Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upQubes Manager unusable (no new VMs, stale state) after Whoops #990
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
May 5, 2015
Member
This actually looks like some libvirt crash. Check /var/log/messages in
dom0, I guess you'll find there something like this:
libvirtd: libxl_internal.h:2784: libxl__ctx_unlock: Assertion `!r'
failed
After this happens, libvirtd is restarted automatically, but Qubes
Manager do not reconnect to the new instance. Restarting Qubes Manager
should help.
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
|
This actually looks like some libvirt crash. Check
After this happens, libvirtd is restarted automatically, but Qubes Best Regards, |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qjoo
May 5, 2015
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Marek Marczykowski-Górecki:
This actually looks like some libvirt crash. Check
/var/log/messagesin dom0, I guess you'll find there something
like this:libvirtd: libxl_internal.h:2784: libxl__ctx_unlock: Assertion!r' failed`
I can confirm having such a line in my logfile.
(Can not say whether that was generated at the time of the described
error, but probably.)
After this happens, libvirtd is restarted automatically, but Qubes
Manager do not reconnect to the new instance. Restarting Qubes
Manager should help.
Should this be reported upstream or how do you want to handle such
problems? Does Qubes 3.0 use an unmodified libvirtd?
-----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJVSR+HAAoJENGIB/ssoMC2lwkQAKr2t2mXDDjw2EmSkJB/ccXH
IxD0dxAyFxhFrgKp4Yijabr5cbjytkyHY98rLkzZz8vLNp8TU5CKKCwQYchrR3OA
gN/34DZIw22SVNBqcURWMckxL66l+Ruau9/EZQDBYgY+4DRXB9oIsutRMjvtuCoI
75YPcrMXXWZwWudauAkEPzsKHFrTIhvQzbRzlrX3M4Jp8McrDlfXU+AqupqagZV2
+GK6jzpWMmXPISV4eaWXAbawaAU/Z/Q8fp+DFPHrtQL9VLNNIJCHOzL7ch3GtqeA
/QfmoqbiLu0SIDl6o2wr0axYcj2sNPMBVFqoTzVATjuyljCyC4I/S/9hdN2jvsGC
DZPR4pzskzr/z1KSioqaZXkN6AJaxwGCJk6Tn6kqXVC50GlaZAzNMC7RT2PxkzTc
ORhcJDcpgEVs9qCSR83NPWGknbRQ3rA7PGhbFhiUMTSgGADjjEQEiKN8J9lc3ekP
XO6GuJDGxx5Mur7OzNYAweffL6x6aD+LZlYc9+tueprUIexdhjvoLAoqOuBRNXKq
1jx410s4PZtAMaHFXtpLy+TaNAV2rZwHlFFStPPmEHDpCF9kTpGGo9++HPSh1ojj
qc89wN4THp1qK5DekK2d87TN1fKaf8J0fjX7Cyh5l++YHAff1BN2qQaOgr/y+oqB
pykbjjC2545cAfiW627X
=B3De
-----END PGP SIGNATURE-----
qjoo
commented
May 5, 2015
|
-----BEGIN PGP SIGNED MESSAGE----- Marek Marczykowski-Górecki:
I can confirm having such a line in my logfile.
Should this be reported upstream or how do you want to handle such iQIcBAEBCgAGBQJVSR+HAAoJENGIB/ssoMC2lwkQAKr2t2mXDDjw2EmSkJB/ccXH |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
May 5, 2015
Member
On Tue, May 05, 2015 at 12:52:51PM -0700, qjoo wrote:
Marek Marczykowski-Górecki:
This actually looks like some libvirt crash. Check
/var/log/messagesin dom0, I guess you'll find there something
like this:libvirtd: libxl_internal.h:2784: libxl__ctx_unlock: Assertion!r' failed`I can confirm having such a line in my logfile.
(Can not say whether that was generated at the time of the described
error, but probably.)After this happens, libvirtd is restarted automatically, but Qubes
Manager do not reconnect to the new instance. Restarting Qubes
Manager should help.Should this be reported upstream or how do you want to handle such
problems? Does Qubes 3.0 use an unmodified libvirtd?
We have some patches on both libvirtd and libxl, but very unlikely there
is a cause (it doesn't touch anything lock related).
I've seen some rework of libxl context handling in newer libvirt version
- there is a chance it is already fixed there. Needs further
investigation.
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
|
On Tue, May 05, 2015 at 12:52:51PM -0700, qjoo wrote:
We have some patches on both libvirtd and libxl, but very unlikely there
Best Regards, |
marmarek
added
bug
C: qubes-manager
P: minor
labels
May 12, 2015
marmarek
added this to the Release 3.0 milestone
May 12, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
May 12, 2015
Member
This bug is about qubes-manager not reconnecting to libvirtd after crash/restart.
I'll leave it here, but if we solve underlying issue (#995), this will most likely be closed as 'wontfix', or moved to next release.
|
This bug is about qubes-manager not reconnecting to libvirtd after crash/restart. |
marmarek
modified the milestones:
Release 3.1,
Release 3.0
Sep 2, 2015
marmarek
referenced this issue
Dec 30, 2015
Closed
[Qubes 3.0] net-vm refuses to boot - Failed to restore PCI config space #1525
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mfc
Jan 4, 2016
Member
This actually looks like some libvirt crash. Check
/var/log/messagesin dom0, I guess you'll find there something like this:libvirtd: libxl_internal.h:2784: libxl__ctx_unlock: Assertion!r' failed`I can confirm having such a line in my logfile.
I get this same crash (libvirtError: internal error: client socket is closed) upon creating a DispVM but do not have this unlock error in my logs.
The crash message in Qubes VM Manager is:
----
line: if ret == -1: raise libvirtError ('virDomainIsActive() failed', dom=self)
func: isActive
line no.: 1338
file: /usr/lib64/python2.7/site-packages/libvirt.py
----
line: if libvirt_domain.isActive():
func: get_power_state
line no.: 852
file: /usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py
----
line: state = vm.get_power_state()
func: update_table
line no.: 698
file: /usr/lib64/python2.7/site-packages/qubesmanager/main.py
If I try to close the Qubes VM Manager from the systray, the system draws the right-click box without content inside it, the system hangs, and ultimately the machine must be rebooted.
In addition (potentially related, potentially not): default whonix gateway proxyvm starts yellow on boot, must be restarted -- however it cannot be started on its own (throws an error), must be started by starting an AppVM that is dependent on the whonix gateway proxyvm. Only then does it successfully start.
Qubes 3.1rc1
I get this same crash ( The crash message in Qubes VM Manager is:
If I try to close the Qubes VM Manager from the systray, the system draws the right-click box without content inside it, the system hangs, and ultimately the machine must be rebooted. In addition (potentially related, potentially not): default whonix gateway proxyvm starts yellow on boot, must be restarted -- however it cannot be started on its own (throws an error), must be started by starting an AppVM that is dependent on the whonix gateway proxyvm. Only then does it successfully start. Qubes 3.1rc1 |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Jan 4, 2016
Member
On Mon, Jan 04, 2016 at 03:08:07AM -0800, Michael Carbone wrote:
If I try to close the Qubes VM Manager from the systray, the system draws the right-click box without content inside it, the system hangs, and ultimately the machine must be rebooted.
This is some Qubes Manager hang, while holding X mouse grab, so
effectively blocking the whole X server. But you can resolve this by
switching to text console, logging as user there and killing
qubes-manager process.
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
|
On Mon, Jan 04, 2016 at 03:08:07AM -0800, Michael Carbone wrote:
This is some Qubes Manager hang, while holding X mouse grab, so Best Regards, |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Jan 4, 2016
Member
On Mon, Jan 04, 2016 at 03:08:07AM -0800, Michael Carbone wrote:
In addition (potentially related, potentially not): default whonix gateway proxyvm starts yellow on boot, must be restarted -- however it cannot be started on its own (throws an error), must be started by starting an AppVM that is dependent on the whonix gateway proxyvm. Only then does it successfully start.
Can you elaborate about that error? Haven't seen anything like that.
Also on my system sys-whonix starts just fine on system boot (green).
Check sudo systemctl status qubes-netvm in dom0 for details.
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
|
On Mon, Jan 04, 2016 at 03:08:07AM -0800, Michael Carbone wrote:
Can you elaborate about that error? Haven't seen anything like that. Also on my system Best Regards, |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mfc
Jan 5, 2016
Member
Can you elaborate about that error? Haven't seen anything like that.
For sys-whonix = whonix and whonix-dependent appvm: tor-personal-debian, it threw the following error:
Error while starting the 'tor-personal-debian' VM: Failed to kill old QubesDB instance (PID 2526). Terminate it manually and retry. If that isn't QubesDB process, remove the pidfile: /var/run/qubes/qubesdb.whonix.pid
The computer froze (I couldn't switch to text console) in this case.
sys-whonix actually works even though it is yellow so I am just not touching upon reboot, and not doing DispVMs right now.
For sys-whonix =
The computer froze (I couldn't switch to text console) in this case. sys-whonix actually works even though it is yellow so I am just not touching upon reboot, and not doing DispVMs right now. |
qjoo commentedMay 5, 2015
when closing firefox in a dispvm with ctrl-w -> window closes but dispvm is still running in qubes manager. Starting new dispvms works but they do no longer show up in QM after this bug has been triggered (dispvm windows themselfs show up and work fine).
In case this is relevant: