aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMichael Kerrisk <mtk.manpages@gmail.com>2021-08-09 06:33:03 +0200
committerMichael Kerrisk <mtk.manpages@gmail.com>2021-08-10 03:29:39 +0200
commit03cd41e922ef49272c03dcb3c8a9df7a0b43327d (patch)
treef5db544a7e75e4a685241aa39328eb4462b5742d
parent63097cb7be1eb7780b6231767c89bde733f24323 (diff)
downloadman-pages-03cd41e922ef49272c03dcb3c8a9df7a0b43327d.tar.gz
mount_setattr.2: Minor formatting fixes
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
-rw-r--r--man2/mount_setattr.224
1 files changed, 12 insertions, 12 deletions
diff --git a/man2/mount_setattr.2 b/man2/mount_setattr.2
index 70ab4592e7..44cd11cb67 100644
--- a/man2/mount_setattr.2
+++ b/man2/mount_setattr.2
@@ -379,7 +379,7 @@ and also the following
.BR xattr (7)
keys:
.RS
-.IP \(bu
+.IP \(bu 3
.IR security.capability ,
whenever filesystem
.BR capabilities (7)
@@ -400,7 +400,7 @@ entries.
.IP
The following conditions must be met in order to create an idmapped mount:
.RS
-.IP \(bu
+.IP \(bu 3
The caller must have
.I CAP_SYS_ADMIN
in the initial user namespace.
@@ -458,14 +458,14 @@ in
to create an idmapped mount will be the user namespace of a container.
In other scenarios it will be a dedicated user namespace associated with
a user's login session as is the case for portable home directories in
-.BR systemd-homed.service (8) ).
+.BR systemd-homed.service (8)).
It is also perfectly fine to create a dedicated user namespace
for the sake of idmapping a mount.
.IP
Idmapped mounts can be useful in the following
and a variety of other scenarios:
.RS
-.IP \(bu
+.IP \(bu 3
Sharing files between multiple users or multiple machines,
especially in complex scenarios.
For example,
@@ -480,11 +480,11 @@ assign random user IDs and group IDs at login time.
.IP \(bu
Sharing files from the host with unprivileged containers.
This allows a user to avoid having to change ownership permanently through
-.BR chown (2) .
+.BR chown (2).
.IP \(bu
Idmapping a container's root filesystem.
Users don't need to change ownership permanently through
-.BR chown (2) .
+.BR chown (2).
Especially for large root filesystems, using
.BR chown (2)
can be prohibitively expensive.
@@ -707,7 +707,7 @@ or
set and the flag is locked.
Mount attributes become locked on a mount if:
.RS
-.IP \(bu
+.IP \(bu 3
A new mount or mount tree is created causing mount propagation across user
namespaces.
The kernel will lock the aforementioned flags to protect these sensitive
@@ -720,7 +720,7 @@ in
.BR unshare (2),
.BR clone (2),
or
-.BR clone3 (2) .
+.BR clone3 (2).
The aformentioned flags become locked to protect user namespaces from altering
sensitive mount properties.
.RE
@@ -769,7 +769,7 @@ This extensibility design is very similar to other system calls such as
.BR perf_event_open (2),
.BR clone3 (2)
and
-.BR openat2 (2) .
+.BR openat2 (2).
.PP
Let
.I usize
@@ -778,7 +778,7 @@ and let
.I ksize
be the size of the structure which the kernel supports,
then there are three cases to consider:
-.IP \(bu
+.IP \(bu 3
If
.I ksize
equals
@@ -852,7 +852,7 @@ kernel supports can do so by conducting a binary search on
.I size
with a structure which has every byte nonzero
(to find the largest value which doesn't produce an error of
-.BR E2BIG ) .
+.BR E2BIG ).
.SH EXAMPLES
.EX
/*
@@ -984,7 +984,7 @@ main(int argc, char *argv[])
ret = move_mount(fd_tree, "", \-EBADF, target,
MOVE_MOUNT_F_EMPTY_PATH);
if (ret == \-1)
- exit_log("%m - Failed to attach mount to %s\en", target);
+ exit_log("%m \- Failed to attach mount to %s\en", target);
close(fd_tree);
exit(EXIT_SUCCESS);