-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
/var/run/qubes-service qvm-sevice available too late breaks systemd services #1985
Comments
Files in /var/run/qubes-service are created by qubes-sysinit.service. So defer that condition check after that service start. Fixes QubesOS/qubes-issues#1985
Files in /var/run/qubes-service are created by qubes-sysinit.service. So defer that condition check after that service start. Thanks @adrelanos for the report. Fixes QubesOS/qubes-issues#1985
Take a look at attached PR. Does it fix the problem for you (you can check for that service only)? |
This was quick. Awesome. Works for me. (I will be shipping a separate drop-in file as workaround for vpn-firewall until this ends up in stable. Should not matter.) |
/var/run/qubes-service qvm-sevice available too late breaks systemd services QubesOS/qubes-issues#1985
Files in /var/run/qubes-service are created by qubes-sysinit.service. So defer that condition check after that service start. Thanks @adrelanos for the report. Fixes QubesOS/qubes-issues#1985 (cherry picked from commit 5e08e2b)
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Qubes OS version
R3.1
Affected TemplateVMs
debian-8 (standalone)
Steps to reproduce the behavior:
Qubes VM Manager -> right click on VM -> services -> enter (without the single quotes) 'netfilter-persistent' -> click on + -> OK
Start VM.
Expected behavior:
/var/run/qubes-service files should be readable before netfilter-persistent (or any other) systemd service starts.
Actual behavior:
/var/run/qubes-service is available too late.
General notes:
This breaks VPN-Firewall. (A project maintained by me that could theoretically in future provide a bulletproof sys-vpn implementation, that (in development branch) would also defeat fixed shared VPN/Tor server leak bug (adrelanos/vpn-firewall#12) and solve #1941.
Related issues:
#1941
The text was updated successfully, but these errors were encountered: