setns.2: wfix

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2013-02-26 14:10:40 +01:00
parent edc3c3b4c0
commit 7fc8e5ece2
1 changed files with 3 additions and 4 deletions

View File

@ -102,10 +102,10 @@ This prevents a caller that has dropped capabilities from regaining
those capabilities via a call to
.BR setns ().
A process reassociating itself with a user namespace must have
A process reassociating itself with a user namespace must have the
.B CAP_SYS_ADMIN
.\" See kernel/user_namespace.c:userns_install() [3.8 source]
privileges in the target user namespace.
capability in the target user namespace.
Upon successfully joining a user namespace,
a process is granted all capabilities in that namespace,
regardless of its user and group IDs.
@ -148,8 +148,7 @@ in which it is already a member.
Cannot allocate sufficient memory to change the specified namespace.
.TP
.B EPERM
The calling thread did not have the required privilege
.RB ( CAP_SYS_ADMIN )
The calling thread did not have the required capability
for this operation.
.SH VERSIONS
The