Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upSetting several AppVMs to start on boot causes only one random VM to autostart #2666
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
unman
Mar 4, 2017
Member
This isn't my experience. I regularly open 9 or 10 qubes on start-up without problems. Almost all of those are based on minimal (or mini) templates, but not all. I dont have huge amounts RAM, but a reasonable processor and SSD. Even on laptop with regularHD I could start 5 or 6
Can you provide some details on your box?
Also, does it make any difference if you set all the VMs with netvm none?
What about changing the template to a minimal template?
|
This isn't my experience. I regularly open 9 or 10 qubes on start-up without problems. Almost all of those are based on minimal (or mini) templates, but not all. I dont have huge amounts RAM, but a reasonable processor and SSD. Even on laptop with regularHD I could start 5 or 6 |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Yethal
Mar 4, 2017
I have 32GB of RAM and an nvme SSD so I doubt it's caused by my spec.
I've just checked this, all VMs autostart correctly after setting their NetVM to none.
Yethal
commented
Mar 4, 2017
|
I have 32GB of RAM and an nvme SSD so I doubt it's caused by my spec. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 4, 2017
Member
Does those network connected VMs use default NetVM? Default NetVM is specifically started before other VMs to avoid race condition you are experiencing.
|
Does those network connected VMs use default NetVM? Default NetVM is specifically started before other VMs to avoid race condition you are experiencing. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Yethal
Mar 4, 2017
All VMs use the default sys-firewall VM. Although I just checked, under Global settings I had sys-net set as default NetVM and not sys-firewall which was probably the cause of this issue. This however leads me to a question, why is it even possible to set sys-net as default NetVM (aside from "users are free to shoot themselves in the foot if they want to") ?
Yethal
commented
Mar 4, 2017
•
|
All VMs use the default sys-firewall VM. Although I just checked, under Global settings I had sys-net set as default NetVM and not sys-firewall which was probably the cause of this issue. This however leads me to a question, why is it even possible to set sys-net as default NetVM (aside from "users are free to shoot themselves in the foot if they want to") ? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Because it's also valid setting, in some cases. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Yethal
Mar 4, 2017
Fair enough. Is the race condition something that is going to be worked on or can I close this one out?
Yethal
commented
Mar 4, 2017
•
|
Fair enough. Is the race condition something that is going to be worked on or can I close this one out? |
andrewdavidwong
added
the
C: core
label
Mar 5, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
added
the
bug
label
Mar 5, 2017
marmarek
added this to the Release 3.1 updates milestone
Mar 5, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
@andrewdavidwong Confirmed this issue still arises in 3.2 milestone |
andrewdavidwong
modified the milestones:
Release 3.2 updates,
Release 3.1 updates
Apr 16, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Jun 3, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Jun 3, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Jun 3, 2017
marmarek
closed this
in
marmarek/qubes-core-admin@018877a
Jun 12, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jul 4, 2017
Automated announcement from builder-github
The package qubes-core-dom0-4.0.1-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
qubesos-bot
commented
Jul 4, 2017
|
Automated announcement from builder-github The package
|
Yethal commentedMar 4, 2017
•
edited
Edited 1 time
-
Yethal
edited Mar 4, 2017 (most recent)
Qubes OS version (e.g.,
R3.2):3.2
Affected TemplateVMs (e.g.,
fedora-23, if applicable):fedora-24, possibly others
Expected behavior:
All AppVMs set to autostart actually autostart.
Actual behavior:
Network disconnected AppVM and one random network connected AppVM autostart correctly. The rest needs to be manually started.
Steps to reproduce the behavior:
General notes:
I can provide whichever logs are needed just tell me which ones.
Related issues: