X-Git-Url: http://git.ipfire.org/?a=blobdiff_plain;f=man%2Fsystemd.exec.xml;h=dfae0572d889f1ef06aaacf7f9ec1e8a16757f10;hb=44898c535889ce31257f895c5fbcdfcfb6817bc6;hp=a9f1d8d74e11342281ed7869529db094b4470d53;hpb=78e864e5b3cc11b72ae663f49f42f158cafbfedf;p=thirdparty%2Fsystemd.git diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index a9f1d8d74e1..dfae0572d88 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -81,26 +81,30 @@ - Automatic Dependencies - - A few execution parameters result in additional, automatic - dependencies to be added. - - Units with WorkingDirectory=, RootDirectory= or - RootImage= set automatically gain dependencies of type Requires= and - After= on all mount units required to access the specified paths. This is equivalent to having - them listed explicitly in RequiresMountsFor=. - - Similar, units with PrivateTmp= enabled automatically get mount unit dependencies for all - mounts required to access /tmp and /var/tmp. They will also gain an - automatic After= dependency on - systemd-tmpfiles-setup.service8. - - Units whose standard output or error output is connected to , - or (or their combinations with console output, see below) automatically acquire dependencies - of type After= on systemd-journald.socket. + Implicit Dependencies + + A few execution parameters result in additional, automatic dependencies to be added: + + + Units with WorkingDirectory=, RootDirectory=, RootImage=, + RuntimeDirectory=, StateDirectory=, CacheDirectory=, + LogsDirectory= or ConfigurationDirectory= set automatically gain dependencies + of type Requires= and After= on all mount units required to access the specified paths. + This is equivalent to having them listed explicitly in RequiresMountsFor=. + + Similar, units with PrivateTmp= enabled automatically get mount unit dependencies for all + mounts required to access /tmp and /var/tmp. They will also gain an + automatic After= dependency on + systemd-tmpfiles-setup.service8. + + Units whose standard output or error output is connected to , + or (or their combinations with console output, see below) automatically acquire dependencies + of type After= on systemd-journald.socket. + + + Options @@ -216,10 +220,13 @@ cannot leave files around after unit termination. Moreover ProtectSystem=strict and ProtectHome=read-only are implied, thus prohibiting the service to write to arbitrary file system locations. In order to allow the service to write to certain directories, they have to be whitelisted - using ReadWritePaths=, but care must be taken so that UID/GID recycling doesn't - create security issues involving files created by the service. Use RuntimeDirectory= (see - below) in order to assign a writable runtime directory to a service, owned by the dynamic user/group and - removed automatically when the unit is terminated. Defaults to off. + using ReadWritePaths=, but care must be taken so that UID/GID recycling doesn't create + security issues involving files created by the service. Use RuntimeDirectory= (see below) in + order to assign a writable runtime directory to a service, owned by the dynamic user/group and removed + automatically when the unit is terminated. Use StateDirectory=, + CacheDirectory= and LogsDirectory= in order to assign a set of writable + directories for specific purposes to the service in a way that they are protected from vulnerabilities due to + UID reuse (see below). Defaults to off. @@ -422,17 +429,17 @@ PassEnvironment= - Pass environment variables from the systemd system - manager to executed processes. Takes a space-separated list of variable - names. This option may be specified more than once, in which case all - listed variables will be set. If the empty string is assigned to this - option, the list of environment variables is reset, all prior - assignments have no effect. Variables that are not set in the system - manager will not be passed and will be silently ignored. + Pass environment variables set for the system service manager to executed processes. Takes a + space-separated list of variable names. This option may be specified more than once, in which case all listed + variables will be passed. If the empty string is assigned to this option, the list of environment variables to + pass is reset, all prior assignments have no effect. Variables specified that are not set for the system + manager will not be passed and will be silently ignored. Note that this option is only relevant for the system + service manager, as system services by default do not automatically inherit any environment variables set for + the service manager itself. However, in case of the user service manager all environment variables are passed + to the executed processes anyway, hence this option is without effect for the user service manager. - Variables passed from this setting are overridden by those passed - from Environment= or - EnvironmentFile=. + Variables set for invoked processes due to this setting are subject to being overridden by those + configured with Environment= or EnvironmentFile=. Example: PassEnvironment=VAR1 VAR2 VAR3 @@ -446,6 +453,30 @@ for details about environment variables. + + UnsetEnvironment= + + Explicitly unset environment variable assignments that would normally be passed from the + service manager to invoked processes of this unit. Takes a space-separated list of variable names or variable + assignments. This option may be specified more than once, in which case all listed variables/assignments will + be unset. If the empty string is assigned to this option, the list of environment variables/assignments to + unset is reset. If a variable assignment is specified (that is: a variable name, followed by + =, followed by its value), then any environment variable matching this precise assignment is + removed. If a variable name is specified (that is a variable name without any following = or + value), then any assignment matching the variable name, regardless of its value is removed. Note that the + effect of UnsetEnvironment= is applied as final step when the environment list passed to + executed processes is compiled. That means it may undo assignments from any configuration source, including + assignments made through Environment= or EnvironmentFile=, inherited from + the system manager's global set of environment variables, inherited via PassEnvironment=, + set by the service manager itself (such as $NOTIFY_SOCKET and such), or set by a PAM module + (in case PAMName= is used). + + + See + environ7 + for details about environment variables. + + StandardInput= Controls where file descriptor 0 (STDIN) of @@ -590,7 +621,7 @@ If the standard output (or error output, see below) of a unit is connected to the journal, syslog or the kernel log buffer, the unit will implicitly gain a dependency of type After= on - systemd-journald.socket (also see the automatic dependencies section above). + systemd-journald.socket (also see the "Implicit Dependencies" section above). This setting defaults to the value set with in @@ -908,7 +939,18 @@ Note that for each unit making use of this option a PAM session handler process will be maintained as part of the unit and stays around as long as the unit is active, to ensure that appropriate actions can be taken when the unit and hence the PAM session terminates. This process is named (sd-pam) and - is an immediate child process of the unit's main process. + is an immediate child process of the unit's main process. + + Note that when this option is used for a unit it is very likely (depending on PAM configuration) that the + main unit process will be migrated to its own session scope unit when it is activated. This process will hence + be associated with two units: the unit it was originally started from (and for which + PAMName= was configured), and the session scope unit. Any child processes of that process + will however be associated with the session scope unit only. This has implications when used in combination + with NotifyAccess=, as these child processes will not be able to affect + changes in the original unit through notification messages. These messages will be considered belonging to the + session scope unit and not the original unit. It is hence not recommended to use PAMName= in + combination with NotifyAccess=. + @@ -924,11 +966,21 @@ inverted. Note that this option also affects the respective capabilities in the effective, permitted and inheritable capability sets. If this option is not used, the capability bounding set is not modified on process execution, hence no limits on the capabilities of the process are enforced. This option may appear more than - once, in which case the bounding sets are merged. If the empty string is assigned to this option, the bounding - set is reset to the empty capability set, and all prior settings have no effect. If set to - ~ (without any further argument), the bounding set is reset to the full set of available + once, in which case the bounding sets are merged by AND, or by OR + if the lines are prefixed with ~ (see below). If the empty string is assigned + to this option, the bounding set is reset to the empty capability set, and all prior settings have no effect. + If set to ~ (without any further argument), the bounding set is reset to the full set of available capabilities, also undoing any previous settings. This does not affect commands prefixed with - +. + +. + + Example: if a unit has the following, + CapabilityBoundingSet=CAP_A CAP_B +CapabilityBoundingSet=CAP_B CAP_C + then CAP_A, CAP_B, and CAP_C are set. + If the second line is prefixed with ~, e.g., + CapabilityBoundingSet=CAP_A CAP_B +CapabilityBoundingSet=~CAP_B CAP_C + then, only CAP_A is set. @@ -937,7 +989,8 @@ Controls which capabilities to include in the ambient capability set for the executed process. Takes a whitespace-separated list of capability names, e.g. CAP_SYS_ADMIN, CAP_DAC_OVERRIDE, CAP_SYS_PTRACE. This option may appear more than - once in which case the ambient capability sets are merged. If the list of capabilities is prefixed with + once in which case the ambient capability sets are merged (see the above examples in + CapabilityBoundingSet=). If the list of capabilities is prefixed with ~, all but the listed capabilities will be included, the effect of the assignment inverted. If the empty string is assigned to this option, the ambient capability set is reset to the empty capability set, and all prior settings have no effect. If set to ~ (without any further @@ -1437,10 +1490,18 @@ + + @aio + Asynchronous I/O (io_setup2, io_submit2, and related calls) + @basic-io System calls for basic I/O: reading, writing, seeking, file descriptor duplication and closing (read2, write2, and related calls) + + @chown + Changing file ownership (chown2, fchownat2, and related calls) + @clock System calls for changing the system clock (adjtimex2, settimeofday2, and related calls) @@ -1469,6 +1530,10 @@ @keyring Kernel keyring access (keyctl2 and related calls) + + @memlock + Locking of memory into RAM (mlock2, mlockall2 and related calls) + @module Loading and unloading of kernel modules (init_module2, delete_module2 and related calls) @@ -1509,10 +1574,22 @@ @setuid System calls for changing user ID and group ID credentials, (setuid2, setgid2, setresuid2, …) + + @signal + System calls for manipulating and handling process signals (signal2, sigprocmask2, …) + @swap System calls for enabling/disabling swap devices (swapon2, swapoff2) + + @sync + Synchronizing files and memory to disk: (fsync2, msync2, and related calls) + + + @timer + System calls for scheduling operations by time (alarm2, timer_create2, …) + @@ -1656,7 +1733,7 @@ LockPersonality= - Locks down the Takes a boolean argument. If set, locks down the personality2 system call so that the kernel execution domain may not be changed from the default or the personality selected with Personality= directive. This may be useful to improve security, because odd personality @@ -1665,25 +1742,80 @@ NoNewPrivileges=yes is implied. + + KeyringMode= + + Controls how the kernel session keyring is set up for the service (see session-keyring7 for + details on the session keyring). Takes one of , , + . If set to no special keyring setup is done, and the kernel's + default behaviour is applied. If is used a new session keyring is allocated when a + service process is invoked, and it is not linked up with any user keyring. This is the recommended setting for + system services, as this ensures that multiple services running under the same system user ID (in particular + the root user) do not share their key material among each other. If is used a new + session keyring is allocated as for , but the user keyring of the user configured with + User= is linked into it, so that keys assigned to the user may be requested by the unit's + processes. In this modes multiple units running processes under the same user ID may share key material. Unless + is selected the unique invocation ID for the unit (see below) is added as a protected + key by the name invocation_id to the newly created session keyring. Defaults to + for the system service manager and to for the user service + manager. + + RuntimeDirectory= + StateDirectory= + CacheDirectory= + LogsDirectory= + ConfigurationDirectory= - Takes a whitespace-separated list of directory names. The specified directory names must be - relative, and may not include . or ... If set, one or more directories - including their parents by the specified names will be created below /run (for system - services) or below $XDG_RUNTIME_DIR (for user services) when the unit is started. The - lowest subdirectories are removed when the unit is stopped. It is possible to preserve the directories if - RuntimeDirectoryPreserve= is configured to or . - The lowest subdirectories will have the access mode specified in RuntimeDirectoryMode=, - and be owned by the user and group specified in User= and Group=. - This implies ReadWritePaths=, that is, the directories specified - in this option are accessible with the access mode specified in RuntimeDirectoryMode= - even if ProtectSystem= is set to . - Use this to manage one or more runtime directories of the unit and bind their - lifetime to the daemon runtime. This is particularly useful for unprivileged daemons that cannot create + These options take a whitespace-separated list of directory names. The specified directory + names must be relative, and may not include . or ... If set, one or more + directories by the specified names will be created (including their parents) below /run + (or $XDG_RUNTIME_DIR for user services), /var/lib (or + $XDG_CONFIG_HOME for user services), /var/cache (or + $XDG_CACHE_HOME for user services), /var/log (or + $XDG_CONFIG_HOME/log for user services), or /etc + (or $XDG_CONFIG_HOME for user services), respectively, when the unit is started. + + In case of RuntimeDirectory= the lowest subdirectories are removed when the unit is + stopped. It is possible to preserve the specified directories in this case if + RuntimeDirectoryPreserve= is configured to or + (see below). The directories specified with StateDirectory=, + CacheDirectory=, LogsDirectory=, + ConfigurationDirectory= are not removed when the unit is stopped. + + Except in case of ConfigurationDirectory=, the innermost specified directories will be + owned by the user and group specified in User= and Group=. If the + specified directories already exist and their owning user or group do not match the configured ones, all files + and directories below the specified directories as well as the directories themselves will have their file + ownership recursively changed to match what is configured. As an optimization, if the specified directories are + already owned by the right user and group, files and directories below of them are left as-is, even if they do + not match what is requested. The innermost specified directories will have their access mode adjusted to the + what is specified in RuntimeDirectoryMode=, StateDirectoryMode=, + CacheDirectoryMode=, LogsDirectoryMode= and + ConfigurationDirectoryMode=. + + Except in case of ConfigurationDirectory=, these options imply + ReadWritePaths= for the specified paths. When combined with + RootDirectory= or RootImage= these paths always reside on the host and + are mounted from there into the unit's file system namespace. If DynamicUser= is used in + conjunction with RuntimeDirectory=, StateDirectory=, + CacheDirectory= and LogsDirectory=, the behaviour of these options is + slightly altered: the directories are created below /run/private, + /var/lib/private, /var/cache/private and + /var/log/private, respectively, which are host directories made inaccessible to + unprivileged users, which ensures that access to these directories cannot be gained through dynamic user ID + recycling. Symbolic links are created to hide this difference in behaviour. Both from perspective of the host + and from inside the unit, the relevant directories hence always appear directly below + /run, /var/lib, /var/cache and + /var/log. + + Use RuntimeDirectory= to manage one or more runtime directories for the unit and bind + their lifetime to the daemon runtime. This is particularly useful for unprivileged daemons that cannot create runtime directories in /run due to lack of privileges, and to make sure the runtime - directory is cleaned up automatically after use. For runtime directories that require more complex or - different configuration or lifetime guarantees, please consider using + directory is cleaned up automatically after use. For runtime directories that require more complex or different + configuration or lifetime guarantees, please consider using tmpfiles.d5. Example: if a system service unit has the following, @@ -1693,22 +1825,7 @@ except /run/foo are owned by the user and group specified in User= and Group=, and removed when the service is stopped. - - - StateDirectory= - CacheDirectory= - LogsDirectory= - ConfigurationDirectory= - - Takes a whitespace-separated list of directory names. If set, as similar to - RuntimeDirectory=, one or more directories including their parents by the specified names - will be created below /var/lib, /var/cache, /var/log, - or /etc, respectively, when the unit is started. - Unlike RuntimeDirectory=, the directories are not removed when the unit is stopped. - The lowest subdirectories will be owned by the user and group specified in User= - and Group=. The options imply ReadWritePaths=. - @@ -1787,12 +1904,38 @@ Environment variables in spawned processes - Processes started by the system are executed in a clean - environment in which select variables listed below are set. System - processes started by systemd do not inherit variables from PID 1, - but processes started by user systemd instances inherit all - environment variables from the user systemd instance. - + Processes started by the service manager are executed with an environment variable block assembled from + multiple sources. Processes started by the system service manager generally do not inherit environment variables + set for the service manager itself (but this may be altered via PassEnvironment=), but processes + started by the user service manager instances generally do inherit all environment variables set for the service + manager itself. + + For each invoked process the list of environment variables set is compiled from the following sources: + + + Variables globally configured for the service manager, using the + DefaultEnvironment= setting in + systemd-system.conf5, the kernel command line option systemd.setenv= (see + systemd1) or via + systemctl set-environment (see systemctl1). + + Variables defined by the service manager itself (see the list below) + + Variables set in the service manager's own environment variable block (subject to PassEnvironment= for the system service manager) + + Variables set via Environment= in the unit file + + Variables read from files specified via EnvironmentFiles= in the unit file + + Variables set by any PAM modules in case PAMName= is in effect, cf. pam_env8 + + + If the same environment variables are set by multiple of these sources, the later source — according to the + order of the list above — wins. Note that as final step all variables listed in + UnsetEnvironment= are removed again from the compiled environment variable list, immediately + before it is passed to the executed process. + + The following select environment variables are set by the service manager itself for each invoked process: @@ -1931,6 +2074,12 @@ $JOURNAL_STREAM is set at all as services might invoke external processes replacing their standard output or standard error output, without unsetting the environment variable. + If both standard output and standard error of the executed processes are connected to the journal via a + stream socket, this environment variable will contain information about the standard error stream, as that's + usually the preferred destination for log data. (Note that typically the same stream is used for both standard + output and standard error, hence very likely the environment variable contains device and inode information + matching both stream file descriptors.) + This environment variable is primarily useful to allow services to optionally upgrade their used log protocol to the native journal protocol (using sd_journal_print3 and other @@ -1943,15 +2092,60 @@ Only defined for the service unit type, this environment variable is passed to all ExecStop= and ExecStopPost= processes, and encodes the service - "result". Currently, the following values are defined: protocol (in case of a protocol - violation; if a service did not take the steps required by its unit configuration), timeout - (in case of an operation timeout), exit-code (if a service process exited with a non-zero - exit code; see $EXIT_CODE below for the actual exit code returned), signal - (if a service process was terminated abnormally by a signal; see $EXIT_CODE below for the - actual signal used for the termination), core-dump (if a service process terminated - abnormally and dumped core), watchdog (if the watchdog keep-alive ping was enabled for the - service but it missed the deadline), or resources (a catch-all condition in case a system - operation failed). + "result". Currently, the following values are defined: + + + Defined <varname>$SERVICE_RESULT</varname> values + + + + + + Value + Meaning + + + + + + success + The service ran successfully and exited cleanly. + + + protocol + A protocol violation occurred: the service did not take the steps required by its unit configuration (specifically what is configured in its Type= setting). + + + timeout + One of the steps timed out. + + + exit-code + Service process exited with a non-zero exit code; see $EXIT_CODE below for the actual exit code returned. + + + signal + A service process was terminated abnormally by a signal, without dumping core. See $EXIT_CODE below for the actual signal causing the termination. + + + core-dump + A service process terminated abnormally with a signal and dumped core. See $EXIT_CODE below for the signal causing the termination. + + + watchdog + Watchdog keep-alive ping was enabled for the service, but the deadline was missed. + + + start-limit-hit + A start limit was defined for the unit and it was hit, causing the unit to fail to start. See systemd.unit5's StartLimitIntervalSec= and StartLimitBurst= for details. + + + resources + A catch-all condition in case a system operation failed. + + + +
This environment variable is useful to monitor failure or successful termination of a service. Even though this variable is available in both ExecStop= and ExecStopPost=, it @@ -1989,6 +2183,11 @@ + + success + exited + 0 + protocol not set @@ -1998,7 +2197,6 @@ exited 0 - timeout killed @@ -2009,26 +2207,22 @@ 0, 1, 2, 3, …, 255 - exit-code exited - 0, 1, 2, 1, 2, 3, …, 255 - signal killed HUP, INT, KILL, … - core-dump dumped ABRT, SEGV, QUIT, … - watchdog dumped @@ -2043,15 +2237,18 @@ 0, 1, 2, 3, …, 255 - + + start-limit-hit + not set + not set + resources any of the above any of the above - - Note: the process may be also terminated by a signal not sent by systemd. In particular the process may send an arbitrary signal to itself in a handler for any of the non-maskable signals. Nevertheless, in the timeout and watchdog rows above only the signals that systemd sends have been included. + Note: the process may be also terminated by a signal not sent by systemd. In particular the process may send an arbitrary signal to itself in a handler for any of the non-maskable signals. Nevertheless, in the timeout and watchdog rows above only the signals that systemd sends have been included. Moreover, using SuccessExitStatus= additional exit statuses may be declared to indicate clean termination, which is not reflected by this table. @@ -2060,18 +2257,316 @@
+
+ + + Process exit codes + + When invoking a unit process the service manager possibly fails to apply the execution parameters configured + with the settings above. In that case the already created service process will exit with a non-zero exit code + before the configured command line is executed. (Or in other words, the child process possibly exits with these + error codes, after having been created by the fork2 system call, but + before the matching execve2 system call is + called.) Specifically, exit codes defined by the C library, by the LSB specification and by the systemd service + manager itself are used. + + The following basic service exit codes are defined by the C library. + + + Basic C library exit codes + + + + Exit Code + Symbolic Name + Description + + + + + 0 + EXIT_SUCCESS + Generic success code. + + + 1 + EXIT_FAILURE + Generic failure or unspecified error. + + + +
+ + The following service exit codes are defined by the LSB specification + . + - Additional variables may be configured by the following - means: for processes spawned in specific units, use the - Environment=, EnvironmentFile= - and PassEnvironment= options above; to specify - variables globally, use DefaultEnvironment= - (see - systemd-system.conf5) - or the kernel option systemd.setenv= (see - systemd1). - Additional variables may also be set through PAM, - cf. pam_env8. + + LSB service exit codes + + + + Exit Code + Symbolic Name + Description + + + + + 2 + EXIT_INVALIDARGUMENT + Invalid or excess arguments. + + + 3 + EXIT_NOTIMPLEMENTED + Unimplemented feature. + + + 4 + EXIT_NOPERMISSION + The user has insufficient privileges. + + + 5 + EXIT_NOTINSTALLED + The program is not installed. + + + 6 + EXIT_NOTCONFIGURED + The program is not configured. + + + 7 + EXIT_NOTRUNNING + The program is not running. + + + +
+ + + The LSB specification suggests that error codes 200 and above are reserved for implementations. Some of them are + used by the service manager to indicate problems during process invocation: + + + systemd-specific exit codes + + + + Exit Code + Symbolic Name + Description + + + + + 200 + EXIT_CHDIR + Changing to the requested working directory failed. See WorkingDirectory= above. + + + 201 + EXIT_NICE + Failed to set up process scheduling priority (nice level). See Nice= above. + + + 202 + EXIT_FDS + Failed to close unwanted file descriptors, or to adjust passed file descriptors. + + + 203 + EXIT_EXEC + The actual process execution failed (specifically, the execve2 system call). Most likely this is caused by a missing or non-accessible executable file. + + + 204 + EXIT_MEMORY + Failed to perform an action due to memory shortage. + + + 205 + EXIT_LIMITS + Failed to adjust resoure limits. See LimitCPU= and related settings above. + + + 206 + EXIT_OOM_ADJUST + Failed to adjust the OOM setting. See OOMScoreAdjust= above. + + + 207 + EXIT_SIGNAL_MASK + Failed to set process signal mask. + + + 208 + EXIT_STDIN + Failed to set up standard input. See StandardInput= above. + + + 209 + EXIT_STDOUT + Failed to set up standard output. See StandardOutput= above. + + + 210 + EXIT_CHROOT + Failed to change root directory (chroot2). See RootDirectory=/RootImage= above. + + + 211 + EXIT_IOPRIO + Failed to set up IO scheduling priority. See IOSchedulingClass=/IOSchedulingPriority= above. + + + 212 + EXIT_TIMERSLACK + Failed to set up timer slack. See TimerSlackNSec= above. + + + 213 + EXIT_SECUREBITS + Failed to set process secure bits. See SecureBits= above. + + + 214 + EXIT_SETSCHEDULER + Failed to set up CPU scheduling. See CPUSchedulingPolicy=/CPUSchedulingPriority= above. + + + 215 + EXIT_CPUAFFINITY + Failed to set up CPU affinity. See CPUAffinity= above. + + + 216 + EXIT_GROUP + Failed to determine or change group credentials. See Group=/SupplementaryGroups= above. + + + 217 + EXIT_USER + Failed to determine or change user credentials, or to set up user namespacing. See User=/PrivateUsers= above. + + + 218 + EXIT_CAPABILITIES + Failed to drop capabilities, or apply ambient capabilities. See CapabilityBoundingSet=/AmbientCapabilities= above. + + + 219 + EXIT_CGROUP + Setting up the service control group failed. + + + 220 + EXIT_SETSID + Failed to create new process session. + + + 221 + EXIT_CONFIRM + Execution has been cancelled by the user. See the systemd.confirm_spawn= kernel command line setting on kernel-command-line7 for details. + + + 222 + EXIT_STDERR + Failed to set up standard error output. See StandardError= above. + + + 224 + EXIT_PAM + Failed to set up PAM session. See PAMName= above. + + + 225 + EXIT_NETWORK + Failed to set up network namespacing. See PrivateNetwork= above. + + + 226 + EXIT_NAMESPACE + Failed to set up mount namespacing. See ReadOnlyPaths= and related settings above. + + + 227 + EXIT_NO_NEW_PRIVILEGES + Failed to disable new priviliges. See NoNewPrivileges=yes above. + + + 228 + EXIT_SECCOMP + Failed to apply system call filters. See SystemCallFilter= and related settings above. + + + 229 + EXIT_SELINUX_CONTEXT + Determining or changing SELinux context failed. See SELinuxContext= above. + + + 230 + EXIT_PERSONALITY + Failed to set up a execution domain (personality). See Personality= above. + + + 231 + EXIT_APPARMOR_PROFILE + Failed to prepare changing AppArmor profile. See AppArmorProfile= above. + + + 232 + EXIT_ADDRESS_FAMILIES + Failed to restrict address families. See RestrictAddressFamilies= above. + + + 233 + EXIT_RUNTIME_DIRECTORY + Setting up runtime directory failed. See RuntimeDirectory= and related settings above. + + + 235 + EXIT_CHOWN + Failed to adjust socket ownership. Used for socket units only. + + + 236 + EXIT_SMACK_PROCESS_LABEL + Failed to set SMACK label. See SmackProcessLabel= above. + + + 237 + EXIT_KEYRING + Failed to set up kernel keyring. + + + 238 + EXIT_STATE_DIRECTORY + Failed to set up a the unit's state directory. See StateDirectory= above. + + + 239 + EXIT_CACHE_DIRECTORY + Failed to set up a the unit's cache directory. See CacheDirectory= above. + + + 240 + EXIT_LOGS_DIRECTORY + Failed to set up a the unit's logging directory. See LogsDirectory= above. + + + 241 + EXIT_CONFIGURATION_DIRECTORY + Failed to set up a the unit's configuration directory. See ConfigurationDirectory= above. + + + +