Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 9 Oct 2009 09:09:51 GMT
From:      Robert Watson <rwatson@FreeBSD.org>
To:        Perforce Change Reviews <perforce@freebsd.org>
Subject:   PERFORCE change 169338 for review
Message-ID:  <200910090909.n9999pfV020622@repoman.freebsd.org>

index | next in thread | raw e-mail

http://perforce.freebsd.org/chv.cgi?CH=169338

Change 169338 by rwatson@rwatson_cinnamon on 2009/10/09 09:09:12

	Correct two spelling nits.
	Submitted by:	ceri

Affected files ...

.. //depot/projects/trustedbsd/capabilities/src/lib/libc/sys/cap_enter.2#6 edit
.. //depot/projects/trustedbsd/capabilities/src/lib/libc/sys/cap_new.2#10 edit

Differences ...

==== //depot/projects/trustedbsd/capabilities/src/lib/libc/sys/cap_enter.2#6 (text+ko) ====

@@ -85,7 +85,7 @@
 canonical representation of a right.
 Consumers of
 .Fn cap_enter
-should also be aware of other inheritted rights, such as access to VM
+should also be aware of other inherited rights, such as access to VM
 resources, memory contents, and other process properties that should be
 considered.
 It is advisable to use

==== //depot/projects/trustedbsd/capabilities/src/lib/libc/sys/cap_new.2#10 (text+ko) ====

@@ -218,7 +218,7 @@
 .It Dv CAP_IOCTL
 Permit
 .Xr ioctl 2 .
-Be aware that this system call has enourmous scope, including potentially
+Be aware that this system call has enormous scope, including potentially
 global scope for some objects.
 .It Dv CAP_KEVENT
 Permit


help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200910090909.n9999pfV020622>