diff --git a/man2/clone.2 b/man2/clone.2 index 3e352f79f..9790e0251 100644 --- a/man2/clone.2 +++ b/man2/clone.2 @@ -613,7 +613,7 @@ values across all processes sharing the list, and semaphore adjustments are performed only when the last process that is sharing the list terminates (or ceases sharing the list using .BR unshare (2)). -If this flag is not set, then the child has a separate +If this flag is not set, then the child has a separate .I semadj list that is initially empty. .TP diff --git a/man2/setns.2 b/man2/setns.2 index cd3b6e31f..926842b32 100644 --- a/man2/setns.2 +++ b/man2/setns.2 @@ -128,9 +128,9 @@ multithreaded. Changing the mount namespace requires that the caller possess both .B CAP_SYS_CHROOT and -.BR CAP_SYS_ADMIN +.BR CAP_SYS_ADMIN capabilities in its own user namespace and -.BR CAP_SYS_ADMIN +.BR CAP_SYS_ADMIN in the target mount namespace. See .BR user_namespaces (7) diff --git a/man2/unshare.2 b/man2/unshare.2 index 1f6c1abb2..c6af85c8c 100644 --- a/man2/unshare.2 +++ b/man2/unshare.2 @@ -395,7 +395,7 @@ commands shows that the two shells are in different mount namespaces. .SS Program source \& .nf -/* unshare.c +/* unshare.c A simple implementation of the unshare(1) command: unshare namespaces and execute a command. @@ -451,7 +451,7 @@ main(int argc, char *argv[]) if (unshare(flags) == \-1) errExit("unshare"); - execvp(argv[optind], &argv[optind]); + execvp(argv[optind], &argv[optind]); errExit("execvp"); } .fi diff --git a/man5/proc.5 b/man5/proc.5 index 62b8c2922..337156b5f 100644 --- a/man5/proc.5 +++ b/man5/proc.5 @@ -1810,7 +1810,7 @@ Each line in the file specifies a 1-to-1 mapping of a range of contiguous between two user namespaces. The specification in each line takes the form of three numbers delimited by white space. -The first two numbers specify the starting user ID in +The first two numbers specify the starting user ID in each user namespace. The third number specifies the length of the mapped range. In detail, the fields are interpreted as follows: @@ -1844,7 +1844,7 @@ via a call to .BR unshare (2) or .BR clone (2) -with the +with the .BR CLONE_NEWUSER flag.) This case enables the opener of @@ -1881,7 +1881,7 @@ As at Linux 3.8, the limit is five lines. .IP * The range of user IDs specified in each line cannot overlap with the ranges in any other lines. -In the current implementation (Linux 3.8), this requirement is +In the current implementation (Linux 3.8), this requirement is satisfied by a simplistic implementation that imposes the further requirement that the values in both field 1 and field 2 of successive lines must be diff --git a/man7/namespaces.7 b/man7/namespaces.7 index c10547d84..931d038f6 100644 --- a/man7/namespaces.7 +++ b/man7/namespaces.7 @@ -109,7 +109,7 @@ no privilege is required to create a user namespace. .\" ==================== The /proc/[pid]/ns/ directory ==================== .\" .SS The /proc/[pid]/ns/ directory -Each process has a +Each process has a .IR /proc/[pid]/ns/ .\" See commit 6b4e306aa3dc94a0545eb9279475b1ab6209a31f subdirectory containing one entry for each namespace that @@ -245,8 +245,8 @@ Network namespaces provide isolation of the system resources associated with networking: network devices, IPv4 and IPv6 protocol stacks, IP routing tables, firewalls, the .I /proc/net -directory, the -.I /sys/class/net +directory, the +.I /sys/class/net directory, port numbers (sockets), and so on. A physical network device can live in exactly one network namespace. diff --git a/man7/user_namespaces.7 b/man7/user_namespaces.7 index 233b7c1bd..089364096 100644 --- a/man7/user_namespaces.7 +++ b/man7/user_namespaces.7 @@ -140,7 +140,7 @@ has a nonempty inheritable capabilities mask, it will lose all capabilities. See the discussion of user and group ID mappings, below. -A call to +A call to .BR clone (2), .BR unshare (2), or @@ -297,7 +297,7 @@ settings become locked .\" commit 9566d6742852c527bf5af38af5cbb878dad75705 .\" Author: Eric W. Biederman .\" Date: Mon Jul 28 17:26:07 2014 -0700 -.\" +.\" .\" mnt: Correct permission checks in do_remount .\" when propagated from a more privileged to @@ -584,7 +584,7 @@ and the System V IPC "ctl" .B IPC_STAT operations, credentials exposed by -.IR /proc/PID/status +.IR /proc/PID/status and the files in .IR /proc/sysvipc/* , credentials returned via the @@ -715,7 +715,7 @@ $ \fB./userns_child_exec -p -m -U -M '0 1000 1' -G '0 1000 1' bash\fP .fi .in -The shell has PID 1, because it is the first process in the new +The shell has PID 1, because it is the first process in the new PID namespace: .in +4n