wok-next diff proot/stuff/patches/man.patch @ rev 21727

created recipe for vbindiff
author Hans-G?nter Theisgen
date Sat Nov 21 14:32:44 2020 +0100 (2020-11-21)
parents
children
line diff
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/proot/stuff/patches/man.patch	Sat Nov 21 14:32:44 2020 +0100
     1.3 @@ -0,0 +1,547 @@
     1.4 +--- a/doc/proot/man.1
     1.5 ++++ b/doc/proot/man.1
     1.6 +@@ -1,48 +1,19 @@
     1.7 +-.\" Man page generated from reStructuredText.
     1.8 +-.
     1.9 + .TH PROOT 1 "2014-12-12" "5.1.0" ""
    1.10 + .SH NAME
    1.11 +-PRoot \- chroot, mount --bind, and binfmt_misc without privilege/setup
    1.12 +-.
    1.13 +-.nr rst2man-indent-level 0
    1.14 +-.
    1.15 +-.de1 rstReportMargin
    1.16 +-\\$1 \\n[an-margin]
    1.17 +-level \\n[rst2man-indent-level]
    1.18 +-level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
    1.19 +--
    1.20 +-\\n[rst2man-indent0]
    1.21 +-\\n[rst2man-indent1]
    1.22 +-\\n[rst2man-indent2]
    1.23 +-..
    1.24 +-.de1 INDENT
    1.25 +-.\" .rstReportMargin pre:
    1.26 +-. RS \\$1
    1.27 +-. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin]
    1.28 +-. nr rst2man-indent-level +1
    1.29 +-.\" .rstReportMargin post:
    1.30 +-..
    1.31 +-.de UNINDENT
    1.32 +-. RE
    1.33 +-.\" indent \\n[an-margin]
    1.34 +-.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]]
    1.35 +-.nr rst2man-indent-level -1
    1.36 +-.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]]
    1.37 +-.in \\n[rst2man-indent\\n[rst2man-indent-level]]u
    1.38 +-..
    1.39 ++PRoot \- chroot, mount \-\-bind, and binfmt_misc without privilege/setup
    1.40 + .SH SYNOPSIS
    1.41 + .sp
    1.42 + \fBproot\fP [\fIoption\fP] ... [\fIcommand\fP]
    1.43 + .SH DESCRIPTION
    1.44 + .sp
    1.45 + PRoot is a user\-space implementation of \fBchroot\fP, \fBmount \-\-bind\fP,
    1.46 +-and \fBbinfmt_misc\fP\&.  This means that users don\(aqt need any privileges
    1.47 ++and \fBbinfmt_misc\fP\&.  This means that users don't need any privileges
    1.48 + or setup to do things like using an arbitrary directory as the new
    1.49 + root filesystem, making files accessible somewhere else in the
    1.50 + filesystem hierarchy, or executing programs built for another CPU
    1.51 + architecture transparently through QEMU user\-mode.  Also, developers
    1.52 + can use PRoot as a generic Linux process instrumentation engine thanks
    1.53 +-to its extension mechanism, see \fI\%CARE\fP for an example.  Technically
    1.54 ++to its extension mechanism, see \fICARE\fP for an example.  Technically
    1.55 + PRoot relies on \fBptrace\fP, an unprivileged system\-call available in
    1.56 + every Linux kernel.
    1.57 + .sp
    1.58 +@@ -55,9 +26,9 @@
    1.59 + .sp
    1.60 + When the guest Linux distribution is made for a CPU architecture
    1.61 + incompatible with the host one, PRoot uses the CPU emulator QEMU
    1.62 +-user\-mode to execute transparently guest programs.  It\(aqs a convenient
    1.63 ++user\-mode to execute transparently guest programs.  It's a convenient
    1.64 + way to develop, to build, and to validate any guest Linux packages
    1.65 +-seamlessly on users\(aq computer, just as if they were in a \fInative\fP
    1.66 ++seamlessly on users' computer, just as if they were in a \fInative\fP
    1.67 + guest environment.  That way all of the cross\-compilation issues are
    1.68 + avoided.
    1.69 + .sp
    1.70 +@@ -75,12 +46,11 @@
    1.71 + if they were "normal" host programs.
    1.72 + .SH OPTIONS
    1.73 + .sp
    1.74 +-The command\-line interface is composed of two parts: first PRoot\(aqs
    1.75 ++The command\-line interface is composed of two parts: first PRoot's
    1.76 + options (optional), then the command to launch (\fB/bin/sh\fP if not
    1.77 + specified).  This section describes the options supported by PRoot,
    1.78 + that is, the first part of its command\-line interface.
    1.79 + .SS Regular options
    1.80 +-.INDENT 0.0
    1.81 + .TP
    1.82 + .BI \-r \ path\fP,\fB \ \-\-rootfs\fB= path
    1.83 + Use \fIpath\fP as the new guest root file\-system, default is \fB/\fP\&.
    1.84 +@@ -104,7 +74,7 @@
    1.85 + guest location is a symbolic link, it is dereferenced to ensure
    1.86 + the new content is accessible through all the symbolic links that
    1.87 + point to the overlaid content.  In most cases this default
    1.88 +-behavior shouldn\(aqt be a problem, although it is possible to
    1.89 ++behavior shouldn't be a problem, although it is possible to
    1.90 + explicitly not dereference the guest location by appending it the
    1.91 + \fB!\fP character: \fB\-b *host_path*:*guest_location!*\fP\&.
    1.92 + .TP
    1.93 +@@ -137,14 +107,12 @@
    1.94 + .TP
    1.95 + .B \-h\fP,\fB  \-\-help\fP,\fB  \-\-usage
    1.96 + Print the version and the command\-line usage, then exit.
    1.97 +-.UNINDENT
    1.98 + .SS Extension options
    1.99 + .sp
   1.100 + The following options enable built\-in extensions.  Technically
   1.101 + developers can add their own features to PRoot or use it as a Linux
   1.102 + process instrumentation engine thanks to its extension mechanism, see
   1.103 + the sources for further details.
   1.104 +-.INDENT 0.0
   1.105 + .TP
   1.106 + .BI \-k \ string\fP,\fB \ \-\-kernel\-release\fB= string
   1.107 + Make current kernel appear as kernel release \fIstring\fP\&.
   1.108 +@@ -174,11 +142,9 @@
   1.109 + \fIgid\fP\&.  Likewise, files actually owned by the current user and
   1.110 + group appear as if they were owned by \fIuid\fP and \fIgid\fP instead.
   1.111 + Note that the \fB\-0\fP option is the same as \fB\-i 0:0\fP\&.
   1.112 +-.UNINDENT
   1.113 + .SS Alias options
   1.114 + .sp
   1.115 + The following options are aliases for handy sets of options.
   1.116 +-.INDENT 0.0
   1.117 + .TP
   1.118 + .BI \-R \ path
   1.119 + Alias: \fB\-r *path*\fP + a couple of recommended \fB\-b\fP\&.
   1.120 +@@ -187,10 +153,9 @@
   1.121 + access information about the host system, as it is illustrated in
   1.122 + the \fBExamples\fP section of the manual.  These host information
   1.123 + are typically: user/group definition, network setup, run\-time
   1.124 +-information, users\(aq files, ...  On all Linux distributions, they
   1.125 ++information, users' files, ...  On all Linux distributions, they
   1.126 + all lie in a couple of host files and directories that are
   1.127 + automatically bound by this option:
   1.128 +-.INDENT 7.0
   1.129 + .IP \(bu 2
   1.130 + /etc/host.conf
   1.131 + .IP \(bu 2
   1.132 +@@ -229,7 +194,6 @@
   1.133 + $HOME
   1.134 + .IP \(bu 2
   1.135 + \fIpath\fP
   1.136 +-.UNINDENT
   1.137 + .TP
   1.138 + .BI \-S \ path
   1.139 + Alias: \fB\-0 \-r *path*\fP + a couple of recommended \fB\-b\fP\&.
   1.140 +@@ -238,7 +202,6 @@
   1.141 + the guest rootfs.  It is similar to the \fB\-R\fP option expect it
   1.142 + enables the \fB\-0\fP option and binds only the following minimal set
   1.143 + of paths to avoid unexpected changes on host files:
   1.144 +-.INDENT 7.0
   1.145 + .IP \(bu 2
   1.146 + /etc/host.conf
   1.147 + .IP \(bu 2
   1.148 +@@ -261,8 +224,6 @@
   1.149 + $HOME
   1.150 + .IP \(bu 2
   1.151 + \fIpath\fP
   1.152 +-.UNINDENT
   1.153 +-.UNINDENT
   1.154 + .SH EXIT STATUS
   1.155 + .sp
   1.156 + If an internal error occurs, \fBproot\fP returns a non\-zero exit status,
   1.157 +@@ -285,8 +246,6 @@
   1.158 + \fBproot\fP the path to the guest rootfs followed by the desired
   1.159 + command.  The example below executes the program \fBcat\fP to print the
   1.160 + content of a file:
   1.161 +-.INDENT 0.0
   1.162 +-.INDENT 3.5
   1.163 + .sp
   1.164 + .nf
   1.165 + .ft C
   1.166 +@@ -295,14 +254,10 @@
   1.167 + Welcome to Slackware Linux 8.0
   1.168 + .ft P
   1.169 + .fi
   1.170 +-.UNINDENT
   1.171 +-.UNINDENT
   1.172 + .sp
   1.173 + The default command is \fB/bin/sh\fP when none is specified. Thus the
   1.174 + shortest way to confine an interactive shell and all its sub\-programs
   1.175 + is:
   1.176 +-.INDENT 0.0
   1.177 +-.INDENT 3.5
   1.178 + .sp
   1.179 + .nf
   1.180 + .ft C
   1.181 +@@ -312,15 +267,11 @@
   1.182 + Welcome to Slackware Linux 8.0
   1.183 + .ft P
   1.184 + .fi
   1.185 +-.UNINDENT
   1.186 +-.UNINDENT
   1.187 + .SS \fBmount \-\-bind\fP equivalent
   1.188 + .sp
   1.189 + The bind mechanism enables one to relocate files and directories.  This is
   1.190 + typically useful to trick programs that perform access to hard\-coded
   1.191 + locations, like some installation scripts:
   1.192 +-.INDENT 0.0
   1.193 +-.INDENT 3.5
   1.194 + .sp
   1.195 + .nf
   1.196 + .ft C
   1.197 +@@ -333,14 +284,10 @@
   1.198 + [...] # prog is installed in "/tmp/alternate_opt/bin" actually
   1.199 + .ft P
   1.200 + .fi
   1.201 +-.UNINDENT
   1.202 +-.UNINDENT
   1.203 + .sp
   1.204 + As shown in this example, it is possible to bind over files not even
   1.205 + owned by the user.  This can be used to \fIoverlay\fP system configuration
   1.206 + files, for instance the DNS setting:
   1.207 +-.INDENT 0.0
   1.208 +-.INDENT 3.5
   1.209 + .sp
   1.210 + .nf
   1.211 + .ft C
   1.212 +@@ -348,25 +295,19 @@
   1.213 + \-rw\-r\-\-r\-\- 1 root root 675 Mar  4  2011 /etc/hosts
   1.214 + .ft P
   1.215 + .fi
   1.216 +-.UNINDENT
   1.217 +-.UNINDENT
   1.218 +-.INDENT 0.0
   1.219 +-.INDENT 3.5
   1.220 + .sp
   1.221 + .nf
   1.222 + .ft C
   1.223 + proot \-b ~/alternate_hosts:/etc/hosts
   1.224 + 
   1.225 +-$ echo \(aq1.2.3.4 google.com\(aq > /etc/hosts
   1.226 ++$ echo '1.2.3.4 google.com' > /etc/hosts
   1.227 + $ resolveip google.com
   1.228 + IP address of google.com is 1.2.3.4
   1.229 +-$ echo \(aq5.6.7.8 google.com\(aq > /etc/hosts
   1.230 ++$ echo '5.6.7.8 google.com' > /etc/hosts
   1.231 + $ resolveip google.com
   1.232 + IP address of google.com is 5.6.7.8
   1.233 + .ft P
   1.234 + .fi
   1.235 +-.UNINDENT
   1.236 +-.UNINDENT
   1.237 + .sp
   1.238 + Another example: on most Linux distributions \fB/bin/sh\fP is a symbolic
   1.239 + link to \fB/bin/bash\fP, whereas it points to \fB/bin/dash\fP on Debian
   1.240 +@@ -374,21 +315,15 @@
   1.241 + might not work with Dash.  In this case, the binding mechanism of
   1.242 + PRoot can be used to set non\-disruptively \fB/bin/bash\fP as the default
   1.243 + \fB/bin/sh\fP on these two Linux distributions:
   1.244 +-.INDENT 0.0
   1.245 +-.INDENT 3.5
   1.246 + .sp
   1.247 + .nf
   1.248 + .ft C
   1.249 + proot \-b /bin/bash:/bin/sh [...]
   1.250 + .ft P
   1.251 + .fi
   1.252 +-.UNINDENT
   1.253 +-.UNINDENT
   1.254 + .sp
   1.255 + Because \fB/bin/sh\fP is initially a symbolic link to \fB/bin/dash\fP, the
   1.256 + content of \fB/bin/bash\fP is actually bound over this latter:
   1.257 +-.INDENT 0.0
   1.258 +-.INDENT 3.5
   1.259 + .sp
   1.260 + .nf
   1.261 + .ft C
   1.262 +@@ -402,18 +337,14 @@
   1.263 + 089ed56cd74e63f461bef0fdfc2d159a  /bin/dash
   1.264 + .ft P
   1.265 + .fi
   1.266 +-.UNINDENT
   1.267 +-.UNINDENT
   1.268 + .sp
   1.269 +-In most cases this shouldn\(aqt be a problem, but it is still possible to
   1.270 ++In most cases this shouldn't be a problem, but it is still possible to
   1.271 + strictly bind \fB/bin/bash\fP over \fB/bin/sh\fP \-\- without dereferencing
   1.272 + it \-\- by specifying the \fB!\fP character at the end:
   1.273 +-.INDENT 0.0
   1.274 +-.INDENT 3.5
   1.275 + .sp
   1.276 + .nf
   1.277 + .ft C
   1.278 +-proot \-b \(aq/bin/bash:/bin/sh!\(aq
   1.279 ++proot \-b '/bin/bash:/bin/sh!'
   1.280 + 
   1.281 + $ md5sum /bin/sh
   1.282 + 089ed56cd74e63f461bef0fdfc2d159a  /bin/sh
   1.283 +@@ -423,16 +354,12 @@
   1.284 + c229085928dc19e8d9bd29fe88268504  /bin/dash
   1.285 + .ft P
   1.286 + .fi
   1.287 +-.UNINDENT
   1.288 +-.UNINDENT
   1.289 + .SS \fBchroot\fP + \fBmount \-\-bind\fP equivalent
   1.290 + .sp
   1.291 + The two features above can be combined to make any file from the host
   1.292 + rootfs accessible in the confined environment just as if it were
   1.293 + initially part of the guest rootfs.  It is sometimes required to run
   1.294 + programs that rely on some specific files:
   1.295 +-.INDENT 0.0
   1.296 +-.INDENT 3.5
   1.297 + .sp
   1.298 + .nf
   1.299 + .ft C
   1.300 +@@ -442,12 +369,8 @@
   1.301 + Error, do this: mount \-t proc none /proc
   1.302 + .ft P
   1.303 + .fi
   1.304 +-.UNINDENT
   1.305 +-.UNINDENT
   1.306 + .sp
   1.307 + works better with:
   1.308 +-.INDENT 0.0
   1.309 +-.INDENT 3.5
   1.310 + .sp
   1.311 + .nf
   1.312 + .ft C
   1.313 +@@ -461,14 +384,10 @@
   1.314 + ?        ps \-o tty,command
   1.315 + .ft P
   1.316 + .fi
   1.317 +-.UNINDENT
   1.318 +-.UNINDENT
   1.319 + .sp
   1.320 +-Actually there\(aqs a bunch of such specific files, that\(aqs why PRoot
   1.321 ++Actually there's a bunch of such specific files, that's why PRoot
   1.322 + provides the option \fB\-R\fP to bind automatically a pre\-defined list of
   1.323 + recommended paths:
   1.324 +-.INDENT 0.0
   1.325 +-.INDENT 3.5
   1.326 + .sp
   1.327 + .nf
   1.328 + .ft C
   1.329 +@@ -482,16 +401,12 @@
   1.330 + pts/6    ps \-o tty,command
   1.331 + .ft P
   1.332 + .fi
   1.333 +-.UNINDENT
   1.334 +-.UNINDENT
   1.335 + .SS \fBchroot\fP + \fBmount \-\-bind\fP + \fBsu\fP equivalent
   1.336 + .sp
   1.337 + Some programs will not work correctly if they are not run by the
   1.338 + "root" user, this is typically the case with package managers.  PRoot
   1.339 + can fake the root identity and its privileges when the \fB\-0\fP (zero)
   1.340 + option is specified:
   1.341 +-.INDENT 0.0
   1.342 +-.INDENT 3.5
   1.343 + .sp
   1.344 + .nf
   1.345 + .ft C
   1.346 +@@ -502,13 +417,11 @@
   1.347 + 
   1.348 + # mkdir /tmp/foo
   1.349 + # chmod a\-rwx /tmp/foo
   1.350 +-# echo \(aqI bypass file\-system permissions.\(aq > /tmp/foo/bar
   1.351 ++# echo 'I bypass file\-system permissions.' > /tmp/foo/bar
   1.352 + # cat /tmp/foo/bar
   1.353 + I bypass file\-system permissions.
   1.354 + .ft P
   1.355 + .fi
   1.356 +-.UNINDENT
   1.357 +-.UNINDENT
   1.358 + .sp
   1.359 + This option is typically required to create or install packages into
   1.360 + the guest rootfs.  Note it is \fInot\fP recommended to use the \fB\-R\fP
   1.361 +@@ -516,8 +429,6 @@
   1.362 + system files, like \fB/etc/group\fP\&.  Instead, it is recommended to use
   1.363 + the \fB\-S\fP option.  This latter enables the \fB\-0\fP option and binds
   1.364 + only paths that are known to not be updated by packages:
   1.365 +-.INDENT 0.0
   1.366 +-.INDENT 3.5
   1.367 + .sp
   1.368 + .nf
   1.369 + .ft C
   1.370 +@@ -527,18 +438,14 @@
   1.371 + Installing package perl...
   1.372 + .ft P
   1.373 + .fi
   1.374 +-.UNINDENT
   1.375 +-.UNINDENT
   1.376 + .SS \fBchroot\fP + \fBmount \-\-bind\fP + \fBbinfmt_misc\fP equivalent
   1.377 + .sp
   1.378 + PRoot uses QEMU user\-mode to execute programs built for a CPU
   1.379 +-architecture incompatible with the host one.  From users\(aq
   1.380 ++architecture incompatible with the host one.  From users'
   1.381 + point\-of\-view, guest programs handled by QEMU user\-mode are executed
   1.382 + transparently, that is, just like host programs.  To enable this
   1.383 + feature users just have to specify which instance of QEMU user\-mode
   1.384 + they want to use with the option \fB\-q\fP:
   1.385 +-.INDENT 0.0
   1.386 +-.INDENT 3.5
   1.387 + .sp
   1.388 + .nf
   1.389 + .ft C
   1.390 +@@ -548,31 +455,23 @@
   1.391 + Welcome to ARMedSlack Linux 12.2
   1.392 + .ft P
   1.393 + .fi
   1.394 +-.UNINDENT
   1.395 +-.UNINDENT
   1.396 + .sp
   1.397 + The parameter of the \fB\-q\fP option is actually a whole QEMU user\-mode
   1.398 + command, for instance to enable its GDB server on port 1234:
   1.399 +-.INDENT 0.0
   1.400 +-.INDENT 3.5
   1.401 + .sp
   1.402 + .nf
   1.403 + .ft C
   1.404 + proot \-R /mnt/armslack\-12.2/ \-q "qemu\-arm \-g 1234" emacs
   1.405 + .ft P
   1.406 + .fi
   1.407 +-.UNINDENT
   1.408 +-.UNINDENT
   1.409 + .sp
   1.410 + PRoot allows one to mix transparently the emulated execution of guest
   1.411 + programs and the native execution of host programs in the same
   1.412 +-file\-system namespace.  It\(aqs typically useful to extend the list of
   1.413 ++file\-system namespace.  It's typically useful to extend the list of
   1.414 + available programs and to speed up build\-time significantly.  This
   1.415 + mixed\-execution feature is enabled by default when using QEMU
   1.416 + user\-mode, and the content of the host rootfs is made accessible
   1.417 + through \fB/host\-rootfs\fP:
   1.418 +-.INDENT 0.0
   1.419 +-.INDENT 3.5
   1.420 + .sp
   1.421 + .nf
   1.422 + .ft C
   1.423 +@@ -580,24 +479,20 @@
   1.424 + 
   1.425 + $ file /bin/echo
   1.426 + [...] ELF 32\-bit LSB executable, ARM [...]
   1.427 +-$ /bin/echo \(aqHello world!\(aq
   1.428 ++$ /bin/echo 'Hello world!'
   1.429 + Hello world!
   1.430 + 
   1.431 + $ file /host\-rootfs/bin/echo
   1.432 + [...] ELF 64\-bit LSB executable, x86\-64 [...]
   1.433 +-$ /host\-rootfs/bin/echo \(aqHello mixed world!\(aq
   1.434 ++$ /host\-rootfs/bin/echo 'Hello mixed world!'
   1.435 + Hello mixed world!
   1.436 + .ft P
   1.437 + .fi
   1.438 +-.UNINDENT
   1.439 +-.UNINDENT
   1.440 + .sp
   1.441 + Since both host and guest programs use the guest rootfs as \fB/\fP,
   1.442 + users may want to deactivate explicitly cross\-filesystem support found
   1.443 + in most GNU cross\-compilation tools.  For example with GCC configured
   1.444 + to cross\-compile to the ARM target:
   1.445 +-.INDENT 0.0
   1.446 +-.INDENT 3.5
   1.447 + .sp
   1.448 + .nf
   1.449 + .ft C
   1.450 +@@ -608,14 +503,10 @@
   1.451 + $ ./configure; make
   1.452 + .ft P
   1.453 + .fi
   1.454 +-.UNINDENT
   1.455 +-.UNINDENT
   1.456 + .sp
   1.457 + As with regular files, a host instance of a program can be bound over
   1.458 + its guest instance.  Here is an example where the guest binary of
   1.459 + \fBmake\fP is overlaid by the host one:
   1.460 +-.INDENT 0.0
   1.461 +-.INDENT 3.5
   1.462 + .sp
   1.463 + .nf
   1.464 + .ft C
   1.465 +@@ -628,31 +519,24 @@
   1.466 + Built for x86_64\-slackware\-linux\-gnu
   1.467 + .ft P
   1.468 + .fi
   1.469 +-.UNINDENT
   1.470 +-.UNINDENT
   1.471 + .sp
   1.472 +-It\(aqs worth mentioning that even when mixing the native execution of
   1.473 ++It's worth mentioning that even when mixing the native execution of
   1.474 + host programs and the emulated execution of guest programs, they still
   1.475 + believe they are running in a native guest environment.  As a
   1.476 + demonstration, here is a partial output of a typical \fB\&./configure\fP
   1.477 + script:
   1.478 +-.INDENT 0.0
   1.479 +-.INDENT 3.5
   1.480 + .sp
   1.481 + .nf
   1.482 + .ft C
   1.483 + checking whether the C compiler is a cross\-compiler... no
   1.484 + .ft P
   1.485 + .fi
   1.486 +-.UNINDENT
   1.487 +-.UNINDENT
   1.488 + .SH DOWNLOADS
   1.489 + .SS PRoot
   1.490 + .sp
   1.491 + The latest release of PRoot is packaged on \fI\%http://packages.proot.me\fP
   1.492 + and sources are hosted on \fI\%http://github.proot.me\fP\&.  It is also
   1.493 + available as highly compatible static binaries:
   1.494 +-.INDENT 0.0
   1.495 + .IP \(bu 2
   1.496 + for x86_64: \fI\%http://static.proot.me/proot\-x86_64\fP
   1.497 + .IP \(bu 2
   1.498 +@@ -661,14 +545,12 @@
   1.499 + for ARM: \fI\%http://static.proot.me/proot\-arm\fP
   1.500 + .IP \(bu 2
   1.501 + other architectures: on demand.
   1.502 +-.UNINDENT
   1.503 + .SS Rootfs
   1.504 + .sp
   1.505 + Here follows a couple of URLs where some rootfs archives can be freely
   1.506 + downloaded.  Note that \fBmknod\fP errors reported by \fBtar\fP when
   1.507 + extracting these archives can be safely ignored since special files
   1.508 + are typically bound (see \fB\-R\fP option for details).
   1.509 +-.INDENT 0.0
   1.510 + .IP \(bu 2
   1.511 + \fI\%http://download.openvz.org/template/precreated/\fP
   1.512 + .IP \(bu 2
   1.513 +@@ -679,20 +561,15 @@
   1.514 + \fI\%http://cdimage.ubuntu.com/ubuntu\-core/releases/\fP
   1.515 + .IP \(bu 2
   1.516 + \fI\%http://archlinuxarm.org/developers/downloads\fP
   1.517 +-.UNINDENT
   1.518 + .sp
   1.519 + Technically such rootfs archive can be created by running the
   1.520 + following command on the expected Linux distribution:
   1.521 +-.INDENT 0.0
   1.522 +-.INDENT 3.5
   1.523 + .sp
   1.524 + .nf
   1.525 + .ft C
   1.526 + tar \-\-one\-file\-system \-\-create \-\-gzip \-\-file my_rootfs.tar.gz /
   1.527 + .ft P
   1.528 + .fi
   1.529 +-.UNINDENT
   1.530 +-.UNINDENT
   1.531 + .SS QEMU user\-mode
   1.532 + .sp
   1.533 + QEMU user\-mode is required only if the guest rootfs was made for a CPU
   1.534 +@@ -710,8 +587,6 @@
   1.535 + .sp
   1.536 + Visit \fI\%http://proot.me\fP for help, bug reports, suggestions, patches, ...
   1.537 + Copyright (C) 2014 STMicroelectronics, licensed under GPL v2 or later.
   1.538 +-.INDENT 0.0
   1.539 +-.INDENT 3.5
   1.540 + .sp
   1.541 + .nf
   1.542 + .ft C
   1.543 +@@ -721,7 +596,4 @@
   1.544 + |__|  |__|__\e_____/\e_____/\e____|
   1.545 + .ft P
   1.546 + .fi
   1.547 +-.UNINDENT
   1.548 +-.UNINDENT
   1.549 +-.\" Generated by docutils manpage writer.
   1.550 + .