diff options
| author | Michael Kerrisk <mtk.manpages@gmail.com> | 2013-02-27 07:40:40 +0100 |
|---|---|---|
| committer | Michael Kerrisk <mtk.manpages@gmail.com> | 2014-09-13 20:15:59 -0700 |
| commit | f58fb24f164692abe658a9b12e7b9ec4cedfc47d (patch) | |
| tree | 8f231c0d5a6356610911571c88613200b1ad89dd | |
| parent | 62a5214c57ab01597e7b01aa9ca5c7a844d6df7a (diff) | |
| download | man-pages-f58fb24f164692abe658a9b12e7b9ec4cedfc47d.tar.gz | |
clone.2, seteuid.2, setgid.2, setresuid.2, setreuid.2, setuid.2, unshare.2, capabilities.7, credentials.7: Change reference to namespaces(7) to user_namespaces(7)
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
| -rw-r--r-- | man2/clone.2 | 6 | ||||
| -rw-r--r-- | man2/seteuid.2 | 2 | ||||
| -rw-r--r-- | man2/setgid.2 | 2 | ||||
| -rw-r--r-- | man2/setresuid.2 | 2 | ||||
| -rw-r--r-- | man2/setreuid.2 | 2 | ||||
| -rw-r--r-- | man2/setuid.2 | 2 | ||||
| -rw-r--r-- | man2/unshare.2 | 2 | ||||
| -rw-r--r-- | man7/capabilities.7 | 4 | ||||
| -rw-r--r-- | man7/credentials.7 | 1 |
9 files changed, 13 insertions, 10 deletions
diff --git a/man2/clone.2 b/man2/clone.2 index c57650eb88..e6f5584c34 100644 --- a/man2/clone.2 +++ b/man2/clone.2 @@ -425,7 +425,9 @@ If this flag is not set, then (as with the process is created in the same user namespace as the calling process. For further information on user namespaces, see -.BR namespaces (7). +.BR namespaces (7) +and +.BR user_namespaces (7) Before Linux 3.8, use of .BR CLONE_NEWUSER @@ -962,7 +964,7 @@ was specified in .IR flags , but either the effective user ID or the effective group ID of the caller does not have a mapping in the parent namespace (see -.BR namespaces (7)). +.BR user_namespaces (7)). .SH VERSIONS There is no entry for .BR clone () diff --git a/man2/seteuid.2 b/man2/seteuid.2 index fee9c5348e..6b329665da 100644 --- a/man2/seteuid.2 +++ b/man2/seteuid.2 @@ -145,4 +145,4 @@ and .BR setuid (2), .BR capabilities (7), .BR credentials (7), -.BR namespaces (7) +.BR user_namespaces (7) diff --git a/man2/setgid.2 b/man2/setgid.2 index 442e68c6fc..58ef180f95 100644 --- a/man2/setgid.2 +++ b/man2/setgid.2 @@ -86,4 +86,4 @@ wrapper function transparently deals with the variation across kernel versions. .BR setregid (2), .BR capabilities (7), .BR credentials (7), -.BR namespaces (7) +.BR user_namespaces (7) diff --git a/man2/setresuid.2 b/man2/setresuid.2 index 2d0d9c8fbb..29d01d99d4 100644 --- a/man2/setresuid.2 +++ b/man2/setresuid.2 @@ -138,4 +138,4 @@ wrapper functions transparently deal with the variations across kernel versions. .BR setuid (2), .BR capabilities (7), .BR credentials (7), -.BR namespaces (7) +.BR user_namespaces (7) diff --git a/man2/setreuid.2 b/man2/setreuid.2 index db588b6e41..55161263e7 100644 --- a/man2/setreuid.2 +++ b/man2/setreuid.2 @@ -199,4 +199,4 @@ wrapper functions transparently deal with the variations across kernel versions. .BR setresuid (2), .BR setuid (2), .BR capabilities (7), -.BR namespaces (7) +.BR user_namespaces (7) diff --git a/man2/setuid.2 b/man2/setuid.2 index 7d4ee5c4e9..8e49e2f58e 100644 --- a/man2/setuid.2 +++ b/man2/setuid.2 @@ -149,4 +149,4 @@ wrapper function transparently deals with the variation across kernel versions. .BR setreuid (2), .BR capabilities (7), .BR credentials (7), -.BR namespaces (7) +.BR user_namespaces (7) diff --git a/man2/unshare.2 b/man2/unshare.2 index 0380e7c2b1..23b4791b33 100644 --- a/man2/unshare.2 +++ b/man2/unshare.2 @@ -269,7 +269,7 @@ was specified in .IR flags , but either the effective user ID or the effective group ID of the caller does not have a mapping in the parent namespace (see -.BR namespaces (7)). +.BR user_namespaces (7)). .SH VERSIONS The .BR unshare () diff --git a/man7/capabilities.7 b/man7/capabilities.7 index 506c47a0c8..8796956022 100644 --- a/man7/capabilities.7 +++ b/man7/capabilities.7 @@ -253,7 +253,7 @@ bind to any address for transparent proxying. Make arbitrary manipulations of process GIDs and supplementary GID list; forge GID when passing socket credentials via UNIX domain sockets; write a group ID mapping in a user namespace (see -.BR namespaces (7)). +.BR user_namespaces (7)). .TP .BR CAP_SETFCAP " (since Linux 2.6.24)" Set file capabilities. @@ -287,7 +287,7 @@ Make arbitrary manipulations of process UIDs .BR setfsuid (2)); forge UID when passing socket credentials via UNIX domain sockets; write a user ID mapping in a user namespace (see -.BR namespaces (7)). +.BR user_namespaces (7)). .\" FIXME CAP_SETUID also an effect in exec(); document this. .TP .B CAP_SYS_ADMIN diff --git a/man7/credentials.7 b/man7/credentials.7 index 284a7ff2cd..7e505d1d9c 100644 --- a/man7/credentials.7 +++ b/man7/credentials.7 @@ -333,4 +333,5 @@ is carried through to all of the POSIX threads in a process. .BR namespaces (7), .BR path_resolution (7), .BR signal (7), +.BR user_namespaces (7), .BR unix (7) |
