Fixed small typos in manual pages and code comments.
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
- The <command>newgidmap</command> sets <filename>/proc/[pid]/gid_map</filename> based on it's
+ The <command>newgidmap</command> sets <filename>/proc/[pid]/gid_map</filename> based on its
command line arguments and the gids allowed in <filename>/etc/subgid</filename>.
Note that the root user is not exempted from the requirement for a valid
<filename>/etc/subgid</filename> entry.
<term>lowergid</term>
<listitem>
<para>
- Begining of the range of GIDs outside the user namespace.
+ Beginning of the range of GIDs outside the user namespace.
</para>
</listitem>
</varlistentry>
<varlistentry>
<term><filename>/etc/subgid</filename></term>
<listitem>
- <para>List of users subordinate group IDs.</para>
+ <para>List of user's subordinate group IDs.</para>
</listitem>
</varlistentry>
<varlistentry>
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
- The <command>newuidmap</command> sets <filename>/proc/[pid]/uid_map</filename> based on it's
+ The <command>newuidmap</command> sets <filename>/proc/[pid]/uid_map</filename> based on its
command line arguments and the uids allowed in <filename>/etc/subuid</filename>.
Note that the root user is not exempted from the requirement for a valid
<filename>/etc/subuid</filename> entry.
<term>uid</term>
<listitem>
<para>
- Begining of the range of UIDs inside the user namespace.
+ Beginning of the range of UIDs inside the user namespace.
</para>
</listitem>
</varlistentry>
<term>loweruid</term>
<listitem>
<para>
- Begining of the range of UIDs outside the user namespace.
+ Beginning of the range of UIDs outside the user namespace.
</para>
</listitem>
</varlistentry>
<varlistentry>
<term><filename>/etc/subuid</filename></term>
<listitem>
- <para>List of users subordinate user IDs.</para>
+ <para>List of user's subordinate user IDs.</para>
</listitem>
</varlistentry>
<varlistentry>
if (have_sub_gids(pw->pw_name, range->lower, range->count))
return true;
- /* Allow a process to map it's own gid */
+ /* Allow a process to map its own gid */
if ((range->count == 1) && (pw->pw_gid == range->lower))
return true;
if (argc < 2)
usage();
- /* Find the process that needs it's user namespace
+ /* Find the process that needs its user namespace
* gid mapping set.
*/
target_str = argv[1];
if (have_sub_uids(pw->pw_name, range->lower, range->count))
return true;
- /* Allow a process to map it's own uid */
+ /* Allow a process to map its own uid */
if ((range->count == 1) && (pw->pw_uid == range->lower))
return true;
if (argc < 2)
usage();
- /* Find the process that needs it's user namespace
+ /* Find the process that needs its user namespace
* uid mapping set.
*/
target_str = argv[1];