-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Template updates fail with a VMRootShell permission error #7122
Template updates fail with a VMRootShell permission error #7122
Comments
Do you get a notification about failed template start (not enough memory maybe)? If not, can you look into |
Many thanks for your help and sorry for not checking
This file did had quite some entries for Since the file was not tracked by an rpm package I moved it away and now it works. From my side the bug can be closed but maybe this is an upgrading issue. I do not remember to have created or edited this file. |
I have this exact same issue in 4.1.0. Solution works. |
I confirm this too after upgrading from 4.0.4 with qubes-dist-upgrade tool just now. Content of qubes.VMRootShell: So of course, it fails. Even though previous 4.0.4 had fedora-34. So 4.0.4 was not using it? Or the upgrade script created it? Seems like there is some bug. I cloned 4.0.4 OEM disk image prior of testing this so if you need more info I can feed, please ask. Is that policy still under use? How is it maintained across template upgrades? Backed up the file and removed it to proceed with template upgrades. |
encountered same issue with in-place R4.0->R4.1 upgrade. backing up |
Hmmm I will try to make more time into troubleshooting this and #7114 which are blockers to actually push users into upgrading before Whonix EOL of 03/22 on Qubes 4.0.4 @adrelanos @marmarek: Delays are really short for users. Really surprised by 4.1 release having came so fast. Now we expect users to reinstall and restore backup on top of 4.1 it seems. |
qubes-dist-upgrade-4.0.4-1.fc25.noarch |
Confirm that removing |
@marmarek : What should users to with that file /etc/qubes-rpc/policy/qubes.VMRootShell file containing:
Seems like it is an artifact not updated by anything anymore? |
While the file indeed shouldn't be left there, it shouldn't break updates. The fact it does is a bug. |
Policy files in /etc/qubes-rpc/policy use coma to separate action from parameters, not only between parameters. Fix that. Fixes QubesOS/qubes-issues#7122
@marmarek depending on timeline of that being uploaded in repos, I recommend that file being removed by qubes-dist-upgrade script since a lot of users will experience that issue? |
Automated announcement from builder-github The package
|
Automated announcement from builder-github The component
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The component
Or update dom0 via Qubes Manager. |
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Qubes OS release
Qubes 4.1 RC2
Brief summary
I have upgraded QubesOS from 4.0 to 4.1 RC2 without any issues.
But now if I run the Qubes Updater dom0 can be updated, but if the templates are updated I run into a permission issue.
The management vm
disp-mgmt-debian-11
is reported as started, the template vm never seems to get startet and shortly after I get the error message box:The output of the updater looks as follow:
The same happens if I run the update command outside of Qubes Update.
Steps to reproduce
Qubes Update
against one templateExpected behavior
Qubes Update works as expected without permission errors
Actual behavior
Qubes Update can not update the templates because of permission errors
The text was updated successfully, but these errors were encountered: