diff options
| author | Michael Kerrisk <mtk.manpages@gmail.com> | 2018-08-09 21:06:52 +0200 |
|---|---|---|
| committer | Michael Kerrisk <mtk.manpages@gmail.com> | 2018-08-09 21:06:52 +0200 |
| commit | 4167f63f525f43c835d29fc709433ed70edb9955 (patch) | |
| tree | 0510fd1beca687f399b8aaaf533915a78fd91bf1 | |
| parent | 6d2ac026e8dcaa45584f1b745707a1596140687b (diff) | |
| download | man-pages-4167f63f525f43c835d29fc709433ed70edb9955.tar.gz | |
bpf.2: srcfix: fix typo in kernel version revied for JIT compiler source
Reported-by: Tobias Klauser <tklauser@distanz.ch>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
| -rw-r--r-- | man2/bpf.2 | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/man2/bpf.2 b/man2/bpf.2 index 6ced5b1caa..8effb31fe0 100644 --- a/man2/bpf.2 +++ b/man2/bpf.2 @@ -1181,7 +1181,7 @@ is initialized to 1 and is immutable. one of the Spectre attacks against the BPF interpreter.) .PP The JIT compiler for eBPF is currently -.\" Last reviewed in Linux 4.16-rc by grepping for BPF_ALU64 in arch/ +.\" Last reviewed in Linux 4.18-rc by grepping for BPF_ALU64 in arch/ .\" and by checking the documentation for bpf_jit_enable in .\" Documentation/sysctl/net.txt available for the following architectures: |
