diff options
Diffstat (limited to 'man/system-or-user-ns.xml')
-rw-r--r-- | man/system-or-user-ns.xml | 19 |
1 files changed, 10 insertions, 9 deletions
diff --git a/man/system-or-user-ns.xml b/man/system-or-user-ns.xml index 532c1ef..b0f4247 100644 --- a/man/system-or-user-ns.xml +++ b/man/system-or-user-ns.xml @@ -1,20 +1,21 @@ <?xml version="1.0"?> -<!DOCTYPE book PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN" "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd"> +<!DOCTYPE refsect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN" "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd"> <!-- SPDX-License-Identifier: LGPL-2.1-or-later --> <refsect1> + <title/> -<para id="singular">This option is only available for system services, or for services running in per-user - instances of the service manager in which case <varname>PrivateUsers=</varname> is implicitly enabled - (requires unprivileged user namespaces support to be enabled in the kernel via the - <literal>kernel.unprivileged_userns_clone=</literal> sysctl).</para> + <para id="singular">This option is only available for system services, or for services running in per-user + instances of the service manager in which case <varname>PrivateUsers=</varname> is implicitly enabled + (requires unprivileged user namespaces support to be enabled in the kernel via the + <literal>kernel.unprivileged_userns_clone=</literal> sysctl).</para> -<para id="plural">These options are only available for system services, or for services running in per-user - instances of the service manager in which case <varname>PrivateUsers=</varname> is implicitly enabled - (requires unprivileged user namespaces support to be enabled in the kernel via the - <literal>kernel.unprivileged_userns_clone=</literal> sysctl).</para> + <para id="plural">These options are only available for system services, or for services running in per-user + instances of the service manager in which case <varname>PrivateUsers=</varname> is implicitly enabled + (requires unprivileged user namespaces support to be enabled in the kernel via the + <literal>kernel.unprivileged_userns_clone=</literal> sysctl).</para> </refsect1> |