X-Git-Url: http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=elogind.git;a=blobdiff_plain;f=man%2Fsystemd.conf.xml;h=7776c8f4f739808e13b17173eb9855a7628f0d02;hp=a110f245417fb8a648041b18368704427e91f06f;hb=f89a3b6f5bf695186e7b9e6cc63993b1272e7569;hpb=8d8e945624a0080073d94941f3032b8fa3b3aa15 diff --git a/man/systemd.conf.xml b/man/systemd.conf.xml index a110f2454..7776c8f4f 100644 --- a/man/systemd.conf.xml +++ b/man/systemd.conf.xml @@ -44,12 +44,12 @@ systemd.conf - systemd manager configuration file + System and service manager configuration file - system.conf - user.conf + /etc/systemd/system.conf + /etc/systemd/user.conf @@ -69,7 +69,7 @@ All options are configured in the [Manager] section: - + LogLevel= @@ -79,7 +79,6 @@ DumpCore=yes CrashShell=no ShowStatus=yes - SysVConsole=yes CrashChVT=1 DefaultStandardOutput=journal DefaultStandardError=inherit @@ -119,14 +118,14 @@ - JoinControllers=cpu,cpuacct + JoinControllers=cpu,cpuacct,cpuset net_cls,netprio Configures controllers that shall be mounted in a single hierarchy. By default systemd will mount all controllers which are enabled in the kernel in individual - hierachies, with the exception of + hierarchies, with the exception of those listed in this setting. Takes a space separated list of comma separated controller names, in order @@ -182,6 +181,96 @@ effect if a hardware watchdog is not available. + + + CapabilityBoundingSet= + + Controls which + capabilities to include in the + capability bounding set for PID 1 and + its children. See + capabilities7 + for details. Takes a whitespace + separated list of capability names as + read by + cap_from_name3. + Capabilities listed will be included + in the bounding set, all others are + removed. If the list of capabilities + is prefixed with ~ all but the listed + capabilities will be included, the + effect of the assignment + inverted. Note that this option also + effects the respective capabilities in + the effective, permitted and + inheritable capability sets. The + capability bounding set may also be + individually configured for units + using the + CapabilityBoundingSet= + directive for units, but note that + capabilities dropped for PID 1 cannot + be regained in individual units, they + are lost for good. + + + + TimerSlackNSec= + + Sets the timer slack + in nanoseconds for PID 1 which is then + inherited to all executed processes, + unless overriden individually, for + example with the + TimerSlackNSec= + setting in service units (for details + see + systemd.exec5). The + timer slack controls the accuracy of + wake-ups triggered by timers. See + prctl2 + for more information. Note that in + contrast to most other time span + definitions this parameter takes an + integer value in nano-seconds if no + unit is specified. The usual time + units are understood + too. + + + + DefaultLimitCPU= + DefaultLimitFSIZE= + DefaultLimitDATA= + DefaultLimitSTACK= + DefaultLimitCORE= + DefaultLimitRSS= + DefaultLimitNOFILE= + DefaultLimitAS= + DefaultLimitNPROC= + DefaultLimitMEMLOCK= + DefaultLimitLOCKS= + DefaultLimitSIGPENDING= + DefaultLimitMSGQUEUE= + DefaultLimitNICE= + DefaultLimitRTPRIO= + DefaultLimitRTTIME= + + These settings control + various default resource limits for + units. See + setrlimit2 + for details. Use the string + infinity to + configure no limit on a specific + resource. These settings may be + overriden in individual units + using the corresponding LimitXXX= + directives. Note that these resource + limits are only defaults for units, + they are not applied to PID 1 + itself. +