git: 01f095a35560 - stable/13 - chroot.2: Correct grammar errors. No functional change.

From: Greg Lehey <grog_at_FreeBSD.org>
Date: Thu, 14 Apr 2022 00:04:02 UTC
The branch stable/13 has been updated by grog:

URL: https://cgit.FreeBSD.org/src/commit/?id=01f095a355606e9b7b10f0b03c37980e65243055

commit 01f095a355606e9b7b10f0b03c37980e65243055
Author:     Greg Lehey <grog@FreeBSD.org>
AuthorDate: 2022-03-31 02:05:49 +0000
Commit:     Greg Lehey <grog@FreeBSD.org>
CommitDate: 2022-04-14 00:03:36 +0000

    chroot.2: Correct grammar errors.
              No functional change.
    
    MFC after:      1 week
    
    (cherry picked from commit 4044083079ea55097284adeed98a58067c737b98)
---
 lib/libc/sys/chroot.2 | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/lib/libc/sys/chroot.2 b/lib/libc/sys/chroot.2
index 69ee3743d9d3..f5d9fa5a8515 100644
--- a/lib/libc/sys/chroot.2
+++ b/lib/libc/sys/chroot.2
@@ -147,7 +147,7 @@ open directories, or a MAC check), it is possible that this system
 call may return an error, with the working directory of the process
 left changed.
 .Sh SECURITY CONSIDERATIONS
-The system have many hardcoded paths to files where it may load after
+The system has many hardcoded paths to files which it may load after
 the process starts.
 It is generally recommended to drop privileges immediately after a
 successful
@@ -155,8 +155,8 @@ successful
 call,
 and restrict write access to a limited subtree of the
 .Nm
-root,
-for instance,
+root.
+For instance,
 setup the sandbox so that the sandboxed user will have no write
 access to any well-known system directories.
 .Pp