git: 01f095a35560 - stable/13 - chroot.2: Correct grammar errors. No functional change.
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 14 Apr 2022 00:04:02 UTC
The branch stable/13 has been updated by grog: URL: https://cgit.FreeBSD.org/src/commit/?id=01f095a355606e9b7b10f0b03c37980e65243055 commit 01f095a355606e9b7b10f0b03c37980e65243055 Author: Greg Lehey <grog@FreeBSD.org> AuthorDate: 2022-03-31 02:05:49 +0000 Commit: Greg Lehey <grog@FreeBSD.org> CommitDate: 2022-04-14 00:03:36 +0000 chroot.2: Correct grammar errors. No functional change. MFC after: 1 week (cherry picked from commit 4044083079ea55097284adeed98a58067c737b98) --- lib/libc/sys/chroot.2 | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lib/libc/sys/chroot.2 b/lib/libc/sys/chroot.2 index 69ee3743d9d3..f5d9fa5a8515 100644 --- a/lib/libc/sys/chroot.2 +++ b/lib/libc/sys/chroot.2 @@ -147,7 +147,7 @@ open directories, or a MAC check), it is possible that this system call may return an error, with the working directory of the process left changed. .Sh SECURITY CONSIDERATIONS -The system have many hardcoded paths to files where it may load after +The system has many hardcoded paths to files which it may load after the process starts. It is generally recommended to drop privileges immediately after a successful @@ -155,8 +155,8 @@ successful call, and restrict write access to a limited subtree of the .Nm -root, -for instance, +root. +For instance, setup the sandbox so that the sandboxed user will have no write access to any well-known system directories. .Pp