This unit is provided by:
Options
-
[Install]-
WantedBy=multi-user.target
-
-
[Service]-
AmbientCapabilities=CAP_IPC_LOCK CAP_SYS_PTRACE CAP_DAC_OVERRIDE -
ExecStart=/usr/sbin/prelockd -c /etc/prelockd.conf -
LimitNOFILE=8192 -
LockPersonalityIntroduced in systemd 235=yes -
MemoryDenyWriteExecuteIntroduced in systemd 231=yes -
NoNewPrivilegesIntroduced in systemd 239=yes -
OOMScoreAdjust=-100 -
PrivateDevicesIntroduced in systemd 209=yes -
PrivateNetwork=yes -
PrivateTmp=yes -
ProtectClockIntroduced in systemd 245=yes -
ProtectControlGroupsIntroduced in systemd 232=yes -
ProtectHomeIntroduced in systemd 214=yes -
ProtectHostnameIntroduced in systemd 242=yes -
ProtectKernelLogsIntroduced in systemd 244=yes -
ProtectKernelModulesIntroduced in systemd 232=yes -
ProtectKernelTunablesIntroduced in systemd 232=yes -
ProtectSystemIntroduced in systemd 214=strict -
ReadWritePaths=/var/lib/prelockd -
RestrictNamespacesIntroduced in systemd 233=yes -
RestrictRealtimeIntroduced in systemd 231=yes -
RestrictSUIDSGIDIntroduced in systemd 242=yes -
Slice=unevictable.slice -
TasksMax=1 -
UMask=0166 -
User=prelockd
-
-
[Unit]-
Description=Daemon that prevents eviction of executables/libraries from memory -
Documentation=man:prelockd(8) https://github.com/hakavlad/prelockd
-
Additionnal notes
Nothing here.