Use a single-font-style macro (".B", ".I") for a single argument. Separate the section part from the name of a manual. The output from "nroff" and "groff" is unchanged, except for the style of the section part of some names of manuals. Signed-off-by: Bjarni Ingi Gislason <bjarniig@xxxxxxxxx> --- man2/set_mempolicy.2 | 2 +- man2/set_thread_area.2 | 2 +- man2/seteuid.2 | 4 ++-- man2/setfsgid.2 | 2 +- man2/setfsuid.2 | 2 +- man2/setns.2 | 14 +++++++------- man2/setsid.2 | 2 +- man2/setuid.2 | 2 +- man2/setxattr.2 | 2 +- 9 files changed, 16 insertions(+), 16 deletions(-) diff --git a/man2/set_mempolicy.2 b/man2/set_mempolicy.2 index 7a26f674d..8fd0922ab 100644 --- a/man2/set_mempolicy.2 +++ b/man2/set_mempolicy.2 @@ -81,7 +81,7 @@ argument must specify one of .BR MPOL_INTERLEAVE , .BR MPOL_PREFERRED , or -.BR MPOL_LOCAL +.B MPOL_LOCAL (which are described in detail below). All modes except .B MPOL_DEFAULT diff --git a/man2/set_thread_area.2 b/man2/set_thread_area.2 index efa6a49cc..89d356de8 100644 --- a/man2/set_thread_area.2 +++ b/man2/set_thread_area.2 @@ -121,7 +121,7 @@ and .I seg_not_present are set to 1 and all of the other fields are 0. If an "empty" descriptor is passed to -.BR set_thread_area, +.B set_thread_area, the corresponding TLS entry will be cleared. See BUGS for additional details. .PP diff --git a/man2/seteuid.2 b/man2/seteuid.2 index 24662e178..d41347087 100644 --- a/man2/seteuid.2 +++ b/man2/seteuid.2 @@ -86,7 +86,7 @@ The target user or group ID is not valid in this user namespace. In the case of .BR seteuid (): the calling process is not privileged (does not have the -.BR CAP_SETUID +.B CAP_SETUID capability in its user namespace) and .I euid does not match the current real user ID, current effective user ID, @@ -95,7 +95,7 @@ or current saved set-user-ID. In the case of .BR setegid (): the calling process is not privileged (does not have the -.BR CAP_SETGID +.B CAP_SETGID capability in its user namespace) and .I egid does not match the current real group ID, current effective group ID, diff --git a/man2/setfsgid.2 b/man2/setfsgid.2 index f22183423..199d13066 100644 --- a/man2/setfsgid.2 +++ b/man2/setfsgid.2 @@ -113,7 +113,7 @@ the same value makes it impossible to directly determine whether the call succeeded or failed. Instead, the caller must resort to looking at the return value from a further call such as -.IR setfsgid(\-1) +.IR setfsgid (\-1) (which will always fail), in order to determine if a preceding call to .BR setfsgid () changed the filesystem group ID. diff --git a/man2/setfsuid.2 b/man2/setfsuid.2 index b5842a69b..90253a04d 100644 --- a/man2/setfsuid.2 +++ b/man2/setfsuid.2 @@ -121,7 +121,7 @@ the same value makes it impossible to directly determine whether the call succeeded or failed. Instead, the caller must resort to looking at the return value from a further call such as -.IR setfsuid(\-1) +.IR setfsuid (\-1) (which will always fail), in order to determine if a preceding call to .BR setfsuid () changed the filesystem user ID. diff --git a/man2/setns.2 b/man2/setns.2 index 68bcacda9..a3d4a7e68 100644 --- a/man2/setns.2 +++ b/man2/setns.2 @@ -38,7 +38,7 @@ argument specifies which type of namespace the calling thread may be reassociated with. This argument can have one of the following values: .TP -.BR 0 +.B 0 Allow any type of namespace to be joined. .TP .BR CLONE_NEWCGROUP " (since Linux 4.6)" @@ -77,10 +77,10 @@ what type of namespace is referred to by Specifying a nonzero value for .I nstype is useful if the caller does not know what type of namespace is referred to by -.IR fd +.I fd and wants to ensure that the namespace is of a particular type. (The caller might not know the type of the namespace referred to by -.IR fd +.I fd if the file descriptor was opened by another process and, for example, passed to the caller via a UNIX domain socket.) .\" @@ -124,9 +124,9 @@ Mount namespaces Changing the mount namespace requires that the caller possess both .B CAP_SYS_CHROOT and -.BR CAP_SYS_ADMIN +.B CAP_SYS_ADMIN capabilities in its own user namespace and -.BR CAP_SYS_ADMIN +.B CAP_SYS_ADMIN in the user namespace that owns the target mount namespace. .IP A process may not be reassociated with a new mount namespace if it is @@ -155,7 +155,7 @@ it does not change the PID namespace of the caller itself. .IP Reassociating with a PID namespace is allowed only if the PID namespace specified by -.IR fd +.I fd is a descendant (child, grandchild, etc.) of the PID namespace of the caller. .IP @@ -257,7 +257,7 @@ The following shell session demonstrates the use of this program (compiled as a binary named .IR ns_exec ) in conjunction with the -.BR CLONE_NEWUTS +.B CLONE_NEWUTS example program in the .BR clone (2) man page (complied as a binary named diff --git a/man2/setsid.2 b/man2/setsid.2 index d2f4cc3b2..39703d8fb 100644 --- a/man2/setsid.2 +++ b/man2/setsid.2 @@ -100,7 +100,7 @@ If a session has a controlling terminal, and the .B CLOCAL flag for that terminal is not set, and a terminal hangup occurs, then the session leader is sent a -.BR SIGHUP +.B SIGHUP signal. .PP If a process that is a session leader terminates, then a diff --git a/man2/setuid.2 b/man2/setuid.2 index 4a0dcf91c..b43787f5d 100644 --- a/man2/setuid.2 +++ b/man2/setuid.2 @@ -42,7 +42,7 @@ setuid \- set user identity sets the effective user ID of the calling process. If the calling process is privileged (more precisely: if the process has the -.BR CAP_SETUID +.B CAP_SETUID capability in its user namespace), the real UID and saved set-user-ID are also set. .PP diff --git a/man2/setxattr.2 b/man2/setxattr.2 index 1fcfcdea9..f016c902a 100644 --- a/man2/setxattr.2 +++ b/man2/setxattr.2 @@ -93,7 +93,7 @@ binary data of specified length. .PP By default (i.e., -.IR flags +.I flags is zero), the extended attribute will be created if it does not exist, or the value will be replaced if the attribute already exists. -- 2.20.1