core-agent-linux/misc
Marek Marczykowski-Górecki 2a39adfe0f
Enlarge /tmp and /dev/shm
Initial size of those tmpfs-mounted directories is calculated as 50% of
RAM at VM startup time. Which happen to be quite small number, like
150M. Having such small /tmp and/or /dev/shm apparently isn't enough for
some applications like Google chrome. So set the size statically at 1GB,
which would be the case for baremetal system with 2GB of RAM.

Fixes QubesOS/qubes-issues#1003
2015-10-04 23:07:10 +02:00
..
.gitignore
block-snapshot
close-window.c
dispvm-dotfiles.tbz
dispvm-prerun.sh dispvm: do not start GUI apps during prerun 2015-04-11 02:43:03 +02:00
fstab Enlarge /tmp and /dev/shm 2015-10-04 23:07:10 +02:00
Makefile
mime-globs
org.gnome.nautilus.gschema.override
org.gnome.settings-daemon.plugins.updates.gschema.override vm: disable gnome update plugin, not only unattended installation 2012-06-11 22:35:44 +02:00
org.mate.NotificationDaemon.gschema.override fedora: Use 'slider' org.mate.NotificationDaemon theme 2015-08-07 09:20:44 -04:00
pam.d_su.qubes Fixed /etc/pam.d/su.qubes. (Moved line 'auth sufficient pam_permit.so' up. May not be low '@include' lines.) 2015-09-13 18:36:18 +00:00
polkit-1-qubes-allow-all.pkla
polkit-1-qubes-allow-all.rules vm: move polkit configs from qubes-gui-vm package 2013-02-12 01:38:29 +01:00
profile.d_qt_x11_no_mitshm.sh
qubes-archive-keyring.gpg
qubes-desktop-run Move .desktop launching code to python moules so it can be reused 2015-08-27 22:07:59 +02:00
qubes-download-dom0-updates.sh show error msg if qubes.ReceiveUpdates failed 2015-09-03 14:56:29 +00:00
qubes-r3.list.in Update repository definition for r3.1 2015-09-29 16:54:59 +02:00
qubes-r3.repo Update repository definition for r3.1 2015-09-29 16:54:59 +02:00
qubes-serial-login
qubes-session-autostart qubes-session-autostart: do not abort the whole process on invalid file 2015-08-27 22:41:51 +02:00
qubes-trigger-sync-appmenus.action
qubes-trigger-sync-appmenus.sh
qubes.sudoers
RPM-GPG-KEY-qubes-3-primary
RPM-GPG-KEY-qubes-3-unstable
serial.conf
session-stop-timeout.conf
sudoers.d_qt_x11_no_mitshm
sudoers.d_umask
udev-qubes-misc.rules
vusb-ctl.py
xdg.py qubes-desktop-run: don't crash on Debian wheezy (glib < 2.36) 2015-08-28 02:02:19 +02:00
xenstore-watch.c
xl-qvm-usb-attach.py
xl-qvm-usb-detach.py dom0/core: API CHANGE: pass username as keyword param to vm.run() (#577) 2012-11-13 04:42:25 +01:00
xorg-preload-apps.conf
yum-qubes-hooks.conf
yum-qubes-hooks.py