UserDoc/ConfigFiles changed

suspend-module-blacklist
This commit is contained in:
Marek Marczykowski-Górecki 2014-03-27 16:14:03 +00:00
parent 71de6759de
commit eff2e49a08

View File

@ -19,5 +19,6 @@ Those files are placed in /rw, which survives VM restart, so can be used to cust
- `/rw/config/qubes-ip-change-hook` - script run in NetVM after external IP change (or connection to the network)
- `/rw/config/qubes-firewall-user-script` - script run in ProxyVM after firewall update. Good place to write own custom firewall rules
- `/rw/config/suspend-module-blacklist` - list of modules (one per line) to be unloaded before system going to sleep. The file is used only in VM with some PCI devices attached. Supposed to be used for problematic device drivers.
Note that scripts need to be executable (chmod +x) to be used.