aboutsummaryrefslogtreecommitdiffstats
path: root/man7/capabilities.7
diff options
context:
space:
mode:
Diffstat (limited to 'man7/capabilities.7')
-rw-r--r--man7/capabilities.714
1 files changed, 7 insertions, 7 deletions
diff --git a/man7/capabilities.7 b/man7/capabilities.7
index 3905126f61..54779723f2 100644
--- a/man7/capabilities.7
+++ b/man7/capabilities.7
@@ -322,7 +322,7 @@ performance monitoring functionality from the overloaded
.BR CAP_SYS_ADMIN
capability.
See also the kernel source file
-.IR Documentation/admin-guide/perf-security.rst .
+.IR Documentation/admin\-guide/perf\-security.rst .
.TP
.B CAP_SETGID
.RS
@@ -456,7 +456,7 @@ I/O scheduling classes;
forge PID when passing socket credentials via UNIX domain sockets;
.IP *
exceed
-.IR /proc/sys/fs/file-max ,
+.IR /proc/sys/fs/file\-max ,
the system-wide limit on the number of open files,
in system calls that open files (e.g.,
.BR accept (2),
@@ -749,7 +749,7 @@ via a UNIX domain socket (see
.BR unix (7));
.IP *
override the
-.I /proc/sys/fs/pipe-size-max
+.I /proc/sys/fs/pipe\-size\-max
limit when setting the capacity of a pipe using the
.B F_SETPIPE_SZ
.BR fcntl (2)
@@ -758,7 +758,7 @@ command;
use
.BR F_SETPIPE_SZ
to increase the capacity of a pipe above the limit specified by
-.IR /proc/sys/fs/pipe-max-size ;
+.IR /proc/sys/fs/pipe\-max\-size ;
.IP *
override
.I /proc/sys/fs/mqueue/queues_max,
@@ -1445,10 +1445,10 @@ back into the thread's inheritable set in the future.
In kernels before 2.6.25, the capability bounding set is a system-wide
attribute that affects all threads on the system.
The bounding set is accessible via the file
-.IR /proc/sys/kernel/cap-bound .
+.IR /proc/sys/kernel/cap\-bound .
(Confusingly, this bit mask parameter is expressed as a
signed decimal number in
-.IR /proc/sys/kernel/cap-bound .)
+.IR /proc/sys/kernel/cap\-bound .)
.PP
Only the
.B init
@@ -1809,7 +1809,7 @@ since no thread ever has
in either of these cases:
.IP * 2
In the pre-2.6.25 implementation the system-wide capability bounding set,
-.IR /proc/sys/kernel/cap-bound ,
+.IR /proc/sys/kernel/cap\-bound ,
always masks out the
.B CAP_SETPCAP
capability, and this can not be changed