This unit is provided by:
Options
-
[Install]
-
WantedBy=multi-user.target
-
-
[Service]
-
AmbientCapabilities=CAP_NET_BIND_SERVICE
-
CacheDirectory=mympd
-
CapabilityBoundingSet=CAP_NET_BIND_SERVICE
-
DynamicUser=yes
-
ExecStart=/usr/bin/mympd
-
Group=mympd
-
LockPersonality
Introduced in systemd 235=yes -
MemoryDenyWriteExecute
Introduced in systemd 231=yes -
PrivateDevices
Introduced in systemd 209=yes -
ProtectClock
Introduced in systemd 245=yes -
ProtectControlGroups
Introduced in systemd 232=yes -
ProtectHome
Introduced in systemd 214=yes -
ProtectHostname
Introduced in systemd 242=yes -
ProtectKernelLogs
Introduced in systemd 244=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectKernelTunables
Introduced in systemd 232=yes -
ProtectProc
Introduced in systemd 247=invisible -
ProtectSystem
Introduced in systemd 214=full -
RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK AF_UNIX
-
RestrictNamespaces
Introduced in systemd 233=yes -
RestrictRealtime
Introduced in systemd 231=yes -
StateDirectory=mympd
-
SystemCallArchitectures=native
-
SystemCallFilter=@system-service
-
User=mympd
-
-
[Unit]
-
After=mpd.service
-
Description=myMPD server daemon
-
Documentation=man:mympd(1)
-
Requires=network.target local-fs.target
-
Additionnal notes
Nothing here.