3afc7b7d50
qrexec-daemon will start new processes for called services, which include starting new DispVM, starting other required VMs (like backend GPG VM). Having those processes as root leads to many permissions problems, like the one linked below. So when VM is started by root, make sure that qrexec-daemon will be running as normal user (the first user in group 'qubes' - there should be only one). QubesOS/qubes-issues#1768 |
||
---|---|---|
.. | ||
__init__.py | ||
01QubesAppVm.py | ||
01QubesDisposableVm.py | ||
01QubesHVm.py | ||
02QubesTemplateHVm.py | ||
000QubesVm.py | ||
001QubesResizableVm.py | ||
003QubesTemplateVm.py | ||
005QubesNetVm.py | ||
006QubesAdminVm.py | ||
006QubesProxyVm.py | ||
Makefile | ||
README.txt |
This directory contains Qubes core modules. It will be loaded in lexicographical order, use numeric prefix to force load ordering. 0* - Qubes base modules 00* - Qubes core VM classes