mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
UserDoc/ConfigFiles changed
suspend-module-blacklist
This commit is contained in:
parent
71de6759de
commit
eff2e49a08
@ -19,5 +19,6 @@ Those files are placed in /rw, which survives VM restart, so can be used to cust
|
|||||||
|
|
||||||
- `/rw/config/qubes-ip-change-hook` - script run in NetVM after external IP change (or connection to the network)
|
- `/rw/config/qubes-ip-change-hook` - script run in NetVM after external IP change (or connection to the network)
|
||||||
- `/rw/config/qubes-firewall-user-script` - script run in ProxyVM after firewall update. Good place to write own custom firewall rules
|
- `/rw/config/qubes-firewall-user-script` - script run in ProxyVM after firewall update. Good place to write own custom firewall rules
|
||||||
|
- `/rw/config/suspend-module-blacklist` - list of modules (one per line) to be unloaded before system going to sleep. The file is used only in VM with some PCI devices attached. Supposed to be used for problematic device drivers.
|
||||||
|
|
||||||
Note that scripts need to be executable (chmod +x) to be used.
|
Note that scripts need to be executable (chmod +x) to be used.
|
||||||
|
Loading…
Reference in New Issue
Block a user