From c65f02bae3d2052add5c6752dbe7a811bc7c4ca9 Mon Sep 17 00:00:00 2001 From: Michael Kerrisk Date: Sun, 27 Dec 2020 10:59:08 +0100 Subject: [PATCH] user_namespaces.7: srcfix: remove redundant .PP after .SS Signed-off-by: Michael Kerrisk --- man7/user_namespaces.7 | 6 ------ 1 file changed, 6 deletions(-) diff --git a/man7/user_namespaces.7 b/man7/user_namespaces.7 index c234a8be7..2568cd920 100644 --- a/man7/user_namespaces.7 +++ b/man7/user_namespaces.7 @@ -495,7 +495,6 @@ confusion when using these interfaces. .\" ============================================================ .\" .SS Defining user and group ID mappings: writing to uid_map and gid_map -.PP After the creation of a new user namespace, the .I uid_map file of @@ -812,7 +811,6 @@ by denying any pathway for an unprivileged process to drop groups with .\" ============================================================ .\" .SS Unmapped user and group IDs -.PP There are various places where an unmapped user ID (group ID) may be exposed to user space. For example, the first process in a new user namespace may call @@ -872,7 +870,6 @@ that field is displayed as 4294967295 (\-1 as an unsigned integer). .\" ============================================================ .\" .SS Accessing files -.PP In order to determine permissions when an unprivileged process accesses a file, the process credentials (UID, GID) and the file credentials are in effect mapped back to what they would be in @@ -884,7 +881,6 @@ permissions mask accessibility model, such as System V IPC objects .\" ============================================================ .\" .SS Operation of file-related capabilities -.PP Certain capabilities allow a process to bypass various kernel-enforced restrictions when performing operations on files owned by other users or groups. @@ -920,7 +916,6 @@ at least the file's user ID has a mapping in the user namespace .\" ============================================================ .\" .SS Set-user-ID and set-group-ID programs -.PP When a process inside a user namespace executes a set-user-ID (set-group-ID) program, the process's effective user (group) ID inside the namespace is changed @@ -940,7 +935,6 @@ flag, as described in .\" ============================================================ .\" .SS Miscellaneous -.PP When a process's user and group IDs are passed over a UNIX domain socket to a process in a different user namespace (see the description of .B SCM_CREDENTIALS