aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMichael Kerrisk <mtk.manpages@gmail.com>2017-11-20 16:36:06 +0100
committerMichael Kerrisk <mtk.manpages@gmail.com>2017-11-22 17:40:58 +0100
commit58440555d22a5934c0e9ffc8daa1566434fc02d0 (patch)
treeb2fd1574dbf7e1d54b7607cd6047a962aae39348
parent7a951861cbbe4002499a9818c67213a412b7cc90 (diff)
downloadman-pages-58440555d22a5934c0e9ffc8daa1566434fc02d0.tar.gz
ioctl_getfsmap.2, membarrier.2, seccomp.2: spfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
-rw-r--r--man2/ioctl_getfsmap.22
-rw-r--r--man2/membarrier.22
-rw-r--r--man2/seccomp.22
3 files changed, 3 insertions, 3 deletions
diff --git a/man2/ioctl_getfsmap.2 b/man2/ioctl_getfsmap.2
index 9ed2aab6aa..6892946c51 100644
--- a/man2/ioctl_getfsmap.2
+++ b/man2/ioctl_getfsmap.2
@@ -345,7 +345,7 @@ The pointer passed in was not mapped to a valid memory address.
.B EINVAL
The array is not long enough, the keys do not point to a valid part of
the filesystem, the low key points to a higher point in the filesystem's
-physical storage address space than the high key, or a non-zero value
+physical storage address space than the high key, or a nonzero value
was passed in one of the fields that must be zero.
.TP
.B ENOMEM
diff --git a/man2/membarrier.2 b/man2/membarrier.2
index 6390f96930..c47bc875a8 100644
--- a/man2/membarrier.2
+++ b/man2/membarrier.2
@@ -162,7 +162,7 @@ set to 0, error handling is required only for the first call to
.I cmd
is invalid, or
.I flags
-is non-zero, or the
+is nonzero, or the
.BR MEMBARRIER_CMD_SHARED
command is disabled because the
.I nohz_full
diff --git a/man2/seccomp.2 b/man2/seccomp.2
index 5cb89639f0..b913964a72 100644
--- a/man2/seccomp.2
+++ b/man2/seccomp.2
@@ -160,7 +160,7 @@ other privileged program using
thus potentially compromising that program.
(Such a malicious filter might, for example, cause an attempt to use
.BR setuid (2)
-to set the caller's user IDs to non-zero values to instead
+to set the caller's user IDs to nonzero values to instead
return 0 without actually making the system call.
Thus, the program might be tricked into retaining superuser privileges
in circumstances where it is possible to influence it to do