qvm-service - manage (Qubes-specific) services started in VM

| qvm-service [-l] <vmname>
| qvm-service [-e|-d|-D] <vmname> <service>

-h, --help
    Show this help message and exit
-l, --list
    List services (default action)
-e, --enable
    Enable service
-d, --disable
    Disable service
-D, --default
    Reset service to its default state (remove from the list). Default state
    means "lets VM choose" and can depend on VM type (NetVM, AppVM etc).


This list can be incomplete as VM can implement any additional service without knowledge of qubes-core code.

    Default: enabled everywhere excluding NetVM

    This service reports VM memory usage to dom0, which effectively enables dynamic memory management for the VM.

    *Note:* this service is enforced to be set by dom0 code. If you try to
    remove it (reset to default state), will be recreated with the rule: enabled
    if VM have no PCI devices assigned, otherwise disabled.

    Default: disabled

    Used internally when creating DispVM savefile.

    Default: enabled only in ProxyVM

    Dynamic firewall manager, based on settings in dom0 (qvm-firewall, firewall tab in qubes-manager).
    This service is not supported in netvms.
    Default: enabled only in NetVM and ProxyVM

    Expose network for other VMs. This includes enabling network forwarding, MASQUERADE, DNS redirection and basic firewall.

    Default: enabled only in ProxyVM

    Monitor IP change notification from NetVM. When received, reload qubes-firewall service (to force DNS resolution).
    This service makes sense only with qubes-firewall enabled.

    Default: enabled

    Notify dom0 about updates available for this VM. This is shown in qubes-manager as 'update-pending' flag.

    Default: enabled only in AppVM

    Enable CUPS service. The user can disable cups in VM which do not need printing to speed up booting.

    Default: disabled

    Enable CRON service.

    Default: enabled in NetVM

    Enable NetworkManager. Only VM with direct access to network device needs
    this service, but can be useful in ProxyVM to ease VPN setup.

    Default: disabled

    Enable NTPD service. By default Qubes calls ntpdate every 6 minutes in
    selected VM (aka ClockVM), then propagate the result using qrexec calls.
    Enabling ntpd *do not* disable this behaviour.

    Deprecated name for qubes-updates-proxy.

    Default: enabled in NetVM

    Provide proxy service, which allow access only to yum repos. Filtering is
    done based on URLs, so it shouldn't be used as leak control (pretty easy to
    bypass), but is enough to prevent some erroneous user actions.

    Deprecated name for updates-proxy-setup.

    Default: enabled in AppVM (also in templates)

    Setup yum at startup to use qubes-yum-proxy service.

    *Note:* this service is automatically enabled when you allow VM to access
    yum proxy (in firewall settings) and disabled when you deny access to yum

    Default: disabled

    Disables the default route for networking.  Enabling  this  service
    will  prevent the creation of the default route, but the VM will
    still be able to reach it's direct neighbors.  The functionality
    is implemented in /usr/lib/qubes/setup-ip.

    Default: disabled

    Enabling this service will result in an empty /etc/resolv.conf.
    The functionality is implemented in /usr/lib/qubes/setup-ip.

| Joanna Rutkowska <joanna at invisiblethingslab dot com>
| Rafal Wojtczuk <rafal at invisiblethingslab dot com>
| Marek Marczykowski <marmarek at invisiblethingslab dot com>

Note: The Markdown source of this page in qubes-doc was generated by running the update-manpages-3-2 script on qubes-core-admin/doc/qvm-tools/. If you wish to update the contents of this page as it appears on the Qubes OS website, please submit a pull request to change the appropriate file in qubes-core-admin/doc/qvm-tools/. Do not attempt to change the Markdown source of this page in qubes-doc directly. All direct changes to the Markdown file will be overwritten the next time this page is regenerated.