summaryrefslogtreecommitdiffstats
path: root/man/system-or-user-ns.xml
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-06-12 03:50:42 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-06-12 03:50:42 +0000
commit78e9bb837c258ac0ec7712b3d612cc2f407e731e (patch)
treef515d16b6efd858a9aeb5b0ef5d6f90bf288283d /man/system-or-user-ns.xml
parentAdding debian version 255.5-1. (diff)
downloadsystemd-78e9bb837c258ac0ec7712b3d612cc2f407e731e.tar.xz
systemd-78e9bb837c258ac0ec7712b3d612cc2f407e731e.zip
Merging upstream version 256.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'man/system-or-user-ns.xml')
-rw-r--r--man/system-or-user-ns.xml19
1 files changed, 10 insertions, 9 deletions
diff --git a/man/system-or-user-ns.xml b/man/system-or-user-ns.xml
index 532c1ef..b0f4247 100644
--- a/man/system-or-user-ns.xml
+++ b/man/system-or-user-ns.xml
@@ -1,20 +1,21 @@
<?xml version="1.0"?>
-<!DOCTYPE book PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN" "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd">
+<!DOCTYPE refsect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN" "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd">
<!--
SPDX-License-Identifier: LGPL-2.1-or-later
-->
<refsect1>
+ <title/>
-<para id="singular">This option is only available for system services, or for services running in per-user
- instances of the service manager in which case <varname>PrivateUsers=</varname> is implicitly enabled
- (requires unprivileged user namespaces support to be enabled in the kernel via the
- <literal>kernel.unprivileged_userns_clone=</literal> sysctl).</para>
+ <para id="singular">This option is only available for system services, or for services running in per-user
+ instances of the service manager in which case <varname>PrivateUsers=</varname> is implicitly enabled
+ (requires unprivileged user namespaces support to be enabled in the kernel via the
+ <literal>kernel.unprivileged_userns_clone=</literal> sysctl).</para>
-<para id="plural">These options are only available for system services, or for services running in per-user
- instances of the service manager in which case <varname>PrivateUsers=</varname> is implicitly enabled
- (requires unprivileged user namespaces support to be enabled in the kernel via the
- <literal>kernel.unprivileged_userns_clone=</literal> sysctl).</para>
+ <para id="plural">These options are only available for system services, or for services running in per-user
+ instances of the service manager in which case <varname>PrivateUsers=</varname> is implicitly enabled
+ (requires unprivileged user namespaces support to be enabled in the kernel via the
+ <literal>kernel.unprivileged_userns_clone=</literal> sysctl).</para>
</refsect1>