access.2, prctl.2, recv.2, send.2, euidaccess.3, mbstowcs.3, mcheck.3: ffix

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2012-06-08 00:27:54 +12:00
parent 02ace852fb
commit 6fdbc7794f
7 changed files with 8 additions and 8 deletions

View File

@ -166,7 +166,7 @@ effective user ID to the real ID and then call
.BR access ()
always dereferences symbolic links.
If you need to check the permissions on a symbolic link, use
.BR faccessat(2)
.BR faccessat (2)
with the flag
.BR AT_SYMLINK_NOFOLLOW .
.PP

View File

@ -123,7 +123,7 @@ for security reasons, this feature has been removed.
in
.BR proc (5).)
Processes that are not dumpable can not be attached via
.BR ptrace(2)
.BR ptrace (2)
.BR PTRACE_ATTACH .
.TP
.BR PR_GET_DUMPABLE " (since Linux 2.3.20)"

View File

@ -482,7 +482,7 @@ but glibc currently types it as
.\" across architectures, but socklen_t is always 32 bits.
See
.BR recvmmsg(2)
.BR recvmmsg (2)
for information about a Linux-specific system call
that can be used to receive multiple datagrams in a single call.
.SH EXAMPLE

View File

@ -406,7 +406,7 @@ but glibc currently types it as
.\" across architectures, but socklen_t is always 32 bits.
See
.BR sendmmsg(2)
.BR sendmmsg (2)
for information about a Linux-specific system call
that can be used to transmit multiple datagrams in a single call.
.SH BUGS

View File

@ -87,7 +87,7 @@ any permission error that occurs.
This function always dereferences symbolic links.
If you need to check the permissions on a symbolic link, use
.BR faccessat(2)
.BR faccessat (2)
with the flags
.BR AT_EACCESS
and

View File

@ -81,4 +81,4 @@ provides a better interface to the same
functionality.
.SH "SEE ALSO"
.BR mbsrtowcs (3),
.BR wcstombs(3)
.BR wcstombs (3)

View File

@ -137,9 +137,9 @@ and
.BR mcheck_check_all ()
functions are available since glibc 2.2.
The
.BR mcheck()
.BR mcheck ()
and
.BR mprobe()
.BR mprobe ()
functions are present since at least glibc 2.0
.SH CONFORMING TO
These functions are GNU extensions.