[LTP] [PATCH 1/1] doc: Use :manpages_url: for man pages links
Petr Vorel
pvorel@suse.cz
Mon Jan 12 00:57:51 CET 2026
Use sphinx internal way to link man pages to https://man7.org/
https://www.sphinx-doc.org/en/master/usage/configuration.html#confval-manpages_url
This is much better than using extlinks sphinx extension.
Signed-off-by: Petr Vorel <pvorel@suse.cz>
---
Scripted:
for i in $( git grep -l -i -n -E -I 'man[1-3]'); do sed -i 's/:man\([1-3]\):`\([^`]\+\)`/:manpage:`\2(\1)`/g' $i; done
doc/conf.py | 5 +++--
include/tst_cmd.h | 4 ++--
include/tst_kvercmp.h | 4 ++--
testcases/cve/stack_clash.c | 4 ++--
testcases/kernel/mem/tunable/max_map_count.c | 2 +-
testcases/kernel/syscalls/clone/clone11.c | 2 +-
testcases/kernel/syscalls/clone3/clone304.c | 2 +-
testcases/kernel/syscalls/execve/execve01.c | 2 +-
testcases/kernel/syscalls/execve/execve02.c | 4 ++--
testcases/kernel/syscalls/execve/execve03.c | 2 +-
testcases/kernel/syscalls/execve/execve04.c | 2 +-
testcases/kernel/syscalls/execve/execve05.c | 2 +-
testcases/kernel/syscalls/execve/execve06.c | 2 +-
testcases/kernel/syscalls/fchmod/fchmod06.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl01.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl04.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl05.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl06.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl07.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl08.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl09.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl10.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_loop01.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_loop02.c | 4 ++--
testcases/kernel/syscalls/ioctl/ioctl_loop03.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_loop04.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_loop05.c | 4 ++--
testcases/kernel/syscalls/ioctl/ioctl_loop06.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_loop07.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_pidfd01.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_pidfd02.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_pidfd03.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_pidfd04.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_pidfd05.c | 2 +-
testcases/kernel/syscalls/ioctl/ioctl_pidfd06.c | 2 +-
testcases/kernel/syscalls/mmap/mmap22.c | 2 +-
testcases/kernel/syscalls/mount/mount07.c | 4 ++--
testcases/kernel/syscalls/open/open13.c | 6 +++---
testcases/kernel/syscalls/select/select01.c | 2 +-
testcases/kernel/syscalls/select/select02.c | 2 +-
testcases/kernel/syscalls/select/select03.c | 2 +-
testcases/kernel/syscalls/select/select04.c | 2 +-
testcases/kernel/syscalls/setrlimit/setrlimit02.c | 2 +-
testcases/kernel/syscalls/setrlimit/setrlimit03.c | 2 +-
testcases/kernel/syscalls/setrlimit/setrlimit05.c | 2 +-
testcases/kernel/syscalls/swapon/swapon03.c | 2 +-
testcases/kernel/syscalls/umount/umount01.c | 2 +-
testcases/kernel/syscalls/umount/umount02.c | 4 ++--
testcases/kernel/syscalls/umount/umount03.c | 2 +-
testcases/kernel/syscalls/umount2/umount2_02.c | 10 +++++-----
testcases/kernel/syscalls/unlink/unlink05.c | 6 +++---
testcases/kernel/syscalls/unlink/unlink07.c | 2 +-
testcases/kernel/syscalls/unlink/unlink08.c | 2 +-
testcases/kernel/syscalls/unlink/unlink09.c | 2 +-
testcases/kernel/syscalls/unlink/unlink10.c | 2 +-
testcases/kernel/syscalls/unlinkat/unlinkat01.c | 2 +-
testcases/kernel/syscalls/unshare/unshare01.c | 4 ++--
testcases/kernel/syscalls/unshare/unshare02.c | 2 +-
testcases/kernel/syscalls/userfaultfd/userfaultfd01.c | 2 +-
testcases/network/lib6/asapi_02.c | 4 ++--
66 files changed, 86 insertions(+), 85 deletions(-)
diff --git a/doc/conf.py b/doc/conf.py
index b8ec1c31c2..d49cb4e77e 100644
--- a/doc/conf.py
+++ b/doc/conf.py
@@ -36,14 +36,15 @@ extlinks = {
'master': (f'{ltp_repo}/blob/master/%s', '%s'),
'shell_lib': (f'{ltp_repo}/blob/master/testcases/lib/%s', '%s'),
'git_man': ('https://git-scm.com/docs/git-%s', 'git %s'),
- 'man2': ('https://man7.org/linux/man-pages/man2/%s.2.html', '%s(2)'),
- 'man3': ('https://man7.org/linux/man-pages/man3/%s.3.html', '%s(3)'),
# TODO: allow 2nd parameter to show page description instead of plain URL
'kernel_doc': ('https://docs.kernel.org/%s.html', 'https://docs.kernel.org/%s.html'),
'kernel_tree': ('https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/%s', '%s'),
'kselftest': ('https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/tools/testing/selftests/%s', '%s (kselftest)'),
}
+# Link to man pages
+manpages_url = 'https://man7.org/linux/man-pages/man{section}/{page}.{section}.html'
+
spelling_lang = "en_US"
spelling_warning = True
spelling_exclude_patterns = ['users/stats.rst']
diff --git a/include/tst_cmd.h b/include/tst_cmd.h
index bda74ec911..3bdd764dc9 100644
--- a/include/tst_cmd.h
+++ b/include/tst_cmd.h
@@ -33,7 +33,7 @@ int tst_cmd_(void (cleanup_fn)(void),
#ifdef TST_TEST_H__
/**
- * tst_cmd_fds() - :man2:`vfork` + :man3:`execvp` specified program.
+ * tst_cmd_fds() - :manpage:`vfork(2)` + :manpage:`execvp(3)` specified program.
*
* @argv: A list of two (at least program name + NULL) or more pointers that
* represent the argument list to the new program. The array of pointers
@@ -98,7 +98,7 @@ static inline int tst_cmd(void (cleanup_fn)(void),
#endif
/**
- * tst_system() - Wrapper function for :man3:`system`, ignorcing ``SIGCHLD``
+ * tst_system() - Wrapper function for :manpage:`system(3)`, ignorcing ``SIGCHLD``
* signal.
*
* @command: The command to be run.
diff --git a/include/tst_kvercmp.h b/include/tst_kvercmp.h
index 95eff0bc48..7c991c746a 100644
--- a/include/tst_kvercmp.h
+++ b/include/tst_kvercmp.h
@@ -54,7 +54,7 @@ const char *tst_kvcmp_distname(const char *cur_kver);
* @tst_exv: The tested kernel version string (struct utsname.release).
* @cur_kver: The current version in string (struct utsname.release).
*
- * The return value is similar to the :man3:`strcmp` function, i.e. zero means
+ * The return value is similar to the :manpage:`strcmp(3)` function, i.e. zero means
* equal, negative value means that the kernel is older than the expected value
* and positive means that it's newer.
*
@@ -69,7 +69,7 @@ int tst_kvexcmp(const char *tst_exv, const char *cur_kver);
* @r2: Minor kernel version.
* @r3: Kernel patch level.
*
- * Parse the output from :man2:`uname` and compare it to the passed values.
+ * Parse the output from :manpage:`uname(2)` and compare it to the passed values.
* This is shortcut for calling tst_kvcmp() with ``uname -r`` as str_kver.
*
* Return: Negative if older, 0 if the same and positive if newer.
diff --git a/testcases/cve/stack_clash.c b/testcases/cve/stack_clash.c
index 19da449dde..0584b2f7a4 100644
--- a/testcases/cve/stack_clash.c
+++ b/testcases/cve/stack_clash.c
@@ -12,12 +12,12 @@
* gap which is considered hard to hop above. Code is based on a reproducer from
* https://bugzilla.suse.com/show_bug.cgi?id=CVE-2017-1000364.
*
- * The code :man2:`mmap` region close to the stack end. The code then allocates
+ * The code :manpage:`mmap(2)` region close to the stack end. The code then allocates
* memory on stack until it hits guard page and SIGSEGV or SIGBUS is generated
* by the kernel. The signal handler checks that fault address is further than
* THRESHOLD from the mmapped area.
*
- * We read /proc/self/maps to examine exact top of the stack and :man2:`mmap`
+ * We read /proc/self/maps to examine exact top of the stack and :manpage:`mmap(2)`
* our region exactly GAP_PAGES * PAGE_SIZE away. We read /proc/cmdline to
* see if a different stack_guard_gap size is configured. We set stack limit
* to infinity and preallocate REQ_STACK_SIZE bytes of stack so that no calls
diff --git a/testcases/kernel/mem/tunable/max_map_count.c b/testcases/kernel/mem/tunable/max_map_count.c
index e58bc2ffe0..429b9c81cc 100644
--- a/testcases/kernel/mem/tunable/max_map_count.c
+++ b/testcases/kernel/mem/tunable/max_map_count.c
@@ -18,7 +18,7 @@
* indicates a map entry, so it can caculate the amount of maps by reading
* the file lines' number to check the tunable performance.
*
- * The program tries to invoke :man2:`mmap` endlessly until it triggers
+ * The program tries to invoke :manpage:`mmap(2)` endlessly until it triggers
* ``MAP_FAILED``, then reads the process's maps file /proc/[pid]/maps, save
* the line number to map_count variable, and compare it with
* ``/proc/sys/vm/max_map_count``, map_count should be greater than
diff --git a/testcases/kernel/syscalls/clone/clone11.c b/testcases/kernel/syscalls/clone/clone11.c
index 68c28481e9..f9f5545f9d 100644
--- a/testcases/kernel/syscalls/clone/clone11.c
+++ b/testcases/kernel/syscalls/clone/clone11.c
@@ -4,7 +4,7 @@
*/
/*\
- * This test verifies that :man2:`clone` fails with EPERM when CAP_SYS_ADMIN
+ * This test verifies that :manpage:`clone(2)` fails with EPERM when CAP_SYS_ADMIN
* has been dropped.
*/
diff --git a/testcases/kernel/syscalls/clone3/clone304.c b/testcases/kernel/syscalls/clone3/clone304.c
index 26d42c59e0..9faaf44bb2 100644
--- a/testcases/kernel/syscalls/clone3/clone304.c
+++ b/testcases/kernel/syscalls/clone3/clone304.c
@@ -4,7 +4,7 @@
*/
/*\
- * This test verifies that :man2:`clone3` fails with EPERM when CAP_SYS_ADMIN
+ * This test verifies that :manpage:`clone3(2)` fails with EPERM when CAP_SYS_ADMIN
* has been dropped and ``clone_args.set_tid_size`` is greater than zero.
*/
diff --git a/testcases/kernel/syscalls/execve/execve01.c b/testcases/kernel/syscalls/execve/execve01.c
index 777dad5cef..362c5a9b6d 100644
--- a/testcases/kernel/syscalls/execve/execve01.c
+++ b/testcases/kernel/syscalls/execve/execve01.c
@@ -11,7 +11,7 @@
#include "tst_test.h"
/*\
- * Test :man2:`execve` passes correctly argv[1] and environment variable to the
+ * Test :manpage:`execve(2)` passes correctly argv[1] and environment variable to the
* executed binary.
*/
diff --git a/testcases/kernel/syscalls/execve/execve02.c b/testcases/kernel/syscalls/execve/execve02.c
index 7cbd2c0346..2bf172125f 100644
--- a/testcases/kernel/syscalls/execve/execve02.c
+++ b/testcases/kernel/syscalls/execve/execve02.c
@@ -9,8 +9,8 @@
*/
/*\
- * Attempt to :man2:`execve` an executable owned by root with no execute
- * permissions for the other users, fails when :man2:`execve` is used as
+ * Attempt to :manpage:`execve(2)` an executable owned by root with no execute
+ * permissions for the other users, fails when :manpage:`execve(2)` is used as
* a non-root user, the errno should be EACCES.
*/
diff --git a/testcases/kernel/syscalls/execve/execve03.c b/testcases/kernel/syscalls/execve/execve03.c
index 7a47c985df..a3e1b240a1 100644
--- a/testcases/kernel/syscalls/execve/execve03.c
+++ b/testcases/kernel/syscalls/execve/execve03.c
@@ -7,7 +7,7 @@
*/
/*\
- * Test to check :man2:`execve` sets the following errnos correctly:
+ * Test to check :manpage:`execve(2)` sets the following errnos correctly:
*
* 1. ENAMETOOLONG -- the file name is greater than VFS_MAXNAMELEN
* 2. ENOENT -- the filename does not exist
diff --git a/testcases/kernel/syscalls/execve/execve04.c b/testcases/kernel/syscalls/execve/execve04.c
index 90ceccaeb1..35ec882a07 100644
--- a/testcases/kernel/syscalls/execve/execve04.c
+++ b/testcases/kernel/syscalls/execve/execve04.c
@@ -9,7 +9,7 @@
*/
/*\
- * Attempt to :man2:`execve` a file which is being opened by another process for
+ * Attempt to :manpage:`execve(2)` a file which is being opened by another process for
* writing fails with ETXTBSY.
*/
diff --git a/testcases/kernel/syscalls/execve/execve05.c b/testcases/kernel/syscalls/execve/execve05.c
index d3a9d947bc..352c73c38a 100644
--- a/testcases/kernel/syscalls/execve/execve05.c
+++ b/testcases/kernel/syscalls/execve/execve05.c
@@ -7,7 +7,7 @@
*/
/*\
- * This tests the functionality of the execve(2) :man2:`execve` call by spawning
+ * This tests the functionality of the execve(2) :manpage:`execve(2)` call by spawning
* a few children, each of which would execute "execve_child" binary simultaneously,
* and finally the parent ensures that they terminated correctly.
*/
diff --git a/testcases/kernel/syscalls/execve/execve06.c b/testcases/kernel/syscalls/execve/execve06.c
index 5b58515506..55f5d71163 100644
--- a/testcases/kernel/syscalls/execve/execve06.c
+++ b/testcases/kernel/syscalls/execve/execve06.c
@@ -5,7 +5,7 @@
/*\
* Test that kernel adds dummy argv[0] if empty argument list was passed to
- * :man2:`execve`. This fixes at least one CVE where userspace programs start to
+ * :manpage:`execve(2)`. This fixes at least one CVE where userspace programs start to
* process argument list blindly from argv[1] such as polkit pkexec
* CVE-2021-4034.
*
diff --git a/testcases/kernel/syscalls/fchmod/fchmod06.c b/testcases/kernel/syscalls/fchmod/fchmod06.c
index 458239a2ef..37314e7d09 100644
--- a/testcases/kernel/syscalls/fchmod/fchmod06.c
+++ b/testcases/kernel/syscalls/fchmod/fchmod06.c
@@ -7,7 +7,7 @@
*/
/*\
- * Verify that :man2:`fchmod` fails and sets the proper errno values:
+ * Verify that :manpage:`fchmod(2)` fails and sets the proper errno values:
*
* - EPERM -- the effective UID does not match the owner of the file, and the process is not privileged
* - EBADF -- file descriptor was closed
diff --git a/testcases/kernel/syscalls/ioctl/ioctl01.c b/testcases/kernel/syscalls/ioctl/ioctl01.c
index 4fae026670..62f977ec12 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl01.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl01.c
@@ -8,7 +8,7 @@
*/
/*\
- * Testcase to check the errnos set by the :man2:`ioctl` system call.
+ * Testcase to check the errnos set by the :manpage:`ioctl(2)` system call.
*
* - EBADF: Pass an invalid fd to ioctl(fd, ...) and expect EBADF
* - EFAULT: Pass an invalid address of arg in ioctl(fd, ..., arg)
diff --git a/testcases/kernel/syscalls/ioctl/ioctl04.c b/testcases/kernel/syscalls/ioctl/ioctl04.c
index e38d9d365f..0465aa70fe 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl04.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl04.c
@@ -4,7 +4,7 @@
*/
/*\
- * Basic test for :man2:`ioctl` with BLKROSET and BLKROGET .
+ * Basic test for :manpage:`ioctl(2)` with BLKROSET and BLKROGET .
*
* - Set the device read only, read the value back.
* - Try to mount the device read write, expect failure.
diff --git a/testcases/kernel/syscalls/ioctl/ioctl05.c b/testcases/kernel/syscalls/ioctl/ioctl05.c
index 92ea6f8fee..daeec20d96 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl05.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl05.c
@@ -4,7 +4,7 @@
*/
/*\
- * Basic test for :man2:`ioctl` with BLKGETSIZE and BLKGETSIZE64.
+ * Basic test for :manpage:`ioctl(2)` with BLKGETSIZE and BLKGETSIZE64.
*
* - BLKGETSIZE returns size in 512 byte blocks BLKGETSIZE64 in bytes
* compare that they return the same value.
diff --git a/testcases/kernel/syscalls/ioctl/ioctl06.c b/testcases/kernel/syscalls/ioctl/ioctl06.c
index 8d49d4773d..6e4323b37f 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl06.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl06.c
@@ -4,7 +4,7 @@
*/
/*\
- * Basic test for :man2:`ioctl` with BLKRASET and BLKRAGET.
+ * Basic test for :manpage:`ioctl(2)` with BLKRASET and BLKRAGET.
*
* Sets device read-ahead, reads it back and compares the values.
*
diff --git a/testcases/kernel/syscalls/ioctl/ioctl07.c b/testcases/kernel/syscalls/ioctl/ioctl07.c
index 4afb3a1d6b..f4acb7f892 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl07.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl07.c
@@ -4,7 +4,7 @@
*/
/*\
- * Very basic test for the RND* :man2:`ioctl`.
+ * Very basic test for the RND* :manpage:`ioctl(2)`.
*
* Reads the entropy available from both /proc and the ioctl and compares
* they are similar enough (within a configured fuzz factor).
diff --git a/testcases/kernel/syscalls/ioctl/ioctl08.c b/testcases/kernel/syscalls/ioctl/ioctl08.c
index 520becf7d9..dd64065503 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl08.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl08.c
@@ -5,7 +5,7 @@
*/
/*\
- * Tests :man2:`ioctl` functionality to deduplicate fileranges using
+ * Tests :manpage:`ioctl(2)` functionality to deduplicate fileranges using
* btrfs filesystem.
*
* 1. Sets the same contents for two files and deduplicates it.
diff --git a/testcases/kernel/syscalls/ioctl/ioctl09.c b/testcases/kernel/syscalls/ioctl/ioctl09.c
index c046d89595..61a8d83554 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl09.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl09.c
@@ -5,7 +5,7 @@
*/
/*\
- * Basic test for :man2:`ioctl` with BLKRRPART, it is the same as blockdev
+ * Basic test for :manpage:`ioctl(2)` with BLKRRPART, it is the same as blockdev
* --rereadpt command.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl10.c b/testcases/kernel/syscalls/ioctl/ioctl10.c
index 85c20e76fe..b668c9e938 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl10.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl10.c
@@ -4,7 +4,7 @@
*/
/*\
- * Test PROCMAP_QUERY :man2:`ioctl` for /proc/$PID/maps.
+ * Test PROCMAP_QUERY :manpage:`ioctl(2)` for /proc/$PID/maps.
*
* Test based on :kselftest:`proc/proc-pid-vm.c`.
*
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c
index 86fdbd931e..91683396f2 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c
@@ -4,7 +4,7 @@
*/
/*\
- * This test verifies that :man2:`ioctl` FICLONE feature clones file content
+ * This test verifies that :manpage:`ioctl(2)` FICLONE feature clones file content
* from one file to an another.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c
index d4265147d6..8a550b8f8c 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c
@@ -4,7 +4,7 @@
*/
/*\
- * This test verifies that :man2:`ioctl` FICLONE/FICLONERANGE feature correctly
+ * This test verifies that :manpage:`ioctl(2)` FICLONE/FICLONERANGE feature correctly
* raises EOPNOTSUPP when an unsupported filesystem is used. In particular,
* filesystems which don't support copy-on-write.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c
index a52f0d1f26..ba06e2d8e3 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c
@@ -4,7 +4,7 @@
*/
/*\
- * This test verifies that :man2:`ioctl` FICLONE/FICLONERANGE feature correctly
+ * This test verifies that :manpage:`ioctl(2)` FICLONE/FICLONERANGE feature correctly
* raises exceptions when it's supposed to.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c
index 48321e9f31..e62863b038 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c
@@ -4,7 +4,7 @@
*/
/*\
- * This test verifies that :man2:`ioctl` FICLONE/FICLONERANGE feature raises the
+ * This test verifies that :manpage:`ioctl(2)` FICLONE/FICLONERANGE feature raises the
* right error according with bad file descriptors.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c
index 79143ba160..8dab9f3447 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c
@@ -4,7 +4,7 @@
*/
/*\
- * This test verifies that :man2:`ioctl` FICLONERANGE feature clones file
+ * This test verifies that :manpage:`ioctl(2)` FICLONERANGE feature clones file
* content from one file to an another.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c
index 701a63284c..5c9d8afb70 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c
@@ -4,7 +4,7 @@
*/
/*\
- * This test verifies that :man2:`ioctl` FICLONERANGE feature correctly raises
+ * This test verifies that :manpage:`ioctl(2)` FICLONERANGE feature correctly raises
* EINVAL when:
*
* - filesystem does not support overlapping reflink ranges in the same file
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop01.c b/testcases/kernel/syscalls/ioctl/ioctl_loop01.c
index 9fbdbb1f2b..0d39d2987e 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop01.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop01.c
@@ -6,7 +6,7 @@
*/
/*\
- * Tests :man2:`ioctl` on loopdevice with LO_FLAGS_AUTOCLEAR and
+ * Tests :manpage:`ioctl(2)` on loopdevice with LO_FLAGS_AUTOCLEAR and
* LO_FLAGS_PARTSCAN flags.
*
* For LO_FLAGS_AUTOCLEAR flag, only checks autoclear field value in sysfs
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop02.c b/testcases/kernel/syscalls/ioctl/ioctl_loop02.c
index a401056c34..a5398ba0a5 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop02.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop02.c
@@ -6,14 +6,14 @@
*/
/*\
- * Tests :man2:`ioctl` on loopdevice with LO_FLAGS_READ_ONLY (similar as losetup
+ * Tests :manpage:`ioctl(2)` on loopdevice with LO_FLAGS_READ_ONLY (similar as losetup
* -r) and LOOP_CHANGE_FD flags.
*
* For LOOP_CHANGE_FD, this operation is possible only if the loop device
* is read-only and the new backing store is the same size and type as the
* old backing store.
*
- * When using LOOP_CONFIGURE :man2:`ioctl`, it can set LO_FLAGS_READ_ONLY
+ * When using LOOP_CONFIGURE :manpage:`ioctl(2)`, it can set LO_FLAGS_READ_ONLY
* flag even though backing file with write mode.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop03.c b/testcases/kernel/syscalls/ioctl/ioctl_loop03.c
index db2d16ced0..56a7174761 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop03.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop03.c
@@ -6,7 +6,7 @@
*/
/*\
- * Tests :man2:`ioctl` on loopdevice with LOOP_CHANGE_FD flag.
+ * Tests :manpage:`ioctl(2)` on loopdevice with LOOP_CHANGE_FD flag.
*
* Tests whether LOOP_CHANGE_FD can not succeed (get EINVAL error)
* when loop_dev is not read only.
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop04.c b/testcases/kernel/syscalls/ioctl/ioctl_loop04.c
index b3b4b6a9a9..38134fb701 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop04.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop04.c
@@ -6,7 +6,7 @@
*/
/*\
- * Tests :man2:`ioctl` on loopdevice with LOOP_SET_CAPACITY flag.
+ * Tests :manpage:`ioctl(2)` on loopdevice with LOOP_SET_CAPACITY flag.
*
* Tests whether LOOP_SET_CAPACITY can update a live
* loop device size after change the size of the underlying
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop05.c b/testcases/kernel/syscalls/ioctl/ioctl_loop05.c
index 64b121fb3b..88db7d168c 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop05.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop05.c
@@ -6,7 +6,7 @@
*/
/*\
- * Tests :man2:`ioctl` on loopdevice with LOOP_SET_DIRECT_IO flag.
+ * Tests :manpage:`ioctl(2)` on loopdevice with LOOP_SET_DIRECT_IO flag.
*
* Tests whether LOOP_SET_DIRECT_IO can update a live loop device dio mode.
* It requires the backing file also supports dio mode and the lo_offset is
@@ -16,7 +16,7 @@
* return error when it coudln't be enabled, some silently fall back to regular
* buffered I/O.
*
- * The LOOP_SET_DIRECT_IO :man2:`ioctl` may ignore all checks if it cannot get
+ * The LOOP_SET_DIRECT_IO :manpage:`ioctl(2)` may ignore all checks if it cannot get
* the logical block size which is the case if the block device pointer in the
* backing file inode is not set. In this case the direct I/O appears to be
* enabled but falls back to buffered I/O later on. This is the case at least
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop06.c b/testcases/kernel/syscalls/ioctl/ioctl_loop06.c
index 23204086f6..94f9bcdc6e 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop06.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop06.c
@@ -6,7 +6,7 @@
*/
/*\
- * Tests invalid block size of loopdevice by using :man2:`ioctl` with
+ * Tests invalid block size of loopdevice by using :manpage:`ioctl(2)` with
* LOOP_SET_BLOCK_SIZE and LOOP_CONFIGURE flags.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop07.c b/testcases/kernel/syscalls/ioctl/ioctl_loop07.c
index 31e9c7c04a..0a210038b7 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop07.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop07.c
@@ -6,7 +6,7 @@
*/
/*\
- * Tests :man2:`ioctl` on loopdevice with LOOP_SET_STATUS64 and
+ * Tests :manpage:`ioctl(2)` on loopdevice with LOOP_SET_STATUS64 and
* LOOP_GET_STATUS64 flags.
*
* Tests lo_sizelimit field. If lo_sizelimit is 0, it means max
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_pidfd01.c b/testcases/kernel/syscalls/ioctl/ioctl_pidfd01.c
index 216af2ea30..95c0e8f3fa 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_pidfd01.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_pidfd01.c
@@ -4,7 +4,7 @@
*/
/*\
- * Verify that :man2:`ioctl` raises the right errors when an application
+ * Verify that :manpage:`ioctl(2)` raises the right errors when an application
* provides wrong file descriptor.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_pidfd02.c b/testcases/kernel/syscalls/ioctl/ioctl_pidfd02.c
index 7eb60e7fc6..c6f8a02fe3 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_pidfd02.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_pidfd02.c
@@ -4,7 +4,7 @@
*/
/*\
- * Check if the :man2:`ioctl` function allows retrieval of a child's exit code
+ * Check if the :manpage:`ioctl(2)` function allows retrieval of a child's exit code
* using PIDFD_INFO_EXIT from a process that can be isolated or not from the
* child.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_pidfd03.c b/testcases/kernel/syscalls/ioctl/ioctl_pidfd03.c
index 8f2779be2e..2c785004c0 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_pidfd03.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_pidfd03.c
@@ -4,7 +4,7 @@
*/
/*\
- * Verify that :man2:`ioctl` returns ESRCH when a process attempts to access the
+ * Verify that :manpage:`ioctl(2)` returns ESRCH when a process attempts to access the
* exit status of an isolated child using PIDFD_GET_INFO and PIDFD_INFO_EXIT
* is not defined in struct pidfd_info.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_pidfd04.c b/testcases/kernel/syscalls/ioctl/ioctl_pidfd04.c
index cf8393dec4..ff43160680 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_pidfd04.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_pidfd04.c
@@ -4,7 +4,7 @@
*/
/*\
- * Verify that :man2:`ioctl` permits to obtain the exit code of an isolated
+ * Verify that :manpage:`ioctl(2)` permits to obtain the exit code of an isolated
* signaled child via PIDFD_INFO_EXIT from within a process.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_pidfd05.c b/testcases/kernel/syscalls/ioctl/ioctl_pidfd05.c
index 31439f0b77..278e64cefc 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_pidfd05.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_pidfd05.c
@@ -4,7 +4,7 @@
*/
/*\
- * Verify that :man2:`ioctl` raises an EINVAL or ENOTTY (since v6.18-rc1) error
+ * Verify that :manpage:`ioctl(2)` raises an EINVAL or ENOTTY (since v6.18-rc1) error
* when PIDFD_GET_INFO is used. This happens when:
*
* - info parameter is NULL
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_pidfd06.c b/testcases/kernel/syscalls/ioctl/ioctl_pidfd06.c
index 2a8bc14325..95c09dbdaa 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_pidfd06.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_pidfd06.c
@@ -4,7 +4,7 @@
*/
/*\
- * Verify that :man2:`ioctl` doesn't allow to obtain the exit status of an isolated
+ * Verify that :manpage:`ioctl(2)` doesn't allow to obtain the exit status of an isolated
* process via PIDFD_INFO_EXIT in within an another isolated process, which
* doesn't have any parent connection.
*/
diff --git a/testcases/kernel/syscalls/mmap/mmap22.c b/testcases/kernel/syscalls/mmap/mmap22.c
index 221fd5d286..0b95c578ff 100644
--- a/testcases/kernel/syscalls/mmap/mmap22.c
+++ b/testcases/kernel/syscalls/mmap/mmap22.c
@@ -4,7 +4,7 @@
*/
/*\
- * Test :man2:`mmap` with MAP_DROPPABLE flag.
+ * Test :manpage:`mmap(2)` with MAP_DROPPABLE flag.
*
* Test based on :kselftest:`mm/droppable.c`.
*
diff --git a/testcases/kernel/syscalls/mount/mount07.c b/testcases/kernel/syscalls/mount/mount07.c
index 325e0daa68..f1b890fd6f 100644
--- a/testcases/kernel/syscalls/mount/mount07.c
+++ b/testcases/kernel/syscalls/mount/mount07.c
@@ -10,8 +10,8 @@
*
* It tests to make sure that symlink traversal fails with ELOOP when
* 'nosymfollow' is set, but symbolic links can still be created, and
- * :man2:`readlink` and :man3:`realpath` still work properly. It also verifies
- * that :man2:`statfs` correctly returns ST_NOSYMFOLLOW.
+ * :manpage:`readlink(2)` and :manpage:`realpath(3)` still work properly. It also verifies
+ * that :manpage:`statfs(2)` correctly returns ST_NOSYMFOLLOW.
*/
#include <limits.h>
diff --git a/testcases/kernel/syscalls/open/open13.c b/testcases/kernel/syscalls/open/open13.c
index aea9ec4b2b..40b6fa851e 100644
--- a/testcases/kernel/syscalls/open/open13.c
+++ b/testcases/kernel/syscalls/open/open13.c
@@ -6,12 +6,12 @@
*/
/*\
- * Basic test for O_PATH flag of :man2:`open`:
+ * Basic test for O_PATH flag of :manpage:`open(2)`:
*
* Obtain a file descriptor that can be used to perform operations
* that act purely at the file descriptor level, the file itself is
- * not opened, the operations :man2:`read`, :man2:`write`, :man2:`fchmod`,
- * :man2:`fchown` and :man2:`fgetxattr` fail with the error EBADF.
+ * not opened, the operations :manpage:`read(2)`, :manpage:`write(2)`, :manpage:`fchmod(2)`,
+ * :manpage:`fchown(2)` and :manpage:`fgetxattr(2)` fail with the error EBADF.
*
* The operations include but are not limited to the syscalls above.
*/
diff --git a/testcases/kernel/syscalls/select/select01.c b/testcases/kernel/syscalls/select/select01.c
index 58a4774da1..7b597a69f9 100644
--- a/testcases/kernel/syscalls/select/select01.c
+++ b/testcases/kernel/syscalls/select/select01.c
@@ -7,7 +7,7 @@
*/
/*\
- * :man2:`select` with no I/O and small timeout to file descriptor of a
+ * :manpage:`select(2)` with no I/O and small timeout to file descriptor of a
*
* - regular file
* - system pipe
diff --git a/testcases/kernel/syscalls/select/select02.c b/testcases/kernel/syscalls/select/select02.c
index 541d9367f6..da8b250524 100644
--- a/testcases/kernel/syscalls/select/select02.c
+++ b/testcases/kernel/syscalls/select/select02.c
@@ -4,7 +4,7 @@
*/
/*\
- * Check that :man2:`select` timeouts correctly.
+ * Check that :manpage:`select(2)` timeouts correctly.
*/
#include <unistd.h>
diff --git a/testcases/kernel/syscalls/select/select03.c b/testcases/kernel/syscalls/select/select03.c
index 6ad1d051e0..1154e457d7 100644
--- a/testcases/kernel/syscalls/select/select03.c
+++ b/testcases/kernel/syscalls/select/select03.c
@@ -4,7 +4,7 @@
*/
/*\
- * :man2:`select` failure tests:
+ * :manpage:`select(2)` failure tests:
*
* - negative nfds (EINVAL)
* - invalid readfds (EBADF)
diff --git a/testcases/kernel/syscalls/select/select04.c b/testcases/kernel/syscalls/select/select04.c
index 87791c9205..ddff1528f5 100644
--- a/testcases/kernel/syscalls/select/select04.c
+++ b/testcases/kernel/syscalls/select/select04.c
@@ -5,7 +5,7 @@
*/
/*\
- * Test to check if fd set bits are cleared by :man2:`select`.
+ * Test to check if fd set bits are cleared by :manpage:`select(2)`.
*
* [Algorithm]
* - Check that writefds flag is cleared on full pipe
diff --git a/testcases/kernel/syscalls/setrlimit/setrlimit02.c b/testcases/kernel/syscalls/setrlimit/setrlimit02.c
index 41d8e8007b..92600da4a4 100644
--- a/testcases/kernel/syscalls/setrlimit/setrlimit02.c
+++ b/testcases/kernel/syscalls/setrlimit/setrlimit02.c
@@ -6,7 +6,7 @@
*/
/*\
- * Testcase to test the different errnos set by :man2:`setrlimit` system call.
+ * Testcase to test the different errnos set by :manpage:`setrlimit(2)` system call.
*/
#include <pwd.h>
diff --git a/testcases/kernel/syscalls/setrlimit/setrlimit03.c b/testcases/kernel/syscalls/setrlimit/setrlimit03.c
index d0eefb3c22..0e1f83a1e8 100644
--- a/testcases/kernel/syscalls/setrlimit/setrlimit03.c
+++ b/testcases/kernel/syscalls/setrlimit/setrlimit03.c
@@ -5,7 +5,7 @@
*/
/*\
- * Test :man2:`setrlimit` errnos:
+ * Test :manpage:`setrlimit(2)` errnos:
*
* - EPERM when the super-user tries to increase RLIMIT_NOFILE beyond the
* system limit.
diff --git a/testcases/kernel/syscalls/setrlimit/setrlimit05.c b/testcases/kernel/syscalls/setrlimit/setrlimit05.c
index b35d8ea085..831ccfc204 100644
--- a/testcases/kernel/syscalls/setrlimit/setrlimit05.c
+++ b/testcases/kernel/syscalls/setrlimit/setrlimit05.c
@@ -5,7 +5,7 @@
*/
/*\
- * Test :man2:`setrlimit` for EFAULT when rlim points outside the accessible
+ * Test :manpage:`setrlimit(2)` for EFAULT when rlim points outside the accessible
* address space.
*/
diff --git a/testcases/kernel/syscalls/swapon/swapon03.c b/testcases/kernel/syscalls/swapon/swapon03.c
index 53c5750de4..61a455f319 100644
--- a/testcases/kernel/syscalls/swapon/swapon03.c
+++ b/testcases/kernel/syscalls/swapon/swapon03.c
@@ -6,7 +6,7 @@
*/
/*\
- * Test checks whether :man2:`swapon` system call returns EPERM when the maximum
+ * Test checks whether :manpage:`swapon(2)` system call returns EPERM when the maximum
* number of swap files are already in use.
*
* NOTE: test does not try to calculate MAX_SWAPFILES from the internal
diff --git a/testcases/kernel/syscalls/umount/umount01.c b/testcases/kernel/syscalls/umount/umount01.c
index 0381d08d30..bbce647ffd 100644
--- a/testcases/kernel/syscalls/umount/umount01.c
+++ b/testcases/kernel/syscalls/umount/umount01.c
@@ -6,7 +6,7 @@
*/
/*\
- * Check the basic functionality of the :man2:`umount` system call.
+ * Check the basic functionality of the :manpage:`umount(2)` system call.
*/
#include <sys/mount.h>
diff --git a/testcases/kernel/syscalls/umount/umount02.c b/testcases/kernel/syscalls/umount/umount02.c
index 5797f506be..eacf49d945 100644
--- a/testcases/kernel/syscalls/umount/umount02.c
+++ b/testcases/kernel/syscalls/umount/umount02.c
@@ -7,9 +7,9 @@
*/
/*\
- * Check for basic errors returned by :man2:`umount` system call.
+ * Check for basic errors returned by :manpage:`umount(2)` system call.
*
- * Verify that :man2:`umount` returns -1 and sets errno to
+ * Verify that :manpage:`umount(2)` returns -1 and sets errno to
*
* 1. EBUSY if it cannot be umounted, because dir is still busy.
* 2. EFAULT if specialfile or device file points to invalid address space.
diff --git a/testcases/kernel/syscalls/umount/umount03.c b/testcases/kernel/syscalls/umount/umount03.c
index b0568becb3..5a0f73c2c1 100644
--- a/testcases/kernel/syscalls/umount/umount03.c
+++ b/testcases/kernel/syscalls/umount/umount03.c
@@ -6,7 +6,7 @@
*/
/*\
- * Verify that :man2:`umount` returns -1 and sets errno to EPERM if the user
+ * Verify that :manpage:`umount(2)` returns -1 and sets errno to EPERM if the user
* is not the super-user.
*/
diff --git a/testcases/kernel/syscalls/umount2/umount2_02.c b/testcases/kernel/syscalls/umount2/umount2_02.c
index 377e47c203..990157d1a9 100644
--- a/testcases/kernel/syscalls/umount2/umount2_02.c
+++ b/testcases/kernel/syscalls/umount2/umount2_02.c
@@ -5,14 +5,14 @@
*/
/*\
- * Test for feature MNT_EXPIRE of :man2:`umount2`:
+ * Test for feature MNT_EXPIRE of :manpage:`umount2(2)`:
*
* - EINVAL when flag is specified with either MNT_FORCE or MNT_DETACH
- * - EAGAIN when initial call to :man2:`umount2` with MNT_EXPIRE
- * - EAGAIN when :man2:`umount2` with MNT_EXPIRE after :man2:`access`
- * - succeed when second call to :man2:`umount2` with MNT_EXPIRE
+ * - EAGAIN when initial call to :manpage:`umount2(2)` with MNT_EXPIRE
+ * - EAGAIN when :manpage:`umount2(2)` with MNT_EXPIRE after :manpage:`access(2)`
+ * - succeed when second call to :manpage:`umount2(2)` with MNT_EXPIRE
*
- * Test for feature UMOUNT_NOFOLLOW of :man2:`umount2`:
+ * Test for feature UMOUNT_NOFOLLOW of :manpage:`umount2(2)`:
*
* - EINVAL when target is a symbolic link
* - succeed when target is a mount point
diff --git a/testcases/kernel/syscalls/unlink/unlink05.c b/testcases/kernel/syscalls/unlink/unlink05.c
index 0424218979..8de2d8bc25 100644
--- a/testcases/kernel/syscalls/unlink/unlink05.c
+++ b/testcases/kernel/syscalls/unlink/unlink05.c
@@ -5,10 +5,10 @@
*/
/*\
- * Test the basic functionality of :man2:`unlink`:
+ * Test the basic functionality of :manpage:`unlink(2)`:
*
- * - :man2:`unlink` can delete regular file successfully
- * - :man2:`unlink` can delete fifo file successfully
+ * - :manpage:`unlink(2)` can delete regular file successfully
+ * - :manpage:`unlink(2)` can delete fifo file successfully
*/
#include <errno.h>
diff --git a/testcases/kernel/syscalls/unlink/unlink07.c b/testcases/kernel/syscalls/unlink/unlink07.c
index f53f58af55..b4b70d2704 100644
--- a/testcases/kernel/syscalls/unlink/unlink07.c
+++ b/testcases/kernel/syscalls/unlink/unlink07.c
@@ -5,7 +5,7 @@
*/
/*\
- * Verify that :man2:`unlink`: fails with:
+ * Verify that :manpage:`unlink(2)`: fails with:
*
* - ENOENT when file does not exist
* - ENOENT when pathname is empty
diff --git a/testcases/kernel/syscalls/unlink/unlink08.c b/testcases/kernel/syscalls/unlink/unlink08.c
index efc5753be5..c1fa8f31d0 100644
--- a/testcases/kernel/syscalls/unlink/unlink08.c
+++ b/testcases/kernel/syscalls/unlink/unlink08.c
@@ -5,7 +5,7 @@
*/
/*\
- * Verify that :man2:`unlink`: fails with:
+ * Verify that :manpage:`unlink(2)`: fails with:
*
* - EACCES when no write access to the directory containing pathname
* - EACCES when one of the directories in pathname did not allow search
diff --git a/testcases/kernel/syscalls/unlink/unlink09.c b/testcases/kernel/syscalls/unlink/unlink09.c
index 5f943cf521..10d4e8a448 100644
--- a/testcases/kernel/syscalls/unlink/unlink09.c
+++ b/testcases/kernel/syscalls/unlink/unlink09.c
@@ -6,7 +6,7 @@
*/
/*\
- * Verify that :man2:`unlink`: fails with EPERM when target file is marked as
+ * Verify that :manpage:`unlink(2)`: fails with EPERM when target file is marked as
* immutable or append-only.
*/
diff --git a/testcases/kernel/syscalls/unlink/unlink10.c b/testcases/kernel/syscalls/unlink/unlink10.c
index 46a167e1bd..2d6ec8ce14 100644
--- a/testcases/kernel/syscalls/unlink/unlink10.c
+++ b/testcases/kernel/syscalls/unlink/unlink10.c
@@ -6,7 +6,7 @@
*/
/*\
- * Verify that :man2:`unlink`: fails with EROFS when target file is on
+ * Verify that :manpage:`unlink(2)`: fails with EROFS when target file is on
* a read-only filesystem.
*/
diff --git a/testcases/kernel/syscalls/unlinkat/unlinkat01.c b/testcases/kernel/syscalls/unlinkat/unlinkat01.c
index eddd6e3d24..f46690892c 100644
--- a/testcases/kernel/syscalls/unlinkat/unlinkat01.c
+++ b/testcases/kernel/syscalls/unlinkat/unlinkat01.c
@@ -7,7 +7,7 @@
*/
/*\
- * Basic :man2:`unlinkat` test.
+ * Basic :manpage:`unlinkat(2)` test.
*/
#include "tst_test.h"
diff --git a/testcases/kernel/syscalls/unshare/unshare01.c b/testcases/kernel/syscalls/unshare/unshare01.c
index 32d64b9552..f3d9fca7ba 100644
--- a/testcases/kernel/syscalls/unshare/unshare01.c
+++ b/testcases/kernel/syscalls/unshare/unshare01.c
@@ -6,11 +6,11 @@
*/
/*\
- * Basic tests for the :man2:`unshare` syscall.
+ * Basic tests for the :manpage:`unshare(2)` syscall.
*
* [Algorithm]
*
- * Calls :man2:`unshare` for different CLONE_* flags in a child process and
+ * Calls :manpage:`unshare(2)` for different CLONE_* flags in a child process and
* expects them to succeed.
*/
diff --git a/testcases/kernel/syscalls/unshare/unshare02.c b/testcases/kernel/syscalls/unshare/unshare02.c
index e5a16977f1..b8d51c701a 100644
--- a/testcases/kernel/syscalls/unshare/unshare02.c
+++ b/testcases/kernel/syscalls/unshare/unshare02.c
@@ -5,7 +5,7 @@
*/
/*\
- * Basic tests for the :man2:`unshare` errors.
+ * Basic tests for the :manpage:`unshare(2)` errors.
*
* - EINVAL on invalid flags
* - EPERM when process is missing required privileges
diff --git a/testcases/kernel/syscalls/userfaultfd/userfaultfd01.c b/testcases/kernel/syscalls/userfaultfd/userfaultfd01.c
index c7a7767204..569207c51a 100644
--- a/testcases/kernel/syscalls/userfaultfd/userfaultfd01.c
+++ b/testcases/kernel/syscalls/userfaultfd/userfaultfd01.c
@@ -5,7 +5,7 @@
*/
/*\
- * Force a pagefault event and handle it using :man2:`userfaultfd`
+ * Force a pagefault event and handle it using :manpage:`userfaultfd(2)`
* from a different thread.
*/
diff --git a/testcases/network/lib6/asapi_02.c b/testcases/network/lib6/asapi_02.c
index 6bffde03df..27a2e7c030 100644
--- a/testcases/network/lib6/asapi_02.c
+++ b/testcases/network/lib6/asapi_02.c
@@ -14,7 +14,7 @@
* larger number of messages may be potentially received on an ICMPv6 socket.
* Input filters may therefore be used to restrict input to a subset of the
* incoming ICMPv6 messages so only interesting messages are returned by the
- * :man2:`recv` family of calls to an application.
+ * :manpage:`recv(2)` family of calls to an application.
* The icmp6_filter structure may be used to refine the input message set
* according to the ICMPv6 type. By default, all messages types are allowed
@@ -41,7 +41,7 @@
* ``int ICMP6_FILTER_WILLBLOCK(int, const struct icmp6_filter *)``
* Determine if the given filter will ignore an ICMPv6 message of the given type.
*
- * The :man2:`getsockopt` and :man2:`setsockopt` calls may be used to obtain and
+ * The :manpage:`getsockopt(2)` and :manpage:`setsockopt(2)` calls may be used to obtain and
* install the filter on ICMPv6 sockets at option level ``IPPROTO_ICMPV6`` and
* name ``ICMP6_FILTER`` with a pointer to the icmp6_filter structure as the
* option value.
--
2.51.0
More information about the ltp
mailing list