Ship grub configuration
Qubes VM require few config options in grub. Ship appropriate configuration. Debian have grub.d support, so it can be done cleanly. On Fedora, /etc/default/grub needs to be modified. Still keep the options in separate file, but include it manually from /etc/default/grub. QubesOS/qubes-issues#2577
This commit is contained in:
parent
bc453d8cd7
commit
2a117548b6
2
Makefile
2
Makefile
@ -155,6 +155,7 @@ install-rh: install-systemd install-systemd-dropins install-sysvinit
|
|||||||
|
|
||||||
install -D -m 0644 misc/qubes-trigger-sync-appmenus.action $(DESTDIR)/etc/yum/post-actions/qubes-trigger-sync-appmenus.action
|
install -D -m 0644 misc/qubes-trigger-sync-appmenus.action $(DESTDIR)/etc/yum/post-actions/qubes-trigger-sync-appmenus.action
|
||||||
|
|
||||||
|
install -D -m 0644 misc/grub.qubes $(DESTDIR)/etc/default/grub.qubes
|
||||||
install -D -m 0644 misc/serial.conf $(DESTDIR)/usr/share/qubes/serial.conf
|
install -D -m 0644 misc/serial.conf $(DESTDIR)/usr/share/qubes/serial.conf
|
||||||
install -D misc/qubes-serial-login $(DESTDIR)/$(SBINDIR)/qubes-serial-login
|
install -D misc/qubes-serial-login $(DESTDIR)/$(SBINDIR)/qubes-serial-login
|
||||||
install -D -m 0644 misc/dracut-qubes.conf \
|
install -D -m 0644 misc/dracut-qubes.conf \
|
||||||
@ -316,6 +317,7 @@ install-deb: install-common install-systemd install-systemd-dropins
|
|||||||
install -m 0644 misc/pam.d_su.qubes $(DESTDIR)/etc/pam.d/su.qubes
|
install -m 0644 misc/pam.d_su.qubes $(DESTDIR)/etc/pam.d/su.qubes
|
||||||
install -d $(DESTDIR)/etc/needrestart/conf.d
|
install -d $(DESTDIR)/etc/needrestart/conf.d
|
||||||
install -D -m 0644 misc/50_qubes.conf $(DESTDIR)/etc/needrestart/conf.d/50_qubes.conf
|
install -D -m 0644 misc/50_qubes.conf $(DESTDIR)/etc/needrestart/conf.d/50_qubes.conf
|
||||||
|
install -D -m 0644 misc/grub.qubes $(DESTDIR)/etc/default/grub.d/30-qubes.cfg
|
||||||
|
|
||||||
mkdir -p $(DESTDIR)/etc/systemd/system/
|
mkdir -p $(DESTDIR)/etc/systemd/system/
|
||||||
install -m 0644 vm-systemd/haveged.service $(DESTDIR)/etc/systemd/system/
|
install -m 0644 vm-systemd/haveged.service $(DESTDIR)/etc/systemd/system/
|
||||||
|
1
debian/qubes-core-agent.install
vendored
1
debian/qubes-core-agent.install
vendored
@ -2,6 +2,7 @@ etc/X11/xorg-preload-apps.conf
|
|||||||
etc/apt/apt.conf.d/00notify-hook
|
etc/apt/apt.conf.d/00notify-hook
|
||||||
etc/apt/sources.list.d/qubes-r3.list
|
etc/apt/sources.list.d/qubes-r3.list
|
||||||
etc/apt/trusted.gpg.d/qubes-archive-keyring.gpg
|
etc/apt/trusted.gpg.d/qubes-archive-keyring.gpg
|
||||||
|
etc/default/grub.d/30-qubes.cfg
|
||||||
etc/fstab
|
etc/fstab
|
||||||
etc/needrestart/conf.d/50_qubes.conf
|
etc/needrestart/conf.d/50_qubes.conf
|
||||||
etc/profile.d/qt_x11_no_mitshm.sh
|
etc/profile.d/qt_x11_no_mitshm.sh
|
||||||
|
12
misc/grub.qubes
Normal file
12
misc/grub.qubes
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
# make sure to use /dev/mapper/dmroot, not /dev/xvda directly - both have the
|
||||||
|
# same fs, including UUID
|
||||||
|
GRUB_DISABLE_LINUX_UUID=true
|
||||||
|
GRUB_DISABLE_OS_PROBER=true
|
||||||
|
# don't append twice
|
||||||
|
if [ -z "$QUBES_APPENDED" ]; then
|
||||||
|
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX root=/dev/mapper/dmroot console=hvc0"
|
||||||
|
# make SWIOTLB smaller - it isn't really needed unless PCI passthrough is used,
|
||||||
|
# and even then, 16MB is enough
|
||||||
|
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX swiotlb=8192"
|
||||||
|
QUBES_APPENDED=1
|
||||||
|
fi
|
@ -309,6 +309,14 @@ if [ -e /etc/init/serial.conf ]; then
|
|||||||
cp /usr/share/qubes/serial.conf /etc/init/serial.conf
|
cp /usr/share/qubes/serial.conf /etc/init/serial.conf
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
%triggerin -- grub2-tools
|
||||||
|
|
||||||
|
if ! grep -q /etc/default/grub.qubes /etc/default/grub 2>/dev/null; then
|
||||||
|
# do not keep Qubes-related settings directly in user-controlled config,
|
||||||
|
# include another file
|
||||||
|
echo '. /etc/default/grub.qubes' >> /etc/default/grub
|
||||||
|
fi
|
||||||
|
|
||||||
%post
|
%post
|
||||||
|
|
||||||
# disable some Upstart services
|
# disable some Upstart services
|
||||||
@ -511,6 +519,7 @@ rm -f %{name}-%{version}
|
|||||||
%config(noreplace) /etc/qubes-rpc/qubes.StartApp
|
%config(noreplace) /etc/qubes-rpc/qubes.StartApp
|
||||||
%config(noreplace) /etc/qubes-rpc/qubes.PostInstall
|
%config(noreplace) /etc/qubes-rpc/qubes.PostInstall
|
||||||
%dir /etc/qubes/autostart
|
%dir /etc/qubes/autostart
|
||||||
|
%config(noreplace) /etc/default/grub.qubes
|
||||||
/etc/qubes/autostart/README.txt
|
/etc/qubes/autostart/README.txt
|
||||||
%config /etc/qubes/autostart/*.desktop.d/30_qubes.conf
|
%config /etc/qubes/autostart/*.desktop.d/30_qubes.conf
|
||||||
%dir /etc/qubes/suspend-pre.d
|
%dir /etc/qubes/suspend-pre.d
|
||||||
|
Loading…
Reference in New Issue
Block a user