2013-12-13 23:29:35 +04:00
# This file is part of systemd.
#
# systemd is free software; you can redistribute it and/or modify it
# under the terms of the GNU Lesser General Public License as published by
# the Free Software Foundation; either version 2.1 of the License, or
# (at your option) any later version.
2013-12-17 02:25:32 +04:00
[Unit]
2013-12-13 23:29:35 +04:00
Description = Legacy D-Bus Protocol Compatibility Daemon
[Service]
2013-12-21 07:19:51 +04:00
# The first argument will be replaced by the service by information on
# the process requesting the proxy, we need a placeholder to keep the
# space available for this.
sd-bus: sync with kdbus upstream (ABI break)
kdbus has seen a larger update than expected lately, most notably with
kdbusfs, a file system to expose the kdbus control files:
* Each time a file system of this type is mounted, a new kdbus
domain is created.
* The layout inside each mount point is the same as before, except
that domains are not hierarchically nested anymore.
* Domains are therefore also unnamed now.
* Unmounting a kdbusfs will automatically also detroy the
associated domain.
* Hence, the action of creating a kdbus domain is now as
privileged as mounting a filesystem.
* This way, we can get around creating dev nodes for everything,
which is last but not least something that is not limited by
20-bit minor numbers.
The kdbus specific bits in nspawn have all been dropped now, as nspawn
can rely on the container OS to set up its own kdbus domain, simply by
mounting a new instance.
A new set of mounts has been added to mount things *after* the kernel
modules have been loaded. For now, only kdbus is in this set, which is
invoked with mount_setup_late().
2014-11-13 22:33:03 +03:00
ExecStart = @rootlibexecdir@/systemd-bus-proxyd --drop-privileges --address=kernel:path=/sys/fs/kdbus/0-system/bus --configuration=/etc/dbus-1/system.conf --configuration=/etc/dbus-1/system-local.conf --configuration=/etc/dbus-1/system.d/ xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
2013-12-21 07:19:51 +04:00
NotifyAccess = main
2014-06-04 11:55:40 +04:00
CapabilityBoundingSet = CAP_IPC_OWNER CAP_SETUID CAP_SETGID CAP_SETPCAP
2014-03-19 19:45:28 +04:00
PrivateTmp = yes
PrivateDevices = yes
2014-03-20 02:08:39 +04:00
PrivateNetwork = yes
2014-06-04 20:07:55 +04:00
ProtectSystem = full
ProtectHome = yes