Go to file
Marek Marczykowski-Górecki 8acd40905d Disable lesspipe in dom0
It can be dangerous when processing untrusted content (for example VM
logs).
Details:
https://groups.google.com/d/msgid/qubes-users/20150527215812.GA13915%40mail-itl
2015-06-25 02:37:29 +02:00
appmenus-files appmenus: fix template's icon 2015-04-12 02:06:26 +02:00
appmenus-scripts appmenus: allow '_' in Exec and other fields 2015-05-17 00:07:01 +02:00
doc doc: mention yum opts in qubes-dom0-update manual page 2014-05-11 17:49:52 +02:00
dom0-updates dom0-update: improve package validation regexp - include DSA case (#988) 2015-05-15 03:13:01 +02:00
dracut dracut: support the case when xen-pciback is built-in, not a module 2015-06-15 03:26:04 +02:00
icons Initial commit: appmenus handling code, icons 2013-03-16 18:23:22 +01:00
pm-utils pm-utils: do not load not used pm_functions 2013-12-10 20:02:35 +01:00
qrexec qrexec: do not terminate before sending all the data 2015-06-23 02:44:59 +02:00
rpm_spec Disable lesspipe in dom0 2015-06-25 02:37:29 +02:00
system-config Disable lesspipe in dom0 2015-06-25 02:37:29 +02:00
vaio-fixes vaio-fixes 2013-03-16 18:24:21 +01:00
.gitignore gitignore 2015-05-03 16:05:02 +02:00
Makefile Remove support for old builder API 2013-03-19 19:03:41 +01:00
Makefile.builder Add Makefile.builder 2013-03-19 15:23:17 +01:00
README.txt Add README.txt 2013-03-16 19:59:30 +01:00
version version 3.0.6 2015-05-15 03:29:37 +02:00
version_vaio_fixes vaio-fixes 2013-03-16 18:24:21 +01:00

This package contains Linux dom0 files, which aren't exactly part of "Qubes
core" i.e. aren't required for normal Qubes usage.

Mostly there are config files for different system services, but also some
"addons" to Qubes core:
 - udev scripts for block and USB devices exposure (in qvm-block and qvm-usb)
 - appmenu generation for Linux GUI (including icons)