Drop legacy xen entry in fstab
This commit is contained in:
parent
5db43b9534
commit
e660c4a05f
@ -10,5 +10,4 @@ tmpfs /dev/shm tmpfs defaults,size=1G
|
|||||||
devpts /dev/pts devpts gid=5,mode=620 0 0
|
devpts /dev/pts devpts gid=5,mode=620 0 0
|
||||||
sysfs /sys sysfs defaults 0 0
|
sysfs /sys sysfs defaults 0 0
|
||||||
proc /proc proc defaults 0 0
|
proc /proc proc defaults 0 0
|
||||||
xen /proc/xen xenfs defaults 0 0
|
|
||||||
/dev/xvdi /mnt/removable auto noauto,user,rw 0 0
|
/dev/xvdi /mnt/removable auto noauto,user,rw 0 0
|
||||||
|
@ -108,3 +108,4 @@ enable qubes-sync-time.timer
|
|||||||
# Disable useless Xen services in Qubes VM
|
# Disable useless Xen services in Qubes VM
|
||||||
disable xenstored.service
|
disable xenstored.service
|
||||||
disable xenconsoled.service
|
disable xenconsoled.service
|
||||||
|
disable proc-xen.mount
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Description=Init Qubes Services settings
|
Description=Init Qubes Services settings
|
||||||
DefaultDependencies=no
|
DefaultDependencies=no
|
||||||
Before=sysinit.target
|
Before=sysinit.target
|
||||||
After=proc-xen.mount systemd-modules-load.service qubes-db.service
|
After=systemd-modules-load.service qubes-db.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Type=oneshot
|
Type=oneshot
|
||||||
|
@ -17,7 +17,7 @@ if systemd_version_changed ; then
|
|||||||
fi
|
fi
|
||||||
|
|
||||||
# Wait for xenbus initialization
|
# Wait for xenbus initialization
|
||||||
while [ ! -e /dev/xen/xenbus ] && [ -e /proc/xen/xenbus ]; do
|
while [ ! -e /dev/xen/xenbus ]; do
|
||||||
sleep 0.1
|
sleep 0.1
|
||||||
done
|
done
|
||||||
|
|
||||||
@ -27,15 +27,6 @@ chmod 0775 /var/run/qubes
|
|||||||
mkdir -p /var/run/qubes-service
|
mkdir -p /var/run/qubes-service
|
||||||
mkdir -p /var/run/xen-hotplug
|
mkdir -p /var/run/xen-hotplug
|
||||||
|
|
||||||
# Set permissions to /proc/xen/xenbus, so normal user can talk to xenstore, to
|
|
||||||
# open vchan connection. Note that new code uses /dev/xen/xenbus (which have
|
|
||||||
# permissions set by udev), so this probably can go away soon
|
|
||||||
chmod 666 /proc/xen/xenbus
|
|
||||||
|
|
||||||
# Set permissions to /proc/xen/privcmd, so a user in qubes group can access
|
|
||||||
chmod 660 /proc/xen/privcmd
|
|
||||||
chgrp qubes /proc/xen/privcmd
|
|
||||||
|
|
||||||
# Set default services depending on VM type
|
# Set default services depending on VM type
|
||||||
is_appvm && DEFAULT_ENABLED=$DEFAULT_ENABLED_APPVM && touch /var/run/qubes/this-is-appvm
|
is_appvm && DEFAULT_ENABLED=$DEFAULT_ENABLED_APPVM && touch /var/run/qubes/this-is-appvm
|
||||||
is_netvm && DEFAULT_ENABLED=$DEFAULT_ENABLED_NETVM && touch /var/run/qubes/this-is-netvm
|
is_netvm && DEFAULT_ENABLED=$DEFAULT_ENABLED_NETVM && touch /var/run/qubes/this-is-netvm
|
||||||
|
Loading…
Reference in New Issue
Block a user