setns.2: tfix

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2013-03-07 09:44:32 +01:00
parent 7fc8e5ece2
commit 5c67baab4f
1 changed files with 2 additions and 2 deletions

View File

@ -93,7 +93,7 @@ PID namespace specified by
is a descendant (child, grandchild, etc.) is a descendant (child, grandchild, etc.)
of the PID namespace of the caller. of the PID namespace of the caller.
A multi-threaded process may not change user namespace with A multithreaded process may not change user namespace with
.BR setns (). .BR setns ().
It is not permitted to use It is not permitted to use
.BR setns () .BR setns ()
@ -111,7 +111,7 @@ a process is granted all capabilities in that namespace,
regardless of its user and group IDs. regardless of its user and group IDs.
A process may not be reassociated with a new mount namespace if it is A process may not be reassociated with a new mount namespace if it is
multi-threaded. multithreaded.
.\" Above check is in fs/namespace.c:mntns_install() [3.8 source] .\" Above check is in fs/namespace.c:mntns_install() [3.8 source]
Changing the mount namespace requires that the caller possess both Changing the mount namespace requires that the caller possess both
.B CAP_SYS_CHROOT .B CAP_SYS_CHROOT