mirror of https://github.com/mkerrisk/man-pages
setns.2: ffix: add some paragraph breaks
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
parent
8e23f12b17
commit
2e4a22de93
|
@ -112,14 +112,17 @@ capability in the target user namespace.
|
||||||
Upon successfully joining a user namespace,
|
Upon successfully joining a user namespace,
|
||||||
a process is granted all capabilities in that namespace,
|
a process is granted all capabilities in that namespace,
|
||||||
regardless of its user and group IDs.
|
regardless of its user and group IDs.
|
||||||
|
.IP
|
||||||
A multithreaded process may not change user namespace with
|
A multithreaded process may not change user namespace with
|
||||||
.BR setns ().
|
.BR setns ().
|
||||||
|
.IP
|
||||||
It is not permitted to use
|
It is not permitted to use
|
||||||
.BR setns ()
|
.BR setns ()
|
||||||
to reenter the caller's current user namespace.
|
to reenter the caller's current user namespace.
|
||||||
This prevents a caller that has dropped capabilities from regaining
|
This prevents a caller that has dropped capabilities from regaining
|
||||||
those capabilities via a call to
|
those capabilities via a call to
|
||||||
.BR setns ().
|
.BR setns ().
|
||||||
|
.IP
|
||||||
For security reasons,
|
For security reasons,
|
||||||
.\" commit e66eded8309ebf679d3d3c1f5820d1f2ca332c71
|
.\" commit e66eded8309ebf679d3d3c1f5820d1f2ca332c71
|
||||||
.\" https://lwn.net/Articles/543273/
|
.\" https://lwn.net/Articles/543273/
|
||||||
|
@ -129,6 +132,7 @@ filesystem-related attributes
|
||||||
.BR clone (2)
|
.BR clone (2)
|
||||||
.B CLONE_FS
|
.B CLONE_FS
|
||||||
flag) with another process.
|
flag) with another process.
|
||||||
|
.IP
|
||||||
For further details on user namespaces, see
|
For further details on user namespaces, see
|
||||||
.BR user_namespaces (7).
|
.BR user_namespaces (7).
|
||||||
.TP
|
.TP
|
||||||
|
@ -136,6 +140,7 @@ Mount namespaces
|
||||||
A process may not be reassociated with a new mount namespace if it is
|
A process may not be reassociated with a new mount namespace if it is
|
||||||
multithreaded.
|
multithreaded.
|
||||||
.\" Above check is in fs/namespace.c:mntns_install() [3.8 source]
|
.\" Above check is in fs/namespace.c:mntns_install() [3.8 source]
|
||||||
|
.IP
|
||||||
Changing the mount namespace requires that the caller possess both
|
Changing the mount namespace requires that the caller possess both
|
||||||
.B CAP_SYS_CHROOT
|
.B CAP_SYS_CHROOT
|
||||||
and
|
and
|
||||||
|
@ -143,6 +148,7 @@ and
|
||||||
capabilities in its own user namespace and
|
capabilities in its own user namespace and
|
||||||
.BR CAP_SYS_ADMIN
|
.BR CAP_SYS_ADMIN
|
||||||
in the the user namespace that owns the target mount namespace.
|
in the the user namespace that owns the target mount namespace.
|
||||||
|
.IP
|
||||||
See
|
See
|
||||||
.BR user_namespaces (7)
|
.BR user_namespaces (7)
|
||||||
for details on the interaction of user namespaces and mount namespaces.
|
for details on the interaction of user namespaces and mount namespaces.
|
||||||
|
|
Loading…
Reference in New Issue