This unit is provided by:
Options
-
[Install]
-
WantedBy=multi-user.target
-
-
[Service]
-
AmbientCapabilities=CAP_IPC_LOCK CAP_SYS_PTRACE CAP_DAC_OVERRIDE
-
ExecStart=/usr/sbin/prelockd -c /etc/prelockd.conf
-
LimitNOFILE=8192
-
LockPersonality
Introduced in systemd 235=yes -
MemoryDenyWriteExecute
Introduced in systemd 231=yes -
NoNewPrivileges
Introduced in systemd 239=yes -
OOMScoreAdjust=-100
-
PrivateDevices
Introduced in systemd 209=yes -
PrivateNetwork=yes
-
PrivateTmp=yes
-
ProtectClock
Introduced in systemd 245=yes -
ProtectControlGroups
Introduced in systemd 232=yes -
ProtectHome
Introduced in systemd 214=yes -
ProtectHostname
Introduced in systemd 242=yes -
ProtectKernelLogs
Introduced in systemd 244=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectKernelTunables
Introduced in systemd 232=yes -
ProtectSystem
Introduced in systemd 214=strict -
ReadWritePaths=/var/lib/prelockd
-
RestrictNamespaces
Introduced in systemd 233=yes -
RestrictRealtime
Introduced in systemd 231=yes -
RestrictSUIDSGID
Introduced in systemd 242=yes -
Slice=unevictable.slice
-
TasksMax=1
-
UMask=0166
-
User=prelockd
-
-
[Unit]
-
Description=Daemon that prevents eviction of executables/libraries from memory
-
Documentation=man:prelockd(8) https://github.com/hakavlad/prelockd
-
Additionnal notes
Nothing here.