summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAlejandro Colomar <alx@kernel.org>2023-04-29 20:19:20 +0200
committerAlejandro Colomar <alx@kernel.org>2023-04-29 21:40:15 +0200
commit98c9ca4bc79296be2ad08a3f746c8070995b9e6e (patch)
tree23e9ad3ddfb5b0b9b047386b7ed4324dcc8c30c1
parent6c11d17c376cbfda628d3bfe2c57c661951d4ec1 (diff)
man*/: ffix
Reported-by: groff(1) (`make built-catman-troff`) Signed-off-by: Alejandro Colomar <alx@kernel.org>
-rw-r--r--man2/personality.22
-rw-r--r--man7/mount_namespaces.72
-rw-r--r--man7/user_namespaces.716
3 files changed, 10 insertions, 10 deletions
diff --git a/man2/personality.2 b/man2/personality.2
index d9418b38e..dc916b05c 100644
--- a/man2/personality.2
+++ b/man2/personality.2
@@ -206,7 +206,7 @@ No effect.
Up to Linux v4.0, would set the emulation altroot to
.I /usr/gnemul/riscos
(cf.\&
-.BR PER_SUNOS,
+.BR PER_SUNOS ,
below).
Before then, up to Linux 2.6.3, just Arthur emulation.
.TP
diff --git a/man7/mount_namespaces.7 b/man7/mount_namespaces.7
index b17f86a4c..7fd983af5 100644
--- a/man7/mount_namespaces.7
+++ b/man7/mount_namespaces.7
@@ -1014,7 +1014,7 @@ in the new namespace,
.BR unshare (1)
(since
.I util\-linux
- 2.27) in turn reverses the step performed by
+2.27) in turn reverses the step performed by
.BR systemd (1),
by making all mounts private in the new namespace.
That is,
diff --git a/man7/user_namespaces.7 b/man7/user_namespaces.7
index 27dbc7121..f2cb4e5b8 100644
--- a/man7/user_namespaces.7
+++ b/man7/user_namespaces.7
@@ -1258,14 +1258,14 @@ update_map(char *mapping, char *map_file)
close(fd);
}
-/* Linux 3.19 made a change in the handling of setgroups(2) and the
- \[aq]gid_map\[aq] file to address a security issue. The issue allowed
- *unprivileged* users to employ user namespaces in order to drop groups.
- The upshot of the 3.19 changes is that in order to update the
- \[aq]gid_maps\[aq] file, use of the setgroups() system call in this
- user namespace must first be disabled by writing "deny" to one of
- the /proc/PID/setgroups files for this namespace. That is the
- purpose of the following function. */
+/* Linux 3.19 made a change in the handling of setgroups(2) and
+ the \[aq]gid_map\[aq] file to address a security issue. The issue
+ allowed *unprivileged* users to employ user namespaces in
+ order to drop groups. The upshot of the 3.19 changes is that
+ in order to update the \[aq]gid_maps\[aq] file, use of the setgroups()
+ system call in this user namespace must first be disabled by
+ writing "deny" to one of the /proc/PID/setgroups files for
+ this namespace. That is the purpose of the following function. */
static void
proc_setgroups_write(pid_t child_pid, char *str)