Disable meminfo-writer if there is any PCI device attached
This code used to be in dom0, but it's easier to maintain it in VM. QubesOS/qubes-issues#2101
This commit is contained in:
parent
76e12cae2d
commit
c3d630f288
@ -2,10 +2,20 @@
|
||||
|
||||
# List of services enabled by default (in case of absence of qubesdb entry)
|
||||
DEFAULT_ENABLED_NETVM="network-manager qubes-network qubes-update-check qubes-updates-proxy"
|
||||
DEFAULT_ENABLED_PROXYVM="meminfo-writer qubes-network qubes-firewall qubes-netwatcher qubes-update-check"
|
||||
DEFAULT_ENABLED_APPVM="meminfo-writer cups qubes-update-check"
|
||||
DEFAULT_ENABLED_PROXYVM="qubes-network qubes-firewall qubes-netwatcher qubes-update-check"
|
||||
DEFAULT_ENABLED_APPVM="cups qubes-update-check"
|
||||
DEFAULT_ENABLED_TEMPLATEVM="$DEFAULT_ENABLED_APPVM updates-proxy-setup"
|
||||
DEFAULT_ENABLED="meminfo-writer"
|
||||
DEFAULT_ENABLED=""
|
||||
|
||||
if [ -z "`ls /sys/bus/pci/devices/`" ]; then
|
||||
# do not enable meminfo-writer (so qmemman for this domain) when any PCI
|
||||
# device is present
|
||||
DEFAULT_ENABLED="$DEFAULT_ENABLED meminfo-writer"
|
||||
DEFAULT_ENABLED_APPVM="$DEFAULT_ENABLED_APPVM meminfo-writer"
|
||||
DEFAULT_ENABLED_PROXYVM="$DEFAULT_ENABLED_PROXYVM meminfo-writer"
|
||||
DEFAULT_ENABLED_TEMPLATEVM="$DEFAULT_ENABLED_TEMPLATEVM meminfo-writer"
|
||||
fi
|
||||
|
||||
|
||||
QDB_READ=qubesdb-read
|
||||
QDB_LS=qubesdb-multiread
|
||||
|
Loading…
Reference in New Issue
Block a user