X-Git-Url: http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?a=blobdiff_plain;f=man%2Fsystemd.exec.xml;h=2f75915c2076d6aa4c31bb65d2020422c99b448e;hb=e1bbf3d12f28b8e3d4394f2b257e1b7aea3d10fc;hp=c419424d9d6d0603587dc71b8b8e31baabe8bbeb;hpb=d6797c920e9eb70f46a893c00fdd9ecb86d15f84;p=elogind.git diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index c419424d9..2f75915c2 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -103,7 +103,7 @@ directory path. Sets the root directory for executed processes, with the - chroot2 + chroot2 system call. If this is used, it must be ensured that the process and all its auxiliary files are available in @@ -304,7 +304,7 @@ See - environ7 + environ7 for details about environment variables. @@ -443,12 +443,12 @@ for other processes to release the terminal. connects standard output to the - syslog3 + syslog3 system syslog service. connects it with the kernel log buffer which is accessible via - dmesg1. + dmesg1. connects it with the journal which is accessible via journalctl1 @@ -568,7 +568,7 @@ , or . See - syslog3 + syslog3 for details. This option is only useful when StandardOutput= or @@ -590,7 +590,7 @@ , , . See - syslog3 + syslog3 for details. This option is only useful when StandardOutput= or @@ -687,7 +687,7 @@ User= setting. If not set, no PAM session will be opened for the executed processes. See - pam8 + pam8 for details. @@ -698,7 +698,7 @@ capabilities to include in the capability bounding set for the executed process. See - capabilities7 + capabilities7 for details. Takes a whitespace-separated list of capability names as read by cap_from_name3, @@ -739,7 +739,7 @@ SecureBits= Controls the secure bits set for the executed process. See - capabilities7 + capabilities7 for details. Takes a list of strings: , , @@ -757,7 +757,7 @@ Capabilities= Controls the - capabilities7 + capabilities7 set for the executed process. Take a capability string describing the effective, permitted and inherited @@ -941,8 +941,8 @@ mounts the /usr directory read-only for processes invoked by this unit. If set to - full the - /etc is mounted + full, the + /etc directory is mounted read-only, too. This setting ensures that any modification of the vendor supplied operating system (and @@ -952,7 +952,7 @@ all long-running services, unless they are involved with system updates or need to modify the operating system in - other ways. Note however, that + other ways. Note however that processes retaining the CAP_SYS_ADMIN capability can undo the effect of this setting. This setting is hence @@ -974,7 +974,7 @@ /run/user are made inaccessible and empty for processes invoked by this unit. If set - to read-only the + to read-only, the two directores are made read-only instead. It is recommended to enable this setting for all long-running @@ -982,7 +982,7 @@ ones), to ensure they cannot get access to private user data, unless the services actually require access to - the user's private data. Note however, + the user's private data. Note however that processes retaining the CAP_SYS_ADMIN capability can undo the effect of this setting. This setting @@ -1472,7 +1472,7 @@ or StandardError=tty). See - termcap5. + termcap5. @@ -1488,7 +1488,7 @@ systemd.setenv= (see systemd1). Additional variables may also be set through PAM, - cf. pam_env8. + cf. pam_env8. @@ -1506,7 +1506,7 @@ systemd.resource-control5, systemd.directives7, tmpfiles.d5, - exec3 + exec3