From c95e16451b83eea2cbfada9b42d2e6b9c77126a5 Mon Sep 17 00:00:00 2001 From: avoidr Date: Mon, 27 Jun 2016 01:27:51 +0200 Subject: fix some typos --- src/firejail/usage.c | 2 +- src/man/firejail-login.txt | 2 +- src/man/firejail-profile.txt | 2 +- src/man/firejail.txt | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/src/firejail/usage.c b/src/firejail/usage.c index af1a30ac3..82b1affcc 100644 --- a/src/firejail/usage.c +++ b/src/firejail/usage.c @@ -336,7 +336,7 @@ void usage(void) { printf("\n"); printf("Restricted shell\n\n"); printf("To configure a restricted shell, replace /bin/bash with /usr/bin/firejail in\n"); - printf("/etc/password file for each user that needs to be restricted.\n"); + printf("/etc/passwd file for each user that needs to be restricted.\n"); printf("Alternatively, you can specify /usr/bin/firejail in adduser command:\n\n"); printf(" adduser --shell /usr/bin/firejail username\n\n"); printf("Arguments to be passed to firejail executable upon login are declared in\n"); diff --git a/src/man/firejail-login.txt b/src/man/firejail-login.txt index 6cd9ce3cb..464551202 100644 --- a/src/man/firejail-login.txt +++ b/src/man/firejail-login.txt @@ -15,7 +15,7 @@ Example: .SH RESTRICTED SHELL To configure a restricted shell, replace /bin/bash with /usr/bin/firejail in -/etc/password file for each user that needs to be restricted. Alternatively, +/etc/passwd file for each user that needs to be restricted. Alternatively, you can specify /usr/bin/firejail using adduser or usermod commands: adduser \-\-shell /usr/bin/firejail username diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt index 1f7c8beac..c2d5e7955 100644 --- a/src/man/firejail-profile.txt +++ b/src/man/firejail-profile.txt @@ -243,7 +243,7 @@ Enable seccomp filter and whitelist the system calls in the list. Sets the NO_NEW_PRIVS prctl. This ensures that child processes cannot acquire new privileges using execve(2); in particular, this means that calling a suid binary (or one with file capabilities) -does not results in an increase of privilege. +does not result in an increase of privilege. .TP \fBnoroot Use this command to enable an user namespace. The namespace has only one user, the current user. diff --git a/src/man/firejail.txt b/src/man/firejail.txt index d72deab2f..bb8c64dc9 100644 --- a/src/man/firejail.txt +++ b/src/man/firejail.txt @@ -926,7 +926,7 @@ $ Sets the NO_NEW_PRIVS prctl. This ensures that child processes cannot acquire new privileges using execve(2); in particular, this means that calling a suid binary (or one with file capabilities) -does not results in an increase of privilege. +does not result in an increase of privilege. .TP \fB\-\-nosound -- cgit v1.2.3-70-g09d2 From 7b5b2f9d29218a662cac81f88ff0e39aa9b37c2c Mon Sep 17 00:00:00 2001 From: avoidr Date: Mon, 27 Jun 2016 01:47:20 +0200 Subject: s/Xephry/Xephyr/ --- etc/firejail.config | 2 +- src/man/firejail-config.txt | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/etc/firejail.config b/etc/firejail.config index eaff4de8f..59bbd77a5 100644 --- a/etc/firejail.config +++ b/etc/firejail.config @@ -46,7 +46,7 @@ # xephyr-screen 1024x768 # xephyr-screen 1280x1024 -# Firejail window title in Xephry, default enabled. +# Firejail window title in Xephyr, default enabled. # xephyr-window-title yes # Xephyr command extra parameters. None by default, and the declaration is commented out. diff --git a/src/man/firejail-config.txt b/src/man/firejail-config.txt index bc29dc977..386eda976 100644 --- a/src/man/firejail-config.txt +++ b/src/man/firejail-config.txt @@ -76,7 +76,7 @@ xephyr-screen 1280x1024 .TP \fBxephyr-window-title -Firejail window title in Xephry, default enabled. +Firejail window title in Xephyr, default enabled. .TP \fBxephyr-extra-params -- cgit v1.2.3-70-g09d2