aboutsummaryrefslogtreecommitdiffstats
path: root/man7/user_namespaces.7
diff options
context:
space:
mode:
authorMichael Kerrisk <mtk.manpages@gmail.com>2018-10-31 08:27:56 +0100
committerMichael Kerrisk <mtk.manpages@gmail.com>2018-10-31 08:31:47 +0100
commit29af6f1a59ae1e7d7b08ae4a2340d69d52ab6d8a (patch)
tree41d075e1b612e618846a742a2f43d4e4553c404e /man7/user_namespaces.7
parent659beec77515b2e2e6218e7b1f0cce61a382cd16 (diff)
downloadman-pages-29af6f1a59ae1e7d7b08ae4a2340d69d52ab6d8a.tar.gz
user_namespaces.7: Rework terminology describing ownership of nonuser namespaces
Prefer the word "owns" rather than "associated with" when describing the relationship between user namespaces and non-user namespaces. The existing text used a mix of the two terms, with "associated with" being predominant, but to my ear, describing the relationship as "ownership" is more comprehensible. Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
Diffstat (limited to 'man7/user_namespaces.7')
-rw-r--r--man7/user_namespaces.717
1 files changed, 9 insertions, 8 deletions
diff --git a/man7/user_namespaces.7 b/man7/user_namespaces.7
index 896c7d7353..f347afe9ca 100644
--- a/man7/user_namespaces.7
+++ b/man7/user_namespaces.7
@@ -227,7 +227,8 @@ permits a process to perform operations (that require privilege)
only on resources governed by that namespace.
In other words, having a capability in a user namespace permits a process
to perform privileged operations on resources that are governed by (nonuser)
-namespaces associated with the user namespace (see the next subsection).
+namespaces owned by (associated with) the user namespace
+(see the next subsection).
.PP
On the other hand, there are many privileged operations that affect
resources that are not associated with any namespace type,
@@ -243,7 +244,7 @@ user namespace can perform such operations.
.PP
Holding
.B CAP_SYS_ADMIN
-within the user namespace associated with a process's mount namespace
+within the user namespace that owns a process's mount namespace
allows that process to create bind mounts
and mount the following types of filesystems:
.\" fs_flags = FS_USERNS_MOUNT in kernel sources
@@ -277,7 +278,7 @@ and mount the following types of filesystems:
.PP
Holding
.B CAP_SYS_ADMIN
-within the user namespace associated with a process's cgroup namespace
+within the user namespace that owns a process's cgroup namespace
allows (since Linux 4.6)
that process to the mount the cgroup version 2 filesystem and
cgroup version 1 named hierarchies
@@ -287,7 +288,7 @@ option).
.PP
Holding
.B CAP_SYS_ADMIN
-within the user namespace associated with a process's PID namespace
+within the user namespace that owns a process's PID namespace
allows (since Linux 3.8)
that process to mount
.I /proc
@@ -333,7 +334,7 @@ When a new namespace (other than a user namespace) is created via
.BR clone (2)
or
.BR unshare (2),
-the kernel records the user namespace of the creating process against
+the kernel records the user namespace of the creating process as the owner of
the new namespace.
(This association can't be changed.)
When a process in the new namespace subsequently performs
@@ -345,7 +346,7 @@ For example, suppose that a process attempts to change the hostname
.RB ( sethostname (2)),
a resource governed by the UTS namespace.
In this case,
-the kernel will determine which user namespace is associated with
+the kernel will determine which user namespace owns
the process's UTS namespace, and check whether the process has the
required capability
.RB ( CAP_SYS_ADMIN )
@@ -354,8 +355,8 @@ in that user namespace.
The
.BR NS_GET_USERNS
.BR ioctl (2)
-operation can be used to discover the user namespace with which
-a non-user namespace is associated; see
+operation can be used to discover the user namespace
+that owns a a non-user namespace; see
.BR ioctl_ns (2).
.\"
.\" ============================================================