diff options
author | Mauro Carvalho Chehab <mchehab+huawei@kernel.org> | 2020-10-27 10:51:36 +0100 |
---|---|---|
committer | Jonathan Corbet <corbet@lwn.net> | 2020-10-28 11:42:02 -0600 |
commit | afc74ce7b484da5c5698d8eb2472a58c547cbc2b (patch) | |
tree | 1f3ab8d7009d54badbad1b17dfd31794ae500750 | |
parent | b28d70c6a515580b29ce2be53e585bd86c8b8c8c (diff) |
docs: SafeSetID: fix a warning
As reported by Sphinx 2.4.4:
docs/Documentation/admin-guide/LSM/SafeSetID.rst:110: WARNING: Title underline too short.
Note on GID policies and setgroups()
==================
Signed-off-by: Mauro Carvalho Chehab <mchehab+huawei@kernel.org>
Link: https://lore.kernel.org/r/4afa281c170daabd1ce522653d5d5d5078ebd92c.1603791716.git.mchehab+huawei@kernel.org
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
-rw-r--r-- | Documentation/admin-guide/LSM/SafeSetID.rst | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/Documentation/admin-guide/LSM/SafeSetID.rst b/Documentation/admin-guide/LSM/SafeSetID.rst index 17996c9070e2..0ec34863c674 100644 --- a/Documentation/admin-guide/LSM/SafeSetID.rst +++ b/Documentation/admin-guide/LSM/SafeSetID.rst @@ -107,7 +107,7 @@ for a UID/GID will prevent that UID/GID from obtaining auxiliary setid privileges, such as allowing a user to set up user namespace UID/GID mappings. Note on GID policies and setgroups() -================== +==================================== In v5.9 we are adding support for limiting CAP_SETGID privileges as was done previously for CAP_SETUID. However, for compatibility with common sandboxing related code conventions in userspace, we currently allow arbitrary |