From owner-man-jp-reviewer@jp.freebsd.org  Mon Jul 17 14:53:12 2000
Received: (from daemon@localhost)
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) id OAA20822;
	Mon, 17 Jul 2000 14:53:12 +0900 (JST)
	(envelope-from owner-man-jp-reviewer@jp.FreeBSD.org)
Received: from tyrocine.via2000.net (sirius.am.ics.keio.ac.jp [131.113.69.7])
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) with SMTP id OAA20814
	for <man-jp-reviewer@jp.freebsd.org>; Mon, 17 Jul 2000 14:53:11 +0900 (JST)
	(envelope-from yasu@via2000.net)
Received: (qmail 33056 invoked from network); 17 Jul 2000 05:54:39 -0000
Received: from localhost (127.0.0.1)
  by localhost with SMTP; 17 Jul 2000 05:54:39 -0000
To: man-jp-reviewer@jp.freebsd.org
From: Yasunori Osana <yasu@via2000.net>
X-Mailer: Mew version 1.94.2 on XEmacs 21.1 (Capitol Reef)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Message-Id: <20000717145439S.yasu@localhost>
Date: Mon, 17 Jul 2000 14:54:39 +0900
X-Dispatcher: imput version 20000228(IM140)
Lines: 86
Reply-To: man-jp-reviewer@jp.freebsd.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+000315
X-Sequence: man-jp-reviewer 2784
Subject: [man-jp-reviewer 2784] Check: io.4
Errors-To: owner-man-jp-reviewer@jp.freebsd.org
Sender: owner-man-jp-reviewer@jp.freebsd.org
X-Originator: yasu@via2000.net

$B$*$5$J$G$9!#(B

io.4 $B$r$A$g$C$HD>$7$^$7$?!#(B
$B!V%f!<%6%i%s%I$J!W(B -> $B!V%f!<%6%i%s%I$N!W$G$9!#(B


--- io.4.orig	Sat May 20 19:33:16 2000
+++ io.4	Mon Jul 17 14:51:42 2000
@@ -26,40 +26,47 @@
 .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 .\"
 .\" $Id: io.4,v 1.5 1997/03/21 20:13:45 mpp Exp $
+.\" jpman %Id: io.4,v 1.3 1999/08/16 01:07:51 jsakai Stab %
 .\"
 .Dd Jan 1, 1996
 .Dt IO 4 i386
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm io
-.Nd I/O privilege file
-.Sh DESCRIPTION
-The special file
+.Nd I/O $BFC8"%U%!%$%k(B
+.Sh $B2r@b(B
+$BFC<l%U%!%$%k(B
 .Pa /dev/io
-is a controlled security hole that allows a process to gain I/O
-privileges
-.Pq which are normally reserved for kernel-internal code .
-Any process that holds a file descriptor on
+$B$O@)8f2<$K$"$k%;%-%e%j%F%#%[!<%k$G!"(B
+.Pq $BDL>o$O%+!<%M%k$NFbIt%3!<%I$KM=Ls$5$l$?(B
+I/O $BFC8"$rF@$k$3$H$r%W%m%;%9$K5v2D$7$^$9!#(B
 .Pa /dev/io
-open will get its
+$B$r3+$$$?%U%!%$%k5-=R;R$r;}$C$?$I$s$J%W%m%;%9$G$b!"(B
+$B%U%i%0%l%8%9%?%;%C%H$NCf$N(B
 .Em IOPL
-bits in the flag register set, thus allowing it to perform direct
-I/O operations.  This can be useful in order to write userland
-programs that handle some hardware directly.
+$B%S%C%H$rF@$k$3$H$,$G$-$^$9!#(B
+$B$9$J$o$A!"D>@\(B I/O $B$rA`:n$9$k$3$H$,5v$5$l$^$9!#(B
+$B$3$l$O!"%O!<%I%&%'%"$rD>@\A`:n$9$k(B
+$B%f!<%6%i%s%I$N%W%m%0%i%`$r=q$/$?$a$KLrN)$A$^$9!#(B
 .Pp
-The entire access control is handled by the file access permissions
-of
-.Pa /dev/io ,
-so care should be taken in granting rights for this device.  Note
-that even read/only access will grant the full I/O privileges.
-.Sh FILES
+$B%"%/%;%9@)8fA4BN$O(B
+.Pa /dev/io
+$B$N%U%!%$%k%"%/%;%9%Q!<%_%C%7%g%s$K$h$C$F4IM}$5$l$F$$$^$9$N$G!"(B
+$B$3$N%G%P%$%9$K@5$7$$%Q!<%_%C%7%g%s$rM?$($k$h$&$K(B
+$BCm0U$9$kI,MW$,$"$j$^$9!#(B
+$BFI$_9~$_@lMQ$N%"%/%;%9$G$5$(!"$9$Y$F$N(B I/O $BFC8"$r(B
+$BM?$($F$7$^$&$3$H$KCm0U$7$F$/$@$5$$!#(B
+.Sh $B%U%!%$%k(B
 .Bl -tag -width Pa -compact
 .It Pa /dev/io
 .El
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr mem 4
-.Sh HISTORY
-The
+.Sh $BNr;K(B
 .Nm io
-file appeared in
-.Fx 1.0 .
+$B%U%!%$%k$O(B
+.Fx 1.0
+$B$GEP>l$7$^$7$?!#(B
+
+
+

                         -------------------------------------------
				       Yasunori Osana

			    E-Mail: yasu@via2000.net
			    URL:    http://yasu.prosou.nu
                         -------------------------------------------
