Ship grub configuration
Qubes VM require few config options in grub. Ship appropriate configuration. Debian have grub.d support, so it can be done cleanly. On Fedora, /etc/default/grub needs to be modified. Still keep the options in separate file, but include it manually from /etc/default/grub. QubesOS/qubes-issues#2577
This commit is contained in:
		
							parent
							
								
									bc453d8cd7
								
							
						
					
					
						commit
						2a117548b6
					
				
							
								
								
									
										2
									
								
								Makefile
									
									
									
									
									
								
							
							
						
						
									
										2
									
								
								Makefile
									
									
									
									
									
								
							@ -155,6 +155,7 @@ install-rh: install-systemd install-systemd-dropins install-sysvinit
 | 
			
		||||
 | 
			
		||||
	install -D -m 0644 misc/qubes-trigger-sync-appmenus.action $(DESTDIR)/etc/yum/post-actions/qubes-trigger-sync-appmenus.action
 | 
			
		||||
 | 
			
		||||
	install -D -m 0644 misc/grub.qubes $(DESTDIR)/etc/default/grub.qubes
 | 
			
		||||
	install -D -m 0644 misc/serial.conf $(DESTDIR)/usr/share/qubes/serial.conf
 | 
			
		||||
	install -D misc/qubes-serial-login $(DESTDIR)/$(SBINDIR)/qubes-serial-login
 | 
			
		||||
	install -D -m 0644 misc/dracut-qubes.conf \
 | 
			
		||||
@ -316,6 +317,7 @@ install-deb: install-common install-systemd install-systemd-dropins
 | 
			
		||||
	install -m 0644 misc/pam.d_su.qubes $(DESTDIR)/etc/pam.d/su.qubes
 | 
			
		||||
	install -d $(DESTDIR)/etc/needrestart/conf.d
 | 
			
		||||
	install -D -m 0644 misc/50_qubes.conf $(DESTDIR)/etc/needrestart/conf.d/50_qubes.conf
 | 
			
		||||
	install -D -m 0644 misc/grub.qubes $(DESTDIR)/etc/default/grub.d/30-qubes.cfg
 | 
			
		||||
 | 
			
		||||
	mkdir -p $(DESTDIR)/etc/systemd/system/
 | 
			
		||||
	install -m 0644 vm-systemd/haveged.service  $(DESTDIR)/etc/systemd/system/
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										1
									
								
								debian/qubes-core-agent.install
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										1
									
								
								debian/qubes-core-agent.install
									
									
									
									
										vendored
									
									
								
							@ -2,6 +2,7 @@ etc/X11/xorg-preload-apps.conf
 | 
			
		||||
etc/apt/apt.conf.d/00notify-hook
 | 
			
		||||
etc/apt/sources.list.d/qubes-r3.list
 | 
			
		||||
etc/apt/trusted.gpg.d/qubes-archive-keyring.gpg
 | 
			
		||||
etc/default/grub.d/30-qubes.cfg
 | 
			
		||||
etc/fstab
 | 
			
		||||
etc/needrestart/conf.d/50_qubes.conf
 | 
			
		||||
etc/profile.d/qt_x11_no_mitshm.sh
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										12
									
								
								misc/grub.qubes
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										12
									
								
								misc/grub.qubes
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,12 @@
 | 
			
		||||
# make sure to use /dev/mapper/dmroot, not /dev/xvda directly - both have the
 | 
			
		||||
# same fs, including UUID
 | 
			
		||||
GRUB_DISABLE_LINUX_UUID=true
 | 
			
		||||
GRUB_DISABLE_OS_PROBER=true
 | 
			
		||||
# don't append twice
 | 
			
		||||
if [ -z "$QUBES_APPENDED" ]; then
 | 
			
		||||
    GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX root=/dev/mapper/dmroot console=hvc0"
 | 
			
		||||
    # make SWIOTLB smaller - it isn't really needed unless PCI passthrough is used,
 | 
			
		||||
    # and even then, 16MB is enough
 | 
			
		||||
    GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX swiotlb=8192"
 | 
			
		||||
    QUBES_APPENDED=1
 | 
			
		||||
fi
 | 
			
		||||
@ -309,6 +309,14 @@ if [ -e /etc/init/serial.conf ]; then
 | 
			
		||||
	cp /usr/share/qubes/serial.conf /etc/init/serial.conf
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
%triggerin -- grub2-tools
 | 
			
		||||
 | 
			
		||||
if ! grep -q /etc/default/grub.qubes /etc/default/grub 2>/dev/null; then
 | 
			
		||||
    # do not keep Qubes-related settings directly in user-controlled config,
 | 
			
		||||
    # include another file
 | 
			
		||||
    echo '. /etc/default/grub.qubes' >> /etc/default/grub
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
%post
 | 
			
		||||
 | 
			
		||||
# disable some Upstart services
 | 
			
		||||
@ -511,6 +519,7 @@ rm -f %{name}-%{version}
 | 
			
		||||
%config(noreplace) /etc/qubes-rpc/qubes.StartApp
 | 
			
		||||
%config(noreplace) /etc/qubes-rpc/qubes.PostInstall
 | 
			
		||||
%dir /etc/qubes/autostart
 | 
			
		||||
%config(noreplace) /etc/default/grub.qubes
 | 
			
		||||
/etc/qubes/autostart/README.txt
 | 
			
		||||
%config /etc/qubes/autostart/*.desktop.d/30_qubes.conf
 | 
			
		||||
%dir /etc/qubes/suspend-pre.d
 | 
			
		||||
 | 
			
		||||
		Loading…
	
		Reference in New Issue
	
	Block a user