mirror of https://github.com/mkerrisk/man-pages
ioctl_getfsmap.2, membarrier.2, seccomp.2: spfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
parent
7a951861cb
commit
58440555d2
|
@ -345,7 +345,7 @@ The pointer passed in was not mapped to a valid memory address.
|
|||
.B EINVAL
|
||||
The array is not long enough, the keys do not point to a valid part of
|
||||
the filesystem, the low key points to a higher point in the filesystem's
|
||||
physical storage address space than the high key, or a non-zero value
|
||||
physical storage address space than the high key, or a nonzero value
|
||||
was passed in one of the fields that must be zero.
|
||||
.TP
|
||||
.B ENOMEM
|
||||
|
|
|
@ -162,7 +162,7 @@ set to 0, error handling is required only for the first call to
|
|||
.I cmd
|
||||
is invalid, or
|
||||
.I flags
|
||||
is non-zero, or the
|
||||
is nonzero, or the
|
||||
.BR MEMBARRIER_CMD_SHARED
|
||||
command is disabled because the
|
||||
.I nohz_full
|
||||
|
|
|
@ -160,7 +160,7 @@ other privileged program using
|
|||
thus potentially compromising that program.
|
||||
(Such a malicious filter might, for example, cause an attempt to use
|
||||
.BR setuid (2)
|
||||
to set the caller's user IDs to non-zero values to instead
|
||||
to set the caller's user IDs to nonzero values to instead
|
||||
return 0 without actually making the system call.
|
||||
Thus, the program might be tricked into retaining superuser privileges
|
||||
in circumstances where it is possible to influence it to do
|
||||
|
|
Loading…
Reference in New Issue