-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi all,

I'm sending the following question at the request of Achim Patzner
(CCed):

```
What I did: I restored (among other machines) sys-net, sys-firewall
and work from a backup. These machines were marked as auto-start. They
were automaticaly renamed to *1 on import, their (auto-start) flags
were kept. I immediately used qvm-remove to get rid of them except
"work1" which I renamed to "work-32" using the qubes-manager.

What I expected: I expected the machines to be completely removed and
the name change being appropriately recorded in the database. I forgot
the auto-start feature at that time.

What I found:

Apr 08 00:42:34 dom0 systemd[1]: Started Qubes OS daemon.Apr 08 00:42:34 dom0 
systemd[1]: Starting Qubes Dom0 startup setup...Apr 08 00:42:35 dom0 
systemd[1]: Started Qubes Dom0 startup setup.Apr 08 00:42:35 dom0 systemd[1]: 
Started Qubes memory information reporter.Apr 08 00:42:35 dom0 systemd[1]: 
Starting Start Qubes VM sys-whonix1...Apr 08 00:42:35 dom0 systemd[1]: Starting 
Start Qubes VM sys-net1...Apr 08 00:42:35 dom0 systemd[1]: Starting Start Qubes 
VM sys-net...Apr 08 00:42:35 dom0 systemd[1]: Starting Start Qubes VM 
sys-usb...Apr 08 00:42:35 dom0 systemd[1]: Starting Start Qubes VM 
sys-firewall...Apr 08 00:42:35 dom0 systemd[1]: Starting Start Qubes VM 
sys-whonix...Apr 08 00:42:35 dom0 systemd[1]: Starting Start Qubes VM 
work-32...Apr 08 00:42:35 dom0 systemd[1]: Starting Start Qubes VM 
sys-firewall1...Apr 08 00:42:35 dom0 systemd[1]: Starting Start

Qubes VM work1...Apr 08 00:42:35 dom0 qvm-start[2683]: usage: qvm-start 
[--verbose] [--quiet] [--help] [--all] [--exclude EXCLUDE]Apr 08 00:42:35 dom0 
qvm-start[2683]:                  [--skip-if-running]Apr 08 00:42:35 dom0 
qvm-start[2683]:                  [--drive DRIVE | --hddisk IMAGE | --cdrom 
IMAGE | --install-windows-tools]Apr 08 00:42:35 dom0 qvm-start[2683]:           
       [VMNAME [VMNAME ...]]Apr 08 00:42:35 dom0 qvm-start[2683]: qvm-start: 
error: no such domain: 'work1'Apr 08 00:42:35 dom0 qvm-start[2680]: usage: 
qvm-start [--verbose] [--quiet] [--help] [--all] [--exclude EXCLUDE]Apr 08 
00:42:35 dom0 qvm-start[2680]:                  [--skip-if-running]Apr 08 
00:42:35 dom0 qvm-start[2680]:                  [--drive DRIVE | --hddisk IMAGE 
| --cdrom IMAGE | --install-windows-tools]Apr 08 00:42:35 dom0 qvm-start[2680]: 
                 [VMNAME [VMNAME ...]]Apr 08 00:42:35 dom0
qvm-start[2680]: qvm-start: error: no such domain: 'sys-firewall1'Apr 08 
00:42:35 dom0 qubesd[2548]: Starting sys-usbApr 08 00:42:35 dom0 
qvm-start[2662]: usage: qvm-start [--verbose] [--quiet] [--help] [--all] 
[--exclude EXCLUDE]Apr 08 00:42:35 dom0 qvm-start[2662]:                  
[--skip-if-running]Apr 08 00:42:35 dom0 qvm-start[2662]:                  
[--drive DRIVE | --hddisk IMAGE | --cdrom IMAGE | --install-windows-tools]Apr 
08 00:42:35 dom0 qvm-start[2662]:                  [VMNAME [VMNAME ...]]Apr 08 
00:42:35 dom0 qvm-start[2662]: qvm-start: error: no such domain: 
'sys-whonix1'Apr 08 00:42:35 dom0 qvm-start[2664]: usage: qvm-start [--verbose] 
[--quiet] [--help] [--all] [--exclude EXCLUDE]Apr 08 00:42:35 dom0 
qvm-start[2664]:                  [--skip-if-running]Apr 08 00:42:35 dom0 
qvm-start[2664]:                  [--drive DRIVE | --hddisk IMAGE | --cdrom 
IMAGE |
- --install-windows-tools]Apr 08 00:42:35 dom0 qvm-start[2664]:                 
 [VMNAME [VMNAME ...]]Apr 08 00:42:35 dom0 qvm-start[2664]: qvm-start: error: 
no such domain: 'sys-net1'Apr 08 00:42:35 dom0 systemd[1]: 
qubes-vm@sys-net1.service: Main process exited, code=exited, 
status=2/INVALIDARGUMENTApr 08 00:42:35 dom0 systemd[1]: Failed to start Start 
Qubes VM sys-net1.Apr 08 00:42:35 dom0 systemd[1]: qubes-vm@sys-net1.service: 
Unit entered failed state.Apr 08 00:42:35 dom0 systemd[1]: 
qubes-vm@sys-net1.service: Failed with result 'exit-code'.Apr 08 00:42:35 dom0 
systemd[1]: qubes-vm@sys-whonix1.service: Main process exited, code=exited, 
status=2/INVALIDARGUMENTApr 08 00:42:35 dom0 systemd[1]: Failed to start Start 
Qubes VM sys-whonix1.Apr 08 00:42:35 dom0 systemd[1]: 
qubes-vm@sys-whonix1.service: Unit entered failed state.Apr 08 00:42:35 dom0 
systemd[1]: qubes-vm@sys-whonix1.service:
Failed with result 'exit-code'.Apr 08 00:42:35 dom0 systemd[1]: 
qubes-vm@sys-firewall1.service: Main process exited, code=exited, 
status=2/INVALIDARGUMENTApr 08 00:42:35 dom0 systemd[1]: Failed to start Start 
Qubes VM sys-firewall1.Apr 08 00:42:35 dom0 qubesd[2548]: Starting 
sys-whonixApr 08 00:42:35 dom0 systemd[1]: qubes-vm@sys-firewall1.service: Unit 
entered failed state.Apr 08 00:42:35 dom0 systemd[1]: 
qubes-vm@sys-firewall1.service: Failed with result 'exit-code'.Apr 08 00:42:35 
dom0 systemd[1]: qubes-vm@work1.service: Main process exited, code=exited, 
status=2/INVALIDARGUMENTApr 08 00:42:35 dom0 systemd[1]: Failed to start Start 
Qubes VM work1.Apr 08 00:42:35 dom0 qubesd[2548]: Starting sys-firewallApr 08 
00:42:35 dom0 qubesd[2548]: Starting sys-netApr 08 00:42:35 dom0 qubesd[2548]: 
Starting work-32 

* It still tries auto-starting the "*1" VMs even though they were
  removed
* It still tries starting the "work1" VM
* Nevertheless work-32 is correctly launched so on renaming the flag
  remained active.

How [can I] get these entries out of the appropriate database again?
Maybe the same part of the boot process which is removing corpses of
dispVMs could do these plausibility checks for machines that do not
exist anymore. Or add a qubes-system-dbck.
```

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-----BEGIN PGP SIGNATURE-----
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=EEOl
-----END PGP SIGNATURE-----

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5c69c44-eb11-d5fc-d622-26117cac6e1e%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to