Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upEnsure that VM LVM volumes are not parsed by dom0 tools #2319
Comments
marmarek
added
C: installer
C: other
P: major
task
labels
Sep 14, 2016
marmarek
added this to the Release 4.0 milestone
Sep 14, 2016
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Jun 6, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Jun 9, 2017
qubesos-bot
referenced this issue
in QubesOS/updates-status
Jul 4, 2017
Closed
core-admin v4.0.1 (r4.0) #100
added a commit
to marmarek/qubes-linux-utils
that referenced
this issue
Jul 6, 2017
added a commit
to marmarek/qubes-core-admin-linux
that referenced
this issue
Jul 6, 2017
This was referenced Jul 6, 2017
andrewdavidwong
modified the milestones:
Release 4.0,
Release 4.1
Mar 31, 2018
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
marmarek commentedSep 14, 2016
This scanning include:
This all should be easy to blacklist using appropriate udev rule, similar to this:
https://github.com/QubesOS/qubes-core-admin-linux/blob/master/system-config/00-qubes-ignore-devices.rules
QubesOS/qubes-core-admin-linux@ae7656e
It needs to be included in: