membarrier.2, openat2.2, insque.3, proc.5, tzfile.5, hier.7: Minor grammar fix

Don't hyphenate after adjective ending in "ly". See, for example:
https://www.dragoman.ist/compound-modifiers-with-words-ending-in-ly/
https://www.merriam-webster.com/words-at-play/6-common-hypercorrections-and-how-to-avoid-them/between-you-and-i

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2020-10-25 13:12:57 +01:00
parent ba273524e7
commit 11fd5e7c2a
6 changed files with 9 additions and 9 deletions

View File

@ -261,7 +261,7 @@ is Linux-specific.
.\" .BR rseq (2) .\" .BR rseq (2)
.SH NOTES .SH NOTES
A memory barrier instruction is part of the instruction set of A memory barrier instruction is part of the instruction set of
architectures with weakly-ordered memory models. architectures with weakly ordered memory models.
It orders memory It orders memory
accesses prior to the barrier and after the barrier with respect to accesses prior to the barrier and after the barrier with respect to
matching barriers on other cores. matching barriers on other cores.

View File

@ -353,7 +353,7 @@ as symbolic links are very widely used by end-users.
Setting this flag indiscriminately\(emi.e., Setting this flag indiscriminately\(emi.e.,
for purposes not specifically related to security\(emfor all uses of for purposes not specifically related to security\(emfor all uses of
.BR openat2 () .BR openat2 ()
may result in spurious errors on previously-functional systems. may result in spurious errors on previously functional systems.
This may occur if, for example, This may occur if, for example,
a system pathname that is used by an application is modified a system pathname that is used by an application is modified
(e.g., in a new distribution release) (e.g., in a new distribution release)
@ -380,7 +380,7 @@ as bind mounts are widely used by end-users.
Setting this flag indiscriminately\(emi.e., Setting this flag indiscriminately\(emi.e.,
for purposes not specifically related to security\(emfor all uses of for purposes not specifically related to security\(emfor all uses of
.BR openat2 () .BR openat2 ()
may result in spurious errors on previously-functional systems. may result in spurious errors on previously functional systems.
This may occur if, for example, This may occur if, for example,
a system pathname that is used by an application is modified a system pathname that is used by an application is modified
(e.g., in a new distribution release) (e.g., in a new distribution release)

View File

@ -65,7 +65,7 @@ The
.BR insque () .BR insque ()
and and
.BR remque () .BR remque ()
functions manipulate doubly-linked lists. functions manipulate doubly linked lists.
Each element in the list is a structure of Each element in the list is a structure of
which the first two elements are a forward and a which the first two elements are a forward and a
backward pointer. backward pointer.
@ -97,7 +97,7 @@ call should also point to the element.
The The
.BR remque () .BR remque ()
function removes the element pointed to by \fIelem\fP from the function removes the element pointed to by \fIelem\fP from the
doubly-linked list. doubly linked list.
.SH ATTRIBUTES .SH ATTRIBUTES
For an explanation of the terms used in this section, see For an explanation of the terms used in this section, see
.BR attributes (7). .BR attributes (7).

View File

@ -4072,7 +4072,7 @@ full; that is, user space is not able to read messages fast enough.
(8) (8)
sequence number. sequence number.
Every queued packet is associated with a (32-bit) Every queued packet is associated with a (32-bit)
monotonically-increasing sequence number. monotonically increasing sequence number.
This shows the ID of the most recent packet queued. This shows the ID of the most recent packet queued.
.RE .RE
.IP .IP

View File

@ -280,7 +280,7 @@ design goal has been that a reader can successfully use a TZif
file even if the file is of a later TZif version than what the file even if the file is of a later TZif version than what the
reader was designed for. reader was designed for.
When complete compatibility was not achieved, an attempt was When complete compatibility was not achieved, an attempt was
made to limit glitches to rarely-used timestamps, and to allow made to limit glitches to rarely used timestamps, and to allow
simple partial workarounds in writers designed to generate simple partial workarounds in writers designed to generate
new-version data useful even for older-version readers. new-version data useful even for older-version readers.
This section attempts to document these compatibility issues and This section attempts to document these compatibility issues and

View File

@ -513,10 +513,10 @@ Reserved for historical reasons.
Data cached for programs. Data cached for programs.
.TP .TP
.I /var/cache/fonts .I /var/cache/fonts
Locally-generated fonts (optional). Locally generated fonts (optional).
.TP .TP
.I /var/cache/man .I /var/cache/man
Locally-formatted man pages (optional). Locally formatted man pages (optional).
.TP .TP
.I /var/cache/www .I /var/cache/www
WWW proxy or cache data (optional). WWW proxy or cache data (optional).