qubes-core-admin-linux/system-config
Marek Marczykowski-Górecki 5af0530e8d udev: prevent VM disks content from being accessed by dom0 processes
To not expose dom0 processes like blkid for attacks from VM (e.g. by
placing malicious filesystem header in private.img).
2014-06-11 02:41:20 +02:00
..
00-qubes-ignore-devices.rules udev: prevent VM disks content from being accessed by dom0 processes 2014-06-11 02:41:20 +02:00
60-persistent-storage.rules udev: prevent VM disks content from being accessed by dom0 processes 2014-06-11 02:41:20 +02:00
cpufreq-xen.modules Other Linux-specific files 2013-03-16 19:52:16 +01:00
ip6tables Other Linux-specific files 2013-03-16 19:52:16 +01:00
iptables Use 'conntrack' iptables module instead of obsoleted 'state' 2014-04-04 11:30:55 +02:00
limits-qubes.conf Other Linux-specific files 2013-03-16 19:52:16 +01:00
polkit-1-qubes-allow-all.rules Other Linux-specific files 2013-03-16 19:52:16 +01:00
qubes-dom0.modules Other Linux-specific files 2013-03-16 19:52:16 +01:00
qubes-sync-clock.cron Other Linux-specific files 2013-03-16 19:52:16 +01:00
qubes.sudoers Other Linux-specific files 2013-03-16 19:52:16 +01:00