From 4520f617c9ad43622b21925c17ad6ae1f04718d0 Mon Sep 17 00:00:00 2001 From: Jamie Gritton Date: Thu, 18 Oct 2018 15:02:57 +0000 Subject: [PATCH] Fix typos from r339409. Reported by: maxim Approved by: re (gjb) --- sys/kern/kern_jail.c | 2 +- usr.sbin/jail/jail.8 | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/sys/kern/kern_jail.c b/sys/kern/kern_jail.c index 1b31781d61bd..dfb2a7a4f9fb 100644 --- a/sys/kern/kern_jail.c +++ b/sys/kern/kern_jail.c @@ -3352,7 +3352,7 @@ prison_priv_check(struct ucred *cred, int priv) return (0); /* - * Do not allow a process inside a jail read the kernel + * Do not allow a process inside a jail to read the kernel * message buffer unless explicitly permitted. */ case PRIV_MSGBUF: diff --git a/usr.sbin/jail/jail.8 b/usr.sbin/jail/jail.8 index c0e59f3c9a96..e3f3b776aea4 100644 --- a/usr.sbin/jail/jail.8 +++ b/usr.sbin/jail/jail.8 @@ -553,7 +553,7 @@ with non-jailed parts of the system. Jailed users may read the kernel message buffer. If the .Va security.bsd.unprivileged_read_msgbuf -MIB entry is zero, this will be restricted to to root user. +MIB entry is zero, this will be restricted to the root user. .It Va allow.socket_af Sockets within a jail are normally restricted to IPv4, IPv6, local (UNIX), and route. This allows access to other protocol stacks that