Date: Fri, 9 Oct 2009 09:09:51 GMT From: Robert Watson <rwatson@FreeBSD.org> To: Perforce Change Reviews <perforce@freebsd.org> Subject: PERFORCE change 169338 for review Message-ID: <200910090909.n9999pfV020622@repoman.freebsd.org>
index | next in thread | raw e-mail
http://perforce.freebsd.org/chv.cgi?CH=169338 Change 169338 by rwatson@rwatson_cinnamon on 2009/10/09 09:09:12 Correct two spelling nits. Submitted by: ceri Affected files ... .. //depot/projects/trustedbsd/capabilities/src/lib/libc/sys/cap_enter.2#6 edit .. //depot/projects/trustedbsd/capabilities/src/lib/libc/sys/cap_new.2#10 edit Differences ... ==== //depot/projects/trustedbsd/capabilities/src/lib/libc/sys/cap_enter.2#6 (text+ko) ==== @@ -85,7 +85,7 @@ canonical representation of a right. Consumers of .Fn cap_enter -should also be aware of other inheritted rights, such as access to VM +should also be aware of other inherited rights, such as access to VM resources, memory contents, and other process properties that should be considered. It is advisable to use ==== //depot/projects/trustedbsd/capabilities/src/lib/libc/sys/cap_new.2#10 (text+ko) ==== @@ -218,7 +218,7 @@ .It Dv CAP_IOCTL Permit .Xr ioctl 2 . -Be aware that this system call has enourmous scope, including potentially +Be aware that this system call has enormous scope, including potentially global scope for some objects. .It Dv CAP_KEVENT Permithelp
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200910090909.n9999pfV020622>
