From 9e6bc2d2bc64b4253c41fae5b188e24d0cfc0ec7 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= Date: Tue, 24 Jul 2018 03:37:08 +0200 Subject: [PATCH] config-files: fix qvm-features -> service --- configuration/config-files.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/configuration/config-files.md b/configuration/config-files.md index f2bf902d..b2cc8e35 100644 --- a/configuration/config-files.md +++ b/configuration/config-files.md @@ -31,7 +31,7 @@ The scripts here all run as root. - `/rw/config/qubes-ip-change-hook` - script runs in NetVM after every external IP change and on "hardware" link status change. -- (R4.0 only) in ProxyVMs/AppVMs with `qvm-features qubes-firewall true`, scripts placed in the following directories will be executed in the listed order followed by `qubes-firewall-user-script` after each firewall update. +- (R4.0 only) in ProxyVMs (or AppVMs with `qubes-firewall` service enabled), scripts placed in the following directories will be executed in the listed order followed by `qubes-firewall-user-script` after each firewall update. Good place to write own custom firewall rules. ~~~ @@ -40,7 +40,7 @@ The scripts here all run as root. /rw/config/qubes-firewall-user-script ~~~ -- (R3.2 only) `/rw/config/qubes-firewall-user-script` - script runs in ProxyVM/AppVM with `qvm-features qubes-firewall true` after each firewall update. +- (R3.2 only) `/rw/config/qubes-firewall-user-script` - script runs in ProxyVM (or AppVM with `qubes-firewall` service enabled) after each firewall update. Good place to write own custom firewall rules. - `/rw/config/suspend-module-blacklist` - list of modules (one per line) to be unloaded before system goes to sleep.