Hello Alex, On 1/7/21 6:55 PM, Alejandro Colomar wrote: > Found using: > $ pcregrep -rnM '^..[^"].*[^.]\.\n[a-z]' man? Nice :-). > Signed-off-by: Alejandro Colomar <alx.manpages@xxxxxxxxx> Thanks! Patch applied. Cheers, Michael > --- > man2/close.2 | 2 +- > man2/getpriority.2 | 2 +- > man2/ioctl_userfaultfd.2 | 2 +- > man3/expm1.3 | 4 ++-- > man3/lio_listio.3 | 2 +- > man3/rcmd.3 | 4 ++-- > man4/lirc.4 | 2 +- > man7/mount_namespaces.7 | 4 ++-- > 8 files changed, 11 insertions(+), 11 deletions(-) > > diff --git a/man2/close.2 b/man2/close.2 > index fed770719..864e9eec2 100644 > --- a/man2/close.2 > +++ b/man2/close.2 > @@ -148,7 +148,7 @@ The behavior in this situation varies across systems. > On some systems, when the file descriptor is closed, > the blocking system call returns immediately with an error. > .PP > -On Linux (and possibly some other systems), the behavior is different. > +On Linux (and possibly some other systems), the behavior is different: > the blocking I/O system call holds a reference to the underlying > open file description, and this reference keeps the description open > until the I/O system call completes. > diff --git a/man2/getpriority.2 b/man2/getpriority.2 > index 2e5e49d57..217cc2dea 100644 > --- a/man2/getpriority.2 > +++ b/man2/getpriority.2 > @@ -93,7 +93,7 @@ calling process, or the real user ID of the calling process. > .PP > The > .I prio > -argument is a value in the range \-20 to 19 (but see NOTES below). > +argument is a value in the range \-20 to 19 (but see NOTES below), > with \-20 being the highest priority and 19 being the lowest priority. > Attempts to set a priority outside this range > are silently clamped to the range. > diff --git a/man2/ioctl_userfaultfd.2 b/man2/ioctl_userfaultfd.2 > index 945badf08..4270daf10 100644 > --- a/man2/ioctl_userfaultfd.2 > +++ b/man2/ioctl_userfaultfd.2 > @@ -173,7 +173,7 @@ when the faulting process unmaps virtual memory either explicitly with > or implicitly during either > .BR mmap (2) > or > -.BR mremap (2). > +.BR mremap (2), > the userfaultfd monitor will receive an event of type > .BR UFFD_EVENT_UNMAP . > .TP > diff --git a/man3/expm1.3 b/man3/expm1.3 > index 29e9e2580..73812186c 100644 > --- a/man3/expm1.3 > +++ b/man3/expm1.3 > @@ -162,10 +162,10 @@ Before approximately glibc version 2.11, > .\" but not expm1(1.00199970128e5) and beyond. > .BR expm1 () > raised a bogus invalid floating-point exception in addition to the expected > -overflow exception, and returned a NaN instead of positive infinity. > +overflow exception, and returned a NaN instead of positive infinity, > for some large positive > .I x > -values, > +values. > .PP > Before version 2.11, > .\" It looks like the fix was in 2.11, or possibly 2.12. > diff --git a/man3/lio_listio.3 b/man3/lio_listio.3 > index 0eb8606fe..d89670f7c 100644 > --- a/man3/lio_listio.3 > +++ b/man3/lio_listio.3 > @@ -71,7 +71,7 @@ The > .I nitems > argument specifies the size of the array > .IR aiocb_list . > -null pointers in > +Null pointers in > .I aiocb_list > are ignored. > .PP > diff --git a/man3/rcmd.3 b/man3/rcmd.3 > index f3c0c82d8..9f0b72a6f 100644 > --- a/man3/rcmd.3 > +++ b/man3/rcmd.3 > @@ -172,9 +172,9 @@ This socket is suitable for use by > and several other functions. > Privileged ports are those in the range 0 to 1023. > Only a privileged process > -(on Linux: a process that has the > +(on Linux, a process that has the > .B CAP_NET_BIND_SERVICE > -capability in the user namespace governing its network namespace). > +capability in the user namespace governing its network namespace) > is allowed to bind to a privileged port. > In the glibc implementation, > this function restricts its search to the ports from 512 to 1023. > diff --git a/man4/lirc.4 b/man4/lirc.4 > index f6c41763e..999cdc571 100644 > --- a/man4/lirc.4 > +++ b/man4/lirc.4 > @@ -148,7 +148,7 @@ The following ioctls can be used to probe or change specific > .B lirc > hardware settings. > Many require a third argument, usually an > -.IR int . > +.IR int , > referred to below as > .IR val . > .\" > diff --git a/man7/mount_namespaces.7 b/man7/mount_namespaces.7 > index b086e99d4..4a736a11c 100644 > --- a/man7/mount_namespaces.7 > +++ b/man7/mount_namespaces.7 > @@ -1100,9 +1100,9 @@ may desire to prevent propagation of mount events to other mount namespaces > .BR unshare (1)). > This can be done by changing the propagation type of > mount points in the new namespace to either > -.BR MS_SLAVE > +.B MS_SLAVE > or > -.BR MS_PRIVATE . > +.BR MS_PRIVATE , > using a call such as the following: > .PP > .in +4n > -- Michael Kerrisk Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/ Linux/UNIX System Programming Training: http://man7.org/training/