemon and qubesd.service says 'Failed with result - start-limit-hit'

mannp commented Sep 22, 2017

Ok will do.

I also tried to restart the qubesd daemon and qubesd.service says 'Failed with result - start-limit-hit'

@mannp

This comment has been minimized.

Show comment
Hide comment
@mannp

mannp Sep 22, 2017

@marmarek that was it thanks 👍 surprised the system allowed me to save a vm config if it must have a template allocated?

I am back up and running, so thanks for your time :)

mannp commented Sep 22, 2017

@marmarek that was it thanks 👍 surprised the system allowed me to save a vm config if it must have a template allocated?

I am back up and running, so thanks for your time :)

@mannp mannp closed this Sep 22, 2017

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 22, 2017

Member

How exactly have you managed to do that? Was it a VM without a template, or with invalid template (like removed one)?

Member

marmarek commented Sep 22, 2017

How exactly have you managed to do that? Was it a VM without a template, or with invalid template (like removed one)?

@mannp

This comment has been minimized.

Show comment
Hide comment
@mannp

mannp Sep 22, 2017

It was a VM without a template and I have no idea.

I did not know qubes.xml existed, so haven't edited it before.

Just trying to configure the vms in the gui.

mannp commented Sep 22, 2017

It was a VM without a template and I have no idea.

I did not know qubes.xml existed, so haven't edited it before.

Just trying to configure the vms in the gui.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 22, 2017

Member

So, it was freshly created VM broken?

Member

marmarek commented Sep 22, 2017

So, it was freshly created VM broken?

@mannp

This comment has been minimized.

Show comment
Hide comment
@mannp

mannp Sep 23, 2017

No, I had made edits in the gui for the vms and must have left one without a template allocated.

mannp commented Sep 23, 2017

No, I had made edits in the gui for the vms and must have left one without a template allocated.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 23, 2017

Member

Oh, indeed it should not be possible.

Member

marmarek commented Sep 23, 2017

Oh, indeed it should not be possible.

@marmarek marmarek referenced this issue Sep 23, 2017

Closed

Prevent resetting AppVM.template #3115

0 of 2 tasks complete
@mannp

This comment has been minimized.

Show comment
Hide comment
@mannp

mannp Sep 23, 2017

I have also got myself into a mess (thankfully solved using the knowledge of qubes.xml) allocating the graphics card to my other AppVM's and then being unable to boot the whole qubes distro.

Thanksfully I could edit qubes.xml and remove the offending pci lines to get back up and running.

I would question whether silly moves by me, like that, should also be allowed to happen by the gui?

mannp commented Sep 23, 2017

I have also got myself into a mess (thankfully solved using the knowledge of qubes.xml) allocating the graphics card to my other AppVM's and then being unable to boot the whole qubes distro.

Thanksfully I could edit qubes.xml and remove the offending pci lines to get back up and running.

I would question whether silly moves by me, like that, should also be allowed to happen by the gui?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment