aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMichael Kerrisk <mtk.manpages@gmail.com>2020-12-27 10:59:08 +0100
committerMichael Kerrisk <mtk.manpages@gmail.com>2020-12-27 12:40:30 +0100
commitc65f02bae3d2052add5c6752dbe7a811bc7c4ca9 (patch)
treeaba48e9dea6c5a73950b62c2d78e6cbc2cdf5312
parent312b0eb18223368ff19cff04cec0cfdb08681bb3 (diff)
downloadman-pages-c65f02bae3d2052add5c6752dbe7a811bc7c4ca9.tar.gz
user_namespaces.7: srcfix: remove redundant .PP after .SS
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
-rw-r--r--man7/user_namespaces.76
1 files changed, 0 insertions, 6 deletions
diff --git a/man7/user_namespaces.7 b/man7/user_namespaces.7
index c234a8be76..2568cd9204 100644
--- a/man7/user_namespaces.7
+++ b/man7/user_namespaces.7
@@ -495,7 +495,6 @@ confusion when using these interfaces.
.\" ============================================================
.\"
.SS Defining user and group ID mappings: writing to uid_map and gid_map
-.PP
After the creation of a new user namespace, the
.I uid_map
file of
@@ -812,7 +811,6 @@ by denying any pathway for an unprivileged process to drop groups with
.\" ============================================================
.\"
.SS Unmapped user and group IDs
-.PP
There are various places where an unmapped user ID (group ID)
may be exposed to user space.
For example, the first process in a new user namespace may call
@@ -872,7 +870,6 @@ that field is displayed as 4294967295 (\-1 as an unsigned integer).
.\" ============================================================
.\"
.SS Accessing files
-.PP
In order to determine permissions when an unprivileged process accesses a file,
the process credentials (UID, GID) and the file credentials
are in effect mapped back to what they would be in
@@ -884,7 +881,6 @@ permissions mask accessibility model, such as System V IPC objects
.\" ============================================================
.\"
.SS Operation of file-related capabilities
-.PP
Certain capabilities allow a process to bypass various
kernel-enforced restrictions when performing operations on
files owned by other users or groups.
@@ -920,7 +916,6 @@ at least the file's user ID has a mapping in the user namespace
.\" ============================================================
.\"
.SS Set-user-ID and set-group-ID programs
-.PP
When a process inside a user namespace executes
a set-user-ID (set-group-ID) program,
the process's effective user (group) ID inside the namespace is changed
@@ -940,7 +935,6 @@ flag, as described in
.\" ============================================================
.\"
.SS Miscellaneous
-.PP
When a process's user and group IDs are passed over a UNIX domain socket
to a process in a different user namespace (see the description of
.B SCM_CREDENTIALS