summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRonny Chevalier <chevalier.ronny@gmail.com>2016-05-30 12:57:38 +0100
committerRonny Chevalier <chevalier.ronny@gmail.com>2016-05-30 12:57:38 +0100
commit1f7a9e8ee7ed3d0df103538cec6f8d6a5ac6e7ce (patch)
treedebf53165d4d7ee3c84477a37ea995132bcd166f
parent8869a0b40b1cf82d264cabc2ff8052e8e35145a2 (diff)
parent008dce3875cd7074c3534ef8f4835e80f76c0ce3 (diff)
Merge pull request #3389 from lucab/to-upstream/man-typos
man: fix recurring typo
-rw-r--r--man/systemd.exec.xml6
1 files changed, 3 insertions, 3 deletions
diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml
index 3cf6de8256..5c47e0f329 100644
--- a/man/systemd.exec.xml
+++ b/man/systemd.exec.xml
@@ -1160,7 +1160,7 @@
effect is inverted: only the listed system calls will result
in immediate process termination (blacklisting). If running in
user mode, or in system mode, but without the
- <constant>CAP_SYS_ADMIN</constant> capabiblity (e.g. setting
+ <constant>CAP_SYS_ADMIN</constant> capability (e.g. setting
<varname>User=nobody</varname>),
<varname>NoNewPrivileges=yes</varname> is implied. This
feature makes use of the Secure Computing Mode 2 interfaces of
@@ -1222,7 +1222,7 @@
more strictly: to the architecture the system manager is
compiled for). If running in user mode, or in system mode,
but without the <constant>CAP_SYS_ADMIN</constant>
- capabiblity (e.g. setting <varname>User=nobody</varname>),
+ capability (e.g. setting <varname>User=nobody</varname>),
<varname>NoNewPrivileges=yes</varname> is implied. Note
that setting this option to a non-empty list implies that
<constant>native</constant> is included too. By default, this
@@ -1254,7 +1254,7 @@
has no effect on 32-bit x86 and is ignored (but works
correctly on x86-64). If running in user mode, or in system
mode, but without the <constant>CAP_SYS_ADMIN</constant>
- capabiblity (e.g. setting <varname>User=nobody</varname>),
+ capability (e.g. setting <varname>User=nobody</varname>),
<varname>NoNewPrivileges=yes</varname> is implied. By
default, no restriction applies, all address families are
accessible to processes. If assigned the empty string, any