This unit is provided by:
Options
-
[Install]
-
[Service]
-
AmbientCapabilities=CAP_NET_ADMIN CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_NET_RAW
-
BusName=org.freedesktop.network1
-
CapabilityBoundingSet=CAP_NET_ADMIN CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_NET_RAW
-
DeviceAllow=char-* rw
-
ExecReload=networkctl reload
-
ExecStart=!!/lib/systemd/systemd-networkd
-
ExecStart=!!/usr/lib/systemd/systemd-networkd
-
FileDescriptorStoreMax=512
-
LockPersonality
Introduced in systemd 235=yes -
MemoryDenyWriteExecute
Introduced in systemd 231=yes -
NoNewPrivileges
Introduced in systemd 239=yes -
ProtectClock
Introduced in systemd 245=yes -
ProtectControlGroups
Introduced in systemd 232=yes -
ProtectHome
Introduced in systemd 214=yes -
ProtectKernelLogs
Introduced in systemd 244=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectProc
Introduced in systemd 247=invisible -
ProtectSystem
Introduced in systemd 214=strict -
Restart=on-failure
-
RestartKillSignal=SIGUSR2
-
RestartSec=0
-
RestrictAddressFamilies=AF_UNIX AF_NETLINK AF_INET AF_INET6 AF_PACKET
-
RestrictNamespaces
Introduced in systemd 233=yes -
RestrictRealtime
Introduced in systemd 231=yes -
RestrictSUIDSGID
Introduced in systemd 242=yes -
RuntimeDirectory=systemd/netif
-
RuntimeDirectoryPreserve=yes
-
SystemCallArchitectures=native
-
SystemCallErrorNumber=EPERM
-
SystemCallFilter=@system-service
-
Type=notify
-
User=systemd-network
-
WatchdogSec=3min
-
-
[Unit]
-
After=systemd-networkd.socket systemd-udevd.service network-pre.target systemd-sysusers.service systemd-sysctl.service
-
Before=network.target multi-user.target shutdown.target
-
ConditionCapability=CAP_NET_ADMIN
-
Conflicts=shutdown.target
-
DefaultDependencies=no
-
Description=Network Configuration
-
Documentation=man:systemd-networkd.service(8)
-
Wants=systemd-networkd.socket network.target
-
Additionnal notes
Nothing here.