Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upCan't create new qubes or open VM Settings #3475
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
molnara
Jan 18, 2018
Ok, so there are actually two different critical errors. One happens when you use the VM Settings shortcut and another one when you click the Qubes Settings from the Qube Manager. I'll make an edit with the other stack trace.
molnara
commented
Jan 18, 2018
|
Ok, so there are actually two different critical errors. One happens when you use the VM Settings shortcut and another one when you click the Qubes Settings from the Qube Manager. I'll make an edit with the other stack trace. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Jan 18, 2018
Member
When exactly have you updated? Or better, what package versions do you have, at least qubes-manger and qubes-core-admin-client? You can check it this way:
rpm -q qubes-manager qubes-core-admin-client
|
When exactly have you updated? Or better, what package versions do you have, at least
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
molnara
Jan 18, 2018
I just updated about an hour ago.
Qubes Manager is 4.0.10-1.fc25.x86_64
Admin client is 4.0.13-0.1.fc25.noarch
molnara
commented
Jan 18, 2018
|
I just updated about an hour ago. Qubes Manager is 4.0.10-1.fc25.x86_64 |
marmarek
assigned
marmarta
Jan 18, 2018
marmarek
added
bug
C: qubes-manager
P: major
labels
Jan 18, 2018
marmarek
added this to the Release 4.0 milestone
Jan 18, 2018
marmarta
referenced this issue
in QubesOS/qubes-manager
Jan 18, 2018
Merged
Bunch of fixes for 4.0 #57
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
molnara
Jan 18, 2018
I pulled down another update from test repo and now qubes is unstable. It takes about 15 min to open firefox. Previously I had no issues running existing qubes. Also, my laptop has 16gb memory, I only was running sys-net sys-firewall and one personal cube. All using fedora-26 template downloaded fresh.
molnara
commented
Jan 18, 2018
|
I pulled down another update from test repo and now qubes is unstable. It takes about 15 min to open firefox. Previously I had no issues running existing qubes. Also, my laptop has 16gb memory, I only was running sys-net sys-firewall and one personal cube. All using fedora-26 template downloaded fresh. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
What packages were included in that last update run? |
marmarek
closed this
in
marmarek/qubes-manager@2cffffd
Jan 18, 2018
marmarek
reopened this
Jan 18, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Jan 18, 2018
Member
What kernel do you use in VMs? Was is one of updated packages this time?
|
What kernel do you use in VMs? Was is one of updated packages this time? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
molnara
Jan 19, 2018
The last update that I applied was qubes-core-dom0 4.0.17-1.fc25.x86_64. I am guessing I can just use dnf to roll this one back?
molnara
commented
Jan 19, 2018
|
The last update that I applied was qubes-core-dom0 4.0.17-1.fc25.x86_64. I am guessing I can just use dnf to roll this one back? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
molnara
Jan 19, 2018
Also, I didn't change the vm kernels as I couldn't get into the vm settings unless that package changed them itself. They have always been default.
molnara
commented
Jan 19, 2018
|
Also, I didn't change the vm kernels as I couldn't get into the vm settings unless that package changed them itself. They have always been default. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
What was your previous qubes-core-dom0? 4.0.16 or 4.0.15? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
molnara
commented
Jan 19, 2018
|
It was 4.0.16 |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
molnara
commented
Jan 19, 2018
|
I tried rolling back the update but it can't find 4.0.16 now. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Jan 19, 2018
Member
qubes-dom0-update --action=downgrade qubes-core-dom0-4.0.16
Anyway, I don't see anything between .16 and .17 that could cause this. There is literally one commit and I don't see how it could cause such effect.
Thing that have changed between .15 and .16 is default virt_mode from HVM to PVH. In theory this could affect performance, but I'd rather expect improvement...
Maybe related to #3466? See memory assigned to each VM and/or swap usage inside of VM.
|
Anyway, I don't see anything between .16 and .17 that could cause this. There is literally one commit and I don't see how it could cause such effect. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
molnara
Jan 19, 2018
I couldn't downgrade to 4.0.16 but 4.0.15 worked. As soon as the update completed, immediately my vms started to perform normally.
molnara
commented
Jan 19, 2018
|
I couldn't downgrade to 4.0.16 but 4.0.15 worked. As soon as the update completed, immediately my vms started to perform normally. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
molnara
Jan 19, 2018
Sorry, where do I see how much memory is being used by my vms? I can't get into Vm settings because of the critical error.
molnara
commented
Jan 19, 2018
|
Sorry, where do I see how much memory is being used by my vms? I can't get into Vm settings because of the critical error. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
domains widget (Q icon), or if that doesn't work, |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Jan 19, 2018
Member
Ok, if VM restart wasn't necessary, this is most likely related to a broken fix for #3265. That broken fix is already fixed in QubesOS/qubes-core-admin#182. Let me build 4.0.18...
|
Ok, if VM restart wasn't necessary, this is most likely related to a broken fix for #3265. That broken fix is already fixed in QubesOS/qubes-core-admin#182. Let me build 4.0.18... |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
molnara
Jan 19, 2018
Ok, I didn't realize how much memory is being used by my vms:
Dom0 4067
sys-net 384
sys-net-dm 144
sys-firewall 3194
personal 3999
Seems like the firewall is chewing it all up. My personal one only has one instance of firefox open with two tabs open including the one I am writing this on. I'll try a reboot.
molnara
commented
Jan 19, 2018
|
Ok, I didn't realize how much memory is being used by my vms: Dom0 4067 Seems like the firewall is chewing it all up. My personal one only has one instance of firefox open with two tabs open including the one I am writing this on. I'll try a reboot. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Jan 19, 2018
Member
It looks fine, firewall is using that much, because you have free ram. It will give it to other VMs when needed.
|
It looks fine, firewall is using that much, because you have free ram. It will give it to other VMs when needed. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
qubes-core-dom0 4.0.18 should fix this. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 19, 2018
Automated announcement from builder-github
The package qubes-manager-4.0.11-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
qubesos-bot
commented
Jan 19, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-dom0-cur-test
label
Jan 19, 2018
qubesos-bot
referenced this issue
in QubesOS/updates-status
Jan 19, 2018
Closed
manager v4.0.11 (r4.0) #369
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mirrorway
Jan 19, 2018
With qubes-manager-4.0.11-1 I can't open vm-settings:
Whoops. A critical error occurred. This is most likely a bug in Qubes Manager.
AttributeError: default_dispvm has no default
at line 9
of file /usr/bin/qubes-vm-settings.
mirrorway
commented
Jan 19, 2018
•
|
With qubes-manager-4.0.11-1 I can't open vm-settings: Whoops. A critical error occurred. This is most likely a bug in Qubes Manager. AttributeError: default_dispvm has no default |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Jan 19, 2018
Member
Do you have other updates installed? Especially qubes-core-dom0 4.0.18 and qubes-core-admin-client >= 4.0.13
|
Do you have other updates installed? Especially qubes-core-dom0 4.0.18 and qubes-core-admin-client >= 4.0.13 |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mirrorway
commented
Jan 19, 2018
|
yes to both |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mirrorway
Jan 19, 2018
qubes-prefs default_dispvm was set to: D None,
after setting it to some VM I can now open vm-settings again.
I don't know why it was None, Maybe because I uninstalled fedora-25 template and installed fedora-26.template.
mirrorway
commented
Jan 19, 2018
•
|
qubes-prefs default_dispvm was set to: D None, |
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Jan 19, 2018
marmarek
referenced this issue
in QubesOS/qubes-core-admin
Jan 19, 2018
Merged
app: define values for default_dispvm=None, updatevm=None #183
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
molnara
Jan 19, 2018
I just pulled down latest changes and I can confirm I now can edit VM Settings in and open Create Qubes VM.
Updates applied:
qubes-core-dom0 4.0.18
qubes-dbus 1.0.4
qubes-desktop-linux-manager 4.0.6
qubes-manager 4.0.11
qubes-usb-proxy-dom0 1.0.14
Much appreciated all! Thank you.
molnara
commented
Jan 19, 2018
|
I just pulled down latest changes and I can confirm I now can edit VM Settings in and open Create Qubes VM. Updates applied: Much appreciated all! Thank you. |
marmarek
closed this
Jan 19, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Still have this bug with all updates installed. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
tlaurion
Jan 22, 2018
Contributor
Even if i loop through all qvm-ls and set default_dispvm property to whonix-ws-dvm or -D, the result is still "AttributeError: default_dispvm has no default at line 9 of /usr/bin/qubes-vm-settings"
|
Even if i loop through all qvm-ls and set default_dispvm property to whonix-ws-dvm or -D, the result is still "AttributeError: default_dispvm has no default at line 9 of /usr/bin/qubes-vm-settings" |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Jan 22, 2018
Member
Try setting global property default_dispvm:
qubes-prefs default_dispvm whonix-ws-dvm
(or other value)
|
Try setting global property
(or other value) |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
tlaurion
Jan 22, 2018
Contributor
Seems like I may not understand global/local usage with qvm-prefs. From my understanding qvm-prefs needs a domain as a first argument, which is how I always used qvm-prefs for.
qvm-prefs default_dispvm whonix-ws-dvm
qvm-prefs: error: no such domain: default_dispvm
|
Seems like I may not understand global/local usage with qvm-prefs. From my understanding qvm-prefs needs a domain as a first argument, which is how I always used qvm-prefs for.
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
tlaurion
Jan 22, 2018
Contributor
qvm-ls|awk -F " " {'print $1'}|while read vm; do qvm-prefs $vm default_dispvm -D; done
qvm-ls|awk -F " " {'print $1'}|grep -v whonix| while read vm; do qvm-prefs $vm default_dispvm whonix-ws-dvm; done
I get the same error.
|
I get the same error. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
qubes-prefs - global properties |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
tlaurion
Jan 22, 2018
Contributor
Oupsies. My bad. confused qvm-prefs with qubes-prefs.
Calling qubes-prefs default_dispvm whonix-ws-dvm resolved the issue.
I confirm that just upgrading packages creates the issue. Maybe that invocation should be done in a update script to set default to what was created at install (fedora-25-dvm/ whonix-ws-dvm)?
Thanks @marmarek .
|
Oupsies. My bad. confused qvm-prefs with qubes-prefs. Calling I confirm that just upgrading packages creates the issue. Maybe that invocation should be done in a update script to set default to what was created at install (fedora-25-dvm/ whonix-ws-dvm)? Thanks @marmarek . |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 23, 2018
Automated announcement from builder-github
The package qubes-core-dom0-4.0.19-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
qubesos-bot
commented
Jan 23, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-dom0-cur-test
label
Jan 23, 2018
qubesos-bot
referenced this issue
in QubesOS/updates-status
Jan 23, 2018
Closed
core-admin v4.0.19 (r4.0) #380
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Feb 6, 2018
Automated announcement from builder-github
The package qubes-manager-4.0.13-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:
sudo qubes-dom0-update
Or update dom0 via Qubes Manager.
qubesos-bot
commented
Feb 6, 2018
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
qubesos-bot
added
r4.0-dom0-stable
and removed
r4.0-dom0-cur-test
labels
Feb 6, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Feb 6, 2018
Automated announcement from builder-github
The package qubes-core-dom0-4.0.21-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:
sudo qubes-dom0-update
Or update dom0 via Qubes Manager.
qubesos-bot
commented
Feb 6, 2018
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
molnara commentedJan 18, 2018
•
edited
Edited 1 time
-
molnara
edited Jan 18, 2018 (most recent)
Qubes OS version:
Qubes release 4.0 (R4.0)
Affected TemplateVMs:
dom0
Steps to reproduce the behavior:
Expected behavior:
Actual behavior:
This happens when clicking VM Settings from Qubes shortcut.
This happens when you click the Qubes settings in the Qube Manager.
General notes:
I typed out that stack trace, wasn't sure how to copy/paste from dom0. (Current docs are out of date?) If someone needs more, I can type out the rest.
Related issues: