X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?a=blobdiff_plain;f=man%2Fsystemd.exec.xml;h=2f75915c2076d6aa4c31bb65d2020422c99b448e;hb=351e6342d59c790758c216db3c61e17cc2860fa9;hp=c419424d9d6d0603587dc71b8b8e31baabe8bbeb;hpb=d6797c920e9eb70f46a893c00fdd9ecb86d15f84;p=elogind.git
diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml
index c419424d9..2f75915c2 100644
--- a/man/systemd.exec.xml
+++ b/man/systemd.exec.xml
@@ -103,7 +103,7 @@
directory path. Sets the root
directory for executed processes, with
the
- chroot2
+ chroot2
system call. If this is used, it must
be ensured that the process and all
its auxiliary files are available in
@@ -304,7 +304,7 @@
See
- environ7
+ environ7
for details about environment variables.
@@ -443,12 +443,12 @@
for other processes to release the
terminal.
connects standard output to the
- syslog3
+ syslog3
system syslog
service.
connects it with the kernel log buffer
which is accessible via
- dmesg1.
+ dmesg1.
connects it with the journal which is
accessible via
journalctl1
@@ -568,7 +568,7 @@
,
or
. See
- syslog3
+ syslog3
for details. This option is only
useful when
StandardOutput= or
@@ -590,7 +590,7 @@
,
,
. See
- syslog3
+ syslog3
for details. This option is only
useful when
StandardOutput= or
@@ -687,7 +687,7 @@
User= setting. If
not set, no PAM session will be opened
for the executed processes. See
- pam8
+ pam8
for details.
@@ -698,7 +698,7 @@
capabilities to include in the
capability bounding set for the
executed process. See
- capabilities7
+ capabilities7
for details. Takes a whitespace-separated
list of capability names as read by
cap_from_name3,
@@ -739,7 +739,7 @@
SecureBits=Controls the secure
bits set for the executed process. See
- capabilities7
+ capabilities7
for details. Takes a list of strings:
,
,
@@ -757,7 +757,7 @@
Capabilities=Controls the
- capabilities7
+ capabilities7
set for the executed process. Take a
capability string describing the
effective, permitted and inherited
@@ -941,8 +941,8 @@
mounts the /usr
directory read-only for processes
invoked by this unit. If set to
- full the
- /etc is mounted
+ full, the
+ /etc directory is mounted
read-only, too. This setting ensures
that any modification of the vendor
supplied operating system (and
@@ -952,7 +952,7 @@
all long-running services, unless they
are involved with system updates or
need to modify the operating system in
- other ways. Note however, that
+ other ways. Note however that
processes retaining the CAP_SYS_ADMIN
capability can undo the effect of this
setting. This setting is hence
@@ -974,7 +974,7 @@
/run/user are
made inaccessible and empty for
processes invoked by this unit. If set
- to read-only the
+ to read-only, the
two directores are made read-only
instead. It is recommended to enable
this setting for all long-running
@@ -982,7 +982,7 @@
ones), to ensure they cannot get access
to private user data, unless the
services actually require access to
- the user's private data. Note however,
+ the user's private data. Note however
that processes retaining the
CAP_SYS_ADMIN capability can undo the
effect of this setting. This setting
@@ -1472,7 +1472,7 @@
or
StandardError=tty).
See
- termcap5.
+ termcap5.
@@ -1488,7 +1488,7 @@
systemd.setenv= (see
systemd1). Additional
variables may also be set through PAM,
- cf. pam_env8.
+ cf. pam_env8.
@@ -1506,7 +1506,7 @@
systemd.resource-control5,
systemd.directives7,
tmpfiles.d5,
- exec3
+ exec3