mirror of
https://github.com/systemd/systemd.git
synced 2025-03-28 02:50:16 +03:00
man: document the new Delegate= syntax
This commit is contained in:
parent
0263828039
commit
a9f01ad1bf
@ -711,13 +711,30 @@
|
||||
<term><varname>Delegate=</varname></term>
|
||||
|
||||
<listitem>
|
||||
<para>Turns on delegation of further resource control
|
||||
partitioning to processes of the unit. For unprivileged
|
||||
services (i.e. those using the <varname>User=</varname>
|
||||
setting), this allows processes to create a subhierarchy
|
||||
beneath its control group path. For privileged services and
|
||||
scopes, this ensures the processes will have all control
|
||||
group controllers enabled.</para>
|
||||
<para>Turns on delegation of further resource control partitioning to processes of the unit. Units where this
|
||||
is enabled may create and manage their own private subhierarchy of control groups below the control group of
|
||||
the unit itself. For unprivileged services (i.e. those using the <varname>User=</varname> setting) the unit's
|
||||
control group will be made accessible to the relevant user. When enabled the service manager will refrain
|
||||
from manipulating control groups or moving processes below the unit's control group, so that a clear concept
|
||||
of ownership is established: the control group tree above the unit's control group (i.e. towards the root
|
||||
control group) is owned and managed by the service manager of the host, while the control group tree below
|
||||
the unit's control group is owned and managed by the unit itself. Takes either a boolean argument or a list
|
||||
of control group controller names. If true, delegation is turned on, and all supported controllers are
|
||||
enabled for the unit, making them available to the unit's processes for management. If false, delegation is
|
||||
turned off entirely (and no additional controllers are enabled). If set to a list of controllers, delegation
|
||||
is turned on, and the specified controllers are enabled for the unit. Note that assigning the empty string
|
||||
will enable delegation, but not enable any additional controllers. Defaults to false.</para>
|
||||
|
||||
<para>Note that controller delegation to less privileged code is only safe on the unified control group
|
||||
hierarchy. Accordingly, access to the specified controllers will not be granted to unprivileged services on
|
||||
the legacy hierarchy, even when requested.</para>
|
||||
|
||||
<para>The following controller names may be specified: <option>cpu</option>, <option>cpuacct</option>,
|
||||
<option>io</option>, <option>blkio</option>, <option>memory</option>, <option>devices</option>,
|
||||
<option>pids</option>. Not all of these controllers are available on all kernels however, and some are
|
||||
specific to the unified hierarchy while others are specific to the legacy hierarchy. Also note that the
|
||||
kernel might support further controllers, which aren't covered here yet as delegation is either not supported
|
||||
at all for them or not defined cleanly.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user