From 1ecb680b44b9bb96991be83960a6f5aee17c0417 Mon Sep 17 00:00:00 2001 From: Rudd-O Date: Wed, 24 Oct 2018 07:32:19 +0000 Subject: [PATCH] Allow per-VM protected file list Hopefully this can be pushed as an update for Qubes 3.2 as well? --- init/functions | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/init/functions b/init/functions index 82f4a5b..81d571d 100644 --- a/init/functions +++ b/init/functions @@ -1,7 +1,7 @@ #!/bin/bash # Location of files which contains list of protected files -PROTECTED_FILE_LIST='/etc/qubes/protected-files.d' +PROTECTED_FILE_LIST='/etc/qubes/protected-files.d /rw/qubes/protected-files.d' qsvc() { # Returns whether a service is enabled. @@ -100,7 +100,7 @@ reload_random_seed() { } is_protected_file() { - grep -Fxrq --exclude='*.rpmsave' --exclude='*~' --exclude='*.rpmnew' --exclude='*.rpmold' -- "${1}" "$PROTECTED_FILE_LIST" 2>/dev/null + grep -Fxrq --exclude='*.rpmsave' --exclude='*~' --exclude='*.rpmnew' --exclude='*.rpmold' -- "${1}" $PROTECTED_FILE_LIST 2>/dev/null } umount_retry() {