From 0e6858232387050b2bff15365043914e4c764d7c Mon Sep 17 00:00:00 2001 From: nl6720 Date: Mon, 4 Jul 2022 17:26:30 +0300 Subject: tree-wide: link to docs.kernel.org for kernel documentation https://www.kernel.org/ links to https://docs.kernel.org/ for the documentation. See https://git.kernel.org/pub/scm/docs/kernel/website.git/commit/?id=ebc1c372850f249dd143c6d942e66c88ec610520 These URLs are shorter and nicer looking. --- man/systemd.exec.xml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'man/systemd.exec.xml') diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index 557f881d9d..7e062313dc 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -293,7 +293,7 @@ /proc/. If ptraceable all processes that cannot be ptrace()'ed by a process are hidden to it. If default no restrictions on /proc/ access or visibility are made. For further details see - The /proc + The /proc Filesystem. It is generally recommended to run most system services with this option set to invisible. This option is implemented via file system namespacing, and thus cannot be used with services that shall be able to install mount points in the host file system @@ -318,7 +318,7 @@ introspection are made invisible in the /proc/ file system configured for the unit's processes. This controls the subset= mount option of the procfs instance for the unit. For further details see The /proc + url="https://docs.kernel.org/filesystems/proc.html#mount-options">The /proc Filesystem. Note that Linux exposes various kernel APIs via /proc/, which are made unavailable with this setting. Since these APIs are used frequently this option is useful only in a few, specific cases, and is not suitable for most non-trivial programs. @@ -725,7 +725,7 @@ CapabilityBoundingSet=~CAP_B CAP_C by them, systemctl show shows the original value of this setting. In case the service will be run in a new mount namespace anyway and SELinux is disabled, all file systems are mounted with MS_NOSUID flag. Also see - No New + No New Privileges Flag. @@ -1042,7 +1042,7 @@ CapabilityBoundingSet=~CAP_B CAP_C Sets the adjustment value for the Linux kernel's Out-Of-Memory (OOM) killer score for executed processes. Takes an integer between -1000 (to disable OOM killing of processes of this unit) and 1000 (to make killing of processes of this unit under memory pressure very likely). See The /proc Filesystem for + url="https://docs.kernel.org/filesystems/proc.html">The /proc Filesystem for details. If not specified defaults to the OOM score adjustment level of the service manager itself, which is normally at 0. -- cgit v1.2.3