Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

sys-firewall unresponsive after suspend/resume #8139

Closed
ghost opened this issue Apr 14, 2023 · 2 comments
Closed

sys-firewall unresponsive after suspend/resume #8139

ghost opened this issue Apr 14, 2023 · 2 comments
Labels
affects-4.1 This issue affects Qubes OS 4.1. C: kernel diagnosed Technical diagnosis has been performed (see issue comments). P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. T: bug Type: bug report. A problem or defect resulting in unintended behavior in something that exists.

Comments

@ghost
Copy link

ghost commented Apr 14, 2023

Qubes OS release

R4.1.2 on a desktop PC (MSI Z690-A pro ddr4 with 13th gen CPU - using MSI's bios until Dasharo/coreboot supports Raptor Lake).

Running kernel-latest/6.1.12 (with 5.15.94 there is a huge display refresh lag and the machine can't resume after suspend). Everything works fine with kernel-latest except suspend/resume.

Brief summary

sys-firewall is unresponsive after resume so qubes that use it as netvm have no network connectivity. Some qvm-* commands work, other don't. There's nothing in the logs, and things magically get back to normal after a few minutes.

Details

  • unlike typical resume problems:

    • sys-net doesn't have any issues after resume, it just works
    • most of qvm-... commands in dom0 work
  • when sys-firewall is unresponsive:

    • qvm-ls shows sys-firewall isn't paused. Pausing it and unpausing it has no effect
    • there's nothing in /var/log/qubes/*sys-firewall*.log
    • xl console sys-firewall doesn't show anything weird; I can't login (I can type the username - I guess because xl has "input feedback"- but nothing happens after pressing the enter key).
    • in a sys-firewall terminal, a command that generated some output before suspend (eg. watch -n1 date) doesn't show anything after resume (and obviously, nothing can be typed in the terminal).
    • in dom0: qvm-run work xterm works, but qvm-run -q -a --service -- work qubes.StartApp+xterm doesn't work (nothing happens)
    • in other qubes that use sys-firewall as netvm: ping someip always return one successful echo reply, whatever the ip, with timeout=0ms (which is obviously not possible). ping is then stuck (even with -w or -W flags).
    • powering off the machine takes an awful lot of time, typical of when something went awry with qubesd
  • after a while (I've just measured 9 minutes today), things magically get back to normal. When that happens there are the following log entries (which look pretty normal):

    • in dom0:
    dom0 qrexec-policy-daemon[2626]: qrexec: qubes.GetDate+: sys-firewall -> @default: allowed to dom0
    dom0 qrexec-policy-daemon[2626]: qrexec: qubes.GetDate+: work -> @default: allowed to dom0
    dom0 qrexec-policy-daemon[2626]: qrexec: qubes.GetDate+: dispBrowser -> @default: allowed to dom0
    
    • in sys-net:
    systemd[1]: Starting systemd-tmpfiles-clean.service - Cleanup of Temporary Directories...
    systemd[1]: Starting systemd-hostnamed.service - Hostname Service...                                                                            systemd[1]:   systemd-tmpfiles-clean.service: Deactivated successfully.
    systemd[1]: Finished systemd-tmpfiles-clean.service - Cleanup of Temporary Directories.                                                           systemd[1]: Started systemd-hostnamed.service - Hostname Service.
    
    • in sys-firewall:
    systemd-resolved[436]: Clock change detected. Flushing caches.
    systemd[1]: qubes-sync-time.service: Deactivated successfully
    

Any idea? I've been using Qubes since R3.0, that's the first time I have such an issue (usually sys-net is the culprit, and/or none of qvm-* commands work, etc.)

(might have been related to issue #8086 - but in my case qvm-run vm cmdworks)

@ghost ghost added P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. T: bug Type: bug report. A problem or defect resulting in unintended behavior in something that exists. labels Apr 14, 2023
@marmarek
Copy link
Member

Try kernel-latest-qubes-vm from testing repo (version 6.2.10), it fixes similar issue on some laptops, so maybe will help your case too.

@ghost
Copy link
Author

ghost commented Apr 14, 2023

Try kernel-latest-qubes-vm from testing repo (version 6.2.10), it fixes similar issue on some laptops, so maybe will help your case too.

That's exactly what I was doing when you wrote :) for some reason I had overlooked the kernel update in the testing repo.
And... you're right, problem fixed!
Thanks!

@ghost ghost closed this as completed Apr 14, 2023
@andrewdavidwong andrewdavidwong added C: kernel diagnosed Technical diagnosis has been performed (see issue comments). labels Apr 14, 2023
@andrewdavidwong andrewdavidwong added this to the Release 4.1 updates milestone Apr 14, 2023
@andrewdavidwong andrewdavidwong added the affects-4.1 This issue affects Qubes OS 4.1. label Aug 8, 2023
This issue was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
affects-4.1 This issue affects Qubes OS 4.1. C: kernel diagnosed Technical diagnosis has been performed (see issue comments). P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. T: bug Type: bug report. A problem or defect resulting in unintended behavior in something that exists.
Projects
None yet
Development

No branches or pull requests

2 participants