Removed trailing white space at end of lines

This commit is contained in:
Michael Kerrisk 2014-09-21 11:24:24 +02:00
parent daf084cc33
commit f5d401ddda
6 changed files with 15 additions and 15 deletions

View File

@ -613,7 +613,7 @@ values across all processes sharing the list,
and semaphore adjustments are performed only when the last process
that is sharing the list terminates (or ceases sharing the list using
.BR unshare (2)).
If this flag is not set, then the child has a separate
If this flag is not set, then the child has a separate
.I semadj
list that is initially empty.
.TP

View File

@ -128,9 +128,9 @@ multithreaded.
Changing the mount namespace requires that the caller possess both
.B CAP_SYS_CHROOT
and
.BR CAP_SYS_ADMIN
.BR CAP_SYS_ADMIN
capabilities in its own user namespace and
.BR CAP_SYS_ADMIN
.BR CAP_SYS_ADMIN
in the target mount namespace.
See
.BR user_namespaces (7)

View File

@ -395,7 +395,7 @@ commands shows that the two shells are in different mount namespaces.
.SS Program source
\&
.nf
/* unshare.c
/* unshare.c
A simple implementation of the unshare(1) command: unshare
namespaces and execute a command.
@ -451,7 +451,7 @@ main(int argc, char *argv[])
if (unshare(flags) == \-1)
errExit("unshare");
execvp(argv[optind], &argv[optind]);
execvp(argv[optind], &argv[optind]);
errExit("execvp");
}
.fi

View File

@ -1810,7 +1810,7 @@ Each line in the file specifies a 1-to-1 mapping of a range of contiguous
between two user namespaces.
The specification in each line takes the form of
three numbers delimited by white space.
The first two numbers specify the starting user ID in
The first two numbers specify the starting user ID in
each user namespace.
The third number specifies the length of the mapped range.
In detail, the fields are interpreted as follows:
@ -1844,7 +1844,7 @@ via a call to
.BR unshare (2)
or
.BR clone (2)
with the
with the
.BR CLONE_NEWUSER
flag.)
This case enables the opener of
@ -1881,7 +1881,7 @@ As at Linux 3.8, the limit is five lines.
.IP *
The range of user IDs specified in each line cannot overlap with the ranges
in any other lines.
In the current implementation (Linux 3.8), this requirement is
In the current implementation (Linux 3.8), this requirement is
satisfied by a simplistic implementation that imposes the further
requirement that
the values in both field 1 and field 2 of successive lines must be

View File

@ -109,7 +109,7 @@ no privilege is required to create a user namespace.
.\" ==================== The /proc/[pid]/ns/ directory ====================
.\"
.SS The /proc/[pid]/ns/ directory
Each process has a
Each process has a
.IR /proc/[pid]/ns/
.\" See commit 6b4e306aa3dc94a0545eb9279475b1ab6209a31f
subdirectory containing one entry for each namespace that
@ -245,8 +245,8 @@ Network namespaces provide isolation of the system resources associated
with networking: network devices, IPv4 and IPv6 protocol stacks,
IP routing tables, firewalls, the
.I /proc/net
directory, the
.I /sys/class/net
directory, the
.I /sys/class/net
directory, port numbers (sockets), and so on.
A physical network device can live in exactly one
network namespace.

View File

@ -140,7 +140,7 @@ has a nonempty inheritable capabilities mask,
it will lose all capabilities.
See the discussion of user and group ID mappings, below.
A call to
A call to
.BR clone (2),
.BR unshare (2),
or
@ -297,7 +297,7 @@ settings become locked
.\" commit 9566d6742852c527bf5af38af5cbb878dad75705
.\" Author: Eric W. Biederman <ebiederm@xmission.com>
.\" Date: Mon Jul 28 17:26:07 2014 -0700
.\"
.\"
.\" mnt: Correct permission checks in do_remount
.\"
when propagated from a more privileged to
@ -584,7 +584,7 @@ and the System V IPC "ctl"
.B IPC_STAT
operations,
credentials exposed by
.IR /proc/PID/status
.IR /proc/PID/status
and the files in
.IR /proc/sysvipc/* ,
credentials returned via the
@ -715,7 +715,7 @@ $ \fB./userns_child_exec -p -m -U -M '0 1000 1' -G '0 1000 1' bash\fP
.fi
.in
The shell has PID 1, because it is the first process in the new
The shell has PID 1, because it is the first process in the new
PID namespace:
.in +4n