diff options
| -rw-r--r-- | man2/ioctl_getfsmap.2 | 2 | ||||
| -rw-r--r-- | man2/membarrier.2 | 2 | ||||
| -rw-r--r-- | man2/seccomp.2 | 2 |
3 files changed, 3 insertions, 3 deletions
diff --git a/man2/ioctl_getfsmap.2 b/man2/ioctl_getfsmap.2 index 9ed2aab6aa..6892946c51 100644 --- a/man2/ioctl_getfsmap.2 +++ b/man2/ioctl_getfsmap.2 @@ -345,7 +345,7 @@ The pointer passed in was not mapped to a valid memory address. .B EINVAL The array is not long enough, the keys do not point to a valid part of the filesystem, the low key points to a higher point in the filesystem's -physical storage address space than the high key, or a non-zero value +physical storage address space than the high key, or a nonzero value was passed in one of the fields that must be zero. .TP .B ENOMEM diff --git a/man2/membarrier.2 b/man2/membarrier.2 index 6390f96930..c47bc875a8 100644 --- a/man2/membarrier.2 +++ b/man2/membarrier.2 @@ -162,7 +162,7 @@ set to 0, error handling is required only for the first call to .I cmd is invalid, or .I flags -is non-zero, or the +is nonzero, or the .BR MEMBARRIER_CMD_SHARED command is disabled because the .I nohz_full diff --git a/man2/seccomp.2 b/man2/seccomp.2 index 5cb89639f0..b913964a72 100644 --- a/man2/seccomp.2 +++ b/man2/seccomp.2 @@ -160,7 +160,7 @@ other privileged program using thus potentially compromising that program. (Such a malicious filter might, for example, cause an attempt to use .BR setuid (2) -to set the caller's user IDs to non-zero values to instead +to set the caller's user IDs to nonzero values to instead return 0 without actually making the system call. Thus, the program might be tricked into retaining superuser privileges in circumstances where it is possible to influence it to do |
