diff --git a/Base/usr/share/man/man1/less.md b/Base/usr/share/man/man1/less.md index 50b78e87a3..fb2ad84e60 100644 --- a/Base/usr/share/man/man1/less.md +++ b/Base/usr/share/man/man1/less.md @@ -68,7 +68,7 @@ character. For instance, `\\%l` would render as `%l`. All other characters are treated normally. -#### examples +#### Examples `less`'s current default prompt: `'?f%f :.(line %l)?e (END):.'` diff --git a/Base/usr/share/man/man7/Mitigations.md b/Base/usr/share/man/man7/Mitigations.md index a4010dd881..a158177157 100644 --- a/Base/usr/share/man/man7/Mitigations.md +++ b/Base/usr/share/man/man7/Mitigations.md @@ -74,9 +74,9 @@ Date: Mon Jan 20 22:12:04 2020 +0100 Kernel: Add a basic implementation of unveil() ``` -### syscall call-from verification +### Syscall call-from verification -[syscall call-from verification](https://marc.info/?l=openbsd-tech&m=157488907117170&w=2) is +[Syscall call-from verification](https://marc.info/?l=openbsd-tech&m=157488907117170&w=2) is a mitigation which originated from OpenBSD. In short the kernel checks that all syscalls originate from the address of the system's libc. This makes attacks