diff --git a/sys/kern/kern_jail.c b/sys/kern/kern_jail.c index 1b31781d61bd..dfb2a7a4f9fb 100644 --- a/sys/kern/kern_jail.c +++ b/sys/kern/kern_jail.c @@ -3352,7 +3352,7 @@ prison_priv_check(struct ucred *cred, int priv) return (0); /* - * Do not allow a process inside a jail read the kernel + * Do not allow a process inside a jail to read the kernel * message buffer unless explicitly permitted. */ case PRIV_MSGBUF: diff --git a/usr.sbin/jail/jail.8 b/usr.sbin/jail/jail.8 index c0e59f3c9a96..e3f3b776aea4 100644 --- a/usr.sbin/jail/jail.8 +++ b/usr.sbin/jail/jail.8 @@ -553,7 +553,7 @@ with non-jailed parts of the system. Jailed users may read the kernel message buffer. If the .Va security.bsd.unprivileged_read_msgbuf -MIB entry is zero, this will be restricted to to root user. +MIB entry is zero, this will be restricted to the root user. .It Va allow.socket_af Sockets within a jail are normally restricted to IPv4, IPv6, local (UNIX), and route. This allows access to other protocol stacks that