diff options
author | avoidr <avoidr@users.noreply.github.com> | 2016-06-27 01:27:51 +0200 |
---|---|---|
committer | avoidr <avoidr@users.noreply.github.com> | 2016-06-27 01:27:51 +0200 |
commit | c95e16451b83eea2cbfada9b42d2e6b9c77126a5 (patch) | |
tree | ab52efb112d594c8cca828dd4edbf55c1d28bd9c /src/man/firejail-profile.txt | |
parent | updated syscall list (diff) | |
download | firejail-c95e16451b83eea2cbfada9b42d2e6b9c77126a5.tar.gz firejail-c95e16451b83eea2cbfada9b42d2e6b9c77126a5.tar.zst firejail-c95e16451b83eea2cbfada9b42d2e6b9c77126a5.zip |
fix some typos
Diffstat (limited to 'src/man/firejail-profile.txt')
-rw-r--r-- | src/man/firejail-profile.txt | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt index 1f7c8beac..c2d5e7955 100644 --- a/src/man/firejail-profile.txt +++ b/src/man/firejail-profile.txt | |||
@@ -243,7 +243,7 @@ Enable seccomp filter and whitelist the system calls in the list. | |||
243 | Sets the NO_NEW_PRIVS prctl. This ensures that child processes | 243 | Sets the NO_NEW_PRIVS prctl. This ensures that child processes |
244 | cannot acquire new privileges using execve(2); in particular, | 244 | cannot acquire new privileges using execve(2); in particular, |
245 | this means that calling a suid binary (or one with file capabilities) | 245 | this means that calling a suid binary (or one with file capabilities) |
246 | does not results in an increase of privilege. | 246 | does not result in an increase of privilege. |
247 | .TP | 247 | .TP |
248 | \fBnoroot | 248 | \fBnoroot |
249 | Use this command to enable an user namespace. The namespace has only one user, the current user. | 249 | Use this command to enable an user namespace. The namespace has only one user, the current user. |