mirror of https://github.com/mkerrisk/man-pages
user_namespaces.7: Minor wording fix
Avoid listing all namespace types in a couple of places, since such a list is subject to bit rot as the number of namespace types grows. Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
parent
a3969b76b9
commit
06999763ba
|
@ -213,7 +213,7 @@ further removed descendant user namespaces as well.
|
|||
.\"
|
||||
.SS Interaction of user namespaces and other types of namespaces
|
||||
Starting in Linux 3.8, unprivileged processes can create user namespaces,
|
||||
and mount, PID, IPC, network, and UTS namespaces can be created with just the
|
||||
and other the other types of namespaces can be created with just the
|
||||
.B CAP_SYS_ADMIN
|
||||
capability in the caller's user namespace.
|
||||
|
||||
|
@ -240,7 +240,7 @@ privileges over the remaining namespaces created by the call.
|
|||
Thus, it is possible for an unprivileged caller to specify this combination
|
||||
of flags.
|
||||
|
||||
When a new IPC, mount, network, PID, or UTS namespace is created via
|
||||
When a new namespace (other than a user namespace) is created via
|
||||
.BR clone (2)
|
||||
or
|
||||
.BR unshare (2),
|
||||
|
|
Loading…
Reference in New Issue