Fixed typos in new{g,u}idmap tools.

Fixed small typos in manual pages and code comments.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
This commit is contained in:
Tobias Stoeckmann 2016-07-02 16:39:18 +02:00
parent a4dee3d1ad
commit a84b0cafdd
4 changed files with 11 additions and 11 deletions

View File

@ -80,7 +80,7 @@
<refsect1 id='description'> <refsect1 id='description'>
<title>DESCRIPTION</title> <title>DESCRIPTION</title>
<para> <para>
The <command>newgidmap</command> sets <filename>/proc/[pid]/gid_map</filename> based on it's The <command>newgidmap</command> sets <filename>/proc/[pid]/gid_map</filename> based on its
command line arguments and the gids allowed in <filename>/etc/subgid</filename>. command line arguments and the gids allowed in <filename>/etc/subgid</filename>.
Note that the root user is not exempted from the requirement for a valid Note that the root user is not exempted from the requirement for a valid
<filename>/etc/subgid</filename> entry. <filename>/etc/subgid</filename> entry.
@ -101,7 +101,7 @@
<term>lowergid</term> <term>lowergid</term>
<listitem> <listitem>
<para> <para>
Begining of the range of GIDs outside the user namespace. Beginning of the range of GIDs outside the user namespace.
</para> </para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -145,7 +145,7 @@
<varlistentry> <varlistentry>
<term><filename>/etc/subgid</filename></term> <term><filename>/etc/subgid</filename></term>
<listitem> <listitem>
<para>List of users subordinate group IDs.</para> <para>List of user's subordinate group IDs.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
<varlistentry> <varlistentry>

View File

@ -80,7 +80,7 @@
<refsect1 id='description'> <refsect1 id='description'>
<title>DESCRIPTION</title> <title>DESCRIPTION</title>
<para> <para>
The <command>newuidmap</command> sets <filename>/proc/[pid]/uid_map</filename> based on it's The <command>newuidmap</command> sets <filename>/proc/[pid]/uid_map</filename> based on its
command line arguments and the uids allowed in <filename>/etc/subuid</filename>. command line arguments and the uids allowed in <filename>/etc/subuid</filename>.
Note that the root user is not exempted from the requirement for a valid Note that the root user is not exempted from the requirement for a valid
<filename>/etc/subuid</filename> entry. <filename>/etc/subuid</filename> entry.
@ -93,7 +93,7 @@
<term>uid</term> <term>uid</term>
<listitem> <listitem>
<para> <para>
Begining of the range of UIDs inside the user namespace. Beginning of the range of UIDs inside the user namespace.
</para> </para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -101,7 +101,7 @@
<term>loweruid</term> <term>loweruid</term>
<listitem> <listitem>
<para> <para>
Begining of the range of UIDs outside the user namespace. Beginning of the range of UIDs outside the user namespace.
</para> </para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -144,7 +144,7 @@
<varlistentry> <varlistentry>
<term><filename>/etc/subuid</filename></term> <term><filename>/etc/subuid</filename></term>
<listitem> <listitem>
<para>List of users subordinate user IDs.</para> <para>List of user's subordinate user IDs.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
<varlistentry> <varlistentry>

View File

@ -56,7 +56,7 @@ static bool verify_range(struct passwd *pw, struct map_range *range)
if (have_sub_gids(pw->pw_name, range->lower, range->count)) if (have_sub_gids(pw->pw_name, range->lower, range->count))
return true; return true;
/* Allow a process to map it's own gid */ /* Allow a process to map its own gid */
if ((range->count == 1) && (pw->pw_gid == range->lower)) if ((range->count == 1) && (pw->pw_gid == range->lower))
return true; return true;
@ -113,7 +113,7 @@ int main(int argc, char **argv)
if (argc < 2) if (argc < 2)
usage(); usage();
/* Find the process that needs it's user namespace /* Find the process that needs its user namespace
* gid mapping set. * gid mapping set.
*/ */
target_str = argv[1]; target_str = argv[1];

View File

@ -56,7 +56,7 @@ static bool verify_range(struct passwd *pw, struct map_range *range)
if (have_sub_uids(pw->pw_name, range->lower, range->count)) if (have_sub_uids(pw->pw_name, range->lower, range->count))
return true; return true;
/* Allow a process to map it's own uid */ /* Allow a process to map its own uid */
if ((range->count == 1) && (pw->pw_uid == range->lower)) if ((range->count == 1) && (pw->pw_uid == range->lower))
return true; return true;
@ -113,7 +113,7 @@ int main(int argc, char **argv)
if (argc < 2) if (argc < 2)
usage(); usage();
/* Find the process that needs it's user namespace /* Find the process that needs its user namespace
* uid mapping set. * uid mapping set.
*/ */
target_str = argv[1]; target_str = argv[1];