From: David Tardon Date: Tue, 26 Dec 2023 07:59:53 +0000 (+0100) Subject: man: fix indentation X-Git-Tag: v256-rc1~1378^2~8 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=b3579feb5913326e0427dd6c1a7a5a4885e4e4d8;p=thirdparty%2Fsystemd.git man: fix indentation --- diff --git a/man/system-only.xml b/man/system-only.xml index c59e05cdd1b..944be559f54 100644 --- a/man/system-only.xml +++ b/man/system-only.xml @@ -8,10 +8,10 @@ -<para id="singular">This option is only available for system services and is not supported for services -running in per-user instances of the service manager.</para> + <para id="singular">This option is only available for system services and is not supported for services + running in per-user instances of the service manager.</para> -<para id="plural">These options are only available for system services and are not supported for services -running in per-user instances of the service manager.</para> + <para id="plural">These options are only available for system services and are not supported for services + running in per-user instances of the service manager.</para> </refsect1> diff --git a/man/system-or-user-ns.xml b/man/system-or-user-ns.xml index a36cee78896..b0f4247cacd 100644 --- a/man/system-or-user-ns.xml +++ b/man/system-or-user-ns.xml @@ -8,14 +8,14 @@ <refsect1> <title/> -<para id="singular">This option is only available for system services, or for services running in per-user - instances of the service manager in which case <varname>PrivateUsers=</varname> is implicitly enabled - (requires unprivileged user namespaces support to be enabled in the kernel via the - <literal>kernel.unprivileged_userns_clone=</literal> sysctl).</para> + <para id="singular">This option is only available for system services, or for services running in per-user + instances of the service manager in which case <varname>PrivateUsers=</varname> is implicitly enabled + (requires unprivileged user namespaces support to be enabled in the kernel via the + <literal>kernel.unprivileged_userns_clone=</literal> sysctl).</para> -<para id="plural">These options are only available for system services, or for services running in per-user - instances of the service manager in which case <varname>PrivateUsers=</varname> is implicitly enabled - (requires unprivileged user namespaces support to be enabled in the kernel via the - <literal>kernel.unprivileged_userns_clone=</literal> sysctl).</para> + <para id="plural">These options are only available for system services, or for services running in per-user + instances of the service manager in which case <varname>PrivateUsers=</varname> is implicitly enabled + (requires unprivileged user namespaces support to be enabled in the kernel via the + <literal>kernel.unprivileged_userns_clone=</literal> sysctl).</para> </refsect1>