[PATCH] man2/m*: srcfix: Use a single-font-change macro for a single argument

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



  Also remove quotation marks around a single argument (mmap.2).

  The output from "nroff" and "groff" is unchanged, except
a font change for a punctuation mark (mlock.2, mprotect.2)

Signed-off-by: Bjarni Ingi Gislason <bjarniig@xxxxxxxxx>
---
 man2/madvise.2       |  44 +++++++++---------
 man2/mbind.2         |   4 +-
 man2/membarrier.2    |  12 ++---
 man2/memfd_create.2  |  28 +++++------
 man2/migrate_pages.2 |   2 +-
 man2/mkdir.2         |   4 +-
 man2/mlock.2         |   6 +--
 man2/mmap.2          |  40 ++++++++--------
 man2/modify_ldt.2    |   4 +-
 man2/mount.2         | 108 +++++++++++++++++++++----------------------
 man2/mprotect.2      |  26 +++++------
 man2/mremap.2        |   2 +-
 man2/msgctl.2        |   4 +-
 man2/msgget.2        |   2 +-
 man2/msgop.2         |  12 ++---
 man2/msync.2         |  12 ++---
 16 files changed, 155 insertions(+), 155 deletions(-)

diff --git a/man2/madvise.2 b/man2/madvise.2
index 5367633d1..4c5c20e1e 100644
--- a/man2/madvise.2
+++ b/man2/madvise.2
@@ -75,7 +75,7 @@ values, which are also available on several other implementations.
 .BR madvise ()
 is not specified in POSIX.)
 Subsequently, a number of Linux-specific
-.IR advice
+.I advice
 values have been added.
 .\"
 .\" ======================================================================
@@ -138,7 +138,7 @@ and shmem-based techniques such as System V shared memory segments)
 or zero-fill-on-demand pages for anonymous private mappings.
 .IP
 Note that, when applied to shared mappings,
-.BR MADV_DONTNEED
+.B MADV_DONTNEED
 might not lead to immediate freeing of the pages in the range.
 The kernel is free to delay freeing the pages until an appropriate moment.
 The resident set size (RSS) of the calling process will be immediately
@@ -146,7 +146,7 @@ reduced however.
 .IP
 .B MADV_DONTNEED
 cannot be applied to locked pages, Huge TLB pages, or
-.BR VM_PFNMAP
+.B VM_PFNMAP
 pages.
 (Pages marked with the kernel-internal
 .B VM_PFNMAP
@@ -184,7 +184,7 @@ bytes containing zero.
 .IP
 The specified address range must be mapped shared and writable.
 This flag cannot be applied to locked pages, Huge TLB pages, or
-.BR VM_PFNMAP
+.B VM_PFNMAP
 pages.
 .IP
 In the initial implementation, only
@@ -195,11 +195,11 @@ but since Linux 3.5,
 .\" commit 3f31d07571eeea18a7d34db9af21d2285b807a17
 any filesystem which supports the
 .BR fallocate (2)
-.BR FALLOC_FL_PUNCH_HOLE
+.B FALLOC_FL_PUNCH_HOLE
 mode also supports
 .BR MADV_REMOVE .
 Hugetlbfs fails with the error
-.BR EINVAL
+.B EINVAL
 and other filesystems fail with the error
 .BR EOPNOTSUPP .
 .TP
@@ -246,7 +246,7 @@ restoring the default behavior, whereby a mapping is inherited across
 Poison the pages in the range specified by
 .I addr
 and
-.IR length
+.I length
 and handle subsequent references to those pages
 like a hardware memory corruption.
 This operation is available only for privileged
@@ -282,18 +282,18 @@ See the Linux kernel source file
 for more details.
 .IP
 The
-.BR MADV_MERGEABLE
+.B MADV_MERGEABLE
 and
-.BR MADV_UNMERGEABLE
+.B MADV_UNMERGEABLE
 operations are available only if the kernel was configured with
 .BR CONFIG_KSM .
 .TP
 .BR MADV_UNMERGEABLE " (since Linux 2.6.32)"
 Undo the effect of an earlier
-.BR MADV_MERGEABLE
+.B MADV_MERGEABLE
 operation on the specified address range;
 KSM unmerges whatever pages it had merged in the address range specified by
-.IR addr
+.I addr
 and
 .IR length .
 .TP
@@ -343,17 +343,17 @@ See the Linux kernel source file
 for more details.
 .IP
 The
-.BR MADV_HUGEPAGE
+.B MADV_HUGEPAGE
 and
-.BR MADV_NOHUGEPAGE
+.B MADV_NOHUGEPAGE
 operations are available only if the kernel was configured with
 .BR CONFIG_TRANSPARENT_HUGEPAGE .
 .TP
 .BR MADV_NOHUGEPAGE " (since Linux 2.6.38)"
 Ensures that memory in the address range specified by
-.IR addr
+.I addr
 and
-.IR length
+.I length
 will not be collapsed into huge pages.
 .TP
 .BR MADV_DONTDUMP " (since Linux 3.4)"
@@ -366,7 +366,7 @@ and
 This is useful in applications that have large areas of memory
 that are known not to be useful in a core dump.
 The effect of
-.BR MADV_DONTDUMP
+.B MADV_DONTDUMP
 takes precedence over the bit mask that is set via the
 .I /proc/[pid]/coredump_filter
 file (see
@@ -378,7 +378,7 @@ Undo the effect of an earlier
 .TP
 .BR MADV_FREE " (since Linux 4.5)"
 The application no longer requires the pages in the range specified by
-.IR addr
+.I addr
 and
 .IR len .
 The kernel can thus free these pages,
@@ -473,7 +473,7 @@ is not a valid.
 is
 .B MADV_DONTNEED
 or
-.BR MADV_REMOVE
+.B MADV_REMOVE
 and the specified address range includes locked, Huge TLB pages, or
 .B VM_PFNMAP
 pages.
@@ -481,7 +481,7 @@ pages.
 .B EINVAL
 .I advice
 is
-.BR MADV_MERGEABLE
+.B MADV_MERGEABLE
 or
 .BR MADV_UNMERGEABLE ,
 but the kernel was not configured with
@@ -490,13 +490,13 @@ but the kernel was not configured with
 .B EINVAL
 .I advice
 is
-.BR MADV_FREE
+.B MADV_FREE
 or
-.BR MADV_WIPEONFORK
+.B MADV_WIPEONFORK
 but the specified address range includes file, Huge TLB,
 .BR MAP_SHARED ,
 or
-.BR VM_PFNMAP
+.B VM_PFNMAP
 ranges.
 .TP
 .B EIO
diff --git a/man2/mbind.2 b/man2/mbind.2
index 16644ff6a..c6d08c83e 100644
--- a/man2/mbind.2
+++ b/man2/mbind.2
@@ -122,7 +122,7 @@ argument must specify one of
 .BR MPOL_INTERLEAVE ,
 .BR MPOL_PREFERRED ,
 or
-.BR MPOL_LOCAL
+.B MPOL_LOCAL
 (which are described in detail below).
 All policy modes except
 .B MPOL_DEFAULT
@@ -343,7 +343,7 @@ and
 .I maxnode
 points outside your accessible address space.
 Or, there was an unmapped hole in the specified memory range specified by
-.IR addr
+.I addr
 and
 .IR len .
 .TP
diff --git a/man2/membarrier.2 b/man2/membarrier.2
index 41d7a303a..71a785a73 100644
--- a/man2/membarrier.2
+++ b/man2/membarrier.2
@@ -107,7 +107,7 @@ previously registered with
 .IP
 Given that registration is about the intent to receive the barriers, it
 is valid to invoke
-.BR MEMBARRIER_CMD_GLOBAL_EXPEDITED
+.B MEMBARRIER_CMD_GLOBAL_EXPEDITED
 from a process that has not employed
 .BR MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED .
 .IP
@@ -116,7 +116,7 @@ they never block, but have the downside of causing extra overhead.
 .TP
 .BR MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED " (since Linux 4.16)"
 Register the process's intent to receive
-.BR MEMBARRIER_CMD_GLOBAL_EXPEDITED
+.B MEMBARRIER_CMD_GLOBAL_EXPEDITED
 memory barriers.
 .TP
 .BR MEMBARRIER_CMD_PRIVATE_EXPEDITED " (since Linux 4.14)"
@@ -161,7 +161,7 @@ Register the process's intent to use
 .TP
 .BR MEMBARRIER_CMD_SHARED " (since Linux 4.3)"
 This is an alias for
-.BR MEMBARRIER_CMD_GLOBAL
+.B MEMBARRIER_CMD_GLOBAL
 that exists for header backward compatibility.
 .PP
 The
@@ -224,13 +224,13 @@ set to 0, error handling is required only for the first call to
 is invalid, or
 .I flags
 is nonzero, or the
-.BR MEMBARRIER_CMD_GLOBAL
+.B MEMBARRIER_CMD_GLOBAL
 command is disabled because the
 .I nohz_full
 CPU parameter has been set, or the
-.BR MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE
+.B MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE
 and
-.BR MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_SYNC_CORE
+.B MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_SYNC_CORE
 commands are not implemented by the architecture.
 .TP
 .B ENOSYS
diff --git a/man2/memfd_create.2 b/man2/memfd_create.2
index 3cd392d1b..05a9ce87a 100644
--- a/man2/memfd_create.2
+++ b/man2/memfd_create.2
@@ -48,7 +48,7 @@ have the same semantics as other anonymous
 memory allocations such as those allocated using
 .BR mmap (2)
 with the
-.BR MAP_ANONYMOUS
+.B MAP_ANONYMOUS
 flag.
 .PP
 The initial size of the file is set to 0.
@@ -64,17 +64,17 @@ is used as a filename and will be displayed
 as the target of the corresponding symbolic link in the directory
 .IR /proc/self/fd/ .
 The displayed name is always prefixed with
-.IR memfd:
+.I memfd:
 and serves only for debugging purposes.
 Names do not affect the behavior of the file descriptor,
 and as such multiple files can have the same name without any side effects.
 .PP
 The following values may be bitwise ORed in
-.IR flags
+.I flags
 to change the behavior of
 .BR memfd_create ():
 .TP
-.BR MFD_CLOEXEC
+.B MFD_CLOEXEC
 Set the close-on-exec
 .RB ( FD_CLOEXEC )
 flag on the new file descriptor.
@@ -84,12 +84,12 @@ flag in
 .BR open (2)
 for reasons why this may be useful.
 .TP
-.BR MFD_ALLOW_SEALING
+.B MFD_ALLOW_SEALING
 Allow sealing operations on this file.
 See the discussion of the
 .B F_ADD_SEALS
 and
-.BR F_GET_SEALS
+.B F_GET_SEALS
 operations in
 .BR fcntl (2),
 and also NOTES, below.
@@ -165,7 +165,7 @@ is set to indicate the error.
 .TP
 .B EFAULT
 The address in
-.IR name
+.I name
 points to invalid memory.
 .TP
 .B EINVAL
@@ -223,10 +223,10 @@ The
 .BR memfd_create ()
 system call also has uses without file sealing
 (which is why file-sealing is disabled, unless explicitly requested with the
-.BR MFD_ALLOW_SEALING
+.B MFD_ALLOW_SEALING
 flag).
 In particular, it can be used as an alternative to creating files in
-.IR tmp
+.I tmp
 or as an alternative to using the
 .BR  open (2)
 .B O_TMPFILE
@@ -244,11 +244,11 @@ time-of-check-to-time-of-use race conditions
 (typically dealt with by copying data from
 the shared memory region before checking and using it).
 The latter possibility leaves the local process vulnerable to
-.BR SIGBUS
+.B SIGBUS
 signals when an attempt is made to access a now-nonexistent
 location in the shared memory region.
 (Dealing with this possibility necessitates the use of a handler for the
-.BR SIGBUS
+.B SIGBUS
 signal.)
 .PP
 Dealing with untrusted peers imposes extra complexity on
@@ -330,7 +330,7 @@ This bit mask can be inspected in order to determine
 what kinds of restrictions have been placed on file modifications.
 If desired, the second process can apply further seals
 to impose additional restrictions (so long as the
-.BR F_SEAL_SEAL
+.B F_SEAL_SEAL
 seal has not yet been applied).
 .SH EXAMPLE
 Below are shown two example programs that demonstrate the use of
@@ -378,11 +378,11 @@ From another program, we can obtain a file descriptor for the
 file created by
 .BR memfd_create ()
 by opening the
-.IR /proc/[pid]/fd
+.I /proc/[pid]/fd
 file that corresponds to the file descriptor opened by
 .BR memfd_create ().
 Using that pathname, we inspect the content of the
-.IR /proc/[pid]/fd
+.I /proc/[pid]/fd
 symbolic link, and use our
 .I t_get_seals
 program to view the seals that have been placed on the file:
diff --git a/man2/migrate_pages.2 b/man2/migrate_pages.2
index d3effc234..5b74d786f 100644
--- a/man2/migrate_pages.2
+++ b/man2/migrate_pages.2
@@ -180,5 +180,5 @@ or a similar package.
 .BR migratepages (8),
 .BR numastat (8)
 .PP
-.IR Documentation/vm/page_migration.rst
+.I Documentation/vm/page_migration.rst
 in the Linux kernel source tree
diff --git a/man2/mkdir.2 b/man2/mkdir.2
index 12b131270..ca23028dd 100644
--- a/man2/mkdir.2
+++ b/man2/mkdir.2
@@ -235,9 +235,9 @@ When
 .I pathname
 is a relative pathname,
 glibc constructs a pathname based on the symbolic link in
-.IR /proc/self/fd
+.I /proc/self/fd
 that corresponds to the
-.IR dirfd
+.I dirfd
 argument.
 .SH SEE ALSO
 .BR mkdir (1),
diff --git a/man2/mlock.2 b/man2/mlock.2
index f3f3c8abd..9adb151e2 100644
--- a/man2/mlock.2
+++ b/man2/mlock.2
@@ -222,7 +222,7 @@ Some or all of the specified address range could not be locked.
 The result of the addition
 .IR addr + len
 was less than
-.IR addr
+.I addr
 (e.g., the addition may have resulted in an overflow).
 .TP
 .B EINVAL
@@ -455,11 +455,11 @@ then the already locked bytes in the overlapping region were counted twice
 when checking against the limit.
 Such double accounting could incorrectly calculate a "total locked memory"
 value for the process that exceeded the
-.BR RLIMIT_MEMLOCK
+.B RLIMIT_MEMLOCK
 limit, with the result that
 .BR mlock ()
 and
-.BR mlock2()
+.BR mlock2 ()
 would fail on requests that should have succeeded.
 This bug was fixed
 .\" commit 0cf2f6f6dc605e587d2c1120f295934c77e810e8
diff --git a/man2/mmap.2 b/man2/mmap.2
index fccfb9b3e..65262c67d 100644
--- a/man2/mmap.2
+++ b/man2/mmap.2
@@ -143,7 +143,7 @@ By contrast, when creating a mapping using
 .BR MAP_SHARED_VALIDATE ,
 the kernel verifies all passed flags are known and fails the
 mapping with the error
-.BR EOPNOTSUPP
+.B EOPNOTSUPP
 for unknown flags.
 This mapping type is also required to be able to use some mapping flags
 (e.g.,
@@ -256,12 +256,12 @@ If the specified address cannot be used,
 will fail.
 .IP
 Software that aspires to be portable should use the
-.BR MAP_FIXED
+.B MAP_FIXED
 flag with care,
 keeping in mind that the exact layout of a process's memory mappings
 is allowed to change significantly between kernel versions,
 C library versions, and operating system releases.
-.IR "Carefully read the discussion of this flag in NOTES!"
+.I Carefully read the discussion of this flag in NOTES!
 .TP
 .BR MAP_FIXED_NOREPLACE " (since Linux 4.17)"
 .\" commit a4ff8e8620d3f4f50ac4b41e8067b7d395056843
@@ -280,7 +280,7 @@ This flag can therefore be used as a way to atomically
 one thread will succeed; all others will report failure.
 .IP
 Note that older kernels which do not recognize the
-.BR MAP_FIXED_NOREPLACE
+.B MAP_FIXED_NOREPLACE
 flag will typically (upon detecting a collision with a preexisting mapping)
 fall back to a "non-\c
 .B MAP_FIXED\c
@@ -354,7 +354,7 @@ plus
 .BR mlock (2)
 when major faults are not acceptable after the initialization of the mapping.
 The
-.BR MAP_LOCKED
+.B MAP_LOCKED
 flag is ignored in older kernels.
 .\" If set, the mapped pages will not be swapped out.
 .TP
@@ -365,12 +365,12 @@ Don't perform read-ahead:
 create page tables entries only for pages
 that are already present in RAM.
 Since Linux 2.6.23, this flag causes
-.BR MAP_POPULATE
+.B MAP_POPULATE
 to do nothing.
 One day, the combination of
-.BR MAP_POPULATE
+.B MAP_POPULATE
 and
-.BR MAP_NONBLOCK
+.B MAP_NONBLOCK
 may be reimplemented.
 .TP
 .B MAP_NORESERVE
@@ -392,7 +392,7 @@ private writable mappings.
 Populate (prefault) page tables for a mapping.
 For a file mapping, this causes read-ahead on the file.
 This will help to reduce blocking on page faults later.
-.BR MAP_POPULATE
+.B MAP_POPULATE
 is supported for private mappings only since Linux 2.6.23.
 .TP
 .BR MAP_STACK " (since Linux 2.6.27)"
@@ -536,13 +536,13 @@ is not a valid file descriptor (and
 was not set).
 .TP
 .B EEXIST
-.BR MAP_FIXED_NOREPLACE
+.B MAP_FIXED_NOREPLACE
 was specified in
 .IR flags ,
 and the range covered by
-.IR addr
+.I addr
 and
-.IR length
+.I length
 clashes with an existing mapping.
 .TP
 .B EINVAL
@@ -701,15 +701,15 @@ Certain
 .I flags
 constants are defined only if suitable feature test macros are defined
 (possibly by default):
-.BR _DEFAULT_SOURCE
+.B _DEFAULT_SOURCE
 with glibc 2.19 or later;
 or
-.BR _BSD_SOURCE
+.B _BSD_SOURCE
 or
-.BR _SVID_SOURCE
+.B _SVID_SOURCE
 in glibc 2.19 and earlier.
 (Employing
-.BR _GNU_SOURCE
+.B _GNU_SOURCE
 also suffices,
 and requiring that macro specifically would have been more logical,
 since these flags are all Linux-specific.)
@@ -736,14 +736,14 @@ currently resident in the buffer/page cache using
 .\"
 .SS Using MAP_FIXED safely
 The only safe use for
-.BR MAP_FIXED
+.B MAP_FIXED
 is where the address range specified by
-.IR addr
+.I addr
 and
 .I length
 was previously reserved using another mapping;
 otherwise, the use of
-.BR MAP_FIXED
+.B MAP_FIXED
 is hazardous because it forcibly removes preexisting mappings,
 making it easy for a multithreaded process to corrupt its own address space.
 .PP
@@ -776,7 +776,7 @@ and the PAM libraries
 .UE .
 .PP
 Since Linux 4.17, a multithreaded program can use the
-.BR MAP_FIXED_NOREPLACE
+.B MAP_FIXED_NOREPLACE
 flag to avoid the hazard described above
 when attempting to create a mapping at a fixed address
 that has not been reserved by a preexisting mapping.
diff --git a/man2/modify_ldt.2 b/man2/modify_ldt.2
index 0db6efea4..6f5907440 100644
--- a/man2/modify_ldt.2
+++ b/man2/modify_ldt.2
@@ -192,14 +192,14 @@ Even on 64-bit kernels,
 .BR modify_ldt ()
 cannot be used to create a long mode (i.e., 64-bit) code segment.
 The undocumented field "lm" in
-.IR user_desc
+.I user_desc
 is not useful, and, despite its name,
 does not result in a long mode segment.
 .SH BUGS
 On 64-bit kernels before Linux 3.19,
 .\" commit e30ab185c490e9a9381385529e0fd32f0a399495
 setting the "lm" bit in
-.IR user_desc
+.I user_desc
 prevents the descriptor from being considered empty.
 Keep in mind that the
 "lm" bit does not exist in the 32-bit headers, but these buggy kernels
diff --git a/man2/mount.2 b/man2/mount.2
index 8f6dcf8a1..2352d7c89 100644
--- a/man2/mount.2
+++ b/man2/mount.2
@@ -91,17 +91,17 @@ testing the bits set in
 with the tests being conducted in the order listed here:
 .IP * 3
 Remount an existing mount:
-.IR mountflags
+.I mountflags
 includes
 .BR MS_REMOUNT .
 .IP *
 Create a bind mount:
-.IR mountflags
+.I mountflags
 includes
 .BR MS_BIND .
 .IP *
 Change the propagation type of an existing mount:
-.IR mountflags
+.I mountflags
 includes one of
 .BR MS_SHARED ,
 .BR MS_PRIVATE ,
@@ -110,17 +110,17 @@ or
 .BR MS_UNBINDABLE .
 .IP *
 Move an existing mount to a new location:
-.IR mountflags
+.I mountflags
 includes
 .BR MS_MOVE .
 .IP *
 Create a new mount:
-.IR mountflags
+.I mountflags
 includes none of the above flags.
 .PP
 Each of these operations is detailed later in this page.
 Further flags may be specified in
-.IR mountflags
+.I mountflags
 to modify the behavior of
 .BR mount (),
 as described below.
@@ -175,9 +175,9 @@ as well as cases where the
 .B MS_STRICTATIME
 mount option is also enabled.
 (The advantage of combining
-.BR MS_STRICTATIME
+.B MS_STRICTATIME
 and
-.BR MS_LAZYTIME
+.B MS_LAZYTIME
 is that
 .BR stat (2)
 will return the correctly updated atime, but the atime updates
@@ -207,7 +207,7 @@ Do not update access times for directories on this filesystem.
 This flag provides a subset of the functionality provided by
 .BR MS_NOATIME ;
 that is,
-.BR MS_NOATIME
+.B MS_NOATIME
 implies
 .BR MS_NODIRATIME .
 .TP
@@ -228,7 +228,7 @@ Mount filesystem read-only.
 .TP
 .BR MS_REC " (since Linux 2.4.11)"
 Used in conjunction with
-.BR MS_BIND
+.B MS_BIND
 to create a recursive bind mount,
 and in conjunction with the propagation type flags to recursively change
 the propagation type of all of the mounts in a subtree.
@@ -244,7 +244,7 @@ This option is useful for programs, such as
 that need to know when a file has been read since it was last modified.
 Since Linux 2.6.30, the kernel defaults to the behavior provided
 by this flag (unless
-.BR MS_NOATIME
+.B MS_NOATIME
 was specified), and the
 .B MS_STRICTATIME
 flag is required to obtain traditional semantics.
@@ -260,7 +260,7 @@ Suppress the display of certain
 .RI ( printk ())
 warning messages in the kernel log.
 This flag supersedes the misnamed and obsolete
-.BR MS_VERBOSE
+.B MS_VERBOSE
 flag (available since Linux 2.4.12), which has the same meaning.
 .TP
 .BR MS_STRICTATIME " (since Linux 2.6.30)"
@@ -268,9 +268,9 @@ Always update the last access time (atime) when files on this
 filesystem are accessed.
 (This was the default behavior before Linux 2.6.30.)
 Specifying this flag overrides the effect of setting the
-.BR MS_NOATIME
+.B MS_NOATIME
 and
-.BR MS_RELATIME
+.B MS_RELATIME
 flags.
 .TP
 .B MS_SYNCHRONOUS
@@ -374,11 +374,11 @@ can be changed:
 .BR MS_NOSUID ,
 .BR MS_RELATIME ,
 .BR MS_RDONLY ,
-.BR MS_STRICTATIME
+.B MS_STRICTATIME
 (whose effect is to clear the
-.BR MS_NOATIME
+.B MS_NOATIME
 and
-.BR MS_RELATIME
+.B MS_RELATIME
 flags),
 and
 .BR MS_SYNCHRONOUS .
@@ -387,9 +387,9 @@ Attempts to change the setting of the
 .\" which excludes MS_DIRSYNC and MS_SILENT, although SB_DIRSYNC
 .\" and SB_SILENT are split out as per-superblock flags in do_mount()
 .\" (Linux 4.17 source code)
-.BR MS_DIRSYNC
+.B MS_DIRSYNC
 and
-.BR MS_SILENT
+.B MS_SILENT
 flags during a remount are silently ignored.
 Note that changes to per-superblock flags are visible via
 all mount points of the associated filesystem
@@ -402,7 +402,7 @@ if none of
 .BR MS_NODIRATIME ,
 .BR MS_RELATIME ,
 or
-.BR MS_STRICTATIME
+.B MS_STRICTATIME
 is specified in
 .IR mountflags ,
 then the remount operation preserves the existing values of these flags
@@ -418,7 +418,7 @@ to modify only the per-mount-point flags.
 This is particularly useful for setting or clearing the "read-only"
 flag on a mount point without changing the underlying filesystem.
 Specifying
-.IR mountflags
+.I mountflags
 as:
 .PP
 .in +4n
@@ -434,7 +434,7 @@ other mount points.
 If
 .I mountflags
 includes
-.BR MS_BIND
+.B MS_BIND
 (available since Linux 2.4),
 .\" since 2.4.0-test9
 then perform a bind mount.
@@ -445,9 +445,9 @@ Bind mounts may cross filesystem boundaries and span
 jails.
 .PP
 The
-.IR filesystemtype
+.I filesystemtype
 and
-.IR data
+.I data
 arguments are ignored.
 .PP
 The remaining bits (other than
@@ -465,7 +465,7 @@ only that directory is mounted;
 if there are any submounts under the directory tree,
 they are not bind mounted.
 If the
-.BR MS_REC
+.B MS_REC
 flag is also specified, then a recursive bind mount operation is performed:
 all submounts under the
 .I source
@@ -476,34 +476,34 @@ subtree.
 .\"
 .SS Changing the propagation type of an existing mount
 If
-.IR mountflags
+.I mountflags
 includes one of
 .BR MS_SHARED ,
 .BR MS_PRIVATE ,
 .BR MS_SLAVE ,
 or
-.BR MS_UNBINDABLE
+.B MS_UNBINDABLE
 (all available since Linux 2.6.15),
 then the propagation type of an existing mount is changed.
 If more than one of these flags is specified, an error results.
 .PP
 The only other flags that can be specified while changing
 the propagation type are
-.BR MS_REC
+.B MS_REC
 (described below) and
-.BR MS_SILENT
+.B MS_SILENT
 (which is ignored).
 .PP
 The
 .IR source ,
 .IR filesystemtype ,
 and
-.IR data
+.I data
 arguments are ignored.
 .PP
 The meanings of the propagation type flags are as follows:
 .TP
-.BR MS_SHARED
+.B MS_SHARED
 Make this mount point shared.
 Mount and unmount events immediately under this mount point will propagate
 to the other mount points that are members of this mount's peer group.
@@ -512,11 +512,11 @@ occur under all of the other mount points in the peer group.
 Conversely, mount and unmount events that take place under
 peer mount points will propagate to this mount point.
 .TP
-.BR MS_PRIVATE
+.B MS_PRIVATE
 Make this mount point private.
 Mount and unmount events do not propagate into or out of this mount point.
 .TP
-.BR MS_SLAVE
+.B MS_SLAVE
 If this is a shared mount point that is a member of a peer group
 that contains other members, convert it to a slave mount.
 If this is a shared mount point that is a member of a peer group
@@ -532,16 +532,16 @@ A mount point can be the slave of another peer group
 while at the same time sharing mount and unmount events
 with a peer group of which it is a member.
 .TP
-.BR MS_UNBINDABLE
+.B MS_UNBINDABLE
 Make this mount unbindable.
 This is like a private mount,
 and in addition this mount can't be bind mounted.
 When a recursive bind mount
 .RB ( mount ()
 with the
-.BR MS_BIND
+.B MS_BIND
 and
-.BR MS_REC
+.B MS_REC
 flags) is performed on a directory subtree,
 any unbindable mounts within the subtree are automatically pruned
 (i.e., not replicated)
@@ -555,7 +555,7 @@ If the
 flag is also specified in
 .IR mountflags ,
 then the propagation type of all mount points under
-.IR target
+.I target
 is also changed.
 .PP
 For further details regarding mount propagation types
@@ -566,7 +566,7 @@ For further details regarding mount propagation types
 If
 .I mountflags
 contains the flag
-.BR MS_MOVE
+.B MS_MOVE
 (available since Linux 2.4.18),
 then move a subtree:
 .I source
@@ -576,11 +576,11 @@ specifies the new location to which that mount point is to be relocated.
 The move is atomic: at no point is the subtree unmounted.
 .PP
 The remaining bits in the
-.IR mountflags
+.I mountflags
 argument are ignored, as are the
-.IR filesystemtype
+.I filesystemtype
 and
-.IR data
+.I data
 arguments.
 .\"
 .SS Creating a new mount point
@@ -592,15 +592,15 @@ If none of
 .BR MS_PRIVATE ,
 .BR MS_SLAVE ,
 or
-.BR MS_UNBINDABLE
+.B MS_UNBINDABLE
 is specified in
 .IR mountflags ,
 then
 .BR mount ()
 performs its default action: creating a new mount point.
-.IR source
+.I source
 specifies the source for the new mount point, and
-.IR target
+.I target
 specifies the directory at which to create the mount point.
 .PP
 The
@@ -608,7 +608,7 @@ The
 and
 .I data
 arguments are employed, and further bits may be specified in
-.IR mountflags
+.I mountflags
 to modify the behavior of the call.
 .\"
 .SH RETURN VALUE
@@ -643,7 +643,7 @@ so that it was marked read-only
 and can't be remounted as read-write (until the errors are fixed).
 .IP
 Some filesystems instead return the error
-.BR EROFS
+.B EROFS
 on an attempt to mount a read-only filesystem.
 .TP
 .B EACCES
@@ -706,16 +706,16 @@ includes
 .BR MS_PRIVATE ,
 .BR MS_SLAVE ,
 or
-.BR MS_UNBINDABLE
+.B MS_UNBINDABLE
 and also includes a flag other than
-.BR MS_REC
+.B MS_REC
 or
 .BR MS_SILENT .
 .TP
-.BR EINVAL
+.B EINVAL
 An attempt was made to bind mount an unbindable mount.
 .TP
-.BR EINVAL
+.B EINVAL
 In an unprivileged mount namespace
 (i.e., a mount namespace owned by a user namespace
 that was created by an unprivileged user),
@@ -789,7 +789,7 @@ The definitions of
 .BR MS_SLAVE ,
 .BR MS_STRICTATIME ,
 and
-.BR MS_UNBINDABLE
+.B MS_UNBINDABLE
 were added to glibc headers in version 2.12.
 .\"
 .SH CONFORMING TO
@@ -809,7 +809,7 @@ in the top 16 bits.
 occupy the low order 16 bits of
 .IR mountflags .)
 Specifying
-.BR MS_MGC_VAL
+.B MS_MGC_VAL
 was required in kernel versions prior to 2.4,
 but since Linux 2.4 is no longer required and is ignored if specified.
 .PP
@@ -852,7 +852,7 @@ the mount namespace is preserved across an
 A process can obtain a private mount namespace if:
 it was created using the
 .BR clone (2)
-.BR CLONE_NEWNS
+.B CLONE_NEWNS
 flag,
 in which case its new namespace is initialized to be a
 .I copy
@@ -861,7 +861,7 @@ of the namespace of the process that called
 or it calls
 .BR unshare (2)
 with the
-.BR CLONE_NEWNS
+.B CLONE_NEWNS
 flag,
 which causes the caller's mount namespace to obtain a private copy
 of the namespace that it was previously sharing with other processes,
diff --git a/man2/mprotect.2 b/man2/mprotect.2
index 10e32a4d1..a36afdbdb 100644
--- a/man2/mprotect.2
+++ b/man2/mprotect.2
@@ -118,7 +118,7 @@ Like
 .BR mprotect (),
 .BR pkey_mprotect ()
 changes the protection on the pages specified by
-.IR addr
+.I addr
 and
 .IR len .
 The
@@ -156,24 +156,24 @@ to mark it
 \fIaddr\fP is not a valid pointer,
 or not a multiple of the system page size.
 .TP
-.BR EINVAL
+.B EINVAL
 .RB ( pkey_mprotect ())
 \fIpkey\fP has not been allocated with
 .BR pkey_alloc (2)
 .TP
-.BR EINVAL
+.B EINVAL
 Both
-.BR PROT_GROWSUP
+.B PROT_GROWSUP
 and
-.BR PROT_GROWSDOWN
+.B PROT_GROWSDOWN
 were specified in
 .IR prot .
 .TP
-.BR EINVAL
+.B EINVAL
 Invalid flags specified in
 .IR prot .
 .TP
-.BR EINVAL
+.B EINVAL
 (PowerPC architecture)
 .B PROT_SAO
 was specified in
@@ -190,7 +190,7 @@ Addresses in the range
 are invalid for the address space of the process,
 or specify one or more pages that are not mapped.
 (Before kernel 2.4.19, the error
-.BR EFAULT
+.B EFAULT
 was incorrectly produced for these cases.)
 .TP
 .B ENOMEM
@@ -199,9 +199,9 @@ mappings with distinct attributes (e.g., read versus read/write protection)
 exceeding the allowed maximum.
 .\" I.e., the number of VMAs would exceed the 64 kB maximum
 (For example, making the protection of a range
-.BR PROT_READ
+.B PROT_READ
 in the middle of a region currently protected as
-.BR PROT_READ|PROT_WRITE
+.B PROT_READ|PROT_WRITE
 would result in three mappings:
 two read/write mappings at each end and a read-only mapping in the middle.)
 .SH VERSIONS
@@ -241,7 +241,7 @@ is set in the process's personality flags (see
 specifying
 .B PROT_READ
 will implicitly add
-.BR PROT_EXEC.
+.BR PROT_EXEC .
 .PP
 On some hardware architectures (e.g., i386),
 .B PROT_WRITE
@@ -264,7 +264,7 @@ and
 On x86, when
 .BR mprotect ()
 is used with
-.IR prot
+.I prot
 set to
 .B PROT_EXEC
 a pkey is may be allocated and set on the memory implicitly
@@ -273,7 +273,7 @@ by the kernel, but only when the pkey was 0 previously.
 On systems that do not support protection keys in hardware,
 .BR pkey_mprotect ()
 may still be used, but
-.IR pkey
+.I pkey
 must be set to 0.
 When called this way, the operation of
 .BR pkey_mprotect ()
diff --git a/man2/mremap.2 b/man2/mremap.2
index 45212e2b0..dd3ef4e1b 100644
--- a/man2/mremap.2
+++ b/man2/mremap.2
@@ -204,7 +204,7 @@ was specified without also specifying
 shareable mapping (but see BUGS);
 .IP *
 \fIold_size\fP was zero and the
-.BR MREMAP_MAYMOVE
+.B MREMAP_MAYMOVE
 flag was not specified.
 .RE
 .TP
diff --git a/man2/msgctl.2 b/man2/msgctl.2
index 2c29ea508..226431be6 100644
--- a/man2/msgctl.2
+++ b/man2/msgctl.2
@@ -236,9 +236,9 @@ structure as for
 However,
 .I msg_perm.mode
 is not checked for read access for
-.IR msqid
+.I msqid
 meaning that any user can employ this operation (just as any user may read
-.IR /proc/sysvipc/msg
+.I /proc/sysvipc/msg
 to obtain the same information).
 .SH RETURN VALUE
 On success,
diff --git a/man2/msgget.2 b/man2/msgget.2
index 302ad8efb..4196d5fd1 100644
--- a/man2/msgget.2
+++ b/man2/msgget.2
@@ -165,7 +165,7 @@ capability in the user namespace that governs its IPC namespace.
 .B EEXIST
 .B IPC_CREAT
 and
-.BR IPC_EXCL
+.B IPC_EXCL
 were specified in
 .IR msgflg ,
 but a message queue already exists for
diff --git a/man2/msgop.2 b/man2/msgop.2
index d89c49bb2..c480653b2 100644
--- a/man2/msgop.2
+++ b/man2/msgop.2
@@ -211,7 +211,7 @@ set to
 Unless
 .B MSG_COPY
 is specified in
-.IR msgflg
+.I msgflg
 (see below),
 the
 .I msgtyp
@@ -271,14 +271,14 @@ the call fails immediately with the error
 Because they alter the meaning of
 .I msgtyp
 in orthogonal ways,
-.BR MSG_COPY
+.B MSG_COPY
 and
-.BR MSG_EXCEPT
+.B MSG_EXCEPT
 may not both be specified in
 .IR msgflg .
 .IP
 The
-.BR MSG_COPY
+.B MSG_COPY
 flag was added for the implementation of
 the kernel checkpoint-restore facility and
 is available only if the kernel was built with the
@@ -445,7 +445,7 @@ but not
 .BR EINVAL " (since Linux 3.14)"
 .I msgflg
 specified both
-.BR MSG_COPY
+.B MSG_COPY
 and
 .BR MSG_EXCEPT .
 .TP
@@ -539,7 +539,7 @@ In Linux 3.13 and earlier,
 if
 .BR msgrcv ()
 was called with the
-.BR MSG_COPY
+.B MSG_COPY
 flag, but without
 .BR IPC_NOWAIT ,
 and the message queue contained less than
diff --git a/man2/msync.2 b/man2/msync.2
index ae8ffba53..7639e9588 100644
--- a/man2/msync.2
+++ b/man2/msync.2
@@ -49,7 +49,7 @@ is updated.
 The
 .I flags
 argument should specify exactly one of
-.BR MS_ASYNC
+.B MS_ASYNC
 and
 .BR MS_SYNC ,
 and may additionally include the
@@ -122,9 +122,9 @@ to a value greater than 0.
 .\" glibc defines them to 1.
 .SH NOTES
 According to POSIX, either
-.BR MS_SYNC
+.B MS_SYNC
 or
-.BR MS_ASYNC
+.B MS_ASYNC
 must be specified in
 .IR flags ,
 and indeed failure to include one of these flags will cause
@@ -137,14 +137,14 @@ with semantics that are (currently) equivalent to specifying
 .BR MS_ASYNC .
 (Since Linux 2.6.19,
 .\" commit 204ec841fbea3e5138168edbc3a76d46747cc987
-.BR MS_ASYNC
+.B MS_ASYNC
 is in fact a no-op, since the kernel properly tracks dirty
 pages and flushes them to storage as necessary.)
 Notwithstanding the Linux behavior,
 portable, future-proof applications should ensure that they specify either
-.BR MS_SYNC
+.B MS_SYNC
 or
-.BR MS_ASYNC
+.B MS_ASYNC
 in
 .IR flags .
 .SH SEE ALSO
-- 
2.20.1


-- 
Bjarni I. Gislason



[Index of Archives]     [Kernel Documentation]     [Netdev]     [Linux Ethernet Bridging]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux