* [PATCH] man2/*: srcfix: Correct the misuse of two-fonts macros
@ 2020-02-23 21:27 Bjarni Ingi Gislason
0 siblings, 0 replies; only message in thread
From: Bjarni Ingi Gislason @ 2020-02-23 21:27 UTC (permalink / raw)
To: mtk.manpages; +Cc: linux-man
Changes are based on the latest (23th Februar 2020) revision of my
local git repository.
Correct the misuse of a two-font macro, which function is to:
1) use the first font for each odd numbered argument and the second
font for all others.
2) join the arguments without an intervening space.
Signed-off-by: Bjarni Ingi Gislason <bjarniig@rhi.hi.is>
---
man2/clone.2 | 34 +++++++++++++++++-----------------
man2/ioctl_fideduperange.2 | 2 +-
man2/ioctl_iflags.2 | 4 ++--
man2/memfd_create.2 | 2 +-
man2/mmap.2 | 2 +-
man2/perf_event_open.2 | 2 +-
man2/pidfd_open.2 | 18 +++++++++---------
man2/pidfd_send_signal.2 | 8 ++++----
man2/pivot_root.2 | 8 ++++----
man2/prctl.2 | 4 ++--
man2/ptrace.2 | 14 +++++++-------
11 files changed, 49 insertions(+), 49 deletions(-)
diff --git a/man2/clone.2 b/man2/clone.2
index ee1677ef5..e915ddcb9 100644
--- a/man2/clone.2
+++ b/man2/clone.2
@@ -209,7 +209,7 @@ should be initialized to the size of this structure.
(The existence of the
.I size
argument permits future extensions to the
-.IR clone_args
+.I clone_args
structure.)
.PP
The stack for the child process is specified via
@@ -219,7 +219,7 @@ and
.IR cl_args.stack_size ,
which specifies the size of the stack in bytes.
In the case where the
-.BR CLONE_VM
+.B CLONE_VM
flag (see below) is specified, a stack must be explicitly allocated
and specified.
Otherwise, these two fields can be specified as NULL and 0,
@@ -364,12 +364,12 @@ will be selected the same way as any other PID is selected.
The
.I set_tid
feature requires
-.BR CAP_SYS_ADMIN
+.B CAP_SYS_ADMIN
in all owning user namespaces of the target PID namespaces.
.PP
Callers may only choose a PID greater than 1 in a given PID namespace
if an
-.BR init
+.B init
process (i.e., a process with PID 1) already exists in that namespace.
Otherwise the PID
entry for this PID namespace must be 1.
@@ -456,7 +456,7 @@ there was a
flag,
which caused the parent not to receive a signal when the child terminated.
Ultimately, the effect of this flag was subsumed under the
-.BR CLONE_THREAD
+.B CLONE_THREAD
flag and by the time Linux 2.6.0 was released, this flag had no effect.
Starting in Linux 2.6.2, the need to give this flag together with
.B CLONE_THREAD
@@ -465,7 +465,7 @@ disappeared.
This flag is still defined, but it is usually ignored when calling
.BR clone ().
However, see the description of
-.BR CLONE_PIDFD
+.B CLONE_PIDFD
for some exceptions.
.TP
.BR CLONE_FILES " (since Linux 2.0)"
@@ -785,7 +785,7 @@ From Linux 2.3.21 onward, this flag could be
specified only by the system boot process (PID 0).
The flag disappeared completely from the kernel sources in Linux 2.5.16.
Subsequently, the kernel silently ignored this bit if it was specified in the
-.IR flags
+.I flags
mask.
Much later, the same bit was recycled for use as the
.B CLONE_PIDFD
@@ -828,7 +828,7 @@ will always be a thread group leader.
If the obsolete
.B CLONE_DETACHED
flag is specified alongside
-.BR CLONE_PIDFD
+.B CLONE_PIDFD
when calling
.BR clone (),
an error is returned.
@@ -837,7 +837,7 @@ An error also results if
is specified when calling
.BR clone3 ().
This error behavior ensures that the bit corresponding to
-.BR CLONE_DETACHED
+.B CLONE_DETACHED
can be reused for further PID file descriptor features in the future.
.TP
.BR CLONE_PTRACE " (since Linux 2.2)"
@@ -1364,7 +1364,7 @@ Both
and
.B CLONE_NEWNS
were specified in the
-.IR flags
+.I flags
mask.
.TP
.BR EINVAL " (since Linux 3.9)"
@@ -1373,7 +1373,7 @@ Both
and
.B CLONE_FS
were specified in the
-.IR flags
+.I flags
mask.
.TP
.B EINVAL
@@ -1382,7 +1382,7 @@ Both
and
.B CLONE_SYSVSEM
were specified in the
-.IR flags
+.I flags
mask.
.TP
.B EINVAL
@@ -1395,12 +1395,12 @@ and one (or both) of
or
.B CLONE_PARENT
were specified in the
-.IR flags
+.I flags
mask.
.TP
.BR EINVAL " (since Linux 2.6.32)"
.\" commit 123be07b0b399670a7cc3d82fef0cb4f93ef885c
-.BR CLONE_PARENT
+.B CLONE_PARENT
was specified, and the caller is an init process.
.TP
.B EINVAL
@@ -1527,7 +1527,7 @@ would have been exceeded; see
.BR ENOSPC " (since Linux 4.9; beforehand " EUSERS )
.B CLONE_NEWUSER
was specified in the
-.IR flags
+.I flags
mask, and the call would cause the limit on the number of
nested user namespaces to be exceeded.
See
@@ -1595,7 +1595,7 @@ System call was interrupted by a signal and will be restarted.
.BR EUSERS " (Linux 3.11 to Linux 4.8)"
.B CLONE_NEWUSER
was specified in the
-.IR flags
+.I flags
mask,
and the limit on the number of nested user namespaces would be exceeded.
See the discussion of the
@@ -1716,7 +1716,7 @@ at the end of the stack using
.BR mprotect (2).
.IP *
We can specify the
-.BR MAP_STACK
+.B MAP_STACK
flag to request a mapping that is suitable for a stack.
For the moment, this flag is a no-op on Linux,
but it exists and has effect on some other systems,
diff --git a/man2/ioctl_fideduperange.2 b/man2/ioctl_fideduperange.2
index 0ec1575e9..921dd1976 100644
--- a/man2/ioctl_fideduperange.2
+++ b/man2/ioctl_fideduperange.2
@@ -176,7 +176,7 @@ regions in directories.
.B ENOMEM
The kernel was unable to allocate sufficient memory to perform the
operation or
-.IR dest_count
+.I dest_count
is so large that the input argument description spans more than a single
page of memory.
.TP
diff --git a/man2/ioctl_iflags.2 b/man2/ioctl_iflags.2
index acc2cc907..8b91601ae 100644
--- a/man2/ioctl_iflags.2
+++ b/man2/ioctl_iflags.2
@@ -202,9 +202,9 @@ or the caller must have the
capability.
.PP
The type of the argument given to the
-.BR FS_IOC_GETFLAGS
+.B FS_IOC_GETFLAGS
and
-.BR FS_IOC_SETFLAGS
+.B FS_IOC_SETFLAGS
operations is
.IR "int\ *" ,
notwithstanding the implication in the kernel source file
diff --git a/man2/memfd_create.2 b/man2/memfd_create.2
index 0a867a5ad..d3e70f823 100644
--- a/man2/memfd_create.2
+++ b/man2/memfd_create.2
@@ -282,7 +282,7 @@ in order to restrict further modifications on the file.
then it will be necessary to first unmap the shared writable mapping
created in the previous step.
Otherwise, behavior similar to
-.BR F_SEAL_WRITE
+.B F_SEAL_WRITE
can be achieved by using
.BR F_SEAL_FUTURE_WRITE ,
which will prevent future writes via
diff --git a/man2/mmap.2 b/man2/mmap.2
index e0173c768..07de6e849 100644
--- a/man2/mmap.2
+++ b/man2/mmap.2
@@ -417,7 +417,7 @@ for stack allocations.
.\" "pthread_create() slow for many threads; also time to revisit 64b
.\" context switch optimization?"
A further reason to employ this flag is portability:
-.BR MAP_STACK
+.B MAP_STACK
exists (and has an effect) on some other systems (e.g., some of the BSDs).
.TP
.BR MAP_SYNC " (since Linux 4.15)"
diff --git a/man2/perf_event_open.2 b/man2/perf_event_open.2
index 84eeb353b..72c8690ae 100644
--- a/man2/perf_event_open.2
+++ b/man2/perf_event_open.2
@@ -3457,5 +3457,5 @@ main(int argc, char **argv)
.BR prctl (2),
.BR read (2)
.PP
-.IR Documentation/admin-guide/perf-security.rst
+.I Documentation/admin-guide/perf-security.rst
in the kernel source tree
diff --git a/man2/pidfd_open.2 b/man2/pidfd_open.2
index 3c847f7e1..f7e33ea31 100644
--- a/man2/pidfd_open.2
+++ b/man2/pidfd_open.2
@@ -64,7 +64,7 @@ is not valid.
.B EMFILE
The per-process limit on the number of open file descriptors has been reached
(see the description of
-.BR RLIMIT_NOFILE
+.B RLIMIT_NOFILE
in
.BR getrlimit (2)).
.TP
@@ -113,18 +113,18 @@ Note, however, that this is guaranteed only if the following
conditions hold true:
.IP * 3
the disposition of
-.BR SIGCHLD
+.B SIGCHLD
has not been explicitly set to
-.BR SIG_IGN
+.B SIG_IGN
(see
.BR sigaction (2));
.IP *
the
-.BR SA_NOCLDWAIT
+.B SA_NOCLDWAIT
flag was not specified while establishing a handler for
-.BR SIGCHLD
+.B SIGCHLD
or while setting the disposition of that signal to
-.BR SIG_DFL
+.B SIG_DFL
(see
.BR sigaction (2));
and
@@ -139,7 +139,7 @@ then the child process (along with a PID file descriptor that refers to it)
should instead be created using
.BR clone (2)
with the
-.BR CLONE_PIDFD
+.B CLONE_PIDFD
flag.
.\"
.SS Use cases for PID file descriptors
@@ -149,7 +149,7 @@ A PID file descriptor returned by
(of by
.BR clone (2)
with the
-.BR CLONE_PID
+.B CLONE_PID
flag) can be used for the following purposes:
.IP * 3
The
@@ -194,7 +194,7 @@ process whose PID is specified as its command-line argument.
It then uses
.BR poll (2)
to monitor the file descriptor for process exit, as indicated by an
-.BR EPOLLIN
+.B EPOLLIN
event.
.\"
.SS Program source
diff --git a/man2/pidfd_send_signal.2 b/man2/pidfd_send_signal.2
index fbf124412..30a273372 100644
--- a/man2/pidfd_send_signal.2
+++ b/man2/pidfd_send_signal.2
@@ -69,7 +69,7 @@ is set to 0;
.IP *
.I si_code
is set to
-.BR SI_USER;
+.BR SI_USER ;
.IP *
.I si_pid
is set to the caller's PID; and
@@ -119,7 +119,7 @@ to the target process.
.B EPERM
.I pidfd
doesn't refer to the calling process, and
-.IR info.si_code
+.I info.si_code
is invalid (see
.BR rt_sigqueueinfo (2)).
.TP
@@ -144,7 +144,7 @@ a file descriptor that refers to process.
Such a file descriptor can be obtained in any of the following ways:
.IP * 3
by opening a
-.IR /proc/[pid]
+.IR /proc/ [ pid ]
directory;
.IP *
using
@@ -156,7 +156,7 @@ via the PID file descriptor that is returned by a call to
or
.BR clone3 (2)
that specifies the
-.BR CLONE_PIDFD
+.B CLONE_PIDFD
flag.
.PP
The
diff --git a/man2/pivot_root.2 b/man2/pivot_root.2
index 199536161..7b51278de 100644
--- a/man2/pivot_root.2
+++ b/man2/pivot_root.2
@@ -56,9 +56,9 @@ and thus it should be followed by a
.PP
The following restrictions apply:
.IP \- 3
-.IR new_root
+.I new_root
and
-.IR put_old
+.I put_old
must be directories.
.IP \-
.I new_root
@@ -79,7 +79,7 @@ A path that is not already a mount point can be converted into one by
bind mounting the path onto itself.
.IP \-
The propagation type of the parent mount of
-.IR new_root
+.I new_root
and the parent mount of the current root directory must not be
.BR MS_SHARED ;
similarly, if
@@ -241,7 +241,7 @@ working directory refer to the new root mount point
During the subsequent
.BR umount ()
call, resolution of
-.IR """."""
+.I """."""
starts with
.I new_root
and then moves up the list of mounts stacked at
diff --git a/man2/prctl.2 b/man2/prctl.2
index ef7a91c1a..6a773a970 100644
--- a/man2/prctl.2
+++ b/man2/prctl.2
@@ -1667,9 +1667,9 @@ does not specify a valid capability.
.B EINVAL
.I option
was
-.BR PR_GET_SPECULATION_CTRL
+.B PR_GET_SPECULATION_CTRL
or
-.BR PR_SET_SPECULATION_CTRL
+.B PR_SET_SPECULATION_CTRL
and unused arguments to
.BR prctl ()
are not 0.
diff --git a/man2/ptrace.2 b/man2/ptrace.2
index 5811bbe74..2a2d97148 100644
--- a/man2/ptrace.2
+++ b/man2/ptrace.2
@@ -1071,37 +1071,37 @@ and
fields are defined for all kinds of ptrace system call stops.
The rest of the structure is a union; one should read only those fields
that are meaningful for the kind of system call stop specified by the
-.IR op
+.I op
field.
.IP
The
.I op
field has one of the following values (defined in
-.IR <linux/ptrace.h>)
+.IR <linux/ptrace.h> )
indicating what type of stop occurred and
which part of the union is filled:
.RS
.TP
-.BR PTRACE_SYSCALL_INFO_ENTRY
+.B PTRACE_SYSCALL_INFO_ENTRY
The
.I entry
component of the union contains information relating to a
system call entry stop.
.TP
-.BR PTRACE_SYSCALL_INFO_EXIT
+.B PTRACE_SYSCALL_INFO_EXIT
The
.I exit
component of the union contains information relating to a
system call exit stop.
.TP
-.BR PTRACE_SYSCALL_INFO_SECCOMP
+.B PTRACE_SYSCALL_INFO_SECCOMP
The
.I seccomp
component of the union contains information relating to a
.B PTRACE_EVENT_SECCOMP
stop.
.TP
-.BR PTRACE_SYSCALL_INFO_NONE
+.B PTRACE_SYSCALL_INFO_NONE
No component of the union contains relevant information.
.RE
.\"
@@ -1566,7 +1566,7 @@ returning with
and
.I WSTOPSIG(status)
returns
-.BR SIGTRAP
+.B SIGTRAP
(or for
.BR PTRACE_EVENT_STOP ,
returns the stopping signal if tracee is in a group-stop).
--
2.25.0
^ permalink raw reply related [flat|nested] only message in thread
only message in thread, other threads:[~2020-02-23 21:41 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-02-23 21:27 [PATCH] man2/*: srcfix: Correct the misuse of two-fonts macros Bjarni Ingi Gislason
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).