qubes-core-admin-linux/system-config
Marek Marczykowski-Górecki 5af0530e8d udev: prevent VM disks content from being accessed by dom0 processes
To not expose dom0 processes like blkid for attacks from VM (e.g. by
placing malicious filesystem header in private.img).
2014-06-11 02:41:20 +02:00
..
00-qubes-ignore-devices.rules udev: prevent VM disks content from being accessed by dom0 processes 2014-06-11 02:41:20 +02:00
60-persistent-storage.rules udev: prevent VM disks content from being accessed by dom0 processes 2014-06-11 02:41:20 +02:00
cpufreq-xen.modules
ip6tables
iptables Use 'conntrack' iptables module instead of obsoleted 'state' 2014-04-04 11:30:55 +02:00
limits-qubes.conf
polkit-1-qubes-allow-all.rules
qubes-dom0.modules
qubes-sync-clock.cron
qubes.sudoers