summaryrefslogtreecommitdiff
path: root/man/systemd.exec.xml
diff options
context:
space:
mode:
authorLuca Bruno <luca.bruno@coreos.com>2016-05-30 13:43:53 +0200
committerLuca Bruno <luca.bruno@coreos.com>2016-05-30 13:43:53 +0200
commit008dce3875cd7074c3534ef8f4835e80f76c0ce3 (patch)
treedebf53165d4d7ee3c84477a37ea995132bcd166f /man/systemd.exec.xml
parent8869a0b40b1cf82d264cabc2ff8052e8e35145a2 (diff)
man: fix recurring typo
Diffstat (limited to 'man/systemd.exec.xml')
-rw-r--r--man/systemd.exec.xml6
1 files changed, 3 insertions, 3 deletions
diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml
index 3cf6de8256..5c47e0f329 100644
--- a/man/systemd.exec.xml
+++ b/man/systemd.exec.xml
@@ -1160,7 +1160,7 @@
effect is inverted: only the listed system calls will result
in immediate process termination (blacklisting). If running in
user mode, or in system mode, but without the
- <constant>CAP_SYS_ADMIN</constant> capabiblity (e.g. setting
+ <constant>CAP_SYS_ADMIN</constant> capability (e.g. setting
<varname>User=nobody</varname>),
<varname>NoNewPrivileges=yes</varname> is implied. This
feature makes use of the Secure Computing Mode 2 interfaces of
@@ -1222,7 +1222,7 @@
more strictly: to the architecture the system manager is
compiled for). If running in user mode, or in system mode,
but without the <constant>CAP_SYS_ADMIN</constant>
- capabiblity (e.g. setting <varname>User=nobody</varname>),
+ capability (e.g. setting <varname>User=nobody</varname>),
<varname>NoNewPrivileges=yes</varname> is implied. Note
that setting this option to a non-empty list implies that
<constant>native</constant> is included too. By default, this
@@ -1254,7 +1254,7 @@
has no effect on 32-bit x86 and is ignored (but works
correctly on x86-64). If running in user mode, or in system
mode, but without the <constant>CAP_SYS_ADMIN</constant>
- capabiblity (e.g. setting <varname>User=nobody</varname>),
+ capability (e.g. setting <varname>User=nobody</varname>),
<varname>NoNewPrivileges=yes</varname> is implied. By
default, no restriction applies, all address families are
accessible to processes. If assigned the empty string, any