ioctl_getfsmap.2, membarrier.2, seccomp.2: spfix

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2017-11-20 16:36:06 +01:00
parent 7a951861cb
commit 58440555d2
3 changed files with 3 additions and 3 deletions

View File

@ -345,7 +345,7 @@ The pointer passed in was not mapped to a valid memory address.
.B EINVAL
The array is not long enough, the keys do not point to a valid part of
the filesystem, the low key points to a higher point in the filesystem's
physical storage address space than the high key, or a non-zero value
physical storage address space than the high key, or a nonzero value
was passed in one of the fields that must be zero.
.TP
.B ENOMEM

View File

@ -162,7 +162,7 @@ set to 0, error handling is required only for the first call to
.I cmd
is invalid, or
.I flags
is non-zero, or the
is nonzero, or the
.BR MEMBARRIER_CMD_SHARED
command is disabled because the
.I nohz_full

View File

@ -160,7 +160,7 @@ other privileged program using
thus potentially compromising that program.
(Such a malicious filter might, for example, cause an attempt to use
.BR setuid (2)
to set the caller's user IDs to non-zero values to instead
to set the caller's user IDs to nonzero values to instead
return 0 without actually making the system call.
Thus, the program might be tricked into retaining superuser privileges
in circumstances where it is possible to influence it to do