summaryrefslogtreecommitdiffstats
path: root/src/man
diff options
context:
space:
mode:
authorLibravatar avoidr <avoidr@users.noreply.github.com>2016-06-27 01:27:51 +0200
committerLibravatar avoidr <avoidr@users.noreply.github.com>2016-06-27 01:27:51 +0200
commitc95e16451b83eea2cbfada9b42d2e6b9c77126a5 (patch)
treeab52efb112d594c8cca828dd4edbf55c1d28bd9c /src/man
parentupdated syscall list (diff)
downloadfirejail-c95e16451b83eea2cbfada9b42d2e6b9c77126a5.tar.gz
firejail-c95e16451b83eea2cbfada9b42d2e6b9c77126a5.tar.zst
firejail-c95e16451b83eea2cbfada9b42d2e6b9c77126a5.zip
fix some typos
Diffstat (limited to 'src/man')
-rw-r--r--src/man/firejail-login.txt2
-rw-r--r--src/man/firejail-profile.txt2
-rw-r--r--src/man/firejail.txt2
3 files changed, 3 insertions, 3 deletions
diff --git a/src/man/firejail-login.txt b/src/man/firejail-login.txt
index 6cd9ce3cb..464551202 100644
--- a/src/man/firejail-login.txt
+++ b/src/man/firejail-login.txt
@@ -15,7 +15,7 @@ Example:
15 15
16.SH RESTRICTED SHELL 16.SH RESTRICTED SHELL
17To configure a restricted shell, replace /bin/bash with /usr/bin/firejail in 17To configure a restricted shell, replace /bin/bash with /usr/bin/firejail in
18/etc/password file for each user that needs to be restricted. Alternatively, 18/etc/passwd file for each user that needs to be restricted. Alternatively,
19you can specify /usr/bin/firejail using adduser or usermod commands: 19you can specify /usr/bin/firejail using adduser or usermod commands:
20 20
21adduser \-\-shell /usr/bin/firejail username 21adduser \-\-shell /usr/bin/firejail username
diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt
index 1f7c8beac..c2d5e7955 100644
--- a/src/man/firejail-profile.txt
+++ b/src/man/firejail-profile.txt
@@ -243,7 +243,7 @@ Enable seccomp filter and whitelist the system calls in the list.
243Sets the NO_NEW_PRIVS prctl. This ensures that child processes 243Sets the NO_NEW_PRIVS prctl. This ensures that child processes
244cannot acquire new privileges using execve(2); in particular, 244cannot acquire new privileges using execve(2); in particular,
245this means that calling a suid binary (or one with file capabilities) 245this means that calling a suid binary (or one with file capabilities)
246does not results in an increase of privilege. 246does not result in an increase of privilege.
247.TP 247.TP
248\fBnoroot 248\fBnoroot
249Use this command to enable an user namespace. The namespace has only one user, the current user. 249Use this command to enable an user namespace. The namespace has only one user, the current user.
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index d72deab2f..bb8c64dc9 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -926,7 +926,7 @@ $
926Sets the NO_NEW_PRIVS prctl. This ensures that child processes 926Sets the NO_NEW_PRIVS prctl. This ensures that child processes
927cannot acquire new privileges using execve(2); in particular, 927cannot acquire new privileges using execve(2); in particular,
928this means that calling a suid binary (or one with file capabilities) 928this means that calling a suid binary (or one with file capabilities)
929does not results in an increase of privilege. 929does not result in an increase of privilege.
930 930
931.TP 931.TP
932\fB\-\-nosound 932\fB\-\-nosound