This unit is provided by:
Options
-
[Install]
-
WantedBy=sysinit.target
-
-
[Service]
-
CapabilityBoundingSet=CAP_SYS_ADMIN
-
CapabilityBoundingSet=CAP_SYS_ADMIN CAP_SYS_CHROOT
-
EnvironmentFile=-/etc/default/haveged
-
ExecStart=/usr/bin/haveged -w 1024 -v 1 --Foreground -v 64
-
ExecStart=/usr/sbin/haveged --Foreground --verbose=1 $DAEMON_ARGS
-
ExecStart=/usr/sbin/haveged -w 1024 -v 0 -F
-
ExecStart=/usr/sbin/haveged -w 1024 -v 1 --Foreground -v 64
-
LockPersonality
Introduced in systemd 235=yes -
MemoryDenyWriteExecute
Introduced in systemd 231=yes -
PrivateDevices
Introduced in systemd 209=yes -
PrivateNetwork=yes
-
PrivateTmp=no
-
PrivateTmp=yes
-
ProtectClock
Introduced in systemd 245=yes -
ProtectControlGroups
Introduced in systemd 232=yes -
ProtectHome
Introduced in systemd 214=yes -
ProtectHostname
Introduced in systemd 242=yes -
ProtectKernelLogs
Introduced in systemd 244=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectSystem
Introduced in systemd 214=full -
Restart=always
-
RestrictNamespaces
Introduced in systemd 233=yes -
RestrictRealtime
Introduced in systemd 231=yes -
SecureBits=noroot-locked
-
SuccessExitStatus=137 143
-
SystemCallArchitectures=native
-
SystemCallErrorNumber=EPERM
-
SystemCallFilter=@basic-io @file-system @io-event @network-io @signal arch_prctl brk ioctl mprotect sysinfo
-
SystemCallFilter=@system-service ~@mount
-
-
[Unit]
-
After=apparmor.service systemd-tmpfiles-setup.service systemd-tmpfiles-setup-dev.service
-
After=systemd-tmpfiles-setup-dev.service
-
Before=sysinit.target shutdown.target
-
Before=sysinit.target shutdown.target systemd-journald.service
-
ConditionKernelVersion=<5.6
-
ConditionVirtualization=!container
-
DefaultDependencies=no
-
Description=Entropy Daemon based on the HAVEGE algorithm
-
Documentation=man:haveged(8) http://www.issihosts.com/haveged/
-
Additionnal notes
Nothing here.