From 98c9ca4bc79296be2ad08a3f746c8070995b9e6e Mon Sep 17 00:00:00 2001 From: Alejandro Colomar Date: Sat, 29 Apr 2023 20:19:20 +0200 Subject: man*/: ffix Reported-by: groff(1) (`make built-catman-troff`) Signed-off-by: Alejandro Colomar --- man2/personality.2 | 2 +- man7/mount_namespaces.7 | 2 +- man7/user_namespaces.7 | 16 ++++++++-------- 3 files changed, 10 insertions(+), 10 deletions(-) diff --git a/man2/personality.2 b/man2/personality.2 index d9418b38e..dc916b05c 100644 --- a/man2/personality.2 +++ b/man2/personality.2 @@ -206,7 +206,7 @@ No effect. Up to Linux v4.0, would set the emulation altroot to .I /usr/gnemul/riscos (cf.\& -.BR PER_SUNOS, +.BR PER_SUNOS , below). Before then, up to Linux 2.6.3, just Arthur emulation. .TP diff --git a/man7/mount_namespaces.7 b/man7/mount_namespaces.7 index b17f86a4c..7fd983af5 100644 --- a/man7/mount_namespaces.7 +++ b/man7/mount_namespaces.7 @@ -1014,7 +1014,7 @@ in the new namespace, .BR unshare (1) (since .I util\-linux - 2.27) in turn reverses the step performed by +2.27) in turn reverses the step performed by .BR systemd (1), by making all mounts private in the new namespace. That is, diff --git a/man7/user_namespaces.7 b/man7/user_namespaces.7 index 27dbc7121..f2cb4e5b8 100644 --- a/man7/user_namespaces.7 +++ b/man7/user_namespaces.7 @@ -1258,14 +1258,14 @@ update_map(char *mapping, char *map_file) close(fd); } -/* Linux 3.19 made a change in the handling of setgroups(2) and the - \[aq]gid_map\[aq] file to address a security issue. The issue allowed - *unprivileged* users to employ user namespaces in order to drop groups. - The upshot of the 3.19 changes is that in order to update the - \[aq]gid_maps\[aq] file, use of the setgroups() system call in this - user namespace must first be disabled by writing "deny" to one of - the /proc/PID/setgroups files for this namespace. That is the - purpose of the following function. */ +/* Linux 3.19 made a change in the handling of setgroups(2) and + the \[aq]gid_map\[aq] file to address a security issue. The issue + allowed *unprivileged* users to employ user namespaces in + order to drop groups. The upshot of the 3.19 changes is that + in order to update the \[aq]gid_maps\[aq] file, use of the setgroups() + system call in this user namespace must first be disabled by + writing "deny" to one of the /proc/PID/setgroups files for + this namespace. That is the purpose of the following function. */ static void proc_setgroups_write(pid_t child_pid, char *str) -- cgit v1.2.3