2020-11-09 13:23:58 +09:00
# SPDX-License-Identifier: LGPL-2.1-or-later
2017-11-18 17:35:03 +01:00
#
2013-10-17 03:18:36 +02:00
# This file is part of systemd.
#
# systemd is free software; you can redistribute it and/or modify it
# under the terms of the GNU Lesser General Public License as published by
# the Free Software Foundation; either version 2.1 of the License, or
# (at your option) any later version.
[Unit]
2021-06-29 09:47:53 +02:00
Description = Network Configuration
2013-10-17 03:18:36 +02:00
Documentation = man:systemd-networkd.service(8)
2014-06-17 02:18:33 +02:00
ConditionCapability = CAP_NET_ADMIN
2013-10-17 03:18:36 +02:00
DefaultDependencies = no
2016-11-22 08:41:51 +01:00
# systemd-udevd.service can be dropped once tuntap is moved to netlink
2020-08-26 16:54:45 +02:00
After = systemd-networkd.socket systemd-udevd.service network-pre.target systemd-sysusers.service systemd-sysctl.service
2014-06-17 02:18:33 +02:00
Before = network.target multi-user.target shutdown.target
Conflicts = shutdown.target
2020-08-26 16:54:45 +02:00
Wants = systemd-networkd.socket network.target
2013-10-17 03:18:36 +02:00
[Service]
2017-08-27 01:40:47 +09:00
AmbientCapabilities = CAP_NET_ADMIN CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_NET_RAW
2020-09-11 10:56:06 +02:00
BusName = org.freedesktop.network1
2018-11-12 17:19:48 +01:00
CapabilityBoundingSet = CAP_NET_ADMIN CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_NET_RAW
2019-05-01 15:28:36 +03:00
DeviceAllow = char-* rw
2021-05-16 11:55:36 +02:00
ExecStart = !!{{ROOTLIBEXECDIR}}/systemd-networkd
2022-08-13 17:18:55 +09:00
FileDescriptorStoreMax = 512
2018-11-12 17:19:48 +01:00
LockPersonality = yes
MemoryDenyWriteExecute = yes
NoNewPrivileges = yes
2020-08-06 14:50:38 +02:00
ProtectProc = invisible
2020-04-02 21:18:11 +03:00
ProtectClock = yes
2016-08-26 13:23:27 +02:00
ProtectControlGroups = yes
2018-11-12 17:19:48 +01:00
ProtectHome = yes
2019-11-13 16:56:23 -08:00
ProtectKernelLogs = yes
2020-08-06 14:50:38 +02:00
ProtectKernelModules = yes
2018-11-12 17:19:48 +01:00
ProtectSystem = strict
Restart = on-failure
2020-08-06 14:50:38 +02:00
RestartKillSignal = SIGUSR2
2018-11-12 17:19:48 +01:00
RestartSec = 0
2021-10-15 06:31:21 +09:00
RestrictAddressFamilies = AF_UNIX AF_NETLINK AF_INET AF_INET6 AF_PACKET
2018-11-12 17:19:48 +01:00
RestrictNamespaces = yes
RestrictRealtime = yes
2019-03-20 19:52:20 +01:00
RestrictSUIDSGID = yes
2017-08-27 01:40:47 +09:00
RuntimeDirectory = systemd/netif
RuntimeDirectoryPreserve = yes
2018-11-12 17:19:48 +01:00
SystemCallArchitectures = native
SystemCallErrorNumber = EPERM
SystemCallFilter = @system-service
2023-01-02 17:25:46 +01:00
Type = notify-reload
2018-11-12 17:19:48 +01:00
User = systemd-network
2021-05-16 11:55:36 +02:00
{ { S E R V I C E _ W A T C H D O G } }
2014-02-21 04:38:17 +01:00
[Install]
WantedBy = multi-user.target
2015-02-01 22:13:26 +01:00
Also = systemd-networkd.socket
2017-04-10 11:59:58 -04:00
Alias = dbus-org.freedesktop.network1.service
2017-03-27 06:55:55 -04:00
2021-12-16 09:46:26 +01:00
# The output from this generator is used by udevd and networkd. Enable it by
# default when enabling systemd-networkd.service.
Also = systemd-network-generator.service
2017-03-27 06:55:55 -04:00
# We want to enable systemd-networkd-wait-online.service whenever this service
# is enabled. systemd-networkd-wait-online.service has
# WantedBy=network-online.target, so enabling it only has an effect if
# network-online.target itself is enabled or pulled in by some other unit.
Also = systemd-networkd-wait-online.service