above the standard error (file descriptor three). Values less than
three are not permitted. This option is only available if the
administrator has enabled the I<closefrom_override> option in
-L<sudoers(@mansectform@)>.
+L<sudoers(5)>.
=item -c
=item -E
The B<-E> (I<preserve environment>) option will override the
-I<env_reset> option in L<sudoers(@mansectform@)>). It is only
+I<env_reset> option in L<sudoers(5)>). It is only
available when either the matching command has the C<SETENV> tag
-or the I<setenv> option is set in L<sudoers(@mansectform@)>.
+or the I<setenv> option is set in L<sudoers(5)>.
=item -e
The B<-H> (I<HOME>) option sets the C<HOME> environment variable
to the homedir of the target user (root by default) as specified
-in passwd(@mansectform@). By default, B<sudo> does not modify C<HOME>
-(see I<set_home> and I<always_set_home> in L<sudoers(@mansectform@)>).
+in passwd(5). By default, B<sudo> does not modify C<HOME>
+(see I<set_home> and I<always_set_home> in L<sudoers(5)>).
=item -h
=item -i
The B<-i> (I<simulate initial login>) option runs the shell specified
-in the L<passwd(@mansectform@)> entry of the user that the command is
+in the L<passwd(5)> entry of the user that the command is
being run as. The command name argument given to the shell begins
with a `C<->' to tell the shell to run as a login shell. B<sudo>
attempts to change to that user's home directory before running the
The B<-s> (I<shell>) option runs the shell specified by the I<SHELL>
environment variable if it is set or the shell as specified
-in L<passwd(@mansectform@)>.
+in L<passwd(5)>.
=item -U
The B<-u> (I<user>) option causes B<sudo> to run the specified command
as a user other than I<root>. To specify a I<uid> instead of a
I<username>, use I<#uid>. Note that if the I<targetpw> Defaults
-option is set (see L<sudoers(@mansectform@)>) it is not possible
+option is set (see L<sudoers(5)>) it is not possible
to run commands with a uid not listed in the password database.
=item -V
variables with one important exception. If the I<setenv> option
is set in I<sudoers> or the command to be run has the C<SETENV> tag
set the user may set variables that would overwise be forbidden.
-See L<sudoers(@mansectform@)> for more information.
+See L<sudoers(5)> for more information.
=head1 RETURN VALUES
access to commands via B<sudo> to verify that the command does not
inadvertently give the user an effective root shell. For more
information, please see the C<PREVENTING SHELL ESCAPES> section in
-L<sudoers(@mansectform@)>.
+L<sudoers(5)>.
=head1 ENVIRONMENT
=head1 EXAMPLES
-Note: the following examples assume suitable L<sudoers(@mansectform@)> entries.
+Note: the following examples assume suitable L<sudoers(5)> entries.
To get a file listing of an unreadable directory:
=head1 SEE ALSO
-L<grep(1)>, L<su(1)>, L<stat(2)>, L<login_cap(3)>, L<passwd(@mansectform@)>,
-L<sudoers(@mansectform@)>, L<visudo(@mansectsu@)>
+L<grep(1)>, L<su(1)>, L<stat(2)>, L<login_cap(3)>, L<passwd(5)>,
+L<sudoers(5)>, L<visudo(8)>
=head1 AUTHORS
Also, many programs (such as editors) allow the user to run commands
via shell escapes, thus avoiding B<sudo>'s checks. However, on
most systems it is possible to prevent shell escapes with B<sudo>'s
-I<noexec> functionality. See the L<sudoers(@mansectform@)> manual
+I<noexec> functionality. See the L<sudoers(5)> manual
for details.
It is not meaningful to run the C<cd> command directly via sudo, e.g.,
=head1 DESCRIPTION
B<visudo> edits the I<sudoers> file in a safe fashion, analogous to
-L<vipw(@mansectsu@)>. B<visudo> locks the I<sudoers> file against multiple
+L<vipw(8)>. B<visudo> locks the I<sudoers> file against multiple
simultaneous edits, provides basic sanity checks, and checks
for parse errors. If the I<sudoers> file is currently being
edited you will receive a message to try again later.
=head1 SEE ALSO
-L<vi(1)>, L<sudoers(@mansectform@)>, L<sudo(@mansectsu@)>, L<vipw(@mansectsu@)>
+L<vi(1)>, L<sudoers(5)>, L<sudo(8)>, L<vipw(8)>
=head1 AUTHOR