This unit is provided by:
Options
-
[Install]-
WantedBy=multi-user.target
-
-
[Service]-
AmbientCapabilities=CAP_NET_BIND_SERVICE -
CacheDirectory=mympd -
CapabilityBoundingSet=CAP_NET_BIND_SERVICE -
DynamicUser=yes -
ExecStart=/usr/bin/mympd -
Group=mympd -
LockPersonalityIntroduced in systemd 235=yes -
MemoryDenyWriteExecuteIntroduced in systemd 231=yes -
PrivateDevicesIntroduced in systemd 209=yes -
ProtectClockIntroduced in systemd 245=yes -
ProtectControlGroupsIntroduced in systemd 232=yes -
ProtectHomeIntroduced in systemd 214=yes -
ProtectHostnameIntroduced in systemd 242=yes -
ProtectKernelLogsIntroduced in systemd 244=yes -
ProtectKernelModulesIntroduced in systemd 232=yes -
ProtectKernelTunablesIntroduced in systemd 232=yes -
ProtectProcIntroduced in systemd 247=invisible -
ProtectSystemIntroduced in systemd 214=full -
RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK AF_UNIX -
RestrictNamespacesIntroduced in systemd 233=yes -
RestrictRealtimeIntroduced in systemd 231=yes -
StateDirectory=mympd -
SystemCallArchitectures=native -
SystemCallFilter=@system-service -
User=mympd
-
-
[Unit]-
After=mpd.service -
Description=myMPD server daemon -
Documentation=man:mympd(1) -
Requires=network.target local-fs.target
-
Additionnal notes
Nothing here.