Author: jamie Date: Thu Oct 18 15:02:57 2018 New Revision: 339420 URL: https://svnweb.freebsd.org/changeset/base/339420
Log: Fix typos from r339409. Reported by: maxim Approved by: re (gjb) Modified: head/sys/kern/kern_jail.c head/usr.sbin/jail/jail.8 Modified: head/sys/kern/kern_jail.c ============================================================================== --- head/sys/kern/kern_jail.c Thu Oct 18 14:20:15 2018 (r339419) +++ head/sys/kern/kern_jail.c Thu Oct 18 15:02:57 2018 (r339420) @@ -3352,7 +3352,7 @@ prison_priv_check(struct ucred *cred, int priv) return (0); /* - * Do not allow a process inside a jail read the kernel + * Do not allow a process inside a jail to read the kernel * message buffer unless explicitly permitted. */ case PRIV_MSGBUF: Modified: head/usr.sbin/jail/jail.8 ============================================================================== --- head/usr.sbin/jail/jail.8 Thu Oct 18 14:20:15 2018 (r339419) +++ head/usr.sbin/jail/jail.8 Thu Oct 18 15:02:57 2018 (r339420) @@ -553,7 +553,7 @@ with non-jailed parts of the system. Jailed users may read the kernel message buffer. If the .Va security.bsd.unprivileged_read_msgbuf -MIB entry is zero, this will be restricted to to root user. +MIB entry is zero, this will be restricted to the root user. .It Va allow.socket_af Sockets within a jail are normally restricted to IPv4, IPv6, local (UNIX), and route. This allows access to other protocol stacks that _______________________________________________ svn-src-all@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/svn-src-all To unsubscribe, send any mail to "svn-src-all-unsubscr...@freebsd.org"