From 3b3a3f9e8acef5a04c315e48e2e30f0ad48a6024 Mon Sep 17 00:00:00 2001 From: Vincent43 <31109921+Vincent43@users.noreply.github.com> Date: Sat, 22 Sep 2018 16:44:06 +0100 Subject: manpages: fix alignment --- src/man/firejail.txt | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) (limited to 'src/man') diff --git a/src/man/firejail.txt b/src/man/firejail.txt index d34725dc5..cdc43be83 100644 --- a/src/man/firejail.txt +++ b/src/man/firejail.txt @@ -2494,9 +2494,7 @@ AppArmor support is disabled by default at compile time. Use --enable-apparmor c .br $ ./configure --prefix=/usr --enable-apparmor .TP -During software install, a generic AppArmor profile file, firejail-default, is placed in /etc/apparmor.d directory. The local customizations can be -placed in /etc/apparmor.d/local/firejail-local. The profile needs to be loaded into the kernel by running the following command as root, reloading -apparmor.service or rebooting the system: +During software install, a generic AppArmor profile file, firejail-default, is placed in /etc/apparmor.d directory. The local customizations can be placed in /etc/apparmor.d/local/firejail-local. The profile needs to be loaded into the kernel by reloading apparmor.service, rebooting the system or running the following command as root: .br .br @@ -2506,8 +2504,7 @@ The installed profile is supplemental for main firejail functions and among othe .br .br -- Disable ptrace. With ptrace it is possible to inspect and hijack running programs. Usually this is needed only for debugging. -You should have no problems running Chromium or Firefox. This feature is available only on Ubuntu kernels. +- Disable ptrace. With ptrace it is possible to inspect and hijack running programs. Usually this is needed only for debugging. You should have no problems running Chromium or Firefox. This feature is available only on Ubuntu kernels. .br .br @@ -2515,8 +2512,7 @@ You should have no problems running Chromium or Firefox. This feature is availab .br .br -- Allow running programs only from well-known system paths, such as /bin, /sbin, /usr/bin etc. Those paths are available as read-only. Running -programs and scripts from user home or other directories writable by the user is not allowed. +- Allow running programs only from well-known system paths, such as /bin, /sbin, /usr/bin etc. Those paths are available as read-only. Running programs and scripts from user home or other directories writable by the user is not allowed. .br .br -- cgit v1.2.3-54-g00ecf