Skip to content

Qubesd can be perma-crashed by setting devices_denied to an empty string #9893

@marmarta

Description

@marmarta

How to file a helpful issue

Qubes OS release

r.4.3

Brief summary

Setting devices_denied to an empty string (in an attempt to clear this property) made my qubesd unable to start on next load.

Steps to reproduce

qvm-prefs VM_NAME devices_denied "m******"
qvm-prefs VM_NAME devices_denied ""

restart qubesd (for me it was complete system reboot), cry when qubesd fails to start.

Expected behavior

No explosions, empty string is a valid value.

Actual behavior

Pain, nothing starts, despair.
Output of journalctl -u qubesd:

Image

Metadata

Metadata

Assignees

No one assigned

    Labels

    C: coreThis issue pertains to a Qubes core component.P: defaultPriority: default. Default priority for new issues, to be replaced given sufficient information.R: duplicateResolution: Another issue exists that is very similar to or subsumes this one.affects-4.3This issue affects Qubes OS 4.3.

    Type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions