A minor wording fix...
Signed-off-by: Michael Kerrisk <mtk.man-pages@gmail.com>
It is not possible to send a signal to an explicitly selected thread in a
multithreaded process using the
.BR kill (2)
-syscall. If
+system call. If
.BR kill (2)
is used to send a signal to a thread group, then the kernel selects an arbitrary
member of the thread group that has not blocked the signal. For more details
.PP
The command
.BR kill (1)
-as well as syscall
+as well as system call
.BR kill (2)
accept a TID (thread ID, see
.BR gettid (2))
.RE
This feature is not supported by the Linux kernel; it is implemented in userspace
-by an additional \fBmount\fR(2) remounting syscall. This solution is not atomic.
+by an additional \fBmount\fR(2) remounting system call.
+This solution is not atomic.
The alternative (classic) way to create a read-only bind mount is to use the remount
operation, for example:
Note that the Linux kernel does not allow to change multiple propagation flags
with a single
.BR mount (2)
-syscall, and the flags cannot be mixed with other mount options.
+system call, and the flags cannot be mixed with other mount options.
Since util-linux 2.23 the \fBmount\fR command allows to use several propagation flags
together and also together with other mount operations. This feature is EXPERIMENTAL.
-The propagation flags are applied by additional \fBmount\fR(2) syscalls when the
+The propagation flags are applied by additional \fBmount\fR(2) system calls when the
preceding mount operations were successful. Note that this use case is not
atomic. It is possible to specify the propagation flags in
.BR fstab (5)
The difference between the commands setpriv and su (or runuser) is that setpriv does
not use open PAM session and does not ask for password. It's simple non-suid wrapper around
.B execve
-syscall.
+system call.
.SH OPTION
.TP
.B \-\-clear\-groups
Note that this option does not guarantee that umount command does not hang.
It's strongly recommended to use absolute paths without symlinks to avoid
-unwanted readlink and stat syscalls on unreachable NFS in umount.
+unwanted readlink and stat system calls on unreachable NFS in umount.
.TP
.BR \-i , " \-\-internal\-only"
Do not call the \fB/sbin/umount.\fIfilesystem\fR helper even if it exists.
.BR "\-\-setgroups allow" | deny
Allow or deny the
.BR setgroups (2)
-syscall in a user namespace.
+system call in a user namespace.
.sp
To be able to call
.BR setgroups (2),