epoll_ctl.2, ioctl_userfaultfd.2, keyctl.2, ptrace.2, socket.7: ffix

Reported-by: Bjarni Ingi Gislason <bjarniig@rhi.hi.is>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2019-02-27 10:06:04 +01:00
parent b30b425ba1
commit f711139679
5 changed files with 7 additions and 7 deletions

View File

@ -215,7 +215,7 @@ The following values may be specified in conjunction with
.BR EPOLLEXCLUSIVE :
.BR EPOLLIN ,
.BR EPOLLOUT ,
.BR EPOLLWAKEUP,
.BR EPOLLWAKEUP ,
and
.BR EPOLLET .
.BR EPOLLHUP

View File

@ -60,7 +60,7 @@ The various
.BR ioctl (2)
operations are described below.
The
.BR UFFDIO_API,
.BR UFFDIO_API ,
.BR UFFDIO_REGISTER ,
and
.BR UFFDIO_UNREGISTER

View File

@ -516,7 +516,7 @@ and
As a convenience, the following macros are defined as masks for
all of the permission bits in each of the user categories:
.BR KEY_POS_ALL ,
.BR KEY_USR_ALL,
.BR KEY_USR_ALL ,
.BR KEY_GRP_ALL ,
and
.BR KEY_OTH_ALL .

View File

@ -1756,7 +1756,7 @@ both the syscall-entry-stop and the system call itself will be skipped.
This means that if the system call number is negative after a
.BR PTRACE_EVENT_SECCOMP
and the tracee is restarted using
.BR PTRACE_SYSCALL,
.BR PTRACE_SYSCALL ,
the next observed stop will be a syscall-exit-stop,
rather than the syscall-entry-stop that might have been expected.
.\"

View File

@ -567,9 +567,9 @@ it always lingers in the background.
When set, this option will prevent
changing the filters associated with the socket.
These filters include any set using the socket options
.BR SO_ATTACH_FILTER,
.BR SO_ATTACH_BPF,
.BR SO_ATTACH_REUSEPORT_CBPF
.BR SO_ATTACH_FILTER ,
.BR SO_ATTACH_BPF ,
.BR SO_ATTACH_REUSEPORT_CBPF ,
and
.BR SO_ATTACH_REUSEPORT_EPBF .
.IP