[PATCH] man7/n-q.7: srcfix: Use a single-font-style macro for a single argument

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



  Use a single-font-style macro (".B", ".I") for a single argument.

  The output from "nroff" and "groff" is unchanged.

Signed-off-by: Bjarni Ingi Gislason <bjarniig@xxxxxxxxx>
---
 man7/namespaces.7         | 26 ++++++++++-----------
 man7/netlink.7            | 10 ++++----
 man7/numa.7               |  4 ++--
 man7/packet.7             | 48 +++++++++++++++++++--------------------
 man7/persistent-keyring.7 | 10 ++++----
 man7/pid_namespaces.7     | 26 ++++++++++-----------
 man7/pipe.7               | 16 ++++++-------
 man7/pkeys.7              | 10 ++++----
 man7/pty.7                |  2 +-
 9 files changed, 76 insertions(+), 76 deletions(-)

diff --git a/man7/namespaces.7 b/man7/namespaces.7
index 1c3903474..9781df0d0 100644
--- a/man7/namespaces.7
+++ b/man7/namespaces.7
@@ -80,7 +80,7 @@ The
 system call allows the calling process to join an existing namespace.
 The namespace to join is specified via a file descriptor that refers to
 one of the
-.IR /proc/[pid]/ns
+.I /proc/[pid]/ns
 files described below.
 .TP
 .BR unshare (2)
@@ -108,7 +108,7 @@ Creation of new namespaces using
 and
 .BR unshare (2)
 in most cases requires the
-.BR CAP_SYS_ADMIN
+.B CAP_SYS_ADMIN
 capability, since, in the new namespace,
 the creator will have the power to change global resources
 that are visible to other processes that are subsequently created in,
@@ -120,7 +120,7 @@ no privilege is required to create a user namespace.
 .\"
 .SS The /proc/[pid]/ns/ directory
 Each process has a
-.IR /proc/[pid]/ns/
+.I /proc/[pid]/ns/
 .\" See commit 6b4e306aa3dc94a0545eb9279475b1ab6209a31f
 subdirectory containing one entry for each namespace that
 supports being manipulated by
@@ -166,7 +166,7 @@ Since Linux 3.8,
 they appear as symbolic links.
 If two processes are in the same namespace,
 then the device IDs and inode numbers of their
-.IR /proc/[pid]/ns/xxx
+.I /proc/[pid]/ns/xxx
 symbolic links will be the same; an application can check this using the
 .I stat.st_dev
 and
@@ -245,31 +245,31 @@ directory (which is present since Linux 4.9) expose limits
 on the number of namespaces of various types that can be created.
 The files are as follows:
 .TP
-.IR max_cgroup_namespaces
+.I max_cgroup_namespaces
 The value in this file defines a per-user limit on the number of
 cgroup namespaces that may be created in the user namespace.
 .TP
-.IR max_ipc_namespaces
+.I max_ipc_namespaces
 The value in this file defines a per-user limit on the number of
 ipc namespaces that may be created in the user namespace.
 .TP
-.IR max_mnt_namespaces
+.I max_mnt_namespaces
 The value in this file defines a per-user limit on the number of
 mount namespaces that may be created in the user namespace.
 .TP
-.IR max_net_namespaces
+.I max_net_namespaces
 The value in this file defines a per-user limit on the number of
 network namespaces that may be created in the user namespace.
 .TP
-.IR max_pid_namespaces
+.I max_pid_namespaces
 The value in this file defines a per-user limit on the number of
 pid namespaces that may be created in the user namespace.
 .TP
-.IR max_user_namespaces
+.I max_user_namespaces
 The value in this file defines a per-user limit on the number of
 user namespaces that may be created in the user namespace.
 .TP
-.IR max_uts_namespaces
+.I max_uts_namespaces
 The value in this file defines a per-user limit on the number of
 uts namespaces that may be created in the user namespace.
 .PP
@@ -432,7 +432,7 @@ a namespace into existence even though it has no member processes.
 These factors include the following:
 .IP * 3
 An open file descriptor or a bind mount exists for the corresponding
-.IR /proc/[pid]/ns/*
+.I /proc/[pid]/ns/*
 file.
 .IP *
 The namespace is hierarchical (i.e., a PID or user namespace),
@@ -442,7 +442,7 @@ It is a user namespace that owns one or more nonuser namespaces.
 .IP *
 It is a PID namespace,
 and there is a process that refers to the namespace via a
-.IR /proc/[pid]/ns/pid_for_children
+.I /proc/[pid]/ns/pid_for_children
 symbolic link.
 .IP *
 It is an IPC namespace, and a corresponding mount of an
diff --git a/man7/netlink.7 b/man7/netlink.7
index 952aa7065..e3d00fbca 100644
--- a/man7/netlink.7
+++ b/man7/netlink.7
@@ -43,7 +43,7 @@ and raw sockets.
 selects the kernel module or netlink group to communicate with.
 The currently assigned netlink families are:
 .TP
-.BR NETLINK_ROUTE
+.B NETLINK_ROUTE
 Receives routing and link updates and may be used to modify the routing
 tables (both IPv4 and IPv6), IP addresses, link parameters,
 neighbor setups, queueing disciplines, traffic classes and
@@ -53,7 +53,7 @@ packet classifiers (see
 .BR NETLINK_W1 " (Linux 2.6.13 to 2.16.17)"
 Messages from 1-wire subsystem.
 .TP
-.BR NETLINK_USERSOCK
+.B NETLINK_USERSOCK
 Reserved for user-mode socket protocols.
 .TP
 .BR NETLINK_FIREWALL " (up to and including Linux 3.4)"
@@ -65,7 +65,7 @@ kernel module.
 After a long period of being declared obsolete (in favor of the more advanced
 .I nfnetlink_queue
 feature),
-.BR NETLINK_FIREWALL
+.B NETLINK_FIREWALL
 was removed in Linux 3.5.
 .TP
 .BR NETLINK_INET_DIAG " (since Linux 2.6.14)"
@@ -81,7 +81,7 @@ A synonym for
 .BR NETLINK_NFLOG " (up to and including Linux 3.16)"
 Netfilter/iptables ULOG.
 .TP
-.BR NETLINK_XFRM
+.B NETLINK_XFRM
 .\" FIXME More details on NETLINK_XFRM needed.
 IPsec.
 .TP
@@ -387,7 +387,7 @@ As at Linux 3.0, the
 .BR NETLINK_GENERIC ,
 .BR NETLINK_ROUTE ,
 and
-.BR NETLINK_SELINUX
+.B NETLINK_SELINUX
 groups allow other users to receive messages.
 No groups allow other users to send messages.
 .PP
diff --git a/man7/numa.7 b/man7/numa.7
index b6d81029d..2b7d2802f 100644
--- a/man7/numa.7
+++ b/man7/numa.7
@@ -123,7 +123,7 @@ Number of dirty pages.
 .TP
 .I mapped=<pages>
 Total number of mapped pages, if different from
-.IR dirty
+.I dirty
 and
 .I anon
 pages.
@@ -152,7 +152,7 @@ The Linux NUMA system calls and
 .I /proc
 interface are available only
 if the kernel was configured and built with the
-.BR CONFIG_NUMA
+.B CONFIG_NUMA
 option.
 .SS Library support
 Link with \fI\-lnuma\fP
diff --git a/man7/packet.7 b/man7/packet.7
index b624d47d1..9e2db6cfd 100644
--- a/man7/packet.7
+++ b/man7/packet.7
@@ -34,7 +34,7 @@ for raw packets including the link-level header or
 .B SOCK_DGRAM
 for cooked packets with the link-level header removed.
 The link-level header information is available in a common format in a
-.IR sockaddr_ll
+.I sockaddr_ll
 structure.
 .I protocol
 is the IEEE 802.3 protocol number in network byte order.
@@ -88,7 +88,7 @@ specifying an address in a
 .I struct sockaddr_ll
 to bind the packet socket to an interface.
 Fields used for binding are
-.IR sll_family
+.I sll_family
 (should be
 .BR AF_PACKET ),
 .IR sll_protocol ,
@@ -187,10 +187,10 @@ Packet socket options are configured by calling
 with level
 .BR SOL_PACKET .
 .TP
-.BR PACKET_ADD_MEMBERSHIP
+.B PACKET_ADD_MEMBERSHIP
 .PD 0
 .TP
-.BR PACKET_DROP_MEMBERSHIP
+.B PACKET_DROP_MEMBERSHIP
 .PD
 Packet sockets can be used to configure physical-layer multicasting
 and promiscuous mode.
@@ -297,20 +297,20 @@ modulo the number of sockets in the group, where a flow hash is a hash
 over network-layer address and optional transport-layer port fields.
 .IP *
 The load-balance mode
-.BR PACKET_FANOUT_LB
+.B PACKET_FANOUT_LB
 implements a round-robin algorithm.
 .IP *
-.BR PACKET_FANOUT_CPU
+.B PACKET_FANOUT_CPU
 selects the socket based on the CPU that the packet arrived on.
 .IP *
-.BR PACKET_FANOUT_ROLLOVER
+.B PACKET_FANOUT_ROLLOVER
 processes all data on a single socket, moving to the next when one
 becomes backlogged.
 .IP *
-.BR PACKET_FANOUT_RND
+.B PACKET_FANOUT_RND
 selects the socket using a pseudo-random number generator.
 .IP *
-.BR PACKET_FANOUT_QM
+.B PACKET_FANOUT_QM
 .\" commit 2d36097d26b5991d71a2cf4a20c1a158f0f1bfcd
 (available since Linux 3.14)
 selects the socket using the recorded queue_mapping of the received skb.
@@ -326,7 +326,7 @@ preserve order even in this case.
 Fanout mode and options are communicated in the second 16 bits of the
 integer option value.
 The flag
-.BR PACKET_FANOUT_FLAG_ROLLOVER
+.B PACKET_FANOUT_FLAG_ROLLOVER
 enables the roll over mechanism as a backup strategy: if the
 original fanout algorithm selects a backlogged socket, the packet
 rolls over to the next available one.
@@ -336,7 +336,7 @@ When a malformed packet is encountered on a transmit ring,
 the default is to reset its
 .I tp_status
 to
-.BR TP_STATUS_WRONG_FORMAT
+.B TP_STATUS_WRONG_FORMAT
 and abort the transmission immediately.
 The malformed packet blocks itself and subsequently enqueued packets from
 being sent.
@@ -347,7 +347,7 @@ reset to
 and the transmission process restarted via
 .BR send (2).
 However, if
-.BR PACKET_LOSS
+.B PACKET_LOSS
 is set, any malformed packet will be skipped, its
 .I tp_status
 reset to
@@ -359,7 +359,7 @@ By default, a packet receive ring writes packets immediately following the
 metadata structure and alignment padding.
 This integer option reserves additional headroom.
 .TP
-.BR PACKET_RX_RING
+.B PACKET_RX_RING
 Create a memory-mapped ring buffer for asynchronous packet reception.
 The packet socket reserves a contiguous region of application address
 space, lays it out into an array of packet slots and copies packets
@@ -393,7 +393,7 @@ ownership to the application.
 During normal operation, the new
 .I tp_status
 value has at least the
-.BR TP_STATUS_USER
+.B TP_STATUS_USER
 bit set to signal that a received packet has been stored.
 When the application has finished processing a packet, it transfers
 ownership of the slot back to the socket by setting
@@ -403,10 +403,10 @@ equal to
 .IP
 Packet sockets implement multiple variants of the packet ring.
 The implementation details are described in
-.IR Documentation/networking/packet_mmap.txt
+.I Documentation/networking/packet_mmap.txt
 in the Linux kernel source tree.
 .TP
-.BR PACKET_STATISTICS
+.B PACKET_STATISTICS
 Retrieve packet socket statistics in the form of a structure
 .IP
 .in +4n
@@ -429,19 +429,19 @@ By default, this is a software generated timestamp generated when the
 packet is copied into the ring.
 This integer option selects the type of timestamp.
 Besides the default, it support the two hardware formats described in
-.IR Documentation/networking/timestamping.txt
+.I Documentation/networking/timestamping.txt
 in the Linux kernel source tree.
 .TP
 .BR PACKET_TX_RING " (since Linux 2.6.31)"
 .\" commit 69e3c75f4d541a6eb151b3ef91f34033cb3ad6e1
 Create a memory-mapped ring buffer for packet transmission.
 This option is similar to
-.BR PACKET_RX_RING
+.B PACKET_RX_RING
 and takes the same arguments.
 The application writes packets into slots with
 .I tp_status
 equal to
-.BR TP_STATUS_AVAILABLE
+.B TP_STATUS_AVAILABLE
 and schedules them for transmission by changing
 .I tp_status
 to
@@ -464,13 +464,13 @@ On successful transmission, the socket resets
 to
 .BR TP_STATUS_AVAILABLE .
 It immediately aborts the transmission on error unless
-.BR PACKET_LOSS
+.B PACKET_LOSS
 is set.
 .TP
 .BR PACKET_VERSION " (with " PACKET_RX_RING "; since Linux 2.6.27)"
 .\" commit bbd6ef87c544d88c30e4b762b1b61ef267a7d279
 By default,
-.BR PACKET_RX_RING
+.B PACKET_RX_RING
 creates a packet receive ring of variant
 .BR TPACKET_V1 .
 To create another variant, configure the desired variant by setting this
@@ -646,10 +646,10 @@ The
 include file for physical-layer protocols.
 .PP
 The Linux kernel source tree.
-.IR /Documentation/networking/filter.txt
+.I /Documentation/networking/filter.txt
 describes how to apply Berkeley Packet Filters to packet sockets.
-.IR /tools/testing/selftests/net/psock_tpacket.c
+.I /tools/testing/selftests/net/psock_tpacket.c
 contains example source code for all available versions of
-.BR PACKET_RX_RING
+.B PACKET_RX_RING
 and
 .BR PACKET_TX_RING .
diff --git a/man7/persistent-keyring.7 b/man7/persistent-keyring.7
index 48e219b0c..5aa854fd3 100644
--- a/man7/persistent-keyring.7
+++ b/man7/persistent-keyring.7
@@ -94,22 +94,22 @@ function for manipulating persistent keyrings.
 operation.)
 This operation allows the calling thread to get the persistent keyring
 corresponding to its own UID or, if the thread has the
-.BR CAP_SETUID
+.B CAP_SETUID
 capability, the persistent keyring corresponding to some other UID
 in the same user namespace.
 .SH NOTES
 Each user namespace owns a keyring called
-.IR .persistent_register
+.I .persistent_register
 that contains links to all of the persistent keys in that namespace.
 (The
-.IR .persistent_register
+.I .persistent_register
 keyring can be seen when reading the contents of the
-.IR /proc/keys
+.I /proc/keys
 file for the UID 0 in the namespace.)
 The
 .BR keyctl_get_persistent (3)
 operation looks for a key with a name of the form
-.IR _persistent.<UID>
+.I _persistent.<UID>
 in that keyring,
 creates the key if it does not exist, and links it into the keyring.
 .SH SEE ALSO
diff --git a/man7/pid_namespaces.7 b/man7/pid_namespaces.7
index eaed8787b..817b2c481 100644
--- a/man7/pid_namespaces.7
+++ b/man7/pid_namespaces.7
@@ -57,11 +57,11 @@ The first process created in a new namespace
 (i.e., the process created using
 .BR clone (2)
 with the
-.BR CLONE_NEWPID
+.B CLONE_NEWPID
 flag, or the first child created by a process after a call to
 .BR unshare (2)
 using the
-.BR CLONE_NEWPID
+.B CLONE_NEWPID
 flag) has the PID 1, and is the "init" process for the namespace (see
 .BR init (1)).
 This process becomes the parent of any child processes that are orphaned
@@ -70,7 +70,7 @@ because a process that resides in this PID namespace terminated
 .PP
 If the "init" process of a PID namespace terminates,
 the kernel terminates all of the processes in the namespace via a
-.BR SIGKILL
+.B SIGKILL
 signal.
 This behavior reflects the fact that the "init" process
 is essential for the correct operation of a PID namespace.
@@ -198,7 +198,7 @@ That is to say, processes may not enter any ancestor namespaces
 Changing PID namespaces is a one-way operation.
 .PP
 The
-.BR NS_GET_PARENT
+.B NS_GET_PARENT
 .BR ioctl (2)
 operation can be used to discover the parental relationship
 between PID namespaces; see
@@ -213,11 +213,11 @@ that specify a PID namespace file descriptor
 and calls to
 .BR unshare (2)
 with the
-.BR CLONE_NEWPID
+.B CLONE_NEWPID
 flag cause children subsequently created
 by the caller to be placed in a different PID namespace from the caller.
 (Since Linux 4.12, that PID namespace is shown via the
-.IR /proc/[pid]/ns/pid_for_children
+.I /proc/[pid]/ns/pid_for_children
 file, as described in
 .BR namespaces (7).)
 These calls do not, however,
@@ -241,7 +241,7 @@ with the
 .B CLONE_NEWPID
 flag only once.
 After it has performed this operation, its
-.IR /proc/PID/ns/pid_for_children
+.I /proc/PID/ns/pid_for_children
 symbolic link will be empty until the first child is created in the namespace.
 .\"
 .\" ============================================================
@@ -269,7 +269,7 @@ rather than the "init" process in the child's own PID namespace.
 .\"
 .SS Compatibility of CLONE_NEWPID with other CLONE_* flags
 In current versions of Linux,
-.BR CLONE_NEWPID
+.B CLONE_NEWPID
 can't be combined with
 .BR CLONE_THREAD .
 Threads are required to be in the same PID namespace such that
@@ -293,15 +293,15 @@ would defeat that.
 .\" 8382fcac1b813ad0a4e68a838fc7ae93fa39eda0
 .\" when CLONE_NEWPID|CLONE_VM was disallowed
 In earlier versions of Linux,
-.BR CLONE_NEWPID
+.B CLONE_NEWPID
 was additionally disallowed (failing with the error
 .BR EINVAL )
 in combination with
-.BR CLONE_SIGHAND
+.B CLONE_SIGHAND
 .\" (restriction lifted in faf00da544045fdc1454f3b9e6d7f65c841de302)
 (before Linux 4.3) as well as
 .\" (restriction lifted in e79f525e99b04390ca4d2366309545a836c03bf1)
-.BR CLONE_VM
+.B CLONE_VM
 (before Linux 3.12).
 The changes that lifted these restrictions have also been ported to
 earlier stable kernels.
@@ -326,9 +326,9 @@ so that tools such as
 .BR ps (1)
 work correctly.
 If a new mount namespace is simultaneously created by including
-.BR CLONE_NEWNS
+.B CLONE_NEWNS
 in the
-.IR flags
+.I flags
 argument of
 .BR clone (2)
 or
diff --git a/man7/pipe.7 b/man7/pipe.7
index 21c8fa79b..bb6ed7c5f 100644
--- a/man7/pipe.7
+++ b/man7/pipe.7
@@ -137,9 +137,9 @@ Since Linux 2.6.11, the pipe capacity is 16 pages
 Since Linux 2.6.35, the default pipe capacity is 16 pages,
 but the capacity can be queried and set using the
 .BR fcntl (2)
-.BR F_GETPIPE_SZ
+.B F_GETPIPE_SZ
 and
-.BR F_SETPIPE_SZ
+.B F_SETPIPE_SZ
 operations.
 See
 .BR fcntl (2)
@@ -167,7 +167,7 @@ On Linux, the following files control how much memory can be used for pipes:
 .\" commit b492e95be0ae672922f4734acf3f5d35c30be948
 An upper limit, in pages, on the capacity that an unprivileged user
 (one without the
-.BR CAP_SYS_RESOURCE
+.B CAP_SYS_RESOURCE
 capability)
 can set for a pipe.
 .IP
@@ -238,9 +238,9 @@ The default value for this file is 16384,
 which permits creating up to 1024 pipes with the default capacity.
 .PP
 Before Linux 4.9, some bugs affected the handling of the
-.IR pipe-user-pages-soft
+.I pipe-user-pages-soft
 and
-.IR pipe-user-pages-hard
+.I pipe-user-pages-hard
 limits; see BUGS.
 .\"
 .SS PIPE_BUF
@@ -342,12 +342,12 @@ Portable applications should avoid reliance on
 bidirectional pipe semantics.
 .SS BUGS
 Before Linux 4.9, some bugs affected the handling of the
-.IR pipe-user-pages-soft
+.I pipe-user-pages-soft
 and
-.IR pipe-user-pages-hard
+.I pipe-user-pages-hard
 limits when using the
 .BR fcntl (2)
-.BR F_SETPIPE_SZ
+.B F_SETPIPE_SZ
 operation to change a pipe's capacity:
 .\" These bugs where remedied by a series of patches, in particular,
 .\" commit b0b91d18e2e97b741b294af9333824ecc3fadfd8 and
diff --git a/man7/pkeys.7 b/man7/pkeys.7
index 63be26ee8..b1de0d244 100644
--- a/man7/pkeys.7
+++ b/man7/pkeys.7
@@ -44,7 +44,7 @@ access, or all access to a tagged page.
 Protection keys work in conjunction with the existing
 .BR PROT_READ /
 .BR PROT_WRITE /
-.BR PROT_EXEC
+.B PROT_EXEC
 permissions passed to system calls such as
 .BR mprotect (2)
 and
@@ -54,7 +54,7 @@ mechanisms.
 .PP
 If a process performs an access that violates pkey
 restrictions, it receives a
-.BR SIGSEGV
+.B SIGSEGV
 signal.
 See
 .BR sigaction (2)
@@ -92,7 +92,7 @@ called on them because it would have processor or memory performance
 implications to perform the additional checks needed to disallow it.
 Implementation of the necessary checks is left up to applications.
 Applications may implement these checks by searching the
-.IR /proc/[pid]/smaps
+.I /proc/[pid]/smaps
 file for memory regions with the pkey assigned.
 Further details can be found in
 .BR proc (5).
@@ -118,7 +118,7 @@ instruction.
 Details of how to do this can be found in the Intel Software
 Developers Manual.
 The kernel performs this enumeration and exposes the information in
-.IR /proc/cpuinfo
+.I /proc/cpuinfo
 under the "flags" field.
 The string "pku" in this field indicates hardware support for protection
 keys and the string "ospke" indicates that the kernel contains and has
@@ -160,7 +160,7 @@ and
 .PP
 The Linux pkey system calls are available only if the kernel was
 configured and built with the
-.BR CONFIG_X86_INTEL_MEMORY_PROTECTION_KEYS
+.B CONFIG_X86_INTEL_MEMORY_PROTECTION_KEYS
 option.
 .SH EXAMPLE
 .PP
diff --git a/man7/pty.7 b/man7/pty.7
index d221c41a7..77fbba003 100644
--- a/man7/pty.7
+++ b/man7/pty.7
@@ -158,7 +158,7 @@ operations
 .BR TIOCSTART ,
 .BR TIOCUCNTL ,
 and
-.BR TIOCREMOTE
+.B TIOCREMOTE
 have not been implemented under Linux.
 .SH SEE ALSO
 .BR ioctl_tty (2),
-- 
2.20.1



[Index of Archives]     [Kernel Documentation]     [Netdev]     [Linux Ethernet Bridging]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux