-
-
Notifications
You must be signed in to change notification settings - Fork 115
Preload disposables #660
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Preload disposables #660
Conversation
qubes/api/internal.py
Outdated
| :return: | ||
| """ | ||
| dispvm_template = self.arg |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
self.dest?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
But also, who will call it? If something from inside qubesd, then it doesn't need to be an "API" method, just a function somewhere, probably next to the dispvm class.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
self.dest?
WIll fix.
But also, who will call it? If something from inside qubesd, then it doesn't need to be an "API" method, just a function somewhere, probably next to the dispvm class.
Haven't determined yet who will call it and not sure it will be something inside qubesd, all I gethered so far is that it needs to run after the autostarted qubes starts, which I presume can be easily monitored.
qubes/api/internal.py
Outdated
| dispvm_template = self.arg | ||
| preload_dispvm = dispvm_template.features.get("preload-dispvm", None) | ||
| ## TODO: should this function receive disposable name as argument | ||
| ## or call admin.vm.CreateDisposable? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
IMO makes more sense to create here.
There should be also somewhere a counter how many preloaded disposables should be and if that limit (which may be 0) is reached already, do nothing here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will fix.
qubes/api/internal.py
Outdated
| :return: | ||
| """ | ||
| used_dispvm = self.arg |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
self.dest?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will fix.
qubes/api/internal.py
Outdated
| preload_dispvm = preload_dispvm.split(" ") | ||
| if use_first: | ||
| used_dispvm_name = preload_dispvm[1:] | ||
| else: | ||
| used_dispvm_name = used_dispvm.name |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should also check if the selected dispvm is actually one of preloaded ones.
But also, what is the use case of pointing at specific DispVM, instead of its template?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should also check if the selected dispvm is actually one of preloaded ones.
Will fix.
But also, what is the use case of pointing at specific DispVM, instead of its template?
In case a specific preloaded dispvm is unpaused.
qubes/api/internal.py
Outdated
| @qubes.api.method( | ||
| "internal.dispvm.preload.Use", scope="local", write=True | ||
| ) | ||
| async def dispvm_preload_use(self): |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should probably be an utility function somewhere, not an API method exposed to external callers.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I also moved internal.dispvm.preload.Create as a utility function instead of API method.
qubes/vm/dispvm.py
Outdated
| if self.is_domain_preloaded(): | ||
| self.pause() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is easy thing to do, but requires testing if it isn't too early. Some services (especially gui-agent) may still be starting.
There is an qubes.WaitForSession service that may help (ensure to use async handler to not block qubesd while waiting on it).
And also, the event is called domain-start.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There is an qubes.WaitForSession service that may help (ensure to use async handler to not block qubesd while waiting on it).
What is preloaded dispvm has gui feature disabled in case the user is using the disposable to be qubes-builder-dvm for example, that doesn't require a GUI? What can be done in this case?
See also QubesOS/qubes-issues#9789 related to gui feature and +WaitForSession.
And also, the event is called domain-start.
Right... My mind was on domain-unpaused therefore domain-started.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What is preloaded dispvm has
guifeature disabled in case the user is using the disposable to be qubes-builder-dvm for example, that doesn't require a GUI? What can be done in this case?
Very good question. In that case I guess start even is all we have. Maybe with some (configurable?) delay?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added a delay for both enabled gui and disabled gui. There is attribute/prefs qrexec_timeout, I used a delay lower than that, not sure it should be configurable as I don't know the benefits. The preloaded DispVM is paused when the timeout is reached.
qubes/vm/dispvm.py
Outdated
| def on_domain_unpaused(self): | ||
| """Mark unpaused preloaded domains as used.""" | ||
| if self.is_domain_preloaded(): | ||
| self.app.qubesd_call( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This doesn't exist in core-admin - it's only in core-admin-client. Here, you are running inside qubesd already, you can simply call appropriate function directly.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will fix.
857b54b to
db08c70
Compare
qubes/vm/dispvm.py
Outdated
| ) | ||
| threshold = 1024 * 5 | ||
| if memory >= (available_memory - threshold): | ||
| await DispVM.create_preloaded_dispvm(self) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is wrong, should have called QubesAdminAPI.create_disposable with preload argument.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
or rather DispVM.from_appvm
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There is tiny bit of code that I didn't want to duplicate from create_disposable():
dispvm = await qubes.vm.dispvm.DispVM.from_appvm(
dispvm_template, preload=preload
)
# TODO: move this to extension (in race-free fashion, better than here)
dispvm.tags.add("created-by-" + str(self.src))
dispvm.tags.add("disp-created-by-" + str(self.src))The tags... although I see some tests not using it:
% rg from_appvm ../qubes-core-*
../qubes-core-admin/qubes/tests/vm/dispvm.py
90: def test_000_from_appvm(self, mock_storage, mock_makedirs, mock_symlink):
104: qubes.vm.dispvm.DispVM.from_appvm(self.appvm)
117: def test_001_from_appvm_reject_not_allowed(self):
120: qubes.vm.dispvm.DispVM.from_appvm(self.appvm)
../qubes-core-admin/qubes/tests/integ/dispvm.py
211: qubes.vm.dispvm.DispVM.from_appvm(self.disp_base)
229: qubes.vm.dispvm.DispVM.from_appvm(self.disp_base)
../qubes-core-admin/qubes/vm/dispvm.py
390: async def from_appvm(cls, appvm, preload=False, **kwargs):
401: >>> dispvm = qubes.vm.dispvm.DispVM.from_appvm(appvm).start()
../qubes-core-admin/qubes/api/admin.py
1291: dispvm = await qubes.vm.dispvm.DispVM.from_appvm(
../qubes-core-admin-client/qubesadmin/tools/qvm_run.py
277: dispvm = qubesadmin.vm.DispVM.from_appvm(args.app,
../qubes-core-admin-client/qubesadmin/tests/vm/dispvm.py
36: vm = qubesadmin.vm.DispVM.from_appvm(self.app, None)
55: vm = qubesadmin.vm.DispVM.from_appvm(self.app, 'test-vm')
66: vm = qubesadmin.vm.DispVM.from_appvm(self.app, None)
72: vm = qubesadmin.vm.DispVM.from_appvm(self.app, None)
82: vm = qubesadmin.vm.DispVM.from_appvm(self.app, 'test-vm')
92: vm = qubesadmin.vm.DispVM.from_appvm(self.app, None)
../qubes-core-admin-client/qubesadmin/vm/__init__.py
451: def from_appvm(cls, app, appvm):
And you are correct, using create in the name of something that is not creating something, but marking, gave me the impression it would create the qube...
qubes/vm/dispvm.py
Outdated
| ## before starting a qube? | ||
| memory = getattr(self, "memory", 0) | ||
| available_memory = ( | ||
| psutil.virtual_memory().available / (1024 * 1024) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I get what you mean, but this will not work. This looks only at free memory in dom0, not the whole system. And even if it would look more globally, qmemman tries to allocate available memory as much as possible. Only qmemman knows how much "free" memory you really have, and currently there is no API to query that...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I will leave this for last, as it touches another component (qmmeman).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think the overall structure is getting close, but there are still several details. And tests missing, but this you know.
qubes/vm/dispvm.py
Outdated
| preload_dispvm_max = int( | ||
| self.features.check_with_template("preload-dispvm-max", 0) | ||
| ) | ||
| if preload_dispvm_max == 0: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This check is too late, no? I mean, the VM is created at this point already.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This check probably should be in from_appvm when preload=True. And also similar check for >0, if there aren't enough preloaded dispvms already (and if there are, probably raise an exception, not just return).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This check is too late, no?
Yes, moved to from_appvm.
And also similar check for >0, if there aren't enough preloaded dispvms already
This case will be handled as an event instead of API method. On the next push, let's see what you think about it.
(and if there are, probably raise an exception, not just return).
Done.
qubes/vm/dispvm.py
Outdated
| dispvm_template = getattr(self, "template") | ||
| dispvm = self | ||
| elif ( | ||
| self.klass == "AppVM" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is defined in a DispVM class, the klass is always DispVM here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Removing appvm clause.
qubes/vm/dispvm.py
Outdated
| self.klass == "AppVM" | ||
| and getattr(self, "template_for_dispvms", False) | ||
| ): | ||
| dispvm_template = dispvm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Besides condition always being false, dispvm is not set anyway.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed by removing appvm clause.
|
|
||
| preload_dispvm = dispvm_template.features.get("preload-dispvm", None) | ||
| if not preload_dispvm: | ||
| return |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks wrong - this shouldn't happen, as use_preloaded_dispvm should only be called on a preloaded dispvm, at this point there should be something in this feature. This should at least be a warning, if not even an exception.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I removed as everything that calls use_preloaded is checking if it is empty or even if a specific disposable is in it.
qubes/vm/dispvm.py
Outdated
| if dispvm.name not in preload_dispvm: | ||
| raise qubes.exc.QubesException("DispVM is not preloaded") | ||
| used_dispvm = dispvm.name | ||
| else: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
same comment as above about the class
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed by removing clause.
qubes/vm/dispvm.py
Outdated
| dispvm.features["internal"] = False | ||
| ## TODO: confirm if this guess of event code is correct | ||
| self.app.fire_event_for_permission(dispvm_template=dispvm_template) | ||
| dispvm_template.fire_event_async("domain-preloaded-dispvm-used") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
_async needs await. And also, it may be useful to add dispvm (name? object?) as an event parameter.
And please document the event (there is specific sphinx syntax for events, see others for example).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done.
qubes/vm/dispvm.py
Outdated
| ) | ||
| threshold = 1024 * 5 | ||
| if memory >= (available_memory - threshold): | ||
| await DispVM.create_preloaded_dispvm(self) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
or rather DispVM.from_appvm
qubes/vm/dispvm.py
Outdated
| async def on_domain_unpaused(self): | ||
| """Mark unpaused preloaded domains as used.""" | ||
| if self.is_domain_preloaded(): | ||
| await DispVM.use_preloaded_dispvm(self) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
self.use_preloaded_dispvm()
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed.
qubes/vm/dispvm.py
Outdated
| await dispvm.create_on_disk() | ||
|
|
||
| if preload: | ||
| await DispVM.create_preloaded_dispvm(dispvm) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
dispvm.create_preloaded_dispvm()
But also, I think this function should be named like mark_preloaded() or such, as it doesn't really create anything, it's called when the VM is already created.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed.
qubes/vm/dispvm.py
Outdated
| if preload_dispvm: | ||
| dispvm = preload_dispvm.split(" ")[0] | ||
| dispvm = app.domains[dispvm] | ||
| await DispVM.use_preloaded_dispvm(dispvm) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
dispvm.use_preloaded_dispvm()
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed.
596c882 to
a76ed3e
Compare
| @@ -0,0 +1,17 @@ | |||
| [Unit] | |||
| Description=Preload Qubes DispVMs | |||
| After[email protected] | |||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are you sure it will work this way? I don't think it will cover all instances of the qubes-vm@ units...
But maybe adding Before=qubes-preload-dispvm.service to [email protected] file will work?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Indeed my option failed. I did test without rebooting a qube enabling on runtime, not a valid test.
I did not want to touch qubes-vm@ but ordering after a template seems undocumented. Tested the way you said and it is best.
|
|
||
| [Service] | ||
| Type=oneshot | ||
| Environment=DISPLAY=:0 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is display really needed here? Xorg may not be running yet at this stage (and even when it is, user may not be logged in yet).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I copied from [email protected], if it is not needed here, it is not needed there also. Maybe it is needed for the gui agent to be able to create the sys-net Network Manager tray icon for example
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I tested the following:
DISPLAY= qvm-start QUBE
qvm-run -- QUBE xtermAlso tested the service with
Environment=DISPLAY=
ExecStart=/usr/bin/qvm-start %i
And both worked.
It opened the terminal. It seems to not be needed. But in 2013 it was?
commit 59b9e43060c3b9bd717e9cc59979153f86f1b9b7 (tag: mm_59b9e430)
Author: Marek Marczykowski-Górecki <[email protected]>
Date: Tue Nov 26 16:53:26 2013
Fix VM autostart - set $DISPLAY env variable
Without this, started qrexec-daemon would not have access to GUI,
especially can't display Qubes RPC confirmation dialogs.
diff --git a/linux/systemd/[email protected] b/linux/systemd/[email protected]
index 1770d6d9..ffa61763 100644
--- a/linux/systemd/[email protected]
+++ b/linux/systemd/[email protected]
@@ -4,6 +4,7 @@ After=qubes-netvm.service
[Service]
Type=oneshot
+Environment=DISPLAY=:0
ExecStart=/usr/bin/qvm-start --no-guid %i
Group=qubes
RemainAfterExit=yesThere is no option --no-guid anymore. For qvm_run.py, the default is to use args.gui if DISPLAY is set. I have found nothing special on qvm_start.py
Seems "safe" to remove from both services.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, things have changed since 2013, now qvm-start only sends an API call to qubesd, it doesn't start those services as its own children anymore.
qubes/tests/api_admin.py
Outdated
| b"admin.vm.CreateDisposable", b"dom0", arg="preload-autostart" | ||
| ) | ||
| # TODO: doesn't return any value, so how to check if it was preloaded? | ||
| #dispvm_preload = self.vm.features.get("preload-dispvm", "").split(" ") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Check if there is (exactly) one entry?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
:) Yes... will fix.
qubes/vm/dispvm.py
Outdated
| def get_feat_preload(self, feature): | ||
| if feature not in ["preload-dispvm", "preload-dispvm-max"]: | ||
| raise qubes.exc.QubesException("Invalid feature provided") | ||
|
|
||
| if feature == "preload-dispvm": | ||
| default = "" | ||
| elif feature == "preload-dispvm-max": | ||
| default = 0 | ||
|
|
||
| value = self.features.check_with_template(feature, default) | ||
|
|
||
| if feature == "preload-dispvm": | ||
| return value.split(" ") | ||
| if feature == "preload-dispvm-max": | ||
| return int(value) | ||
| return None |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Wouldn't it be better to have two functions instead of the conditions in one?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed. Is shorter, better.
qubes/vm/dispvm.py
Outdated
| @qubes.events.handler( | ||
| "domain-preloaded-dispvm-used", "domain-preloaded-dispvm-autostart" | ||
| ) | ||
| async def on_domain_preloaded_dispvm_used(self, event, delay=5, **kwargs): # pylint: disable=unused-argument |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The event is fired on disposable template, so it should be attached there, not to DispVM class. See DVMTemplateMixin.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will fix.
qubes/vm/dispvm.py
Outdated
| :returns: | ||
| """ | ||
| await asyncio.sleep(delay) | ||
| while True: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There should be a check for preload-dispvm-max early. Right now, it looks like it will preload always at least one dispvm even if preload-dispvm-max is 0. I know preload-dispvm has a check for that, but it's still open for races, plus admin.vm.CreateDisposable method can be called by others too (it's a public API, for those with appropriate permission).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed.
qubes/vm/dispvm.py
Outdated
| # TODO: what to do if the maximum is never reached on autostart | ||
| # as there is not enough memory, and then a preloaded DispVM is | ||
| # used, calling for the creation of another one, while the | ||
| # autostart will also try to create one. Is this a race | ||
| # condition? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That's a very good question. Yes, I think this race condition is there. Maybe wrap preloading dispvm in a lock? The section under lock should do all checks (max count, free memory) + actual creating. And when the max is reached (regardless if it's autostart or not), simply exit the loop. This way, even if two instances of this function runs in parallel, still correct number of dispvms will be preloaded, and both instances will finish eventually.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah, an async lock that exits when max is reached independent of the event seems like a great idea.
qubes/vm/dispvm.py
Outdated
| # W0236 (invalid-overridden-method) Method 'on_domain_started' was expected | ||
| # to be 'non-async', found it instead as 'async' | ||
| # TODO: Seems to conflict with qubes.vm.mix.net, which is pretty strange. | ||
| # Larger bug? qubes.vm.qubesvm.QubesVM has NetVMMixin... which conflicts... |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think you need to rename this function to not override one from the mixin...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed.
qubes/vm/dispvm.py
Outdated
|
|
||
| proc = None | ||
| try: | ||
| proc = await asyncio.wait_for( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
run_service only starts the service. You need to wait for it to complete with proc.communicate() for example. Or simply use run_service_for_stdio which will do that for you.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed.
| if preload_dispvm: | ||
| dispvm = app.domains[preload_dispvm[0]] | ||
| await dispvm.use_preloaded() | ||
| return dispvm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Unpause needs to happen at some point. Normally caller expect to receive not running VM, so it will call start() on it. But this won't unpause it... One option would be to modify start() to unpause VM if it's paused. Sounds like a big change, but maybe nothing will explode?
Alternatively, unpause here, and rely on the fact that start() on a running VM is no-op, so all should work (I hope).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Both options seems to have different blast ranges. I will choose the smaller blast which is to unpause it here. Also in case it is not accompanied by .start(). Although I don't see any problem with unpausing when asking to start a qube, as running any Qrexec service targeting a qube already unpauses it.
a1fe380 to
e6cffff
Compare
linux/systemd/[email protected]
Outdated
| [Unit] | ||
| Description=Start Qubes VM %i | ||
| After=qubesd.service qubes-meminfo-writer-dom0.service | ||
| Before[email protected] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| Before=qubes-vm@.service | |
| Before=qubes-preload-dispvm.service |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed....
qubes/tests/api_admin.py
Outdated
| self.app.domains[self.vm].fire_event = self.emitter.fire_event | ||
| self.vm.features["preload-dispvm-max"] = "1" | ||
| self.app.default_dispvm = self.vm | ||
| # TODO: how to mock start of a qube that we don't have its object? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
you can also patch the start method at the class level, like unittest.mock.patch("qubes.vm.dispvm.DispVM.start"). A heavier hammer, but should be fine in this test context.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Did this. Thanks.
qubes/vm/dispvm.py
Outdated
| # on it). | ||
| # TODO: | ||
| # Test if pause isn't too late, what if application autostarts, will | ||
| # it open before the qube is paused? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, it will. Theoretically there is an "invisible" mode for gui-daemon for situation like this (it was used for very old implementation of DispVM that also kinda preloaded it). But there is no support for flipping it in runtime, gui-daemon needs to be restarted for that, so that's a broader change to use it in this version. Maybe later, I'd say it's okay to ignore this issue for now.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Add this comment there. Nothing to do about this now.
|
Removed draft but still not ready yet, but Gitlab CI fails to fetch amended and force pushed commits when using the Github API. Having problems with events not being fired, trying to understand it. |
82e8ce1 to
ba4516e
Compare
linux/aux-tools/preload-dispvm
Outdated
| ] | ||
| method = "admin.vm.CreateDisposable" | ||
| for qube in appvms: | ||
| qube.qubesd_call("dom0", method, "preload-autostart") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks wrong, as the first argument is the call target. So, it calls the method on dom0 several times, instead of each disposable template...
See how qubesd_call is used in qubesadmin.vm.QubesVM. But since that uses private attribute, I guess it needs a wrapper (and then make all self.qubesd_call(self._method_dest, ...) use that new wrapper?)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if self._method_dest.startswith('$dispvm:'):
method_dest = self._method_dest[len('$dispvm:'):]
else:
method_dest = 'dom0'
dispvm = self.app.qubesd_call(method_dest,
'admin.vm.CreateDisposable')I guess it can always be the disposable template in this case?
for qube in appvms:
qube.qubesd_call(qube.name, method, "preload-autostart")There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, the latter should work too.
ba4516e to
0cda3bb
Compare
|
This didn't went far: |
|
And this: |
4026719 to
eb1caff
Compare
9b11c60 to
65f1c0e
Compare
42aee13 to
bf4fcfb
Compare
Uhm, looks like I forgot to include core-agent-linux PR in this test... |
Not all qubes from the second batch loaded, they timed out after 120 seconds when trying to start the qube. The integration test logs don't tell much, but the journal says it was out of memory. It is easy to know that it is the second batch because of the video. 4 qubes trying to preload (I lowered from 5 because 8GB of RAM for this is too little at least before fixing the issue with pause with too much RAM) followed by 4 more qubes trying to preload. 3 qubes failed to start and 3 qmemman messages of failing to satisfy assignments. Integration testsJournalThere are 3 of these logs
In other words, what can be done to fix this? Make Whonix-Workstation preload less qubes (2 or 3) as it is too resource intensive? |
bf4fcfb to
02ecfed
Compare
Organized the main issue QubesOS/qubes-issues#1512, use PR's from the MVP section. |
885a894 to
4edf004
Compare
Is a disposable state, it runs on the background and awaits to intercept calls made to disposables of the same disposable template, having faster execution times. Information of the design choices is present in the DispVM class. To use them, set the number of allowed preloaded for each disposable template with the feature "preload-dispvm-max". In case there is not enough available memory, the maximum won't be preloaded at this instance, but will retry later on at any relevant event, such as a preloaded being used or a normal qube being requested while a preload can be created. GUI daemon requires a running qube to connect to the GUI agent in the qube, because of that, auto starting the preload mechanism only happens after a GUI login. Preloaded qubes are hidden from GUI applications until the qube itself is requested to be used. Any GUI application that allows opening applications on preloaded qubes before they are marked as used is considered a bug. Applications that autostart on the qube are shown before the qube has its state interrupted, it is also a bug but that can't be fixed easily. For: QubesOS/qubes-issues#1512 For: QubesOS/qubes-issues#9918
e81d8c2 to
78aacd1
Compare
For: QubesOS/qubes-issues#1512
How to test
Unit tests
Integration tests