.P
eBPF programs can be attached to different events.
These events can be the arrival of network packets, tracing
-events, classification events by network queueing disciplines
+events, classification events by network queueing disciplines
(for eBPF programs attached to a
.BR tc (8)
classifier), and other types that may be added in the future.
.P
The new file offset is returned in the argument
.IR result .
-The type
+The type
.I loff_t
is a 64-bit signed type.
.P
.BR pidfd_getfd ()
is restricted by a
.B PTRACE_MODE_ATTACH_REALCREDS
-ptrace access mode check.
+ptrace access mode check.
.SH SEE ALSO
.BR clone3 (2),
.BR dup (2),
The
.I pidfd
argument is a PID file descriptor,
-a file descriptor that refers to process.
+a file descriptor that refers to process.
Such a file descriptor can be obtained in any of the following ways:
.IP \[bu] 3
by opening a
.BR accept (2)
holding a port number that the target
(which, after the interruption by the signal handler,
-perhaps closed its listening socket) might expect to be able to reuse in a
+perhaps closed its listening socket)
+might expect to be able to reuse in a
.BR bind (2)
call.
.P
a pathname that doesn't start with "." and doesn't begin with the prefix
"/tmp/", then the supervisor spoofs an error return
.RB ( EOPNOTSUPP ,
-"Operation not supported")
+"Operation not supported")
for the target's
.BR mkdir (2)
call (which is not executed):
.IP
.in +4n
.EX
-struct seminfo {
+struct seminfo {
int semmap; /* Number of entries in semaphore
map; unused within kernel */
int semmni; /* Maximum number of semaphore sets */
.BR pthread_exit (3)).
.TP
.IR /proc/ tid /
-There is a numerical subdirectory for each running thread
+There is a numerical subdirectory for each running thread
that is not a thread group leader
(i.e., a thread whose thread ID is not the same as its process ID);
the subdirectory is named by the thread ID.
.RE
.IP
During the Linux 4.11 development cycle,
-this file was removed because of security concerns,
+this file was removed because of security concerns,
as it exposes information across namespaces.
Furthermore, it is possible to obtain
the same information via in-kernel tracing facilities such as ftrace.
used for holding
encryption keys for module signature verification.
.IP
-These special keyrings are usually closed to direct alteration
+These special keyrings are usually closed to direct alteration
by user space.
.P
An originally planned "group keyring",
.B CLOCK_MONOTONIC_COARSE
and
.BR CLOCK_MONOTONIC_RAW ),
-a nonsettable clock that represents monotonic time since\[em]as
-described by POSIX\[em]"some unspecified point in the past".
+a nonsettable clock that represents monotonic time since
+\[em]as described by POSIX\[em]
+"some unspecified point in the past".
.IP \[bu]
.B CLOCK_BOOTTIME
(and likewise