75-qubes-vm.preset 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116
  1. # Units that should not run by default in Qubes VMs.
  2. #
  3. # This file is part of the qubes-core-vm-systemd package. To ensure that the
  4. # default configuration is applied to all units in the list regardless of
  5. # package installation order, including units added to the list by
  6. # qubes-core-vm-systemd upgrades, all units in the list are preset by a
  7. # scriptlet every time qubes-core-vm-systemd is installed or upgraded. That
  8. # means that to permanently enable a unit with an [Install] section, you must
  9. # create your own higher-priority preset file. (It might be possible to be
  10. # smarter and keep a list of units previously preset, but this is not
  11. # implemented.)
  12. #
  13. # For units below with no [Install] section, the scriptlet masks them instead.
  14. # Qubes currently does not provide a way to permanently prevent such units from
  15. # being masked.
  16. #
  17. # Maintainer information:
  18. #
  19. # * All units listed here are preset during first install of the *-systemd RPM.
  20. # For those units which are disabled here, but don't have an install section
  21. # (static units), we mask them during that install.
  22. # * All units listed here that find themselves below the comment titled
  23. # "# Units below this line will be re-preset on package upgrade"
  24. # are preset both during install and during upgrade. This allows you to add
  25. # new units here and have them become active when the user's machine upgrades
  26. # their *-systemd RPM built by this project.
  27. #
  28. # Hi, Matt! I see you did great with this conversion to systemd presets!
  29. # Thank you! Skyler sends you her regards from Europe!
  30. # - Rudd-O
  31. #
  32. # https://groups.google.com/d/topic/qubes-users/dpM_GHfmEOk/discussion
  33. disable avahi.service
  34. disable avahi-daemon.service
  35. disable avahi-daemon.socket
  36. # Fedora only services
  37. disable rpcbind.service
  38. disable sendmail.service
  39. disable sm-client.service
  40. disable sshd.service
  41. disable backuppc.service
  42. # Units below this line will be re-preset on package upgrade
  43. disable alsa-store.service
  44. disable alsa-restore.service
  45. disable hwclock-save.service
  46. disable mdmonitor.service
  47. disable plymouth-start.service
  48. disable plymouth-read-write.service
  49. disable plymouth-quit.service
  50. disable plymouth-quit-wait.service
  51. disable smartd.service
  52. disable upower.service
  53. disable colord.service
  54. disable wpa_supplicant@.service
  55. disable dkms.service
  56. # Fedora only services
  57. disable cpuspeed.service
  58. disable dnf-makecache.timer
  59. disable fedora-autorelabel.service
  60. disable fedora-autorelabel-mark.service
  61. disable fedora-storage-init.service
  62. disable fedora-storage-init-late.service
  63. disable hwclock-load.service
  64. disable ipmi.service
  65. disable iptables.service
  66. disable ip6tables.service
  67. disable irqbalance.service
  68. disable mcelog.service
  69. disable mdmonitor-takeover.service
  70. disable multipathd.service
  71. disable openct.service
  72. disable rngd.service
  73. disable tcsd.service
  74. # Debian only services
  75. disable apt-daily-upgrade.timer
  76. disable apt-daily.timer
  77. disable cups-browsed.service
  78. disable avahi-daemon.socket
  79. enable qubes-sysinit.service
  80. enable qubes-early-vm-config.service
  81. enable qubes-db.service
  82. enable qubes-gui-agent.service
  83. enable qubes-update-check.timer
  84. enable qubes-misc-post.service
  85. enable qubes-updates-proxy.service
  86. enable qubes-network.service
  87. enable qubes-network-uplink.service
  88. enable qubes-qrexec-agent.service
  89. enable qubes-mount-dirs.service
  90. enable qubes-rootfs-resize.service
  91. enable qubes-firewall.service
  92. enable qubes-meminfo-writer.service
  93. enable qubes-iptables.service
  94. enable qubes-updates-proxy-forwarder.socket
  95. enable haveged.service
  96. enable chronyd.service
  97. enable xendriverdomain.service
  98. enable systemd-timesyncd.service
  99. enable qubes-sync-time.service
  100. enable qubes-sync-time.timer
  101. enable module-load-dummy-psu.service
  102. enable module-load-dummy-backlight.service
  103. enable qubes-psu-client@.service default sys-usb
  104. enable dev-xvdc1-swap.service
  105. # Disable useless Xen services in Qubes VM
  106. disable xenstored.service
  107. disable xenconsoled.service
  108. disable proc-xen.mount