svn commit: r339420 - in head: sys/kern usr.sbin/jail
Jamie Gritton
jamie at FreeBSD.org
Thu Oct 18 15:02:58 UTC 2018
Author: jamie
Date: Thu Oct 18 15:02:57 2018
New Revision: 339420
URL: https://svnweb.freebsd.org/changeset/base/339420
Log:
Fix typos from r339409.
Reported by: maxim
Approved by: re (gjb)
Modified:
head/sys/kern/kern_jail.c
head/usr.sbin/jail/jail.8
Modified: head/sys/kern/kern_jail.c
==============================================================================
--- head/sys/kern/kern_jail.c Thu Oct 18 14:20:15 2018 (r339419)
+++ head/sys/kern/kern_jail.c Thu Oct 18 15:02:57 2018 (r339420)
@@ -3352,7 +3352,7 @@ prison_priv_check(struct ucred *cred, int priv)
return (0);
/*
- * Do not allow a process inside a jail read the kernel
+ * Do not allow a process inside a jail to read the kernel
* message buffer unless explicitly permitted.
*/
case PRIV_MSGBUF:
Modified: head/usr.sbin/jail/jail.8
==============================================================================
--- head/usr.sbin/jail/jail.8 Thu Oct 18 14:20:15 2018 (r339419)
+++ head/usr.sbin/jail/jail.8 Thu Oct 18 15:02:57 2018 (r339420)
@@ -553,7 +553,7 @@ with non-jailed parts of the system.
Jailed users may read the kernel message buffer.
If the
.Va security.bsd.unprivileged_read_msgbuf
-MIB entry is zero, this will be restricted to to root user.
+MIB entry is zero, this will be restricted to the root user.
.It Va allow.socket_af
Sockets within a jail are normally restricted to IPv4, IPv6, local
(UNIX), and route. This allows access to other protocol stacks that
More information about the svn-src-all
mailing list