diff options
author | Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> | 2019-02-13 10:17:49 +0100 |
---|---|---|
committer | Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> | 2019-02-13 11:17:41 +0100 |
commit | e0e2ecd5a81106a477c8d08e081b77ac7d3b5bdc (patch) | |
tree | 440f8f27da3704c4158d84eac33e6da97e5cef44 /man | |
parent | test: replace echo with socat (diff) | |
download | systemd-e0e2ecd5a81106a477c8d08e081b77ac7d3b5bdc.tar.xz systemd-e0e2ecd5a81106a477c8d08e081b77ac7d3b5bdc.zip |
man: move entries to the right section in systemd.directives
They were in "miscellaneuos" because of the missing class= assignment.
Probably introduced when the split into sections was done.
Diffstat (limited to 'man')
-rw-r--r-- | man/systemd.exec.xml | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index eb476327aa..0248c3a8e0 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -393,7 +393,7 @@ CapabilityBoundingSet=~CAP_B CAP_C</programlisting> <refsect1> <title>Mandatory Access Control</title> - <variablelist> + <variablelist class='unit-directives'> <varlistentry> <term><varname>SELinuxContext=</varname></term> @@ -436,7 +436,7 @@ CapabilityBoundingSet=~CAP_B CAP_C</programlisting> <refsect1> <title>Process Properties</title> - <variablelist> + <variablelist class='unit-directives'> <varlistentry> <term><varname>LimitCPU=</varname></term> @@ -671,7 +671,7 @@ CapabilityBoundingSet=~CAP_B CAP_C</programlisting> <refsect1> <title>Scheduling</title> - <variablelist> + <variablelist class='unit-directives'> <varlistentry> <term><varname>Nice=</varname></term> @@ -764,7 +764,7 @@ CapabilityBoundingSet=~CAP_B CAP_C</programlisting> (such as <varname>ProtectSystem=</varname>) are not available, as the underlying kernel functionality is only accessible to privileged processes.</para> - <variablelist> + <variablelist class='unit-directives'> <varlistentry> <term><varname>ProtectSystem=</varname></term> @@ -1388,7 +1388,7 @@ RestrictNamespaces=~cgroup net</programlisting> <refsect1> <title>System Call Filtering</title> - <variablelist> + <variablelist class='unit-directives'> <varlistentry> <term><varname>SystemCallFilter=</varname></term> @@ -1627,7 +1627,7 @@ SystemCallErrorNumber=EPERM</programlisting> <refsect1> <title>Environment</title> - <variablelist> + <variablelist class='unit-directives'> <varlistentry> <term><varname>Environment=</varname></term> @@ -1742,7 +1742,7 @@ SystemCallErrorNumber=EPERM</programlisting> <refsect1> <title>Logging and Standard Input/Output</title> - <variablelist> + <variablelist class='unit-directives'> <varlistentry> <term><varname>StandardInput=</varname></term> @@ -2084,7 +2084,7 @@ StandardInputData=SWNrIHNpdHplIGRhIHVuJyBlc3NlIEtsb3BzLAp1ZmYgZWVtYWwga2xvcHAncy <refsect1> <title>System V Compatibility</title> - <variablelist> + <variablelist class='unit-directives'> <varlistentry> <term><varname>UtmpIdentifier=</varname></term> |