Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upqvm-remove sys-whonix error - QubesException: domain is in use "sys-whonix" #3193
Comments
adrelanos
referenced this issue
Oct 19, 2017
Closed
Salt - Qubes R4 RC1 - fails to set sys-whonix's NetVM to default (sys-firewall) #3189
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Oct 19, 2017
Member
See journalctl in dom0 for details where exactly it is used. You can't remove it if it's netvm of some other VM, even if not running. You need to change netvm first.
|
See |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Oct 19, 2017
Member
Right.
whonix-ws-dvm is using sys-whonix.
And qvm-remove whonix-ws-dvm is also refused, because it is being used by whonix-ws-dvm.default_dispvm.
The required commands are:
qvm-prefs --set whonix-ws-dvm netvm ""
qvm-prefs --set whonix-ws-dvm default_dispvm ""
qvm-remove whonix-ws-dvm
qvm-remove sys-whonix
So this is not a core, but more a documentation or usability issue.
|
Right.
And The required commands are:
So this is not a core, but more a documentation or usability issue. |
marmarek
added
C: doc
task
labels
Oct 19, 2017
marmarek
added this to the Release 4.0 milestone
Oct 19, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Nov 7, 2017
qubesos-bot
referenced this issue
in QubesOS/updates-status
Nov 21, 2017
Closed
core-admin v4.0.12 (r4.0) #313
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adubois
Mar 2, 2018
From an end user point of view, whonix-ws-dvm is visible from qvm-ls, so it make sense for him to naturally delete it before it's netvm.
However what is not obvious is qvm-remove whonix-ws-dvm -> Domain in use.
qvm-prefs --set whonix-ws-dvm default_dispvm "" as mentioned above fixed it.
If there is no real dependency (AFAIK this property is a property of the object itself, so should not be a blocker) -> so rather than doc update, should this ticket be tagged as bug in qvm-remove?
otherwise, happy to do the PR for the doc update of qvm-remove instructing that:
- --force should be used because of that qvm-prefs value
- that qvm-prefs should be cleared <-- my preferred solution
adubois
commented
Mar 2, 2018
|
From an end user point of view, whonix-ws-dvm is visible from qvm-ls, so it make sense for him to naturally delete it before it's netvm. If there is no real dependency (AFAIK this property is a property of the object itself, so should not be a blocker) -> so rather than doc update, should this ticket be tagged as bug in qvm-remove? otherwise, happy to do the PR for the doc update of qvm-remove instructing that:
|
added a commit
to adubois/qubes-doc
that referenced
this issue
Mar 3, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adubois
Mar 3, 2018
Created QubesOS/qubes-doc#610
Problem is not limited to qvm-prefs of DVM itself.
adubois
commented
Mar 3, 2018
|
Created QubesOS/qubes-doc#610 |
andrewdavidwong
modified the milestones:
Release 4.0,
Release 4.1
Mar 31, 2018
added a commit
to marmarta/qubes-core-admin-client
that referenced
this issue
Jul 19, 2018
marmarta
referenced this issue
in QubesOS/qubes-core-admin-client
Jul 19, 2018
Merged
Better information on error in qvm-remove #74
marmarek
closed this
in
QubesOS/qubes-core-admin-client#74
Jul 20, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jul 20, 2018
Automated announcement from builder-github
The package python2-qubesadmin-4.0.19-0.1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
qubesos-bot
commented
Jul 20, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-dom0-cur-test
label
Jul 20, 2018
qubesos-bot
referenced this issue
in QubesOS/updates-status
Jul 20, 2018
Open
core-admin-client v4.0.19 (r4.0) #607
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jul 20, 2018
Automated announcement from builder-github
The package core-admin-client has been pushed to the r4.0 testing repository for the CentOS centos7 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Jul 20, 2018
|
Automated announcement from builder-github The package
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jul 20, 2018
Automated announcement from builder-github
The package qubes-core-admin-client_4.0.19-1+deb9u1 has been pushed to the r4.0 testing repository for the Debian template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing (or appropriate equivalent for your template version), then use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Jul 20, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-stretch-cur-test
label
Jul 20, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jul 20, 2018
Automated announcement from builder-github
The component core-admin-client (including package python2-qubesadmin-4.0.19-0.1.fc26) has been pushed to the r4.0 testing repository for the Fedora template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Jul 20, 2018
|
Automated announcement from builder-github The component
|
adrelanos commentedOct 19, 2017
Qubes OS version:
Qubes R4 with all Qubes testing repositories
Affected TemplateVMs:
Dom0
Steps to reproduce the behavior:
Install Qubes R4 with all Qubes testing repositories.
Enable Qubes community templates repository in /etc/yum.repos.d/qubes-templates.repo.
(Did last command because of #3188.)
Expected behavior:
sys-whonix removed.
Actual behavior:
Error message
Checked using
qvm-lsthat sys-whonix is not running, it's halted, whonix-gw and whonix-ws are halted as well and anon-whonix does not exist. No other VM using sys-whonix. I wonder what may be using sys-whonix?