mirror of https://github.com/mkerrisk/man-pages
mmap.2, proc.5, bpf-helpers.7, cpuset.7: tfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
parent
f2e7c3b645
commit
9d4976ce7d
|
@ -437,7 +437,7 @@ For other files, creating a mapping with this flag results in an
|
||||||
error.
|
error.
|
||||||
.IP
|
.IP
|
||||||
Shared file mappings with this flag provide the guarantee that while
|
Shared file mappings with this flag provide the guarantee that while
|
||||||
some memory is writably mapped in the address space of the process,
|
some memory is mapped writable in the address space of the process,
|
||||||
it will be visible in the same file at the same offset even after
|
it will be visible in the same file at the same offset even after
|
||||||
the system crashes or is rebooted.
|
the system crashes or is rebooted.
|
||||||
In conjunction with the use of appropriate CPU instructions,
|
In conjunction with the use of appropriate CPU instructions,
|
||||||
|
|
|
@ -114,7 +114,7 @@ specific program
|
||||||
(so long as the program doesn't otherwise reveal itself by its behavior).
|
(so long as the program doesn't otherwise reveal itself by its behavior).
|
||||||
.\" As an additional bonus, since
|
.\" As an additional bonus, since
|
||||||
.\" .IR /proc/[pid]/cmdline
|
.\" .IR /proc/[pid]/cmdline
|
||||||
.\" is unaccessible for other users,
|
.\" is inaccessible for other users,
|
||||||
.\" poorly written programs passing sensitive information via
|
.\" poorly written programs passing sensitive information via
|
||||||
.\" program arguments are now protected against local eavesdroppers.
|
.\" program arguments are now protected against local eavesdroppers.
|
||||||
.TP
|
.TP
|
||||||
|
|
|
@ -2075,7 +2075,7 @@ egress path otherwise). This is the only flag supported for now.
|
||||||
.B Description
|
.B Description
|
||||||
This helper is used in programs implementing policies at the
|
This helper is used in programs implementing policies at the
|
||||||
skb socket level. If the sk_buff \fIskb\fP is allowed to pass (i.e.
|
skb socket level. If the sk_buff \fIskb\fP is allowed to pass (i.e.
|
||||||
if the verdeict eBPF program returns \fBSK_PASS\fP), redirect it
|
if the verdict eBPF program returns \fBSK_PASS\fP), redirect it
|
||||||
to the socket referenced by \fImap\fP (of type
|
to the socket referenced by \fImap\fP (of type
|
||||||
\fBBPF_MAP_TYPE_SOCKHASH\fP) using hash \fIkey\fP\&. Both ingress and
|
\fBBPF_MAP_TYPE_SOCKHASH\fP) using hash \fIkey\fP\&. Both ingress and
|
||||||
egress interfaces can be used for redirection. The
|
egress interfaces can be used for redirection. The
|
||||||
|
|
|
@ -317,7 +317,7 @@ Flag (0 or 1).
|
||||||
If set (1), the kernel slab caches
|
If set (1), the kernel slab caches
|
||||||
for file I/O (directory and inode structures) are
|
for file I/O (directory and inode structures) are
|
||||||
uniformly spread across the cpuset.
|
uniformly spread across the cpuset.
|
||||||
By defaultBy default, is off (0) in the top cpuset,
|
By default, is off (0) in the top cpuset,
|
||||||
and inherited from the parent cpuset in
|
and inherited from the parent cpuset in
|
||||||
newly created cpusets.
|
newly created cpusets.
|
||||||
See the \fBMemory Spread\fR section, below.
|
See the \fBMemory Spread\fR section, below.
|
||||||
|
|
Loading…
Reference in New Issue