membarrier.2, openat2.2, insque.3, proc.5, tzfile.5, hier.7: Minor grammar fix

Don't hyphenate after adjective ending in "ly". See, for example:
https://www.dragoman.ist/compound-modifiers-with-words-ending-in-ly/
https://www.merriam-webster.com/words-at-play/6-common-hypercorrections-and-how-to-avoid-them/between-you-and-i

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2020-10-25 13:12:57 +01:00
parent ba273524e7
commit 11fd5e7c2a
6 changed files with 9 additions and 9 deletions

View File

@ -261,7 +261,7 @@ is Linux-specific.
.\" .BR rseq (2)
.SH NOTES
A memory barrier instruction is part of the instruction set of
architectures with weakly-ordered memory models.
architectures with weakly ordered memory models.
It orders memory
accesses prior to the barrier and after the barrier with respect to
matching barriers on other cores.

View File

@ -353,7 +353,7 @@ as symbolic links are very widely used by end-users.
Setting this flag indiscriminately\(emi.e.,
for purposes not specifically related to security\(emfor all uses of
.BR openat2 ()
may result in spurious errors on previously-functional systems.
may result in spurious errors on previously functional systems.
This may occur if, for example,
a system pathname that is used by an application is modified
(e.g., in a new distribution release)
@ -380,7 +380,7 @@ as bind mounts are widely used by end-users.
Setting this flag indiscriminately\(emi.e.,
for purposes not specifically related to security\(emfor all uses of
.BR openat2 ()
may result in spurious errors on previously-functional systems.
may result in spurious errors on previously functional systems.
This may occur if, for example,
a system pathname that is used by an application is modified
(e.g., in a new distribution release)

View File

@ -65,7 +65,7 @@ The
.BR insque ()
and
.BR remque ()
functions manipulate doubly-linked lists.
functions manipulate doubly linked lists.
Each element in the list is a structure of
which the first two elements are a forward and a
backward pointer.
@ -97,7 +97,7 @@ call should also point to the element.
The
.BR remque ()
function removes the element pointed to by \fIelem\fP from the
doubly-linked list.
doubly linked list.
.SH ATTRIBUTES
For an explanation of the terms used in this section, see
.BR attributes (7).

View File

@ -4072,7 +4072,7 @@ full; that is, user space is not able to read messages fast enough.
(8)
sequence number.
Every queued packet is associated with a (32-bit)
monotonically-increasing sequence number.
monotonically increasing sequence number.
This shows the ID of the most recent packet queued.
.RE
.IP

View File

@ -280,7 +280,7 @@ design goal has been that a reader can successfully use a TZif
file even if the file is of a later TZif version than what the
reader was designed for.
When complete compatibility was not achieved, an attempt was
made to limit glitches to rarely-used timestamps, and to allow
made to limit glitches to rarely used timestamps, and to allow
simple partial workarounds in writers designed to generate
new-version data useful even for older-version readers.
This section attempts to document these compatibility issues and

View File

@ -513,10 +513,10 @@ Reserved for historical reasons.
Data cached for programs.
.TP
.I /var/cache/fonts
Locally-generated fonts (optional).
Locally generated fonts (optional).
.TP
.I /var/cache/man
Locally-formatted man pages (optional).
Locally formatted man pages (optional).
.TP
.I /var/cache/www
WWW proxy or cache data (optional).