From cb476d88507e5cc7e119d515a97153a29f15a405 Mon Sep 17 00:00:00 2001 From: Michael Kerrisk Date: Tue, 12 Nov 2013 16:46:36 +1300 Subject: [PATCH] tty_ioctl.4: Rework text on root to discuss just in terms of capabilities Signed-off-by: Michael Kerrisk --- man4/tty_ioctl.4 | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/man4/tty_ioctl.4 b/man4/tty_ioctl.4 index eb5a5f797..07d2f0ade 100644 --- a/man4/tty_ioctl.4 +++ b/man4/tty_ioctl.4 @@ -90,9 +90,9 @@ structure of the terminal. Sets the locking status of the .I termios structure of the terminal. -Only root (more precisely: a process with the +Only a process with the .BR CAP_SYS_ADMIN -capability) can do this. +capability can do this. .SS Get and set window size Window sizes are kept in the kernel, but not used by the kernel (except in the case of virtual consoles, where the kernel will @@ -223,9 +223,9 @@ to the given terminal. If that was a pseudoterminal master, send it to the slave. In Linux before version 2.6.10, anybody can do this as long as the output was not redirected yet; -since version 2.6.10, only root (a process with the +since version 2.6.10, only a process with the .BR CAP_SYS_ADMIN -capability) may do this. +capability may do this. If output was redirected already .B EBUSY is returned, @@ -245,9 +245,9 @@ controlling terminal already. If this terminal is already the controlling terminal of a different session group then the ioctl fails with .BR EPERM , -unless the caller is root (more precisely: has the +unless the caller has the .BR CAP_SYS_ADMIN -capability) and +capability and .I arg equals 1, in which case the terminal is stolen, and all processes that had it as controlling terminal lose it. @@ -292,7 +292,7 @@ No further operations on the terminal are permitted. (They will fail with .BR EBUSY , -except for root, that is, a process with the +except for a process with the .BR CAP_SYS_ADMIN capability.) .TP