Module Name:    src
Committed By:   wiz
Date:           Wed Mar 14 11:51:54 UTC 2012

Modified Files:
        src/share/man/man9: kauth.9

Log Message:
Bump date for previous.
Spell "file system" like in other man pages.
Fix typos.


To generate a diff of this commit:
cvs rdiff -u -r1.98 -r1.99 src/share/man/man9/kauth.9

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/share/man/man9/kauth.9
diff -u src/share/man/man9/kauth.9:1.98 src/share/man/man9/kauth.9:1.99
--- src/share/man/man9/kauth.9:1.98	Tue Mar 13 18:40:27 2012
+++ src/share/man/man9/kauth.9	Wed Mar 14 11:51:54 2012
@@ -1,4 +1,4 @@
-.\" $NetBSD: kauth.9,v 1.98 2012/03/13 18:40:27 elad Exp $
+.\" $NetBSD: kauth.9,v 1.99 2012/03/14 11:51:54 wiz Exp $
 .\"
 .\" Copyright (c) 2005, 2006 Elad Efrat <e...@netbsd.org>
 .\" All rights reserved.
@@ -25,7 +25,7 @@
 .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 .\"
-.Dd January 16, 2012
+.Dd March 13, 2012
 .Dt KAUTH 9
 .Os
 .Sh NAME
@@ -208,7 +208,7 @@ Check if operations on the device mapper
 .Xr dm 4
 device are allowed.
 .It Dv KAUTH_SYSTEM_FILEHANDLE
-Check if filehandle operations allowed.
+Check if file handle operations allowed.
 .It Dv KAUTH_SYSTEM_FS_EXTATTR
 Check if starting, stopping, enabling, or disabling extended attributes
 is allowed.
@@ -217,7 +217,7 @@ is a
 .Ft struct mount *
 of the mount-point on which the operation is performed.
 .It Dv KAUTH_SYSTEM_FS_SNAPSHOT
-Check if setting up a file-system snapshot is allowed.
+Check if setting up a file system snapshot is allowed.
 .Ar arg1
 is a
 .Ft struct mount *
@@ -227,12 +227,12 @@ is a
 .Ft struct vnode *
 of the vnode where the snapshot is expected to be.
 .It Dv KAUTH_SYSTEM_FS_QUOTA
-Check if file-system quota operations are allowed.
+Check if file system quota operations are allowed.
 .Pp
 .Ar arg1
 is a
 .Ft struct mount *
-describing the file-system mount in question.
+describing the file system mount in question.
 .Ar req
 can be one of the following:
 .Bl -tag -width compact
@@ -256,7 +256,7 @@ with the user-id of the user whose quota
 Check if bypassing the quota (not enforcing it) is allowed.
 .El
 .It Dv KAUTH_SYSTEM_FS_RESERVEDSPACE
-Check if using the file-system reserved space is allowed.
+Check if using the file system reserved space is allowed.
 .It Dv KAUTH_SYSTEM_LFS
 Check if LFS-related operations are allowed.
 .Ar req
@@ -322,14 +322,14 @@ with the mount structure in question,
 .Ar arg2
 is a
 .Ft void *
-with file-system specific data, if any.
+with file system specific data, if any.
 .It Dv KAUTH_REQ_SYSTEM_MOUNT_NEW
-Check if mounting a new file-system is allowed.
+Check if mounting a new file system is allowed.
 .Pp
 .Ar arg1
 is the
 .Ft struct vnode *
-on which the file-system is to be mounted,
+on which the file system is to be mounted,
 .Ar arg2
 is an
 .Ft int
@@ -337,9 +337,9 @@ with the mount flags, and
 .Ar arg3
 is a
 .Ft void *
-with file-system specific data, if any.
+with file system specific data, if any.
 .It Dv KAUTH_REQ_SYSTEM_MOUNT_UNMOUNT
-Checks if unmounting a file-system is allowed.
+Checks if unmounting a file system is allowed.
 .Pp
 .Ar arg1
 is a
@@ -359,9 +359,9 @@ with the new mount flags, and
 .Ar arg3
 is a
 .Ft void *
-with file-system specific data, if any.
+with file system specific data, if any.
 .It Dv KAUTH_REQ_SYSTEM_MOUNT_UMAP
-Check if mounting the user and group id remapping file-system.
+Check if mounting the user and group id remapping file system.
 See
 .Xr mount_umap 8 .
 .El
@@ -775,7 +775,7 @@ can be one of the following:
 .It Dv KAUTH_REQ_NETWORK_INTERFACE_BRIDGE_GETPRIV
 Check if getting privileges parameters is allowed.
 .It Dv KAUTH_REQ_NETWORK_INTERFACE_BRIDGE_SETPRIV
-Check if setting privileges paramteres is allowed.
+Check if setting privileges parameters is allowed.
 .El
 .It Dv KAUTH_NETWORK_INTERFACE_PPP
 Checks if operations performed on the
@@ -1299,14 +1299,14 @@ Check if setting the default key-repeat 
 .Ss Vnode Scope
 The vnode scope,
 .Dq org.netbsd.kauth.vnode ,
-authorizes operations made on vnodes representing files-system objects.
+authorizes operations made on vnodes representing file system objects.
 .Pp
 The authorization wrapper for this scope is declared as
 .Pp
 .Ft int Fn kauth_authorize_vnode "kauth_cred_t cred" "kauth_action_t action" \
 "vnode_t *vp" "vnode_t *dvp" "int fs_decision"
 .Pp
-This scope is heavily used in file-system code and can potentially affect
+This scope is heavily used in file system code and can potentially affect
 system-wide performance.
 Therefore, there are several things developers should know when using it.
 .Pp
@@ -1316,7 +1316,7 @@ parameter is a bit-mask and multiple act
 in a single call.
 Two helper functions help generate the
 .Ar action
-value for a couple of common cases: translating file-system access to a
+value for a couple of common cases: translating file system access to a
 .Xr kauth 9
 action and checking access to a vnode.
 .Pp
@@ -1330,7 +1330,7 @@ Another function,
 "mode_t file_mode" ,
 returns a
 .Ft kauth_action_t
-suitable for use in many file-system
+suitable for use in many file system
 .Xr access 2
 implementations.
 It calls the aforementioned
@@ -1345,7 +1345,7 @@ Second, it is recommended to be very car
 scope.
 A special parameter,
 .Ar fs_decision ,
-allows different file-systems to instrument different policies without adding
+allows different file systems to instrument different policies without adding
 their own listener.
 This parameter is special because it also serves as a fall-back decision when
 no
@@ -1355,11 +1355,11 @@ It can take either an
 .Xr errno 2
 value or
 .Dq KAUTH_VNODE_REMOTEFS ,
-indicating that the file-system on which the authorization is made is remote
+indicating that the file system on which the authorization is made is remote
 and cannot provide us with a fall-back decision.
 In this case,
 .Xr kauth 9
-can only short-circuit the request but the file-system will have the last
+can only short-circuit the request but the file system will have the last
 word if there is no definitive allow or deny decision.
 .Pp
 The value of
@@ -1369,7 +1369,7 @@ policy.
 For the latter case,
 .Xr genfs 9
 provides a set of helper functions that implement common policies that
-file-systems can use.
+file systems can use.
 The calling convention is as follows:
 .Bd -literal -offset indent
 int error;
@@ -1381,7 +1381,7 @@ Actions on the vnode scope are of two ty
 An operation is similar in concept to actions on other scopes in the sense
 that it represents an operation desired by the caller.
 A flag is an indicator of additional information about the vnode that
-a file-system can set in order to allow the listener to make a more
+a file system can set in order to allow the listener to make a more
 informed decision.
 .Pp
 Actions include the following:
@@ -1457,7 +1457,7 @@ The vnode is executable.
 The macro
 .Fn FS_OBJECT_CAN_EXEC
 can be used to help determine if this flag should be set.
-This macro determines a file-system object to be executable if it is a
+This macro determines a file system object to be executable if it is a
 directory (in which case we say it is searchable) or if it has at least one
 executable bit set in its mode.
 .Pp
@@ -1476,16 +1476,15 @@ if (privileged) {
 .Pp
 Finally, the vnode scope authorization wrapper returns
 .Er EACCES
-in case of an error, to maintain file-system semantics.
-File-systems can override this value if needed.
+in case of an error, to maintain file system semantics.
+File systems can override this value if needed.
 .It KAUTH_VNODE_HAS_SYSFLAGS
-The file-system object represented by the vnode has system flags set.
+The file system object represented by the vnode has system flags set.
 .It KAUTH_VNODE_ACCESS
 The authorization is advisory only and no actual operation is to be
 performed.
 This is not implemented.
 .El
-.Pp
 .Ss Credentials Scope
 The credentials scope,
 .Dq org.netbsd.kauth.cred ,

Reply via email to