This unit is provided by:
Options
-
[Install] -
[Service]-
AmbientCapabilities=CAP_NET_ADMIN CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_NET_RAW -
BusName=org.freedesktop.network1 -
CapabilityBoundingSet=CAP_NET_ADMIN CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_NET_RAW -
DeviceAllow=char-* rw -
ExecReload=networkctl reload -
ExecStart=!!/lib/systemd/systemd-networkd -
ExecStart=!!/usr/lib/systemd/systemd-networkd -
FileDescriptorStoreMax=512 -
LockPersonalityIntroduced in systemd 235=yes -
MemoryDenyWriteExecuteIntroduced in systemd 231=yes -
NoNewPrivilegesIntroduced in systemd 239=yes -
ProtectClockIntroduced in systemd 245=yes -
ProtectControlGroupsIntroduced in systemd 232=yes -
ProtectHomeIntroduced in systemd 214=yes -
ProtectKernelLogsIntroduced in systemd 244=yes -
ProtectKernelModulesIntroduced in systemd 232=yes -
ProtectProcIntroduced in systemd 247=invisible -
ProtectSystemIntroduced in systemd 214=strict -
Restart=on-failure -
RestartKillSignal=SIGUSR2 -
RestartSec=0 -
RestrictAddressFamilies=AF_UNIX AF_NETLINK AF_INET AF_INET6 AF_PACKET -
RestrictNamespacesIntroduced in systemd 233=yes -
RestrictRealtimeIntroduced in systemd 231=yes -
RestrictSUIDSGIDIntroduced in systemd 242=yes -
RuntimeDirectory=systemd/netif -
RuntimeDirectoryPreserve=yes -
SystemCallArchitectures=native -
SystemCallErrorNumber=EPERM -
SystemCallFilter=@system-service -
Type=notify -
User=systemd-network -
WatchdogSec=3min
-
-
[Unit]-
After=systemd-networkd.socket systemd-udevd.service network-pre.target systemd-sysusers.service systemd-sysctl.service -
Before=network.target multi-user.target shutdown.target -
ConditionCapability=CAP_NET_ADMIN -
Conflicts=shutdown.target -
DefaultDependencies=no -
Description=Network Configuration -
Documentation=man:systemd-networkd.service(8) -
Wants=systemd-networkd.socket network.target
-
Additionnal notes
Nothing here.