From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-13.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0C88DC2D0A8 for ; Wed, 9 Sep 2020 17:00:34 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id C537C2166E for ; Wed, 9 Sep 2020 17:00:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1599670833; bh=F38L5HcK+PWN6kp1gWIMXrEICgbpC/K+TO5DkjZ2XS4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:List-ID:From; b=qXqAEVF/a72FYre8lBHIE9u4fUGpfsuGd8rUjvkImVYQqcdKFi/JMBVpA4HvmTcxF R1dI0cnixxoCukAFkTpM/0rRga05ViVFGZszQwINX8mX4vXBvEhNPkgVS5YgL6pauB OWSKX1EIARaQm7JV76LJe53mxfHF1KBP1g1QSECs= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731244AbgIIRAc (ORCPT ); Wed, 9 Sep 2020 13:00:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:51824 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730649AbgIIPvM (ORCPT ); Wed, 9 Sep 2020 11:51:12 -0400 Received: from mail.kernel.org (ip5f5ad5d6.dynamic.kabel-deutschland.de [95.90.213.214]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3E462221E7; Wed, 9 Sep 2020 14:11:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1599660665; bh=F38L5HcK+PWN6kp1gWIMXrEICgbpC/K+TO5DkjZ2XS4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=aXd8/JoALhftUwkdlwfmxkKu3JLctEjQW0ZzzRxsLP81AyPLxBnJ8wLSUxWSAWU4i 13iGhEnmXGpWUFsO31B4BQYVCwi1K/f3dJvU+WVU917lMupXSzarqB58sZ5ag6QAwJ DohP9Sckw/nz2lbWzIiHAt9HoNrBczm4aXLM4L/c= Received: from mchehab by mail.kernel.org with local (Exim 4.94) (envelope-from ) id 1kG0oR-00DUX5-D7; Wed, 09 Sep 2020 16:11:03 +0200 From: Mauro Carvalho Chehab To: Linux Doc Mailing List , Jonathan Corbet Cc: Mauro Carvalho Chehab , linux-kernel@vger.kernel.org Subject: [PATCH 13/30] docs: SafeSetID: fix a warning Date: Wed, 9 Sep 2020 16:10:44 +0200 Message-Id: <4cbe4cba5158c8b015bf10add87fe5c390e8338e.1599660067.git.mchehab+huawei@kernel.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As reported by Sphinx 2.4.4: docs/Documentation/admin-guide/LSM/SafeSetID.rst:110: WARNING: Title underline too short. Note on GID policies and setgroups() ================== Signed-off-by: Mauro Carvalho Chehab --- Documentation/admin-guide/LSM/SafeSetID.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Documentation/admin-guide/LSM/SafeSetID.rst b/Documentation/admin-guide/LSM/SafeSetID.rst index 17996c9070e2..0ec34863c674 100644 --- a/Documentation/admin-guide/LSM/SafeSetID.rst +++ b/Documentation/admin-guide/LSM/SafeSetID.rst @@ -107,7 +107,7 @@ for a UID/GID will prevent that UID/GID from obtaining auxiliary setid privileges, such as allowing a user to set up user namespace UID/GID mappings. Note on GID policies and setgroups() -================== +==================================== In v5.9 we are adding support for limiting CAP_SETGID privileges as was done previously for CAP_SETUID. However, for compatibility with common sandboxing related code conventions in userspace, we currently allow arbitrary -- 2.26.2