mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-01-13 16:29:59 -05:00
R4.0 updates, edits for clarity
This commit is contained in:
parent
a66c20b719
commit
3ba9b6a46c
@ -16,7 +16,7 @@ These files are placed in /rw, which survives a VM restart.
|
||||
That way, they can be used to customize a single VM instead of all VMs based on the same template.
|
||||
The scripts here all run as root.
|
||||
|
||||
- `/rw/config/rc.local` - script run at VM startup. Good place to change some service settings, replace config files with its copy stored in /rw/config, etc. Example usage:
|
||||
- `/rw/config/rc.local` - script runs at VM startup. Good place to change some service settings, replace config files with its copy stored in /rw/config, etc. Example usage:
|
||||
|
||||
~~~
|
||||
# Store bluetooth keys in /rw to keep them across VM restarts
|
||||
@ -24,14 +24,14 @@ The scripts here all run as root.
|
||||
ln -s /rw/config/var-lib-bluetooth /var/lib/bluetooth
|
||||
~~~
|
||||
|
||||
- `/rw/config/qubes-ip-change-hook` - script run in NetVM after external IP change (or connection to the network).
|
||||
- `/rw/config/qubes-ip-change-hook` - script runs in NetVM after every external IP change and on "hardware" link status change.
|
||||
|
||||
- `/rw/config/qubes-firewall-user-script` - script run in ProxyVM after each firewall update.
|
||||
- `/rw/config/qubes-firewall-user-script` - script runs in ProxyVM/AppVM with `qvm-features <vmname> qubes-firewall true` after each firewall update.
|
||||
Good place to write own custom firewall rules.
|
||||
|
||||
- `/rw/config/suspend-module-blacklist` - list of modules (one per line) to be unloaded before system goes to sleep.
|
||||
The file is used only in a VM with PCI devices attached.
|
||||
Supposed to be used for problematic device drivers.
|
||||
Intended for use with problematic device drivers.
|
||||
|
||||
Note that scripts need to be executable (chmod +x) to be used.
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user