Skip to content

Commit a4e9e02

Browse files
poetteringbluca
authored andcommitted
wishlist: minor tweaks
1 parent 6c5abc6 commit a4e9e02

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ being released, not the devices being closed.
5454

5555
### Auxiliary socket message describing the sender's cgroup
5656

57-
`SCM_CGROUP` or a similar auxiliary socket message, that allows
57+
`SCM_CGROUPID` or a similar auxiliary socket message, that allows
5858
receivers to figure out which cgroup a sender is part of.
5959

6060
**Use-Case:** `systemd-journald` picks up cgroup information from
@@ -327,7 +327,7 @@ impossible in languages that do not allow `fork()` without `execve()`.
327327
block device probing via flock(). Often userspace wants to wait
328328
for that, but without risking to hang forever.
329329

330-
### Extend `mount_setattr()` to allow changing mount properties ignoring any failures
330+
### Extend `mount_setattr()` to allow changing mount properties ignoring any failures
331331

332332
**Use-Case:** workloads that know that there are mounts in a mount tree
333333
whose attributes cannot be changed by the caller don't want
@@ -638,7 +638,7 @@ to safely and race-freely invoke processes, but the fact that `comm`
638638
is useless after invoking a process that way makes the call
639639
unfortunately hard to use for systemd.
640640

641-
### Path-based ACL management
641+
### Path-based ACL management in an LSM hook
642642

643643
The LSM module API should have the ability to do path-based (not
644644
just inode-based) ACL management.
@@ -720,7 +720,7 @@ in case the process dies and its PID is quickly recycled. (This
720720
assumes systemd can acquire a pidfd of the foreign process without
721721
races, for example via `SCM_PIDFD` and `SO_PEERPIDFD` or similar.)
722722

723-
### Ability to put user xattrs on `S_IFSOCK` socket inodes
723+
### Ability to put user xattrs on `S_IFSOCK` socket entrypoint inodes in the file system
724724

725725
Currently, the kernel only allows extended attributes in the
726726
`user.*` namespace to be attached to directory and regular file

0 commit comments

Comments
 (0)