From 7658852df4ba159202a975742bace7e4fbde19eb Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= Date: Wed, 30 Mar 2016 01:25:57 +0200 Subject: [PATCH] update manpages --- reference/dom0-tools/qvm-add-appvm.md | 2 +- reference/dom0-tools/qvm-backup-restore.md | 15 +++++++++++++++ reference/dom0-tools/qvm-pci.md | 4 ++++ reference/dom0-tools/qvm-prefs.md | 4 ++-- .../dom0-tools/qvm-revert-template-changes.md | 2 +- reference/dom0-tools/qvm-service.md | 4 ++-- 6 files changed, 25 insertions(+), 6 deletions(-) diff --git a/reference/dom0-tools/qvm-add-appvm.md b/reference/dom0-tools/qvm-add-appvm.md index 4230d071..bf497cf2 100644 --- a/reference/dom0-tools/qvm-add-appvm.md +++ b/reference/dom0-tools/qvm-add-appvm.md @@ -16,7 +16,7 @@ NAME qvm-add-appvm - add an already installed appvm to the Qubes DB -WARNING: Normally you would not need this command, and you would use qvm-create instead! +WARNING: Noramlly you would not need this command, and you would use qvm-create instead! Date 2012-04-10 diff --git a/reference/dom0-tools/qvm-backup-restore.md b/reference/dom0-tools/qvm-backup-restore.md index b8c30f26..f75b9bcb 100644 --- a/reference/dom0-tools/qvm-backup-restore.md +++ b/reference/dom0-tools/qvm-backup-restore.md @@ -30,6 +30,9 @@ OPTIONS -h, --help Show this help message and exit +--verify-only +Do not restore the data, only verify backup integrity + --skip-broken Do not restore VMs that have missing templates or netvms @@ -54,6 +57,18 @@ Do not restore dom0 user home dir --ignore-username-mismatch Ignore dom0 username mismatch while restoring homedir +-d APPVM, --dest-vm=APPVM +The AppVM to send backups to + +-e, --encrypted +The backup is encrypted + +-z, --compressed +The backup is compressed + +--debug +Enable (a lot of) debug output + AUTHORS ------- diff --git a/reference/dom0-tools/qvm-pci.md b/reference/dom0-tools/qvm-pci.md index 0712d01a..5dba5aee 100644 --- a/reference/dom0-tools/qvm-pci.md +++ b/reference/dom0-tools/qvm-pci.md @@ -38,6 +38,10 @@ List VM PCI devices -a, --add Add a PCI device to specified VM +-C, --add-class +Add all devices of given class: +net - network interfaces, usb - USB controllers + -d, --delete Remove a PCI device from specified VM diff --git a/reference/dom0-tools/qvm-prefs.md b/reference/dom0-tools/qvm-prefs.md index f2ffa1d0..1544eee7 100644 --- a/reference/dom0-tools/qvm-prefs.md +++ b/reference/dom0-tools/qvm-prefs.md @@ -115,7 +115,7 @@ Additional drive for the VM (available only for HVMs). This can be used to attac mac Accepted values: MAC address, `auto` -Can be used to force specific of virtual ethernet card in the VM. Setting to `auto` will use automatic-generated MAC - based on VM id. Especially useful when some licenses depends on static MAC address. For template-based HVM `auto` mode means to clone template MAC. +Can be used to force specific of virtual ethernet card in the VM. Setting to `auto` will use automatic-generated MAC - based on VM id. Especially useful when some licencing depending on static MAC address. For template-based HVM `auto` mode means to clone template MAC. default\_user Accepted values: username @@ -135,7 +135,7 @@ This HVM have qrexec agent installed. When VM have qrexec agent installed, one c guiagent\_installed Accepted values: `True`, `False` -This HVM have gui agent installed. This option disables full screen GUI virtualization and enables per-window seamless GUI mode. This option will be automatically turned on during Qubes Windows Tools installation, but if you install Qubes gui agent in some other OS, you need to turn this option on manually. You can turn this option off to troubleshoot some early HVM OS boot problems (enter safe mode etc), but the option will be automatically enabled at first VM normal startup (and will take effect from the next startup). +This HVM have gui agent installed. This option disables full screen GUI virtualization and enables per-window seemless GUI mode. This option will be automatically turned on during Qubes Windows Tools installation, but if you install qubes gui agent in some other OS, you need to turn this option on manually. You can turn this option off to troubleshoot some early HVM OS boot problems (enter safe mode etc), but the option will be automatically enabled at first VM normal startup (and will take effect from the next startup). *Notice:* when Windows GUI agent is installed in the VM, SVGA device (used to full screen video) is disabled, so even if you disable this option, you will not get functional full desktop access (on normal VM startup). Use some other means for that (VNC, RDP or so). diff --git a/reference/dom0-tools/qvm-revert-template-changes.md b/reference/dom0-tools/qvm-revert-template-changes.md index 355d2e26..116575b2 100644 --- a/reference/dom0-tools/qvm-revert-template-changes.md +++ b/reference/dom0-tools/qvm-revert-template-changes.md @@ -31,7 +31,7 @@ OPTIONS Show this help message and exit --force -Do not prompt for confirmation +Do not prompt for comfirmation AUTHORS ------- diff --git a/reference/dom0-tools/qvm-service.md b/reference/dom0-tools/qvm-service.md index eabc08a4..98a3722e 100644 --- a/reference/dom0-tools/qvm-service.md +++ b/reference/dom0-tools/qvm-service.md @@ -46,14 +46,14 @@ Reset service to its default state (remove from the list). Default state means " SUPPORTED SERVICES ------------------ -This list can be incomplete as VM can implement any additional service without knowledge of qubes-core code. +This list can be incomplete as VM can implement any additional service without knowlege of qubes-core code. meminfo-writer Default: enabled everywhere excluding NetVM This service reports VM memory usage to dom0, which effectively enables dynamic memory management for the VM. -*Note:* this service is enforced to be set by dom0 code. If you try to remove it (reset to default state), will be recreated with the rule: enabled if VM have no PCI devices assigned, otherwise disabled. +*Note:* this service is enforced to be set by dom0 code. If you try to remove it (reset to defult state), will be recreated with the rule: enabled if VM have no PCI devices assigned, otherwise disabled. qubes-dvm Default: disabled