Closed qubesos-bot closed 6 years ago
Package for dom0 was built (build log) and uploaded to current-testing repository
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Upload vmm-xen-stubdom-linux e0b91d2574284a830b2effba95d264914163f075 r4.0 current repo -----BEGIN PGP SIGNATURE-----
iQJUBAEBCAA+FiEEF7fMGYa9PSjEFHW2hG1rcJxuLn8FAlvNPXggHG1hcm1hcmVr QGludmlzaWJsZXRoaW5nc2xhYi5jb20ACgkQhG1rcJxuLn+mWA//RkPxmbc2SsUM YqLRSX2RP7oPf0od8RT+SGsK7rOW5UF3UVsqojeQlyxSsO7YBjWBM/NBMm/Hulx9 CUrLWDuEzHZRKD0M2K5n+6buhHSMFFvuQxvhb/1xMZAba194sujW/FuCvnrZsKPK x6HF6daWLAXGeqlgLCo97/NgSnho6ym3MFhWfdVuSU0JRscRDuNe/yCPL7eC+Z2P 8tZwjplPzo/UVaUaTVQY779Kcg0OHvoSsJn7xwKUgWM7hr8xv71WFlbs56RcXTS+ wY0vCMkmMTqndnqcEFYd2oz/sDGA4voJb/V6uRNZMMNyAkMgAlFcgXddmKlIZygy rSJOTOVfG6luprrfNG1xwweHoxAkwe+iKD6/Eii9zVZgxWDaPQmd9HRJ0FwAxabA gyf+fB2ocUHwy9ZicW2/fDZq6eDXIuuXr3ItGzzcjPZtbf/5ZfbVn/1lZFkUGmzp 6jXCwmO9/AkHWbsFD5MFMww0DW6EFO3W1XBf/i5GxMJZPKhlKjQWFIXf4F/O9RJT 1uDlfZox4RBO2Rv3sefrbxsA1pXkqvcSDd4JRxi99J1mXBBVJhZ442KxSBxb+z2l qqyIoTLOjlx2sesq1ZwaGO9upmWJ08Q4v9/PHLAwG351IZY57QN8LNIpw1qX3RKn scMJkfdNOYyOObdbyKkQ0w194OswKyQ= =ehQy -----END PGP SIGNATURE-----
Package for dom0 was uploaded to stable repository
Update of vmm-xen-stubdom-linux to v1.0.10 for Qubes r4.0, see comments below for details.
Built from: https://github.com/QubesOS/qubes-vmm-xen-stubdom-linux/commit/e0b91d2574284a830b2effba95d264914163f075
Changes since previous version: QubesOS/qubes-vmm-xen-stubdom-linux@e0b91d2 version 1.0.10 QubesOS/qubes-vmm-xen-stubdom-linux@3c688e3 rpm: bump required Xen version QubesOS/qubes-vmm-xen-stubdom-linux@b0ec6d6 ifdown: force vif-0 close synchronously before removing it QubesOS/qubes-vmm-xen-stubdom-linux@a4a0066 Add upstream seccomp patches QubesOS/qubes-vmm-xen-stubdom-linux@2795280 Fix potential inotifywait race condition QubesOS/qubes-vmm-xen-stubdom-linux@486605c add delay to qemu-ifdown script QubesOS/qubes-vmm-xen-stubdom-linux@633c01b mount tmpfs with nodev,noexec and add additional seccomp call filters QubesOS/qubes-vmm-xen-stubdom-linux@604081e Update busybox version QubesOS/qubes-vmm-xen-stubdom-linux@3ac49c8 Update submodule reference QubesOS/qubes-vmm-xen-stubdom-linux@f2cf613 Build hardened busybox QubesOS/qubes-vmm-xen-stubdom-linux@33c6c08 Update seccomp filter to deny spawning, and remount rootfs to read only QubesOS/qubes-vmm-xen-stubdom-linux@cd7350f Update init script to use inotify instead of polling QubesOS/qubes-vmm-xen-stubdom-linux@0276f43 Update to qemu 3.0.0
Referenced issues: QubesOS/qubes-issues#4191
If you're release manager, you can issue GPG-inline signed command:
Upload vmm-xen-stubdom-linux e0b91d2574284a830b2effba95d264914163f075 r4.0 current repo
(available 7 days from now)Upload vmm-xen-stubdom-linux e0b91d2574284a830b2effba95d264914163f075 r4.0 current (dists) repo
, you can choose subset of distributions, likevm-fc24 vm-fc25
(available 7 days from now)Upload vmm-xen-stubdom-linux e0b91d2574284a830b2effba95d264914163f075 r4.0 security-testing repo
Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).