diff options
author | Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> | 2017-01-11 15:23:00 -0500 |
---|---|---|
committer | Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> | 2017-01-11 15:23:00 -0500 |
commit | 374e69225215aa25ea67b166ec4b61ad628d5021 (patch) | |
tree | 4f541fea1553aac429e6b326c423e86dfa62dd29 | |
parent | 6539dd7c42946d9ba5dc43028b8b5785eb2db3c5 (diff) | |
parent | 4b957756b829a861da007908b31c2c89255802d8 (diff) |
Merge pull request #5009 from ian-kelling/ian-mnt-namespace-doc
-rw-r--r-- | man/systemd.exec.xml | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index d2553b287c..7bdac1c1d5 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -1184,7 +1184,11 @@ details. Defaults to <option>shared</option>. Use <option>shared</option> to ensure that mounts and unmounts are propagated from systemd's namespace to the service's namespace and vice versa. Use <option>slave</option> to run processes so that none of their mounts and unmounts will propagate to the host. Use <option>private</option> - to also ensure that no mounts and unmounts from the host will propagate into the unit processes' namespace. Note that + to also ensure that no mounts and unmounts from the host will propagate into the unit processes' namespace. + If this is set to <option>slave</option> or <option>private</option>, any mounts created by spawned processes + will be unmounted after the completion of the current command line of <varname>ExecStartPre=</varname>, + <varname>ExecStartPost=</varname>, <varname>ExecStart=</varname>, + and <varname>ExecStopPost=</varname>. Note that <option>slave</option> means that file systems mounted on the host might stay mounted continuously in the unit's namespace, and thus keep the device busy. Note that the file system namespace related options (<varname>PrivateTmp=</varname>, <varname>PrivateDevices=</varname>, <varname>ProtectSystem=</varname>, |