 cce5210239
			
		
	
	
		cce5210239
		
	
	
	
	
		
			
			As #774 is resolved, it is no longer true that NetworkManger in non-NetVM will cause network problems.
		
			
				
	
	
		
			98 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
			
		
		
	
	
			98 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
| ===========
 | |
| qvm-service
 | |
| ===========
 | |
| 
 | |
| NAME
 | |
| ====
 | |
| qvm-service - manage (Qubes-specific) services stared in VM
 | |
| 
 | |
| :Date:   2012-05-30
 | |
| 
 | |
| SYNOPSIS
 | |
| ========
 | |
| | qvm-service [-l] <vmname>
 | |
| | qvm-service [-e|-d|-D] <vmname> <service>
 | |
| 
 | |
| OPTIONS
 | |
| =======
 | |
| -h, --help
 | |
|     Show this help message and exit
 | |
| -l, --list
 | |
|     List services (default action)
 | |
| -e, --enable
 | |
|     Enable service
 | |
| -d, --disable
 | |
|     Disable service
 | |
| -D, --default
 | |
|     Reset service to its default state (remove from the list). Default state
 | |
|     means "lets VM choose" and can depend on VM type (NetVM, AppVM etc).
 | |
| 
 | |
| SUPPORTED SERVICES
 | |
| ==================
 | |
| 
 | |
| This list can be incomplete as VM can implement any additional service without knowlege of qubes-core code.
 | |
| 
 | |
| meminfo-writer
 | |
|     Default: enabled everywhere excluding NetVM
 | |
| 
 | |
|     This service reports VM memory usage to dom0, which effectively enables dynamic memory management for the VM.
 | |
| 
 | |
|     *Note:* this service is enforced to be set by dom0 code. If you try to
 | |
|     remove it (reset to defult state), will be recreated with the rule: enabled
 | |
|     if VM have no PCI devices assigned, otherwise disabled.
 | |
| 
 | |
| qubes-firewall
 | |
|     Default: enabled only in ProxyVM
 | |
| 
 | |
|     Dynamic firewall manager, based on settings in dom0 (qvm-firewall, firewall tab in qubes-manager)
 | |
| 
 | |
| qubes-network
 | |
|     Default: enabled only in NetVM and ProxyVM
 | |
| 
 | |
|     Expose network for other VMs. This includes enabling network forwardnig, MASQUERADE, DNS redirection and basic firewall.
 | |
| 
 | |
| qubes-netwatcher
 | |
|     Default: enabled only in ProxyVM
 | |
| 
 | |
|     Monitor IP change notification from NetVM. When received, reload qubes-firewall service (to force DNS resolution).
 | |
|     This service makes sense only with qubes-firewall enabled.
 | |
| 
 | |
| qubes-update-check
 | |
|     Default: enabled
 | |
| 
 | |
|     Notify dom0 about updates available for this VM. This is shown in qubes-manager as 'update-pending' flag.
 | |
| 
 | |
| cups
 | |
|     Default: enabled only in AppVM
 | |
| 
 | |
|     Enable CUPS service. The user can disable cups in VM which do not need printing to speed up booting.
 | |
| 
 | |
| network-manager
 | |
|     Default: enabled in NetVM
 | |
| 
 | |
|     Enable NetworkManager. Only VM with direct access to network device needs
 | |
|     this service, but can be useful in ProxyVM to ease VPN setup.
 | |
| 
 | |
| qubes-yum-proxy
 | |
|     Default: enabled in NetVM
 | |
| 
 | |
|     Provide proxy service, which allow access only to yum repos. Filtering is
 | |
|     done based on URLs, so it shouldn't be used as leak control (pretty easy to
 | |
|     bypass), but is enough to prevent some erroneous user actions.
 | |
| 
 | |
| yum-proxy-setup
 | |
|     Default: enabled in AppVM (also in templates)
 | |
| 
 | |
|     Setup yum at startup to use qubes-yum-proxy service.
 | |
| 
 | |
|     *Note:* this service is automatically enabled when you allow VM to access
 | |
|     yum proxy (in firewall settings) and disabled when you deny access to yum
 | |
|     proxy.
 | |
| 
 | |
| 
 | |
| AUTHORS
 | |
| =======
 | |
| | Joanna Rutkowska <joanna at invisiblethingslab dot com>
 | |
| | Rafal Wojtczuk <rafal at invisiblethingslab dot com>
 | |
| | Marek Marczykowski <marmarek at invisiblethingslab dot com>
 |