This unit is provided by:
Options
-
[Service]
-
BusName=org.freedesktop.login1
-
CapabilityBoundingSet=CAP_SYS_ADMIN CAP_MAC_ADMIN CAP_AUDIT_CONTROL CAP_CHOWN CAP_DAC_READ_SEARCH CAP_DAC_OVERRIDE CAP_FOWNER CAP_SYS_TTY_CONFIG CAP_LINUX_IMMUTABLE
-
DeviceAllow=block-* r char-/dev/console rw char-drm rw char-input rw char-tty rw char-vcs rw
-
ExecStart=/lib/systemd/systemd-logind
-
ExecStart=/usr/lib/systemd/systemd-logind
-
FileDescriptorStoreMax=512
-
IPAddressDeny=any
-
LimitNOFILE=524288
-
LockPersonality
Introduced in systemd 235=yes -
MemoryDenyWriteExecute
Introduced in systemd 231=yes -
NoNewPrivileges
Introduced in systemd 239=yes -
PrivateTmp=yes
-
ProtectClock
Introduced in systemd 245=yes -
ProtectControlGroups
Introduced in systemd 232=yes -
ProtectHome
Introduced in systemd 214=yes -
ProtectHostname
Introduced in systemd 242=yes -
ProtectKernelLogs
Introduced in systemd 244=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectSystem
Introduced in systemd 214=strict -
ReadWritePaths=/etc /run
-
Restart=always
-
RestartSec=0
-
RestrictAddressFamilies=AF_UNIX AF_NETLINK
-
RestrictNamespaces
Introduced in systemd 233=yes -
RestrictRealtime
Introduced in systemd 231=yes -
RestrictSUIDSGID
Introduced in systemd 242=yes -
RuntimeDirectory=systemd/sessions systemd/seats systemd/users systemd/inhibit systemd/shutdown
-
RuntimeDirectoryPreserve=yes
-
StateDirectory=systemd/linger
-
SystemCallArchitectures=native
-
SystemCallErrorNumber=EPERM
-
SystemCallFilter=@system-service
-
WatchdogSec=3min
-
-
[Unit]
-
After=nss-user-lookup.target user.slice modprobe@drm.service dbus.socket
-
ConditionPathExists=|/lib/systemd/system/dbus.service |/lib/systemd/system/dbus-broker.service
-
Description=User Login Management
-
Documentation=man:sd-login(3) man:systemd-logind.service(8) man:logind.conf(5) man:org.freedesktop.login1(5)
-
Wants=user.slice modprobe@drm.service dbus.socket
-
Additionnal notes
Nothing here.