diff options
author | Bjarni Ingi Gislason | 2018-05-18 21:21:42 +0200 |
---|---|---|
committer | Karel Zak | 2018-05-23 10:43:27 +0200 |
commit | 0bb7e904d72213b29f890364e25796685ee377f4 (patch) | |
tree | 5930dd59265bbad36cd13b69f5028d0e6d58bf61 /sys-utils/unshare.1 | |
parent | more: reorder global declarations (diff) | |
download | kernel-qcow2-util-linux-0bb7e904d72213b29f890364e25796685ee377f4.tar.gz kernel-qcow2-util-linux-0bb7e904d72213b29f890364e25796685ee377f4.tar.xz kernel-qcow2-util-linux-0bb7e904d72213b29f890364e25796685ee377f4.zip |
man: Use the correct macro for a font change of one argument
Use the correct macro (I, B) for the font change of one argument, not
those that are used for alternating two fonts, like "BR", "IR", "RB",
or "RI".
Signed-off-by: Bjarni Ingi Gislason <bjarniig@rhi.hi.is>
Diffstat (limited to 'sys-utils/unshare.1')
-rw-r--r-- | sys-utils/unshare.1 | 28 |
1 files changed, 14 insertions, 14 deletions
diff --git a/sys-utils/unshare.1 b/sys-utils/unshare.1 index 42cd7b3c3..746c41152 100644 --- a/sys-utils/unshare.1 +++ b/sys-utils/unshare.1 @@ -22,7 +22,7 @@ See the \fBEXAMPLES\fR section for more details. .PP The namespaces to be unshared are indicated via options. Unshareable namespaces are: .TP -.BR "mount namespace" +.B mount namespace Mounting and unmounting filesystems will not affect the rest of the system, except for filesystems which are explicitly marked as shared (with \fBmount --make-shared\fP; see \fI/proc/self/mountinfo\fP or @@ -30,7 +30,7 @@ shared (with \fBmount --make-shared\fP; see \fI/proc/self/mountinfo\fP or For further details, see .BR mount_namespaces (7) and the discussion of the -.BR CLONE_NEWNS +.B CLONE_NEWNS flag in .BR clone (2). .sp @@ -41,63 +41,63 @@ unshared. It's possible to disable this feature with option \fB\-\-propagation unchanged\fP. Note that \fBprivate\fP is the kernel default. .TP -.BR "UTS namespace" +.B UTS namespace Setting hostname or domainname will not affect the rest of the system. For further details, see .BR namespaces (7) and the discussion of the -.BR CLONE_NEWUTS +.B CLONE_NEWUTS flag in .BR clone (2). .TP -.BR "IPC namespace" +.B IPC namespace The process will have an independent namespace for POSIX message queues as well as System V \%message queues, semaphore sets and shared memory segments. For further details, see .BR namespaces (7) and the discussion of the -.BR CLONE_NEWIPC +.B CLONE_NEWIPC flag in .BR clone (2). .TP -.BR "network namespace" +.B network namespace The process will have independent IPv4 and IPv6 stacks, IP routing tables, firewall rules, the \fI/proc/net\fP and \fI/sys/class/net\fP directory trees, sockets, etc. For further details, see .BR namespaces (7) and the discussion of the -.BR CLONE_NEWNET +.B CLONE_NEWNET flag in .BR clone (2). .TP -.BR "PID namespace" +.B PID namespace Children will have a distinct set of PID-to-process mappings from their parent. For further details, see .BR pid_namespaces (7) and the discussion of the -.BR CLONE_NEWPID +.B CLONE_NEWPID flag in .BR clone (2). .TP -.BR "cgroup namespace" +.B cgroup namespace The process will have a virtualized view of \fI/proc\:/self\:/cgroup\fP, and new cgroup mounts will be rooted at the namespace cgroup root. For further details, see .BR cgroup_namespaces (7) and the discussion of the -.BR CLONE_NEWCGROUP +.B CLONE_NEWCGROUP flag in .BR clone (2). .TP -.BR "user namespace" +.B user namespace The process will have a distinct set of UIDs, GIDs and capabilities. For further details, see .BR user_namespaces (7) and the discussion of the -.BR CLONE_NEWUSER +.B CLONE_NEWUSER flag in .BR clone (2). .SH OPTIONS |