qvm-service.rst 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151
  1. .. program:: qvm-service
  2. ========================================================================
  3. :program:`qvm-service` -- Manage (Qubes-specific) services started in VM
  4. ========================================================================
  5. Synopsis
  6. ========
  7. | :command:`qvm-service` [-l] <*vmname*>
  8. | :command:`qvm-service` [-e|-d|-D] <*vmname*> <*service*>
  9. | :command:`qvm-service` <*vmname*> <*service*> [on|off]
  10. Options
  11. =======
  12. .. option:: --help, -h
  13. Show this help message and exit
  14. .. option:: --list, -l
  15. List services (default action)
  16. .. option:: --enable, -e
  17. Enable service
  18. .. option:: --disable, -d
  19. Disable service
  20. .. option:: --default, -D, --delete, --unset
  21. Reset service to its default state (remove from the list). Default state
  22. means "lets VM choose" and can depend on VM type (NetVM, AppVM etc).
  23. .. option:: --verbose, -v
  24. increase verbosity
  25. .. option:: --quiet, -q
  26. decrease verbosity
  27. Supported services
  28. ==================
  29. This list can be incomplete as VM can implement any additional service without
  30. knowledge of qubes-core code.
  31. meminfo-writer
  32. Default: enabled everywhere excluding NetVM
  33. This service reports VM memory usage to dom0, which effectively enables
  34. dynamic memory management for the VM.
  35. .. note::
  36. This service is enforced to be set by dom0 code. If you try to
  37. remove it (reset to default state), will be recreated with the rule: enabled
  38. if VM have no PCI devices assigned, otherwise disabled.
  39. qubes-firewall
  40. Default: enabled only in ProxyVM
  41. Dynamic firewall manager, based on settings in dom0 (qvm-firewall, firewall tab in qubes-manager).
  42. This service is not supported in netvms.
  43. qubes-network
  44. Default: enabled only in NetVM and ProxyVM
  45. Expose network for other VMs. This includes enabling network forwarding, MASQUERADE, DNS redirection and basic firewall.
  46. qubes-network
  47. Default: enabled only in NetVM and ProxyVM
  48. Expose network for other VMs. This includes enabling network forwarding,
  49. MASQUERADE, DNS redirection and basic firewall.
  50. qubes-update-check
  51. Default: enabled
  52. Notify dom0 about updates available for this VM. This is shown in
  53. qubes-manager as 'update-pending' flag.
  54. cups
  55. Default: enabled only in AppVM
  56. Enable CUPS service. The user can disable cups in VM which do not need
  57. printing to speed up booting.
  58. crond
  59. Default: disabled
  60. Enable CRON service.
  61. network-manager
  62. Default: enabled in NetVM
  63. Enable NetworkManager. Only VM with direct access to network device needs
  64. this service, but can be useful in ProxyVM to ease VPN setup.
  65. clocksync
  66. Default: disabled
  67. Enable NTPD (or equivalent) service. If disabled, VM will sync clock with
  68. selected VM (aka ClockVM) instead. ClockVM for particular VM can be set in
  69. policy of qubes.GetDate service, using target= parameter.
  70. qubes-yum-proxy
  71. Deprecated name for qubes-updates-proxy.
  72. qubes-updates-proxy
  73. Default: enabled in NetVM
  74. Provide proxy service, which allow access only to yum repos. Filtering is
  75. done based on URLs, so it shouldn't be used as leak control (pretty easy to
  76. bypass), but is enough to prevent some erroneous user actions.
  77. yum-proxy-setup
  78. Deprecated name for updates-proxy-setup.
  79. updates-proxy-setup
  80. Default: enabled in AppVM (also in templates)
  81. Setup yum at startup to use qubes-yum-proxy service.
  82. .. note::
  83. this service is automatically enabled when you allow VM to access updates
  84. proxy and disabled when you deny access to updates proxy.
  85. disable-default-route
  86. Default: disabled
  87. Disables the default route for networking. Enabling this service
  88. will prevent the creation of the default route, but the VM will
  89. still be able to reach it's direct neighbors. The functionality
  90. is implemented in /usr/lib/qubes/setup-ip.
  91. disable-dns-server
  92. Default: disabled
  93. Enabling this service will result in an empty /etc/resolv.conf.
  94. The functionality is implemented in /usr/lib/qubes/setup-ip.
  95. Authors
  96. =======
  97. | Joanna Rutkowska <joanna at invisiblethingslab dot com>
  98. | Rafal Wojtczuk <rafal at invisiblethingslab dot com>
  99. | Marek Marczykowski <marmarek at invisiblethingslab dot com>