Compare commits

..

16 Commits

Author SHA1 Message Date
Rusty Bird
9debe185fc
Remove syncfs fallback for ancient glibc (Debian 7) 2020-01-22 19:17:29 +00:00
Frédéric Pierret (fepitre)
29a0c0e7f4
travis: switch to dom0 Fedora 31
QubesOS/qubes-issues#5529
2020-01-11 11:41:11 +01:00
Marek Marczykowski-Górecki
3a0a629a38
version 4.1.3 2019-12-07 05:50:26 +01:00
Marek Marczykowski-Górecki
ef2ab997bf
Merge remote-tracking branch 'origin/pr/48'
* origin/pr/48:
  debian: fix dependencies of qubes-kernel-vm-support pkg
2019-12-07 04:58:53 +01:00
Marek Marczykowski-Górecki
2ba9fd6c23
debian: fix dependencies of qubes-kernel-vm-support pkg
Add missing busybox (required for grep inside initramfs).
Add missing grub2-common (required for grub config generation).
Convert Recommends: initramfs-tools to Depends: initramfs-tools |
dracut (see also QubesOS/qubes-issues#3361).

Fixes QubesOS/qubes-issues#5490
2019-12-07 04:58:31 +01:00
Marek Marczykowski-Górecki
241f812304
Merge remote-tracking branch 'origin/pr/47'
* origin/pr/47:
  qubes-kernel-vm-support.postinst run update-grub
2019-12-07 04:57:54 +01:00
Patrick Schleizer
8821906186
qubes-kernel-vm-support.postinst run update-grub
https://github.com/QubesOS/qubes-issues/issues/5212
2019-12-05 20:45:23 +00:00
Patrick Schleizer
34c8212467
qubes-kernel-vm-support.preinst create folder /boot/grub
https://github.com/QubesOS/qubes-issues/issues/5212
2019-12-05 20:39:03 +00:00
Marek Marczykowski-Górecki
9f0dc7dc34
travis: update python versions
3.4 is no longer available in bionic-based travis. Use this occasion to
add 3.6 and 3.7.

QubesOS/qubes-issues#4613
2019-10-23 15:29:47 +02:00
Frédéric Pierret (fepitre)
c110f98fdf
travis: switch to bionic
QubesOS/qubes-issues#4613
2019-10-19 21:51:54 +02:00
xaki23
699e10c057
partition full volatile for non-COW setups too 2019-09-24 22:40:10 +02:00
Marek Marczykowski-Górecki
82a44bc850
version 4.1.2 2019-09-22 05:10:20 +02:00
Marek Marczykowski-Górecki
bd55c1efe4
Disable BLS config style in grub
Fedora use "Boot Loader Specification" config style by default. This is
available only in Fedora-patched grub, so it's incompatible with vanilla
grub shipped by dom0.
Disable it, to generate normal boot entries.

QubesOS/qubes-issues#5212
2019-09-20 20:12:11 +02:00
Marek Marczykowski-Górecki
ba6be8d8be
rpm: update python2 deps
Name python2 explicitly in the dependencies, since Fedora 31 has python3
by default.

QubesOS/qubes-issues#5289
2019-09-17 04:53:16 +02:00
Marek Marczykowski-Górecki
61931747a8
Merge remote-tracking branch 'origin/pr/41'
* origin/pr/41:
  align volatile swap partition to 1Mb instead of 512b

Fixes QubesOS/qubes-issues#5151
2019-08-02 18:30:14 +02:00
xaki23
ecc0b70f67
align volatile swap partition to 1Mb instead of 512b 2019-07-09 23:32:27 +02:00
11 changed files with 78 additions and 28 deletions

View File

@ -1,5 +1,5 @@
sudo: required sudo: required
dist: xenial dist: bionic
language: python language: python
python: python:
- '2.7' - '2.7'
@ -10,7 +10,7 @@ script:
- test -z "$TESTS_ONLY" || python -m unittest discover -v imgconverter -p test.py - test -z "$TESTS_ONLY" || python -m unittest discover -v imgconverter -p test.py
- test -n "$TESTS_ONLY" || ~/qubes-builder/scripts/travis-build - test -n "$TESTS_ONLY" || ~/qubes-builder/scripts/travis-build
env: env:
- DIST_DOM0=fc29 USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1 - DIST_DOM0=fc31 USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1
- DISTS_VM=fc29 USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1 - DISTS_VM=fc29 USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1
- DISTS_VM=fc30 USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1 - DISTS_VM=fc30 USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1
- DISTS_VM=stretch USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1 - DISTS_VM=stretch USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1
@ -22,12 +22,14 @@ jobs:
- env: TESTS_ONLY=1 - env: TESTS_ONLY=1
python: 2.7 python: 2.7
- env: TESTS_ONLY=1 - env: TESTS_ONLY=1
python: 3.4 python: 3.5
- env: TESTS_ONLY=1 - env: TESTS_ONLY=1
python: 3.5 python: 3.6
- env: TESTS_ONLY=1
python: 3.7
- stage: deploy - stage: deploy
python: 3.5 python: 3.6
env: DIST_DOM0=fc29 TESTS_ONLY= env: DIST_DOM0=fc31 TESTS_ONLY=
script: ~/qubes-builder/scripts/travis-deploy script: ~/qubes-builder/scripts/travis-deploy
# don't build tags which are meant for code signing only # don't build tags which are meant for code signing only

31
debian/changelog vendored
View File

@ -1,3 +1,34 @@
qubes-utils (4.1.3) unstable; urgency=medium
[ xaki23 ]
* partition full volatile for non-COW setups too
[ Frédéric Pierret (fepitre) ]
* travis: switch to bionic
[ Marek Marczykowski-Górecki ]
* travis: update python versions
[ Patrick Schleizer ]
* qubes-kernel-vm-support.preinst create folder /boot/grub
* qubes-kernel-vm-support.postinst run update-grub
[ Marek Marczykowski-Górecki ]
* debian: fix dependencies of qubes-kernel-vm-support pkg
-- Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com> Sat, 07 Dec 2019 05:50:26 +0100
qubes-utils (4.1.2) unstable; urgency=medium
[ xaki23 ]
* align volatile swap partition to 1Mb instead of 512b
[ Marek Marczykowski-Górecki ]
* rpm: update python2 deps
* Disable BLS config style in grub
-- Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com> Sun, 22 Sep 2019 05:10:19 +0200
qubes-utils (4.1.1) unstable; urgency=medium qubes-utils (4.1.1) unstable; urgency=medium
* initrd: mount / rw for the overlayfs setup time * initrd: mount / rw for the overlayfs setup time

7
debian/control vendored
View File

@ -24,8 +24,11 @@ Description: Qubes Linux utilities
Package: qubes-kernel-vm-support Package: qubes-kernel-vm-support
Architecture: any Architecture: any
Recommends: initramfs-tools Depends:
Depends: ${misc:Depends} busybox,
initramfs-tools | dracut,
grub2-common,
${misc:Depends}
Description: Qubes VM kernel and initramfs modules Description: Qubes VM kernel and initramfs modules
This package contains: This package contains:
1. mkinitramfs module required to setup Qubes VM root filesystem. This package 1. mkinitramfs module required to setup Qubes VM root filesystem. This package

View File

@ -46,6 +46,19 @@ esac
#DEBHELPER# #DEBHELPER#
## https://phabricator.whonix.org/T377
## Debian has no update-grub trigger yet:
## https://bugs.debian.org/481542
if command -v update-grub >/dev/null 2>&1; then
update-grub || \
echo "$DPKG_MAINTSCRIPT_PACKAGE $DPKG_MAINTSCRIPT_NAME ERROR: Running \
'update-grub' failed with exit code $?. $DPKG_MAINTSCRIPT_PACKAGE is most \
likely only the trigger, not the cause. Unless you know this is not an issue, \
you should fix running 'update-grub', otherwise your system might no longer \
boot." >&2
fi
exit 0 exit 0
# vim: set ts=4 sw=4 sts=4 et : # vim: set ts=4 sw=4 sts=4 et :

View File

@ -0,0 +1,9 @@
#!/bin/bash
set -e
mkdir --parents /boot/grub || true
#DEBHELPER#
exit 0

View File

@ -79,8 +79,8 @@ if [ `cat /sys/class/block/$ROOT_DEV/ro` = 1 ] ; then
die "volatile.img smaller than 1GB, cannot continue" die "volatile.img smaller than 1GB, cannot continue"
fi fi
sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF
1,$SWAP_SIZE,S xvdc1: type=82,start=2048,size=$SWAP_SIZE
,,L xvdc2: type=83
EOF EOF
if [ $? -ne 0 ]; then if [ $? -ne 0 ]; then
die "Qubes: failed to setup partitions on volatile device" die "Qubes: failed to setup partitions on volatile device"
@ -97,7 +97,8 @@ else
log_begin "Qubes: Doing R/W setup for TemplateVM..." log_begin "Qubes: Doing R/W setup for TemplateVM..."
while ! [ -e /dev/xvdc ]; do sleep 0.1; done while ! [ -e /dev/xvdc ]; do sleep 0.1; done
sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF
1,$SWAP_SIZE,S xvdc1: type=82,start=2048,size=$SWAP_SIZE
xvdc3: type=83
EOF EOF
if [ $? -ne 0 ]; then if [ $? -ne 0 ]; then
die "Qubes: failed to setup partitions on volatile device" die "Qubes: failed to setup partitions on volatile device"

View File

@ -53,8 +53,8 @@ if [ `cat /sys/class/block/$ROOT_DEV/ro` = 1 ] ; then
die "volatile.img smaller than 1GB, cannot continue" die "volatile.img smaller than 1GB, cannot continue"
fi fi
/sbin/sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF /sbin/sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF
1,$SWAP_SIZE,S xvdc1: type=82,start=2048,size=$SWAP_SIZE
,,L xvdc2: type=83
EOF EOF
if [ $? -ne 0 ]; then if [ $? -ne 0 ]; then
echo "Qubes: failed to setup partitions on volatile device" echo "Qubes: failed to setup partitions on volatile device"
@ -72,7 +72,8 @@ else
echo "Qubes: Doing R/W setup for TemplateVM..." echo "Qubes: Doing R/W setup for TemplateVM..."
while ! [ -e /dev/xvdc ]; do sleep 0.1; done while ! [ -e /dev/xvdc ]; do sleep 0.1; done
/sbin/sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF /sbin/sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF
1,$SWAP_SIZE,S xvdc1: type=82,start=2048,size=$SWAP_SIZE
xvdc3: type=83
EOF EOF
if [ $? -ne 0 ]; then if [ $? -ne 0 ]; then
die "Qubes: failed to setup partitions on volatile device" die "Qubes: failed to setup partitions on volatile device"

View File

@ -5,4 +5,4 @@ if [ -r /usr/share/qubes/marker-vm ] &&
[ "$(cat /var/lib/qubes/initramfs-updated 2>/dev/null || echo 0)" -ge 1 ]; then [ "$(cat /var/lib/qubes/initramfs-updated 2>/dev/null || echo 0)" -ge 1 ]; then
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX xen_scrub_pages=0" GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX xen_scrub_pages=0"
fi fi
GRUB_ENABLE_BLSCFG=false

View File

@ -33,10 +33,6 @@ void send_status_and_crc(int code, const char *last_filename);
#define O_TMPFILE_MASK (__O_TMPFILE | O_DIRECTORY | O_CREAT) #define O_TMPFILE_MASK (__O_TMPFILE | O_DIRECTORY | O_CREAT)
#endif #endif
#if __GLIBC__ > 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ >= 14)
#define HAVE_SYNCFS
#endif
void do_exit(int code, const char *last_filename) void do_exit(int code, const char *last_filename)
{ {
close(0); close(0);
@ -213,10 +209,8 @@ void process_one_file(struct file_header *untrusted_hdr)
int do_unpack(void) int do_unpack(void)
{ {
struct file_header untrusted_hdr; struct file_header untrusted_hdr;
#ifdef HAVE_SYNCFS
int cwd_fd; int cwd_fd;
int saved_errno; int saved_errno;
#endif
total_bytes = total_files = 0; total_bytes = total_files = 0;
/* initialize checksum */ /* initialize checksum */
@ -233,14 +227,10 @@ int do_unpack(void)
process_one_file(&untrusted_hdr); process_one_file(&untrusted_hdr);
} }
#ifdef HAVE_SYNCFS
saved_errno = errno; saved_errno = errno;
cwd_fd = open(".", O_RDONLY); cwd_fd = open(".", O_RDONLY);
if (cwd_fd >= 0 && syncfs(cwd_fd) == 0 && close(cwd_fd) == 0) if (cwd_fd >= 0 && syncfs(cwd_fd) == 0 && close(cwd_fd) == 0)
errno = saved_errno; errno = saved_errno;
#else
sync();
#endif
send_status_and_crc(errno, untrusted_namebuf); send_status_and_crc(errno, untrusted_namebuf);
return errno; return errno;

View File

@ -14,7 +14,7 @@ Requires: ImageMagick
Requires: python%{python3_pkgversion}-qubesimgconverter Requires: python%{python3_pkgversion}-qubesimgconverter
%{?systemd_requires} %{?systemd_requires}
BuildRequires: systemd BuildRequires: systemd
BuildRequires: python-setuptools BuildRequires: python2-setuptools
BuildRequires: python%{python3_pkgversion}-setuptools BuildRequires: python%{python3_pkgversion}-setuptools
BuildRequires: python2-rpm-macros BuildRequires: python2-rpm-macros
BuildRequires: python3-rpm-macros BuildRequires: python3-rpm-macros
@ -27,7 +27,7 @@ Common Linux files for Qubes Dom0 and VM
%package -n python2-qubesimgconverter %package -n python2-qubesimgconverter
Summary: Python package qubesimgconverter Summary: Python package qubesimgconverter
Requires: python Requires: python2
Requires: pycairo Requires: pycairo
%if 0%{?rhel} >= 7 %if 0%{?rhel} >= 7
Requires: python-pillow Requires: python-pillow

View File

@ -1 +1 @@
4.1.1 4.1.3