123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114 |
- # Units that should not run by default in Qubes VMs.
- #
- # This file is part of the qubes-core-vm-systemd package. To ensure that the
- # default configuration is applied to all units in the list regardless of
- # package installation order, including units added to the list by
- # qubes-core-vm-systemd upgrades, all units in the list are preset by a
- # scriptlet every time qubes-core-vm-systemd is installed or upgraded. That
- # means that to permanently enable a unit with an [Install] section, you must
- # create your own higher-priority preset file. (It might be possible to be
- # smarter and keep a list of units previously preset, but this is not
- # implemented.)
- #
- # For units below with no [Install] section, the scriptlet masks them instead.
- # Qubes currently does not provide a way to permanently prevent such units from
- # being masked.
- #
- # Maintainer information:
- #
- # * All units listed here are preset during first install of the *-systemd RPM.
- # For those units which are disabled here, but don't have an install section
- # (static units), we mask them during that install.
- # * All units listed here that find themselves below the comment titled
- # "# Units below this line will be re-preset on package upgrade"
- # are preset both during install and during upgrade. This allows you to add
- # new units here and have them become active when the user's machine upgrades
- # their *-systemd RPM built by this project.
- #
- # Hi, Matt! I see you did great with this conversion to systemd presets!
- # Thank you! Skyler sends you her regards from Europe!
- # - Rudd-O
- #
- # https://groups.google.com/d/topic/qubes-users/dpM_GHfmEOk/discussion
- disable avahi.service
- disable avahi-daemon.service
- disable avahi-daemon.socket
- # Fedora only services
- disable rpcbind.service
- disable sendmail.service
- disable sm-client.service
- disable sshd.service
- disable backuppc.service
- # Units below this line will be re-preset on package upgrade
- disable alsa-store.service
- disable alsa-restore.service
- disable hwclock-save.service
- disable mdmonitor.service
- disable plymouth-start.service
- disable plymouth-read-write.service
- disable plymouth-quit.service
- disable plymouth-quit-wait.service
- disable smartd.service
- disable upower.service
- disable colord.service
- disable wpa_supplicant@.service
- disable dkms.service
- # Fedora only services
- disable cpuspeed.service
- disable dnf-makecache.timer
- disable fedora-autorelabel.service
- disable fedora-autorelabel-mark.service
- disable fedora-storage-init.service
- disable fedora-storage-init-late.service
- disable hwclock-load.service
- disable ipmi.service
- disable iptables.service
- disable ip6tables.service
- disable irqbalance.service
- disable mcelog.service
- disable mdmonitor-takeover.service
- disable multipathd.service
- disable openct.service
- disable rngd.service
- disable tcsd.service
- # Debian only services
- disable apt-daily-upgrade.timer
- disable apt-daily.timer
- disable cups-browsed.service
- disable avahi-daemon.socket
- enable qubes-sysinit.service
- enable qubes-early-vm-config.service
- enable qubes-db.service
- enable qubes-gui-agent.service
- enable qubes-update-check.timer
- enable qubes-misc-post.service
- enable qubes-updates-proxy.service
- enable qubes-network.service
- enable qubes-qrexec-agent.service
- enable qubes-mount-dirs.service
- enable qubes-rootfs-resize.service
- enable qubes-firewall.service
- enable qubes-meminfo-writer.service
- enable qubes-iptables.service
- enable qubes-updates-proxy-forwarder.socket
- enable haveged.service
- enable chronyd.service
- enable xendriverdomain.service
- enable systemd-timesyncd.service
- enable qubes-sync-time.service
- enable qubes-sync-time.timer
- enable module-load-dummy-psu.service
- enable module-load-dummy-backlight.service
- enable qubes-psu-client@.service default sys-usb
- # Disable useless Xen services in Qubes VM
- disable xenstored.service
- disable xenconsoled.service
- disable proc-xen.mount
|