New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove separate service for starting default NetVM #2533

Closed
andrewdavidwong opened this Issue Dec 23, 2016 · 3 comments

Comments

Projects
None yet
4 participants
@andrewdavidwong
Member

andrewdavidwong commented Dec 23, 2016

Marek:

Default netvm (and other VMs required by it) is started at boot,
regardless of its autostart setting. If you really want, you can disable
qubes-netvm service (via systemctl), but I'd expect some problems then.

In this case, users should not be presented the (ostensible) option to disable autostarting the default NetVM. This option should be removed in two places:

* qvm-prefs (deny action with explanatory note)
* Qubes Manager (grey out checkbox)

(See below.)

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Dec 23, 2016

Member
Member

marmarek commented Dec 23, 2016

@andrewdavidwong andrewdavidwong changed the title from Remove options to disable autostart of default NetVM to Remove separate service for starting default NetVM Dec 23, 2016

@entr0py

This comment has been minimized.

Show comment
Hide comment
@entr0py

entr0py Dec 23, 2016

I'm mashing a couple issues together with this comment - not sure where to say what.

This require fixing concurrent VM startup

This would indirectly fix: Consider adding option 'none' to set Default NetVM. At boot, all VMs in a network chain are launched simultaneously causing issues with ordered initialization (vpn, tor, etc). Under normal (non-boot) circumstances, VMs are launched in an orderly fashion (by netvm dependency).

entr0py commented Dec 23, 2016

I'm mashing a couple issues together with this comment - not sure where to say what.

This require fixing concurrent VM startup

This would indirectly fix: Consider adding option 'none' to set Default NetVM. At boot, all VMs in a network chain are launched simultaneously causing issues with ordered initialization (vpn, tor, etc). Under normal (non-boot) circumstances, VMs are launched in an orderly fashion (by netvm dependency).

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Jul 18, 2017

Automated announcement from builder-github

The package qubes-core-dom0-4.0.2-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Automated announcement from builder-github

The package qubes-core-dom0-4.0.2-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

@qubesos-bot qubesos-bot referenced this issue in QubesOS/updates-status Jul 18, 2017

Closed

core-admin v4.0.2 (r4.0) #144

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment