-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Too many qrexec requests make the target domain hang #5343
Comments
This particular issue ( But that's only one side of the story.
There are several factors contributing to this issue as a whole:
Solutions:TimeoutsAdding timeouts should be easy, especially since we have it done in dom0 part already. We should do that regardless of other options. Error reportingAdding error reporting most likely will require protocol change and as such may be hard. And also doesn't help in case of malicious domains. LimitsI see three (non-exclusive) options:
I think for now the easiest solution is to increase allowed resources, within reason. This is about:
To set the above:
With the above set, I can still trigger the issue if I try very hard (like the command from the issue description), but it should be much less likely to hit it accidentally. |
I just reproduced this, specifically using qubes-split-ssh via Ansible. I think it was the parallelism of Ansible's SSH calls that triggered it. But conceivably, it could be triggered with something like Split GPG too. The number of hosts Ansible was calling out to (via qrexec call to the SSH agent) to was 33. The above config tweaks to dom0 and the template seem to have solved it for me. |
I'm running qubes 4.0 with i3 4.16 and I have multiple qvm-run issues , I can't open a terminal in any appVm or template and the error xenbus: xen store gave: unknown error E2BIG. @marmarek I added this two lines, the first in dom0 and the second in each template
Now even with this two option on dom0 and templates I can't use qvm-run either or qubes-dom0-update freeze
|
This issue is being closed because:
If anyone believes that this issue should be reopened and reassigned to an active milestone, please leave a brief comment. |
Qubes OS version
4.0
Affected component(s) or functionality
qrexec
Brief summary
If a domain issues a lot of qrexec request the target domains starts to log
xenbus: xen store gave: unknown error E2BIG
in dmesg. At some point this will prevent any qrexec connection to the target domain (even from dom0).To Reproduce
Create simple qrexec service and allow it in the policy.
Open a lot qrexec connections (you can ignore the local errors).
Expected behavior
There should be some rate limiting to prevent a domain from DoSing another.
The text was updated successfully, but these errors were encountered: