svn commit: r320989 - head/libexec/rtld-elf
Konstantin Belousov
kib at FreeBSD.org
Fri Jul 14 15:42:14 UTC 2017
Author: kib
Date: Fri Jul 14 15:42:12 2017
New Revision: 320989
URL: https://svnweb.freebsd.org/changeset/base/320989
Log:
Language improvements.
Submitted by: wblock
MFC after: 3 days
Differential revision: https://reviews.freebsd.org/D10826
Modified:
head/libexec/rtld-elf/rtld.1
Modified: head/libexec/rtld-elf/rtld.1
==============================================================================
--- head/libexec/rtld-elf/rtld.1 Fri Jul 14 14:58:10 2017 (r320988)
+++ head/libexec/rtld-elf/rtld.1 Fri Jul 14 15:42:12 2017 (r320989)
@@ -309,7 +309,7 @@ The syntax of the direct invocation is
.Op Ar image arguments
.Ed
.Pp
-The options are as follows:
+The options are:
.Bl -tag -width indent
.It Fl f Ar fd
File descriptor
@@ -339,21 +339,22 @@ Ends the
options.
The argument following
.Fl -
-is interpreted as the path of binary to execute.
+is interpreted as the path of the binary to execute.
.El
.Pp
-To conform to user expectation to not break some naively restricted
-execution environments, in the direct execution mode
+In the direct execution mode,
.Nm
-emulates verification of the binary execute permission
-for current user.
+emulates verification of the binary execute permission for the
+current user.
+This is done to avoid breaking user expectations in naively restricted
+execution environments.
The verification only uses Unix
.Dv DACs ,
ignores
.Dv ACLs
-and is racy by its nature.
-The environments which rely on such restrictions are weak
-and breakable on its own.
+and is naturally prone to race conditions.
+Environments which rely on such restrictions are weak
+and breakable on their own.
.Sh FILES
.Bl -tag -width ".Pa /var/run/ld-elf32.so.hints" -compact
.It Pa /var/run/ld-elf.so.hints
More information about the svn-src-head
mailing list