mirror of https://github.com/mkerrisk/man-pages
user_namespaces.7: srcfix: remove redundant .PP after .SS
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
parent
312b0eb182
commit
c65f02bae3
|
@ -495,7 +495,6 @@ confusion when using these interfaces.
|
|||
.\" ============================================================
|
||||
.\"
|
||||
.SS Defining user and group ID mappings: writing to uid_map and gid_map
|
||||
.PP
|
||||
After the creation of a new user namespace, the
|
||||
.I uid_map
|
||||
file of
|
||||
|
@ -812,7 +811,6 @@ by denying any pathway for an unprivileged process to drop groups with
|
|||
.\" ============================================================
|
||||
.\"
|
||||
.SS Unmapped user and group IDs
|
||||
.PP
|
||||
There are various places where an unmapped user ID (group ID)
|
||||
may be exposed to user space.
|
||||
For example, the first process in a new user namespace may call
|
||||
|
@ -872,7 +870,6 @@ that field is displayed as 4294967295 (\-1 as an unsigned integer).
|
|||
.\" ============================================================
|
||||
.\"
|
||||
.SS Accessing files
|
||||
.PP
|
||||
In order to determine permissions when an unprivileged process accesses a file,
|
||||
the process credentials (UID, GID) and the file credentials
|
||||
are in effect mapped back to what they would be in
|
||||
|
@ -884,7 +881,6 @@ permissions mask accessibility model, such as System V IPC objects
|
|||
.\" ============================================================
|
||||
.\"
|
||||
.SS Operation of file-related capabilities
|
||||
.PP
|
||||
Certain capabilities allow a process to bypass various
|
||||
kernel-enforced restrictions when performing operations on
|
||||
files owned by other users or groups.
|
||||
|
@ -920,7 +916,6 @@ at least the file's user ID has a mapping in the user namespace
|
|||
.\" ============================================================
|
||||
.\"
|
||||
.SS Set-user-ID and set-group-ID programs
|
||||
.PP
|
||||
When a process inside a user namespace executes
|
||||
a set-user-ID (set-group-ID) program,
|
||||
the process's effective user (group) ID inside the namespace is changed
|
||||
|
@ -940,7 +935,6 @@ flag, as described in
|
|||
.\" ============================================================
|
||||
.\"
|
||||
.SS Miscellaneous
|
||||
.PP
|
||||
When a process's user and group IDs are passed over a UNIX domain socket
|
||||
to a process in a different user namespace (see the description of
|
||||
.B SCM_CREDENTIALS
|
||||
|
|
Loading…
Reference in New Issue