user_namespaces.7: srcfix: remove redundant .PP after .SS

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2020-12-27 10:59:08 +01:00
parent 312b0eb182
commit c65f02bae3
1 changed files with 0 additions and 6 deletions

View File

@ -495,7 +495,6 @@ confusion when using these interfaces.
.\" ============================================================
.\"
.SS Defining user and group ID mappings: writing to uid_map and gid_map
.PP
After the creation of a new user namespace, the
.I uid_map
file of
@ -812,7 +811,6 @@ by denying any pathway for an unprivileged process to drop groups with
.\" ============================================================
.\"
.SS Unmapped user and group IDs
.PP
There are various places where an unmapped user ID (group ID)
may be exposed to user space.
For example, the first process in a new user namespace may call
@ -872,7 +870,6 @@ that field is displayed as 4294967295 (\-1 as an unsigned integer).
.\" ============================================================
.\"
.SS Accessing files
.PP
In order to determine permissions when an unprivileged process accesses a file,
the process credentials (UID, GID) and the file credentials
are in effect mapped back to what they would be in
@ -884,7 +881,6 @@ permissions mask accessibility model, such as System V IPC objects
.\" ============================================================
.\"
.SS Operation of file-related capabilities
.PP
Certain capabilities allow a process to bypass various
kernel-enforced restrictions when performing operations on
files owned by other users or groups.
@ -920,7 +916,6 @@ at least the file's user ID has a mapping in the user namespace
.\" ============================================================
.\"
.SS Set-user-ID and set-group-ID programs
.PP
When a process inside a user namespace executes
a set-user-ID (set-group-ID) program,
the process's effective user (group) ID inside the namespace is changed
@ -940,7 +935,6 @@ flag, as described in
.\" ============================================================
.\"
.SS Miscellaneous
.PP
When a process's user and group IDs are passed over a UNIX domain socket
to a process in a different user namespace (see the description of
.B SCM_CREDENTIALS