Compare commits

...

11 Commits

Author SHA1 Message Date
Rusty Bird
9debe185fc
Remove syncfs fallback for ancient glibc (Debian 7) 2020-01-22 19:17:29 +00:00
Frédéric Pierret (fepitre)
29a0c0e7f4
travis: switch to dom0 Fedora 31
QubesOS/qubes-issues#5529
2020-01-11 11:41:11 +01:00
Marek Marczykowski-Górecki
3a0a629a38
version 4.1.3 2019-12-07 05:50:26 +01:00
Marek Marczykowski-Górecki
ef2ab997bf
Merge remote-tracking branch 'origin/pr/48'
* origin/pr/48:
  debian: fix dependencies of qubes-kernel-vm-support pkg
2019-12-07 04:58:53 +01:00
Marek Marczykowski-Górecki
2ba9fd6c23
debian: fix dependencies of qubes-kernel-vm-support pkg
Add missing busybox (required for grep inside initramfs).
Add missing grub2-common (required for grub config generation).
Convert Recommends: initramfs-tools to Depends: initramfs-tools |
dracut (see also QubesOS/qubes-issues#3361).

Fixes QubesOS/qubes-issues#5490
2019-12-07 04:58:31 +01:00
Marek Marczykowski-Górecki
241f812304
Merge remote-tracking branch 'origin/pr/47'
* origin/pr/47:
  qubes-kernel-vm-support.postinst run update-grub
2019-12-07 04:57:54 +01:00
Patrick Schleizer
8821906186
qubes-kernel-vm-support.postinst run update-grub
https://github.com/QubesOS/qubes-issues/issues/5212
2019-12-05 20:45:23 +00:00
Patrick Schleizer
34c8212467
qubes-kernel-vm-support.preinst create folder /boot/grub
https://github.com/QubesOS/qubes-issues/issues/5212
2019-12-05 20:39:03 +00:00
Marek Marczykowski-Górecki
9f0dc7dc34
travis: update python versions
3.4 is no longer available in bionic-based travis. Use this occasion to
add 3.6 and 3.7.

QubesOS/qubes-issues#4613
2019-10-23 15:29:47 +02:00
Frédéric Pierret (fepitre)
c110f98fdf
travis: switch to bionic
QubesOS/qubes-issues#4613
2019-10-19 21:51:54 +02:00
xaki23
699e10c057
partition full volatile for non-COW setups too 2019-09-24 22:40:10 +02:00
9 changed files with 64 additions and 25 deletions

View File

@ -1,5 +1,5 @@
sudo: required
dist: xenial
dist: bionic
language: python
python:
- '2.7'
@ -10,7 +10,7 @@ script:
- test -z "$TESTS_ONLY" || python -m unittest discover -v imgconverter -p test.py
- test -n "$TESTS_ONLY" || ~/qubes-builder/scripts/travis-build
env:
- DIST_DOM0=fc29 USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1
- DIST_DOM0=fc31 USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1
- DISTS_VM=fc29 USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1
- DISTS_VM=fc30 USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1
- DISTS_VM=stretch USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1
@ -22,12 +22,14 @@ jobs:
- env: TESTS_ONLY=1
python: 2.7
- env: TESTS_ONLY=1
python: 3.4
python: 3.5
- env: TESTS_ONLY=1
python: 3.5
python: 3.6
- env: TESTS_ONLY=1
python: 3.7
- stage: deploy
python: 3.5
env: DIST_DOM0=fc29 TESTS_ONLY=
python: 3.6
env: DIST_DOM0=fc31 TESTS_ONLY=
script: ~/qubes-builder/scripts/travis-deploy
# don't build tags which are meant for code signing only

20
debian/changelog vendored
View File

@ -1,3 +1,23 @@
qubes-utils (4.1.3) unstable; urgency=medium
[ xaki23 ]
* partition full volatile for non-COW setups too
[ Frédéric Pierret (fepitre) ]
* travis: switch to bionic
[ Marek Marczykowski-Górecki ]
* travis: update python versions
[ Patrick Schleizer ]
* qubes-kernel-vm-support.preinst create folder /boot/grub
* qubes-kernel-vm-support.postinst run update-grub
[ Marek Marczykowski-Górecki ]
* debian: fix dependencies of qubes-kernel-vm-support pkg
-- Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com> Sat, 07 Dec 2019 05:50:26 +0100
qubes-utils (4.1.2) unstable; urgency=medium
[ xaki23 ]

7
debian/control vendored
View File

@ -24,8 +24,11 @@ Description: Qubes Linux utilities
Package: qubes-kernel-vm-support
Architecture: any
Recommends: initramfs-tools
Depends: ${misc:Depends}
Depends:
busybox,
initramfs-tools | dracut,
grub2-common,
${misc:Depends}
Description: Qubes VM kernel and initramfs modules
This package contains:
1. mkinitramfs module required to setup Qubes VM root filesystem. This package

View File

@ -46,6 +46,19 @@ esac
#DEBHELPER#
## https://phabricator.whonix.org/T377
## Debian has no update-grub trigger yet:
## https://bugs.debian.org/481542
if command -v update-grub >/dev/null 2>&1; then
update-grub || \
echo "$DPKG_MAINTSCRIPT_PACKAGE $DPKG_MAINTSCRIPT_NAME ERROR: Running \
'update-grub' failed with exit code $?. $DPKG_MAINTSCRIPT_PACKAGE is most \
likely only the trigger, not the cause. Unless you know this is not an issue, \
you should fix running 'update-grub', otherwise your system might no longer \
boot." >&2
fi
exit 0
# vim: set ts=4 sw=4 sts=4 et :

View File

@ -0,0 +1,9 @@
#!/bin/bash
set -e
mkdir --parents /boot/grub || true
#DEBHELPER#
exit 0

View File

@ -79,8 +79,8 @@ if [ `cat /sys/class/block/$ROOT_DEV/ro` = 1 ] ; then
die "volatile.img smaller than 1GB, cannot continue"
fi
sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF
1,$SWAP_SIZE,S
,,L
xvdc1: type=82,start=2048,size=$SWAP_SIZE
xvdc2: type=83
EOF
if [ $? -ne 0 ]; then
die "Qubes: failed to setup partitions on volatile device"
@ -97,7 +97,8 @@ else
log_begin "Qubes: Doing R/W setup for TemplateVM..."
while ! [ -e /dev/xvdc ]; do sleep 0.1; done
sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF
1,$SWAP_SIZE,S
xvdc1: type=82,start=2048,size=$SWAP_SIZE
xvdc3: type=83
EOF
if [ $? -ne 0 ]; then
die "Qubes: failed to setup partitions on volatile device"

View File

@ -53,8 +53,8 @@ if [ `cat /sys/class/block/$ROOT_DEV/ro` = 1 ] ; then
die "volatile.img smaller than 1GB, cannot continue"
fi
/sbin/sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF
2048,$SWAP_SIZE,S
,,L
xvdc1: type=82,start=2048,size=$SWAP_SIZE
xvdc2: type=83
EOF
if [ $? -ne 0 ]; then
echo "Qubes: failed to setup partitions on volatile device"
@ -72,7 +72,8 @@ else
echo "Qubes: Doing R/W setup for TemplateVM..."
while ! [ -e /dev/xvdc ]; do sleep 0.1; done
/sbin/sfdisk -q --unit S /dev/xvdc >/dev/null <<EOF
2048,$SWAP_SIZE,S
xvdc1: type=82,start=2048,size=$SWAP_SIZE
xvdc3: type=83
EOF
if [ $? -ne 0 ]; then
die "Qubes: failed to setup partitions on volatile device"

View File

@ -33,10 +33,6 @@ void send_status_and_crc(int code, const char *last_filename);
#define O_TMPFILE_MASK (__O_TMPFILE | O_DIRECTORY | O_CREAT)
#endif
#if __GLIBC__ > 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ >= 14)
#define HAVE_SYNCFS
#endif
void do_exit(int code, const char *last_filename)
{
close(0);
@ -213,10 +209,8 @@ void process_one_file(struct file_header *untrusted_hdr)
int do_unpack(void)
{
struct file_header untrusted_hdr;
#ifdef HAVE_SYNCFS
int cwd_fd;
int saved_errno;
#endif
total_bytes = total_files = 0;
/* initialize checksum */
@ -233,14 +227,10 @@ int do_unpack(void)
process_one_file(&untrusted_hdr);
}
#ifdef HAVE_SYNCFS
saved_errno = errno;
cwd_fd = open(".", O_RDONLY);
if (cwd_fd >= 0 && syncfs(cwd_fd) == 0 && close(cwd_fd) == 0)
errno = saved_errno;
#else
sync();
#endif
send_status_and_crc(errno, untrusted_namebuf);
return errno;

View File

@ -1 +1 @@
4.1.2
4.1.3