Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove separate service for starting default NetVM #2533

Closed
andrewdavidwong opened this issue Dec 23, 2016 · 3 comments
Closed

Remove separate service for starting default NetVM #2533

andrewdavidwong opened this issue Dec 23, 2016 · 3 comments
Labels
C: core r4.0-dom0-cur-test T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
Milestone

Comments

@andrewdavidwong
Copy link
Member

andrewdavidwong commented Dec 23, 2016

Marek:

Default netvm (and other VMs required by it) is started at boot,
regardless of its autostart setting. If you really want, you can disable
qubes-netvm service (via systemctl), but I'd expect some problems then.

In this case, users should not be presented the (ostensible) option to disable autostarting the default NetVM. This option should be removed in two places:

* qvm-prefs (deny action with explanatory note)
* Qubes Manager (grey out checkbox)

(See below.)

@andrewdavidwong andrewdavidwong added C: core P: minor Priority: minor. The lowest priority, below "default." ux User experience labels Dec 23, 2016
@andrewdavidwong andrewdavidwong added this to the Release 4.0 milestone Dec 23, 2016
@marmarek
Copy link
Member

marmarek commented Dec 23, 2016 via email

@andrewdavidwong andrewdavidwong changed the title Remove options to disable autostart of default NetVM Remove separate service for starting default NetVM Dec 23, 2016
@andrewdavidwong andrewdavidwong added T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality. and removed P: minor Priority: minor. The lowest priority, below "default." ux User experience labels Dec 23, 2016
@entr0py
Copy link

entr0py commented Dec 23, 2016

I'm mashing a couple issues together with this comment - not sure where to say what.

This require fixing concurrent VM startup

This would indirectly fix: Consider adding option 'none' to set Default NetVM. At boot, all VMs in a network chain are launched simultaneously causing issues with ordered initialization (vpn, tor, etc). Under normal (non-boot) circumstances, VMs are launched in an orderly fashion (by netvm dependency).

@qubesos-bot
Copy link

Automated announcement from builder-github

The package qubes-core-dom0-4.0.2-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
C: core r4.0-dom0-cur-test T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
Projects
None yet
Development

No branches or pull requests

4 participants