From 854e54fb59abc4474a9f8555330715baf0064d99 Mon Sep 17 00:00:00 2001 From: pirate486743186 <429925+pirate486743186@users.noreply.github.com> Date: Sun, 26 Feb 2023 03:59:23 +0100 Subject: minor clarify userns comments (#5686) Co-authored-by: pirate486743186 <> --- etc/profile-a-l/chromium-common.profile | 4 +++- etc/profile-a-l/electron.profile | 4 +++- etc/profile-m-z/ping.profile | 4 +++- 3 files changed, 9 insertions(+), 3 deletions(-) (limited to 'etc') diff --git a/etc/profile-a-l/chromium-common.profile b/etc/profile-a-l/chromium-common.profile index 4d003ecfc..f1f2f5f68 100644 --- a/etc/profile-a-l/chromium-common.profile +++ b/etc/profile-a-l/chromium-common.profile @@ -37,7 +37,9 @@ include whitelist-runuser-common.inc include whitelist-usr-share-common.inc include whitelist-var-common.inc -# Add the next line to your chromium-common.local if your kernel allows unprivileged userns clone. +# If your kernel allows the creation of user namespaces by unprivileged users +# (for example, if running `unshare -U echo enabled` prints "enabled"), you +# can add the next line to your chromium-common.local. #include chromium-common-hardened.inc.profile apparmor diff --git a/etc/profile-a-l/electron.profile b/etc/profile-a-l/electron.profile index c15e43399..b69f20d3e 100644 --- a/etc/profile-a-l/electron.profile +++ b/etc/profile-a-l/electron.profile @@ -22,7 +22,9 @@ include whitelist-runuser-common.inc include whitelist-usr-share-common.inc include whitelist-var-common.inc -# Add the next line to your electron.local if your kernel allows unprivileged userns clone. +# If your kernel allows the creation of user namespaces by unprivileged users +# (for example, if running `unshare -U echo enabled` prints "enabled"), you +# can add the next line to your electron.local. #include electron-hardened.inc.profile apparmor diff --git a/etc/profile-m-z/ping.profile b/etc/profile-m-z/ping.profile index dbb333afb..4520ac2fa 100644 --- a/etc/profile-m-z/ping.profile +++ b/etc/profile-m-z/ping.profile @@ -24,7 +24,9 @@ include whitelist-runuser-common.inc include whitelist-usr-share-common.inc include whitelist-var-common.inc -# Add the next line to your ping.local if your kernel allows unprivileged userns clone. +# If your kernel allows the creation of user namespaces by unprivileged users +# (for example, if running `unshare -U echo enabled` prints "enabled"), you +# can add the next line to your ping.local. #include ping-hardened.inc.profile apparmor -- cgit v1.2.3-70-g09d2