mirror of https://github.com/mkerrisk/man-pages
Removed trailing white space at end of lines
This commit is contained in:
parent
daf084cc33
commit
f5d401ddda
|
@ -613,7 +613,7 @@ values across all processes sharing the list,
|
|||
and semaphore adjustments are performed only when the last process
|
||||
that is sharing the list terminates (or ceases sharing the list using
|
||||
.BR unshare (2)).
|
||||
If this flag is not set, then the child has a separate
|
||||
If this flag is not set, then the child has a separate
|
||||
.I semadj
|
||||
list that is initially empty.
|
||||
.TP
|
||||
|
|
|
@ -128,9 +128,9 @@ multithreaded.
|
|||
Changing the mount namespace requires that the caller possess both
|
||||
.B CAP_SYS_CHROOT
|
||||
and
|
||||
.BR CAP_SYS_ADMIN
|
||||
.BR CAP_SYS_ADMIN
|
||||
capabilities in its own user namespace and
|
||||
.BR CAP_SYS_ADMIN
|
||||
.BR CAP_SYS_ADMIN
|
||||
in the target mount namespace.
|
||||
See
|
||||
.BR user_namespaces (7)
|
||||
|
|
|
@ -395,7 +395,7 @@ commands shows that the two shells are in different mount namespaces.
|
|||
.SS Program source
|
||||
\&
|
||||
.nf
|
||||
/* unshare.c
|
||||
/* unshare.c
|
||||
|
||||
A simple implementation of the unshare(1) command: unshare
|
||||
namespaces and execute a command.
|
||||
|
@ -451,7 +451,7 @@ main(int argc, char *argv[])
|
|||
if (unshare(flags) == \-1)
|
||||
errExit("unshare");
|
||||
|
||||
execvp(argv[optind], &argv[optind]);
|
||||
execvp(argv[optind], &argv[optind]);
|
||||
errExit("execvp");
|
||||
}
|
||||
.fi
|
||||
|
|
|
@ -1810,7 +1810,7 @@ Each line in the file specifies a 1-to-1 mapping of a range of contiguous
|
|||
between two user namespaces.
|
||||
The specification in each line takes the form of
|
||||
three numbers delimited by white space.
|
||||
The first two numbers specify the starting user ID in
|
||||
The first two numbers specify the starting user ID in
|
||||
each user namespace.
|
||||
The third number specifies the length of the mapped range.
|
||||
In detail, the fields are interpreted as follows:
|
||||
|
@ -1844,7 +1844,7 @@ via a call to
|
|||
.BR unshare (2)
|
||||
or
|
||||
.BR clone (2)
|
||||
with the
|
||||
with the
|
||||
.BR CLONE_NEWUSER
|
||||
flag.)
|
||||
This case enables the opener of
|
||||
|
@ -1881,7 +1881,7 @@ As at Linux 3.8, the limit is five lines.
|
|||
.IP *
|
||||
The range of user IDs specified in each line cannot overlap with the ranges
|
||||
in any other lines.
|
||||
In the current implementation (Linux 3.8), this requirement is
|
||||
In the current implementation (Linux 3.8), this requirement is
|
||||
satisfied by a simplistic implementation that imposes the further
|
||||
requirement that
|
||||
the values in both field 1 and field 2 of successive lines must be
|
||||
|
|
|
@ -109,7 +109,7 @@ no privilege is required to create a user namespace.
|
|||
.\" ==================== The /proc/[pid]/ns/ directory ====================
|
||||
.\"
|
||||
.SS The /proc/[pid]/ns/ directory
|
||||
Each process has a
|
||||
Each process has a
|
||||
.IR /proc/[pid]/ns/
|
||||
.\" See commit 6b4e306aa3dc94a0545eb9279475b1ab6209a31f
|
||||
subdirectory containing one entry for each namespace that
|
||||
|
@ -245,8 +245,8 @@ Network namespaces provide isolation of the system resources associated
|
|||
with networking: network devices, IPv4 and IPv6 protocol stacks,
|
||||
IP routing tables, firewalls, the
|
||||
.I /proc/net
|
||||
directory, the
|
||||
.I /sys/class/net
|
||||
directory, the
|
||||
.I /sys/class/net
|
||||
directory, port numbers (sockets), and so on.
|
||||
A physical network device can live in exactly one
|
||||
network namespace.
|
||||
|
|
|
@ -140,7 +140,7 @@ has a nonempty inheritable capabilities mask,
|
|||
it will lose all capabilities.
|
||||
See the discussion of user and group ID mappings, below.
|
||||
|
||||
A call to
|
||||
A call to
|
||||
.BR clone (2),
|
||||
.BR unshare (2),
|
||||
or
|
||||
|
@ -297,7 +297,7 @@ settings become locked
|
|||
.\" commit 9566d6742852c527bf5af38af5cbb878dad75705
|
||||
.\" Author: Eric W. Biederman <ebiederm@xmission.com>
|
||||
.\" Date: Mon Jul 28 17:26:07 2014 -0700
|
||||
.\"
|
||||
.\"
|
||||
.\" mnt: Correct permission checks in do_remount
|
||||
.\"
|
||||
when propagated from a more privileged to
|
||||
|
@ -584,7 +584,7 @@ and the System V IPC "ctl"
|
|||
.B IPC_STAT
|
||||
operations,
|
||||
credentials exposed by
|
||||
.IR /proc/PID/status
|
||||
.IR /proc/PID/status
|
||||
and the files in
|
||||
.IR /proc/sysvipc/* ,
|
||||
credentials returned via the
|
||||
|
@ -715,7 +715,7 @@ $ \fB./userns_child_exec -p -m -U -M '0 1000 1' -G '0 1000 1' bash\fP
|
|||
.fi
|
||||
.in
|
||||
|
||||
The shell has PID 1, because it is the first process in the new
|
||||
The shell has PID 1, because it is the first process in the new
|
||||
PID namespace:
|
||||
|
||||
.in +4n
|
||||
|
|
Loading…
Reference in New Issue