aboutsummaryrefslogtreecommitdiffstats
path: root/man2/execve.2
diff options
context:
space:
mode:
Diffstat (limited to 'man2/execve.2')
-rw-r--r--man2/execve.234
1 files changed, 17 insertions, 17 deletions
diff --git a/man2/execve.2 b/man2/execve.2
index 9b02659c6c..e127df771d 100644
--- a/man2/execve.2
+++ b/man2/execve.2
@@ -78,8 +78,8 @@ after a successful
.BR execve ().
If the set-user-ID bit is set on the program file pointed to by
-\fIfilename\fP,
-and the underlying file system is not mounted
+\fIfilename\fP,
+and the underlying file system is not mounted
.IR nosuid
(the
.B MS_NOSUID
@@ -211,7 +211,7 @@ For the handling of capabilities during
see
.BR capabilities (7).
.IP * 4
-By default, file descriptors remain open across an
+By default, file descriptors remain open across an
.BR execve ().
File descriptors that are marked close-on-exec are closed
; see the description of
@@ -223,7 +223,7 @@ of all record locks obtained on the underlying file by this process.
See
.BR fcntl (2)
for details.)
-POSIX.1-2001 says that if file descriptors 0, 1, and 2 would
+POSIX.1-2001 says that if file descriptors 0, 1, and 2 would
otherwise be closed after a successful
.BR execve (),
and the process would gain privilege because the set-user_ID or
@@ -231,14 +231,14 @@ set-group_ID permission bit was set on the executed file,
then the system may open an unspecified file for each of these
file descriptors.
As a general principle, no portable program, whether privileged or not,
-can assume that these three file descriptors will remain
+can assume that these three file descriptors will remain
closed across an
.BR execve ().
.\" On Linux it appears that these file descriptors are
.\" always open after an execve(), and it looks like
.\" Solaris 8 and FreeBSD 6.1 are the same. -- mtk, 30 Apr 2007
.SS Interpreter scripts
-An interpreter script is a text file that has execute
+An interpreter script is a text file that has execute
permission enabled and whose first line is of the form:
.in +0.5i
@@ -247,15 +247,15 @@ permission enabled and whose first line is of the form:
.fi
.in
-The
-.I interpreter
+The
+.I interpreter
must be a valid pathname for an
executable which is not itself a script.
-If the
+If the
.I filename
argument of
.BR execve ()
-specifies an interpreter script, then
+specifies an interpreter script, then
.I interpreter
will be invoked with the following arguments:
@@ -267,9 +267,9 @@ will be invoked with the following arguments:
where
.I arg...
-is the series of words pointed to by the
+is the series of words pointed to by the
.I argv
-argument of
+argument of
.BR execve ().
For portable use,
@@ -401,14 +401,14 @@ a #! executable shell script.
The semantics of the
.I optional-arg
argument of an interpreter script vary across implementations.
-On Linux, the entire string following the
+On Linux, the entire string following the
.I interpreter
name is passed as a single argument to the interpreter,
and this string can include white space.
However, behavior differs on some other systems.
Some systems
.\" e.g., Solaris 8
-use the first white space to terminate
+use the first white space to terminate
.IR optional-arg .
On some systems,
.\" e.g., FreeBSD before 6.0, but not FreeBSD 6.0 onwards
@@ -417,7 +417,7 @@ and white spaces in
.I optional-arg
are used to delimit the arguments.
-On Linux,
+On Linux,
.I argv
and
.I envp
@@ -437,7 +437,7 @@ on most other Unix systems doing this will result in an error.
.\" Some Linux versions have failed to check permissions on ELF
.\" interpreters. This is a security hole, because it allows users to
.\" open any file, such as a rewinding tape device, for reading. Some
-.\" Linux versions have also had other security holes in
+.\" Linux versions have also had other security holes in
.\" .BR execve (2)
.\" that could be exploited for denial of service by a suitably crafted
.\" ELF binary. There are no known problems with 2.0.34 or 2.2.15.
@@ -494,7 +494,7 @@ main(int argc, char *argv[])
char *newargv[] = { NULL, "hello", "world", NULL };
char *newenviron[] = { NULL };
- assert(argc == 2); /* argv[1] identifies
+ assert(argc == 2); /* argv[1] identifies
program to exec */
newargv[0] = argv[1];