mirror of https://github.com/mkerrisk/man-pages
user_namespaces.7: Minor wording fix
Avoid listing all namespace types in a couple of places, since such a list is subject to bit rot as the number of namespace types grows. Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
parent
a3969b76b9
commit
06999763ba
|
@ -213,7 +213,7 @@ further removed descendant user namespaces as well.
|
||||||
.\"
|
.\"
|
||||||
.SS Interaction of user namespaces and other types of namespaces
|
.SS Interaction of user namespaces and other types of namespaces
|
||||||
Starting in Linux 3.8, unprivileged processes can create user namespaces,
|
Starting in Linux 3.8, unprivileged processes can create user namespaces,
|
||||||
and mount, PID, IPC, network, and UTS namespaces can be created with just the
|
and other the other types of namespaces can be created with just the
|
||||||
.B CAP_SYS_ADMIN
|
.B CAP_SYS_ADMIN
|
||||||
capability in the caller's user namespace.
|
capability in the caller's user namespace.
|
||||||
|
|
||||||
|
@ -240,7 +240,7 @@ privileges over the remaining namespaces created by the call.
|
||||||
Thus, it is possible for an unprivileged caller to specify this combination
|
Thus, it is possible for an unprivileged caller to specify this combination
|
||||||
of flags.
|
of flags.
|
||||||
|
|
||||||
When a new IPC, mount, network, PID, or UTS namespace is created via
|
When a new namespace (other than a user namespace) is created via
|
||||||
.BR clone (2)
|
.BR clone (2)
|
||||||
or
|
or
|
||||||
.BR unshare (2),
|
.BR unshare (2),
|
||||||
|
|
Loading…
Reference in New Issue