Commit Graph

311 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
2b1f8931a6
tests: integration tests for qvm-convert-img
Actual tool is in separate repository, but the backend module is here.
Also, other tests for imgconverter are already here.

QubesOS/qubes-issues#3085
2017-12-22 16:47:06 +01:00
Marek Marczykowski-Górecki
34e3c3acf3
imgconverter: fix handling explicit file type
Fix handling source filename as 'type:path' - get parts, not try to
extract only the first one.

Related QubesOS/qubes-issues#3085
2017-12-22 03:49:44 +01:00
Marek Marczykowski-Górecki
c57f28d8f7
Merge remote-tracking branch 'qubesos/pr/29'
* qubesos/pr/29:
  Fix qrexec-lib headers
2017-12-22 01:20:52 +01:00
Marek Marczykowski-Górecki
1a77802b20
travis: enable deploy stage for master-staging -> master gate 2017-12-21 20:58:24 +01:00
Marek Marczykowski-Górecki
691f4e52f4
travis: run tests also on python3 2017-12-21 20:12:16 +01:00
Marek Marczykowski-Górecki
20be8e2417
Make tests python3 compatible 2017-12-21 20:11:11 +01:00
Marek Marczykowski-Górecki
3899ca1e5d
travis: run imgconverter unit tests 2017-12-21 19:57:41 +01:00
Marek Marczykowski-Górecki
2ac5c03bb3
Update tests 2017-12-21 19:44:46 +01:00
Marek Marczykowski-Górecki
3e41a2987c
imgconverter: fix make_padlock function
hex_to_float is gone, use hex_to_int instead

Fixes QubesOS/qubes-issues#3331
2017-12-21 19:12:55 +01:00
Gianluca Guida
5fbd19e1d6
Fix qrexec-lib headers 2017-12-15 20:20:15 +01:00
Marek Marczykowski-Górecki
72343fe0cd
version 4.0.12 2017-12-12 01:41:53 +01:00
Marek Marczykowski-Górecki
ee66bb4c80
Merge remote-tracking branch 'qubesos/pr/27'
* qubesos/pr/27:
  qubes-kernel-vm-support compatibility with dracut
2017-12-01 00:12:17 +01:00
Marek Marczykowski-Górecki
dc5d025247
debian: include drauct module in qubes-kernel-vm-support
Support dracut also on Debian systems.

Fixes QubesOS/qubes-issues#3361
2017-12-01 00:11:28 +01:00
Marek Marczykowski-Górecki
3d44d3a80b
debian: make it easier to spot missing files in debian/*.install 2017-12-01 00:02:46 +01:00
Patrick Schleizer
7360aee988
qubes-kernel-vm-support compatibility with dracut
move initramfs-tools from Depends: to Recommends:

fixes https://github.com/QubesOS/qubes-issues/issues/3361
2017-12-01 00:00:28 +01:00
Marek Marczykowski-Górecki
e784f3caa3
version 4.0.11 2017-11-21 05:34:50 +01:00
Marek Marczykowski-Górecki
68d7be77db
Make udev-block-add-change executable again 2017-11-21 05:34:21 +01:00
Marek Marczykowski-Górecki
6cb980f5be
Add missing classmethod decorator 2017-11-21 05:34:01 +01:00
Marek Marczykowski-Górecki
0a7d2c0789
Merge remote-tracking branch 'qubesos/pr/25'
* qubesos/pr/25:
  replace tinting algorithm with one that partially preserves saturation too
  reimplement tint algorithm with numpy for reasonable performance
  use PIL image library instead of ImageMagick to load/save images when tinting
  add Python pillow and numpy dependencies
  remove unused cairo import
2017-11-21 05:14:11 +01:00
Marek Marczykowski-Górecki
92a86fad18
version 4.0.10 2017-11-21 04:46:49 +01:00
Marek Marczykowski-Górecki
141b9912e8
Initialize pad field in filecopy final response
Do not leak 4 bytes from the receiver stack.

Reported by @cfcs
2017-11-20 13:58:39 +01:00
Marek Marczykowski-Górecki
75fa0d3cb0
Merge remote-tracking branch 'qubesos/pr/26'
* qubesos/pr/26:
  This commit specifies the integer width explicitly to match `result_header_ext` etc.
2017-11-20 13:56:55 +01:00
Your Name
a96fe7203e This commit specifies the integer width explicitly to match result_header_ext etc.
also, can someone explain to me why `send_status_and_crc` does not need
to set `_pad` to prevent leaking stack memory in the responses?
2017-11-20 02:40:35 +01:00
qubesuser
ee58088dec replace tinting algorithm with one that partially preserves saturation too
This algorithm partially preserves saturation, for a  better result, but
enforces a minimum chroma, so that greyscale images get tinted.
2017-11-08 18:57:22 +01:00
qubesuser
843ac6c477 reimplement tint algorithm with numpy for reasonable performance
The old algorithm was so slow it would take seconds to tint all images
for a VM.
2017-11-08 18:57:22 +01:00
qubesuser
86e9231ac9 use PIL image library instead of ImageMagick to load/save images when tinting 2017-11-08 18:57:22 +01:00
qubesuser
6c6070ab49 add Python pillow and numpy dependencies 2017-11-08 17:45:21 +01:00
qubesuser
f893420871 remove unused cairo import 2017-11-08 17:45:21 +01:00
qubesuser
4d08ff40a9 Speed up udev-block-add-change by not using xenstore
xenstore-ls is incredibly slow, while reading sysfs is much faster
2017-11-08 03:37:53 +01:00
Olivier MEDOC
19cb61a0ed archlinux: build imgconverter with both python2 and python3 2017-10-22 19:17:12 +02:00
Marek Marczykowski-Górecki
f7cd2b2a76
version 4.0.9 2017-10-17 23:54:15 +02:00
Marek Marczykowski-Górecki
09e6d2ac95
initramfs: add support for variable partitions layout
Try to find root filesystem by partition label (not filesystem label!).
If that fails, default to 3rd partition according to (new) default
layout.

Fixes QubesOS/qubes-issues#3173
2017-10-17 22:45:07 +02:00
Marek Marczykowski-Górecki
e9615899ff
qubes-prepare-vm-kernel: Include kernel and initramfs inside modules.img
This will allow to boot the HVM using provided kernel directly (loaded
by qemu in stubdomain), without need for additional bootloader.

Fixes QubesOS/qubes-issues#2822
2017-10-16 23:43:03 +02:00
Marek Marczykowski-Górecki
b227d01a8a
Fix initramfs scripts on Debian
1. /etc/udev/rules.d needs to be created
2. udev needs to be reloaded explicitly

Fixes QubesOS/qubes-issues#3178
2017-10-16 23:41:21 +02:00
Marek Marczykowski-Górecki
766f83de8e
version 4.0.8 2017-09-30 01:59:38 +02:00
Marek Marczykowski-Górecki
b2207b44fc
travis: add fc26 build 2017-09-29 21:13:16 +02:00
Frédéric Pierret
b3f24caaf2
Fix CentOS dependencies: python3 2017-09-28 14:34:20 +02:00
Marek Marczykowski-Górecki
c62c8e4416
version 4.0.7 2017-09-15 13:43:18 +02:00
Marek Marczykowski-Górecki
c7420318e2
udev: fix loop devices exclusion based on directory flagfile
Getting loop device backing file path was broken:
${NAME%p*} for not-partitioned devices will cut the actual device name.
Use full name instead. This probably breaks handling partitioned
devices, but such devices should not appear in a directory flagged to be
ignored (VM images)

QubesOS/qubes-issues#3084
2017-09-15 05:25:42 +02:00
Olivier MEDOC
0207537b50
Fix gcc Werror because of a typo in a switch/case explicit fallthrough comment
GCC crash because of -Werror=implicit-fallthrough. However the fallthrough exists but has a typo.

Thanks for omac777 analysis (7d0b8155a3)

However the fallthrough exists but has a typo

(cherry picked from commit ea0c714139)
2017-09-13 01:06:04 +02:00
Marek Marczykowski-Górecki
d703652070
version 4.0.6 2017-09-12 04:52:48 +02:00
Marek Marczykowski-Górecki
764b0f3f07
udev: major cleanup in block devices handling
1. Do not detach device forcefully when it's removed. This breaks
libvirt (which thinks the device is still there). After this change, it
is possible to detach device using libvirt, even if it was already
removed physically from backend domain (unless it is dom0 - in which
case it is still broken). So, this is partial fix for
QubesOS/qubes-issues#1082.

2. Do not trigger "change" udev event when only QubesDB state needs to
be updated - this leads to massive udev events queue, and heavy I/O
usage - for example scanning all LVM many times. In some cases it even
caused infinite event queue.

3. Do not use QUBES_EXPOSED udev property - it was needed a while back
before QubesDB, because concurrent xenstore accesses are expensive
(because of transactions). It isn't the problem on QubesDB.

4. Cache information about device-mapper, so it is possible to
reconstruct it at device remove - when the actual device cannot be
queried anymore. This is specifically about list of lower layer devices
used.

5. Allow excluding loop devices pointing at a file in directory marked
with ".qubes-exclude-block-devices" file. This is more generic than
hardcoding /var/lib/qubes.

QubesOS/qubes-issues#3084
Fixes QubesOS/qubes-issues#3073
QubesOS/qubes-issues#1082
2017-09-12 04:25:34 +02:00
Marek Marczykowski-Górecki
dd71f295e5
Merge remote-tracking branch 'qubesos/pr/16'
* qubesos/pr/16:
  Fix off-by-one error in header length calculation
2017-08-12 14:02:51 +02:00
Jean-Philippe Ouellet
349f79bc66
Fix off-by-one error in header length calculation
int(ceil(log10(100))) is one lower than it should be when max widths are
powers of 10. This means providing a value of 100 when the max is 100
produces an unexpected failure.

Was never triggered because imghdrlen args are only hard-coded
constants, but a bug is a bug.
2017-08-11 09:43:41 -04:00
Marek Marczykowski-Górecki
22c94c37a9
version 4.0.5 2017-08-11 13:34:11 +02:00
Marek Marczykowski-Górecki
823d73a524
udev: filter-out QEMU devices
Fixes QubesOS/qubes-issues#2969
2017-08-07 23:00:53 +02:00
Marek Marczykowski-Górecki
43908b7eaa
version 4.0.4 2017-07-29 05:19:34 +02:00
Marek Marczykowski-Górecki
b130b79b28
Merge remote-tracking branch 'qubesos/pr/15'
* qubesos/pr/15:
  u2mfn: get mfn via pte
2017-07-24 14:02:37 +02:00
Marek Marczykowski-Górecki
4dd813c14b
version 4.0.3 2017-07-06 19:41:04 +02:00
Marek Marczykowski-Górecki
0d4c561064
udev: don't list in qvm-block any device marked to be ignored by udev
Not only device-mapper one.
This especially include loop devices for VM disk images.

QubesOS/qubes-issues#2319
2017-07-06 19:40:51 +02:00