100 lines
3.0 KiB
ReStructuredText
100 lines
3.0 KiB
ReStructuredText
===========
|
|
qvm-service
|
|
===========
|
|
|
|
NAME
|
|
====
|
|
qvm-service - manage (Qubes-specific) services stared in VM
|
|
|
|
:Date: 2012-05-30
|
|
|
|
SYNOPSIS
|
|
========
|
|
| qvm-service [-l] <vmname>
|
|
| qvm-service [-e|-d|-D] <vmname> <service>
|
|
|
|
OPTIONS
|
|
=======
|
|
-h, --help
|
|
Show this help message and exit
|
|
-l, --list
|
|
List services (default action)
|
|
-e, --enable
|
|
Enable service
|
|
-d, --disable
|
|
Disable service
|
|
-D, --default
|
|
Reset service to its default state (remove from the list). Default state
|
|
means "lets VM choose" and can depend on VM type (NetVM, AppVM etc).
|
|
|
|
SUPPORTED SERVICES
|
|
==================
|
|
|
|
This list can be incomplete as VM can implement any additional service without knowlege of qubes-core code.
|
|
|
|
meminfo-writer
|
|
Default: enabled everywhere excluding NetVM
|
|
|
|
This service reports VM memory usage to dom0, which effectively enables dynamic memory management for the VM.
|
|
|
|
*Note:* this service is enforced to be set by dom0 code. If you try to
|
|
remove it (reset to defult state), will be recreated with the rule: enabled
|
|
if VM have no PCI devices assigned, otherwise disabled.
|
|
|
|
qubes-firewall
|
|
Default: enabled only in ProxyVM
|
|
|
|
Dynamic firewall manager, based on settings in dom0 (qvm-firewall, firewall tab in qubes-manager)
|
|
|
|
qubes-network
|
|
Default: enabled only in NetVM and ProxyVM
|
|
|
|
Expose network for other VMs. This includes enabling network forwardnig, MASQUERADE, DNS redirection and basic firewall.
|
|
|
|
qubes-netwatcher
|
|
Default: enabled only in ProxyVM
|
|
|
|
Monitor IP change notification from NetVM. When received, reload qubes-firewall service (to force DNS resolution).
|
|
This service makes sense only with qubes-firewall enabled.
|
|
|
|
qubes-update-check
|
|
Default: enabled
|
|
|
|
Notify dom0 about updates available for this VM. This is shown in qubes-manager as 'update-pending' flag.
|
|
|
|
cups
|
|
Default: enabled only in AppVM
|
|
|
|
Enable CUPS service. The user can disable cups in VM which do not need printing to speed up booting.
|
|
|
|
network-manager
|
|
Default: enabled in NetVM
|
|
|
|
Enable NetworkManager. Only VM with direct access to network device needs
|
|
this service. Note that enabling this in a VM which is connected to
|
|
NetVM/ProxyVM can cause network connectivity problems (namely: loss of IP
|
|
address and default route).
|
|
|
|
qubes-yum-proxy
|
|
Default: enabled in NetVM
|
|
|
|
Provide proxy service, which allow access only to yum repos. Filtering is
|
|
done based on URLs, so it shouldn't be used as leak control (pretty easy to
|
|
bypass), but is enough to prevent some erroneous user actions.
|
|
|
|
yum-proxy-setup
|
|
Default: enabled in AppVM (also in templates)
|
|
|
|
Setup yum at startup to use qubes-yum-proxy service.
|
|
|
|
*Note:* this service is automatically enabled when you allow VM to access
|
|
yum proxy (in firewall settings) and disabled when you deny access to yum
|
|
proxy.
|
|
|
|
|
|
AUTHORS
|
|
=======
|
|
| Joanna Rutkowska <joanna at invisiblethingslab dot com>
|
|
| Rafal Wojtczuk <rafal at invisiblethingslab dot com>
|
|
| Marek Marczykowski <marmarek at invisiblethingslab dot com>
|