X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=elogind.git;a=blobdiff_plain;f=man%2Fsystemd.exec.xml;h=b9a37da38e061c3874caf61f287e1ac17fbea2d0;hp=de1d9bf44c4d84f1b7f8ed3a9064aa5b03a5bb6e;hb=0843f2d65ea978b09f12da9ba61ee157d39ee237;hpb=6ea832a20700f5282c08c70f38422c6ab290a0b5 diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index de1d9bf44..b9a37da38 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -57,13 +57,13 @@ Description - Unit configuration files for services, sockets + Unit configuration files for services, sockets, mount points and swap devices share a subset of configuration options which define the execution environment of spawned processes. This man page lists the configuration options - shared by these three unit types. See + shared by these four unit types. See systemd.unit5 for the common options of all unit configuration files, and @@ -629,6 +629,18 @@ for details. + + ControlGroupModify= + Takes a boolean + argument. If true, the control groups + created for this unit will be owned by + ther user specified with + User= (and the + configured group), and he can create + subgroups as well as add processes to + the group. + + CapabilityBoundingSet= @@ -638,7 +650,7 @@ executed process. See capabilities7 for details. Takes a whitespace - seperated list of capability names as + separated list of capability names as read by cap_from_name3. Capabilities listed will be included @@ -646,7 +658,7 @@ removed. If the list of capabilities is prefixed with ~ all but the listed capabilities will be included, the - effect of this assignment + effect of the assignment inverted. Note that this option does not actually set or unset any capabilities in the effective, @@ -715,7 +727,7 @@ path for this unit is implied. This option may be used to place executed processes in arbitrary groups in - arbitrary hierachies -- which can be + arbitrary hierarchies -- which can be configured externally with additional execution limits. By default systemd will place all executed processes in separate per-unit control @@ -753,7 +765,7 @@ usual file access controls would permit this. Directories listed in InaccessibleDirectories= - will be made inaccesible for processes + will be made inaccessible for processes inside the namespace. Note that restricting access with these options does not extend to submounts of a