Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 6 Oct 2014 15:03:09 +0000 (UTC)
From:      Luigi Rizzo <luigi@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   svn commit: r272653 - head/contrib/tcpdump
Message-ID:  <201410061503.s96F39cm032797@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: luigi
Date: Mon Oct  6 15:03:08 2014
New Revision: 272653
URL: https://svnweb.freebsd.org/changeset/base/272653

Log:
  Fix comment and sort rights by name
  
  MFC after:	3 days

Modified:
  head/contrib/tcpdump/tcpdump.c

Modified: head/contrib/tcpdump/tcpdump.c
==============================================================================
--- head/contrib/tcpdump/tcpdump.c	Mon Oct  6 14:57:26 2014	(r272652)
+++ head/contrib/tcpdump/tcpdump.c	Mon Oct  6 15:03:08 2014	(r272653)
@@ -1534,11 +1534,11 @@ main(int argc, char **argv)
 		static const unsigned long cmds[] = { BIOCGSTATS };
 
 		/*
-		 * the various libpcap devices use a combination of
-		 * read (bpf), ioctl (bpf, netmap), poll (netmap)
-		 * so we add the relevant access rights.
+		 * The various libpcap devices use a combination of
+		 * read (bpf), ioctl (bpf, netmap), poll (netmap).
+		 * Grant the relevant access rights, sorted by name.
 		 */
-		cap_rights_init(&rights, CAP_IOCTL, CAP_READ, CAP_EVENT);
+		cap_rights_init(&rights, CAP_EVENT, CAP_IOCTL, CAP_READ);
 		if (cap_rights_limit(pcap_fileno(pd), &rights) < 0 &&
 		    errno != ENOSYS) {
 			error("unable to limit pcap descriptor");



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201410061503.s96F39cm032797>