X-Git-Url: http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?a=blobdiff_plain;f=man%2Fsystemd.conf.xml;h=2659f9ab7bbbcf0cf8ce19f3d83b48414fe6a3a0;hb=ea5943d3862cc690daa76e2ad336737407ec711c;hp=c7890287b5c7a914852c402cdeb612bb7dfe2bbc;hpb=e96d6be763014be75d480fde503d0b77f41194a0;p=elogind.git
diff --git a/man/systemd.conf.xml b/man/systemd.conf.xml
index c7890287b..2659f9ab7 100644
--- a/man/systemd.conf.xml
+++ b/man/systemd.conf.xml
@@ -9,16 +9,16 @@
Copyright 2010 Lennart Poettering
systemd is free software; you can redistribute it and/or modify it
- under the terms of the GNU General Public License as published by
- the Free Software Foundation; either version 2 of the License, or
+ under the terms of the GNU Lesser General Public License as published by
+ the Free Software Foundation; either version 2.1 of the License, or
(at your option) any later version.
systemd is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- General Public License for more details.
+ Lesser General Public License for more details.
- You should have received a copy of the GNU General Public License
+ You should have received a copy of the GNU Lesser General Public License
along with systemd; If not, see .
-->
@@ -103,18 +103,6 @@
of CPU indexes.
-
- MountAuto=yes
- SwapAuto=yes
-
- Configures whether
- systemd should automatically activate
- all swap or mounts listed in
- /etc/fstab, or
- whether this job is left to some other
- system script.
-
-
DefaultControllers=cpu
@@ -194,6 +182,72 @@
effect if a hardware watchdog is not
available.
+
+
+ CapabilityBoundingSet=
+
+ Controls which
+ capabilities to include in the
+ capability bounding set for PID 1 and
+ its children. See
+ capabilities7
+ for details. Takes a whitespace
+ separated list of capability names as
+ read by
+ cap_from_name3.
+ Capabilities listed will be included
+ in the bounding set, all others are
+ removed. If the list of capabilities
+ is prefixed with ~ all but the listed
+ capabilities will be included, the
+ effect of the assignment
+ inverted. Note that this option also
+ effects the respective capabilities in
+ the effective, permitted and
+ inheritable capability sets. The
+ capability bounding set may also be
+ individually configured for units
+ using the
+ CapabilityBoundingSet=
+ directive for units, but note that
+ capabilities dropped for PID 1 cannot
+ be regained in individual units, they
+ are lost for good.
+
+
+
+ DefaultLimitCPU=
+ DefaultLimitFSIZE=
+ DefaultLimitDATA=
+ DefaultLimitSTACK=
+ DefaultLimitCORE=
+ DefaultLimitRSS=
+ DefaultLimitNOFILE=
+ DefaultLimitAS=
+ DefaultLimitNPROC=
+ DefaultLimitMEMLOCK=
+ DefaultLimitLOCKS=
+ DefaultLimitSIGPENDING=
+ DefaultLimitMSGQUEUE=
+ DefaultLimitNICE=
+ DefaultLimitRTPRIO=
+ DefaultLimitRTTIME=
+
+ These settings control
+ various default resource limits for
+ units. See
+ setrlimit2
+ for details. Use the string
+ infinity to
+ configure no limit on a specific
+ resource. These settings may be
+ overriden in individual units
+ using the corresponding LimitXXX=
+ directives. Note that these resource
+ limits are only defaults for units,
+ they are not applied to PID 1
+ itself.
+