git: df2b1d059158 - stable/13 - ptrace.2: Fix warnings from igor.

From: John Baldwin <jhb_at_FreeBSD.org>
Date: Wed, 22 Feb 2023 21:22:44 UTC
The branch stable/13 has been updated by jhb:

URL: https://cgit.FreeBSD.org/src/commit/?id=df2b1d0591584d9e63456349080357d00ccb94d8

commit df2b1d0591584d9e63456349080357d00ccb94d8
Author:     John Baldwin <jhb@FreeBSD.org>
AuthorDate: 2022-12-15 19:25:27 +0000
Commit:     John Baldwin <jhb@FreeBSD.org>
CommitDate: 2023-02-22 20:43:39 +0000

    ptrace.2: Fix warnings from igor.
    
    Reviewed by:    pauamma, imp
    Differential Revision:  https://reviews.freebsd.org/D37689
    
    (cherry picked from commit 120eff994aeb31671c144a1835c62d9d8789a5a0)
---
 lib/libc/sys/ptrace.2 | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/lib/libc/sys/ptrace.2 b/lib/libc/sys/ptrace.2
index a5e67c745422..06c427419c41 100644
--- a/lib/libc/sys/ptrace.2
+++ b/lib/libc/sys/ptrace.2
@@ -2,7 +2,7 @@
 .\"	$NetBSD: ptrace.2,v 1.2 1995/02/27 12:35:37 cgd Exp $
 .\"
 .\" This file is in the public domain.
-.Dd January 27, 2022
+.Dd December 15, 2022
 .Dt PTRACE 2
 .Os
 .Sh NAME
@@ -151,7 +151,7 @@ The following controls are provided for this:
 .Bl -tag -width security.bsd.unprivileged_proc_debug
 .It Dv security.bsd.allow_ptrace
 Setting this sysctl to zero value makes
-.Xr ptrace 2
+.Nm
 return
 .Er ENOSYS
 always as if the syscall is not implemented by the kernel.
@@ -450,11 +450,11 @@ given as the signal to be delivered.
 .It Dv PT_ATTACH
 This request allows a process to gain control of an otherwise
 unrelated process and begin tracing it.
-It does not need any cooperation from the to-be-traced process.
+It does not need any cooperation from the process to trace.
 In
 this case,
 .Fa pid
-specifies the process ID of the to-be-traced process, and the other
+specifies the process ID of the process to trace, and the other
 two arguments are ignored.
 This request requires that the target process must have the same real
 UID as the tracing process, and that it must not be executing a setuid