From b92423e0962ade4f7ad8e5b176fd76638e4270a3 Mon Sep 17 00:00:00 2001 From: tasket Date: Fri, 21 Apr 2017 00:17:55 -0400 Subject: [PATCH] fix comment --- usr/lib/qubes/init/vm-sudo-protect.sh | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/usr/lib/qubes/init/vm-sudo-protect.sh b/usr/lib/qubes/init/vm-sudo-protect.sh index a88d628..54f09ec 100644 --- a/usr/lib/qubes/init/vm-sudo-protect.sh +++ b/usr/lib/qubes/init/vm-sudo-protect.sh @@ -19,11 +19,13 @@ else fi # Experimental: Remove /rw root startup files and copy defaults. -# Activated by presence of /etc/defaults/vms/vms.all dir. +# Activated by presence of vm-sudo-protect-root Qubes service. # Contents of vms/vms.all and vms/hostname will be copied. defdir="/etc/default/vms" rootdirs="$rw/config $rw/usrlocal $rw/bind-dirs" -if [ -e /var/run/qubes-service/vm-sudo-protect-root ] && [ `qubesdb-read /qubes-vm-persistence` = "rw-only" ]; then + +if [ -e /var/run/qubes-service/vm-sudo-protect-root ] \ +&& [ `qubesdb-read /qubes-vm-persistence` = "rw-only" ]; then rm -rf $rootdirs # make user scripts temporarily mutable, in case 'rw/home/user' # files exist in defdir...