summaryrefslogtreecommitdiffstats
path: root/man/systemd.exec.xml
diff options
context:
space:
mode:
authornl6720 <nl6720@gmail.com>2022-07-04 16:26:30 +0200
committerZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>2022-07-04 19:56:53 +0200
commit0e6858232387050b2bff15365043914e4c764d7c (patch)
tree36f91f8833e667d35cedfe610da1b39e9d80b26e /man/systemd.exec.xml
parentMerge pull request #23104 from mrc0mmand/resolved-tests (diff)
downloadsystemd-0e6858232387050b2bff15365043914e4c764d7c.tar.xz
systemd-0e6858232387050b2bff15365043914e4c764d7c.zip
tree-wide: link to docs.kernel.org for kernel documentation
https://www.kernel.org/ links to https://docs.kernel.org/ for the documentation. See https://git.kernel.org/pub/scm/docs/kernel/website.git/commit/?id=ebc1c372850f249dd143c6d942e66c88ec610520 These URLs are shorter and nicer looking.
Diffstat (limited to 'man/systemd.exec.xml')
-rw-r--r--man/systemd.exec.xml8
1 files changed, 4 insertions, 4 deletions
diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml
index 557f881d9d..7e062313dc 100644
--- a/man/systemd.exec.xml
+++ b/man/systemd.exec.xml
@@ -293,7 +293,7 @@
<filename>/proc/</filename>. If <literal>ptraceable</literal> all processes that cannot be
<function>ptrace()</function>'ed by a process are hidden to it. If <literal>default</literal> no
restrictions on <filename>/proc/</filename> access or visibility are made. For further details see
- <ulink url="https://www.kernel.org/doc/html/latest/filesystems/proc.html#mount-options">The /proc
+ <ulink url="https://docs.kernel.org/filesystems/proc.html#mount-options">The /proc
Filesystem</ulink>. It is generally recommended to run most system services with this option set to
<literal>invisible</literal>. This option is implemented via file system namespacing, and thus cannot
be used with services that shall be able to install mount points in the host file system
@@ -318,7 +318,7 @@
introspection are made invisible in the <filename>/proc/</filename> file system configured for the
unit's processes. This controls the <literal>subset=</literal> mount option of the
<literal>procfs</literal> instance for the unit. For further details see <ulink
- url="https://www.kernel.org/doc/html/latest/filesystems/proc.html#mount-options">The /proc
+ url="https://docs.kernel.org/filesystems/proc.html#mount-options">The /proc
Filesystem</ulink>. Note that Linux exposes various kernel APIs via <filename>/proc/</filename>,
which are made unavailable with this setting. Since these APIs are used frequently this option is
useful only in a few, specific cases, and is not suitable for most non-trivial programs.</para>
@@ -725,7 +725,7 @@ CapabilityBoundingSet=~CAP_B CAP_C</programlisting>
by them, <command>systemctl show</command> shows the original value of this setting. In case the
service will be run in a new mount namespace anyway and SELinux is disabled, all file systems
are mounted with <constant>MS_NOSUID</constant> flag. Also see
- <ulink url="https://www.kernel.org/doc/html/latest/userspace-api/no_new_privs.html">No New
+ <ulink url="https://docs.kernel.org/userspace-api/no_new_privs.html">No New
Privileges Flag</ulink>.</para></listitem>
</varlistentry>
@@ -1042,7 +1042,7 @@ CapabilityBoundingSet=~CAP_B CAP_C</programlisting>
<listitem><para>Sets the adjustment value for the Linux kernel's Out-Of-Memory (OOM) killer score for
executed processes. Takes an integer between -1000 (to disable OOM killing of processes of this unit)
and 1000 (to make killing of processes of this unit under memory pressure very likely). See <ulink
- url="https://www.kernel.org/doc/html/latest/filesystems/proc.html">The /proc Filesystem</ulink> for
+ url="https://docs.kernel.org/filesystems/proc.html">The /proc Filesystem</ulink> for
details. If not specified defaults to the OOM score adjustment level of the service manager itself,
which is normally at 0.</para>