user_namespaces.7: Minor wording fix

Avoid listing all namespace types in a couple of places,
since such a list is subject to bit rot as the number
of namespace types grows.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2016-06-21 09:43:34 +02:00
parent a3969b76b9
commit 06999763ba
1 changed files with 2 additions and 2 deletions

View File

@ -213,7 +213,7 @@ further removed descendant user namespaces as well.
.\"
.SS Interaction of user namespaces and other types of namespaces
Starting in Linux 3.8, unprivileged processes can create user namespaces,
and mount, PID, IPC, network, and UTS namespaces can be created with just the
and other the other types of namespaces can be created with just the
.B CAP_SYS_ADMIN
capability in the caller's user namespace.
@ -240,7 +240,7 @@ privileges over the remaining namespaces created by the call.
Thus, it is possible for an unprivileged caller to specify this combination
of flags.
When a new IPC, mount, network, PID, or UTS namespace is created via
When a new namespace (other than a user namespace) is created via
.BR clone (2)
or
.BR unshare (2),