Wrap lines at sentence breaks.

This commit is contained in:
Michael Kerrisk 2008-06-28 04:57:20 +00:00
parent e846d8078c
commit 6387216bb2
16 changed files with 42 additions and 21 deletions

View File

@ -606,14 +606,16 @@ was not.
.B CLONE_THREAD .B CLONE_THREAD
was specified, but was specified, but
.B CLONE_SIGHAND .B CLONE_SIGHAND
was not. (Since Linux 2.5.35.) was not.
(Since Linux 2.5.35.)
.\" .TP .\" .TP
.\" .B EINVAL .\" .B EINVAL
.\" Precisely one of .\" Precisely one of
.\" .B CLONE_DETACHED .\" .B CLONE_DETACHED
.\" and .\" and
.\" .B CLONE_THREAD .\" .B CLONE_THREAD
.\" was specified. (Since Linux 2.6.0-test6.) .\" was specified.
.\" (Since Linux 2.6.0-test6.)
.TP .TP
.B EINVAL .B EINVAL
Both Both

View File

@ -209,7 +209,8 @@ and
.BR munlockall () .BR munlockall ()
are available, are available,
.B _POSIX_MEMLOCK .B _POSIX_MEMLOCK
is defined in \fI<unistd.h>\fP to a value greater than 0. (See also is defined in \fI<unistd.h>\fP to a value greater than 0.
(See also
.BR sysconf (3).) .BR sysconf (3).)
.\" POSIX.1-2001: It shall be defined to -1 or 0 or 200112L. .\" POSIX.1-2001: It shall be defined to -1 or 0 or 200112L.
.\" -1: unavailable, 0: ask using sysconf(). .\" -1: unavailable, 0: ask using sysconf().

View File

@ -451,7 +451,8 @@ and
.BR munmap () .BR munmap ()
are available, are available,
.B _POSIX_MAPPED_FILES .B _POSIX_MAPPED_FILES
is defined in \fI<unistd.h>\fP to a value greater than 0. (See also is defined in \fI<unistd.h>\fP to a value greater than 0.
(See also
.BR sysconf (3).) .BR sysconf (3).)
.\" POSIX.1-2001: It shall be defined to -1 or 0 or 200112L. .\" POSIX.1-2001: It shall be defined to -1 or 0 or 200112L.
.\" -1: unavailable, 0: ask using sysconf(). .\" -1: unavailable, 0: ask using sysconf().

View File

@ -55,7 +55,8 @@ are usually only used by programs such as the Linux NFS server that
need to change what user and group ID is used for file access without a need to change what user and group ID is used for file access without a
corresponding change in the real and effective user and group IDs. corresponding change in the real and effective user and group IDs.
A change in the normal user IDs for a program such as the NFS server A change in the normal user IDs for a program such as the NFS server
is a security hole that can expose it to unwanted signals. (But see below.) is a security hole that can expose it to unwanted signals.
(But see below.)
.BR setfsgid () .BR setfsgid ()
will only succeed if the caller is the superuser or if will only succeed if the caller is the superuser or if

View File

@ -55,7 +55,8 @@ are usually only used by programs such as the Linux NFS server that
need to change what user and group ID is used for file access without a need to change what user and group ID is used for file access without a
corresponding change in the real and effective user and group IDs. corresponding change in the real and effective user and group IDs.
A change in the normal user IDs for a program such as the NFS server A change in the normal user IDs for a program such as the NFS server
is a security hole that can expose it to unwanted signals. (But see below.) is a security hole that can expose it to unwanted signals.
(But see below.)
.BR setfsuid () .BR setfsuid ()
will only succeed if the caller is the superuser or if will only succeed if the caller is the superuser or if

View File

@ -81,7 +81,8 @@ Either
.I path .I path
or or
.I resolved_path .I resolved_path
is NULL. (In libc5 this would just cause a segfault.) is NULL.
(In libc5 this would just cause a segfault.)
But, see NOTES below. But, see NOTES below.
.TP .TP
.B EIO .B EIO

View File

@ -25,7 +25,8 @@ These are typically attached to
the user's terminal (see the user's terminal (see
.BR tty (4) .BR tty (4)
but might instead refer to files or other devices, depending on what but might instead refer to files or other devices, depending on what
the parent process chose to set up. (See also the "Redirection" section of the parent process chose to set up.
(See also the "Redirection" section of
.BR sh (1).) .BR sh (1).)
.PP .PP
The input stream is referred to as "standard input"; the output stream is The input stream is referred to as "standard input"; the output stream is

View File

@ -133,13 +133,15 @@ The day of the year as a decimal number (range 001 to 366).
.TP .TP
.B %k .B %k
The hour (24-hour clock) as a decimal number (range 0 to 23); The hour (24-hour clock) as a decimal number (range 0 to 23);
single digits are preceded by a blank. (See also single digits are preceded by a blank.
(See also
.BR %H .) .BR %H .)
(TZ) (TZ)
.TP .TP
.B %l .B %l
The hour (12-hour clock) as a decimal number (range 1 to 12); The hour (12-hour clock) as a decimal number (range 1 to 12);
single digits are preceded by a blank. (See also single digits are preceded by a blank.
(See also
.BR %I .) .BR %I .)
(TZ) (TZ)
.TP .TP

View File

@ -132,7 +132,8 @@ The minute (0-59).
Arbitrary whitespace. Arbitrary whitespace.
.TP .TP
.B %p .B %p
The locale's equivalent of AM or PM. (Note: there may be none.) The locale's equivalent of AM or PM.
(Note: there may be none.)
.TP .TP
.B %r .B %r
The 12-hour clock time (using the locale's AM or PM). The 12-hour clock time (using the locale's AM or PM).
@ -337,7 +338,8 @@ The year corresponding to the ISO week number, but without the century
(0-99). (0-99).
.TP .TP
.B %G .B %G
The year corresponding to the ISO week number. (For example, 1991.) The year corresponding to the ISO week number.
(For example, 1991.)
.TP .TP
.B %u .B %u
The day of the week as a decimal number (1-7, where Monday = 1). The day of the week as a decimal number (1-7, where Monday = 1).

View File

@ -376,7 +376,8 @@ The four tables are: a) Latin1 \-> PC,
b) VT100 graphics \-> PC, c) PC \-> PC, d) user-defined. b) VT100 graphics \-> PC, c) PC \-> PC, d) user-defined.
.PP .PP
There are two character sets, called G0 and G1, and one of them There are two character sets, called G0 and G1, and one of them
is the current character set. (Initially G0.) is the current character set.
(Initially G0.)
Typing \fB^N\fP causes G1 to become current, Typing \fB^N\fP causes G1 to become current,
\fB^O\fP causes G0 to become current. \fB^O\fP causes G0 to become current.
.PP .PP

View File

@ -61,13 +61,15 @@ Get keyboard flags CapsLock, NumLock, ScrollLock (not lights).
\fIargp\fP points to a char which is set to the flag state. \fIargp\fP points to a char which is set to the flag state.
The low order three bits (mask 0x7) get the current flag state, The low order three bits (mask 0x7) get the current flag state,
and the low order bits of the next nibble (mask 0x70) get and the low order bits of the next nibble (mask 0x70) get
the default flag state. (Since 1.1.54.) the default flag state.
(Since 1.1.54.)
.IP \fBKDSKBLED\fP .IP \fBKDSKBLED\fP
Set keyboard flags CapsLock, NumLock, ScrollLock (not lights). Set keyboard flags CapsLock, NumLock, ScrollLock (not lights).
\fIargp\fP has the desired flag state. \fIargp\fP has the desired flag state.
The low order three bits (mask 0x7) have the flag state, The low order three bits (mask 0x7) have the flag state,
and the low order bits of the next nibble (mask 0x70) have and the low order bits of the next nibble (mask 0x70) have
the default flag state. (Since 1.1.54.) the default flag state.
(Since 1.1.54.)
.IP \fBKDGKBTYPE\fP .IP \fBKDGKBTYPE\fP
Get keyboard type. Get keyboard type.
This returns the value KB_101, defined as 0x02. This returns the value KB_101, defined as 0x02.

View File

@ -67,7 +67,8 @@ devices with different characteristics (block size, compression,
density, etc.) density, etc.)
When the system starts up, only the first device is available. When the system starts up, only the first device is available.
The other three are activated when the default The other three are activated when the default
characteristics are defined (see below). (By changing compile-time characteristics are defined (see below).
(By changing compile-time
constants, it is possible to change the balance between the maximum constants, it is possible to change the balance between the maximum
number of tape drives and the number of minor numbers for each number of tape drives and the number of minor numbers for each
drive. drive.

View File

@ -54,7 +54,8 @@ which is readable by the superuser only.
Regardless of whether shadow passwords are used, many sysadmins Regardless of whether shadow passwords are used, many sysadmins
use an asterisk in the encrypted password field to make sure use an asterisk in the encrypted password field to make sure
that this user can not authenticate him- or herself using a that this user can not authenticate him- or herself using a
password. (But see the Notes below.) password.
(But see the Notes below.)
.PP .PP
If you create a new login, first put an asterisk in the password field, If you create a new login, first put an asterisk in the password field,
then use then use

View File

@ -1144,7 +1144,8 @@ is defined during kernel compilation.
.I /proc/filesystems .I /proc/filesystems
A text listing of the file systems which are supported by the kernel, A text listing of the file systems which are supported by the kernel,
namely file systems which were compiled into the kernel or whose kernel namely file systems which were compiled into the kernel or whose kernel
modules are currently loaded. (See also modules are currently loaded.
(See also
.BR filesystems (5).) .BR filesystems (5).)
If a file system is marked with "nodev", If a file system is marked with "nodev",
this means that it does not require a block device to be mounted this means that it does not require a block device to be mounted

View File

@ -176,7 +176,8 @@ at compile time, and usually is the value of the root device of the
system that the kernel was built on. system that the kernel was built on.
To override this value, and To override this value, and
select the second floppy drive as the root device, one would select the second floppy drive as the root device, one would
use 'root=/dev/fd1'. (The root device can also be set using use 'root=/dev/fd1'.
(The root device can also be set using
.BR rdev (8).) .BR rdev (8).)
The root device can be specified symbolically or numerically. The root device can be specified symbolically or numerically.
@ -1061,7 +1062,8 @@ Use this if you have
more than two drives connected to a floppy controller. more than two drives connected to a floppy controller.
.TP .TP
.B "floppy=asus_pci" .B "floppy=asus_pci"
Sets the bit mask to allow only units 0 and 1. (The default) Sets the bit mask to allow only units 0 and 1.
(The default)
.TP .TP
.B "floppy=daring" .B "floppy=daring"
Tells the floppy driver that you have a well behaved floppy Tells the floppy driver that you have a well behaved floppy

View File

@ -45,7 +45,8 @@ symbols and replacing punctuation with non-English alphabetic characters
to cover German, French, Spanish and others in 7 bits exist. to cover German, French, Spanish and others in 7 bits exist.
All are All are
deprecated; glibc doesn't support locales whose character sets aren't deprecated; glibc doesn't support locales whose character sets aren't
true supersets of ASCII. (These sets are also known as ISO-646, a close true supersets of ASCII.
(These sets are also known as ISO-646, a close
relative of ASCII that permitted replacing these characters.) relative of ASCII that permitted replacing these characters.)
.LP .LP
As Linux was written for hardware designed in the US, it natively As Linux was written for hardware designed in the US, it natively