diff options
| author | Michael Kerrisk <mtk.manpages@gmail.com> | 2017-12-02 16:18:32 +0100 |
|---|---|---|
| committer | Michael Kerrisk <mtk.manpages@gmail.com> | 2017-12-02 16:21:37 +0100 |
| commit | 7c8eb8f7cf9c1e7549b86d94e4dcb377d7093f5c (patch) | |
| tree | b3e81be6d59c0505dc63423caec959c482c8548f /man7/capabilities.7 | |
| parent | f7dbc40ee71268b95127418278b5567aca427063 (diff) | |
| download | man-pages-7c8eb8f7cf9c1e7549b86d94e4dcb377d7093f5c.tar.gz | |
capabilities.7: Deemphasize the ancient prctl(2) PR_SET_KEEPCAPS command
The modern approach is SECBITS_KEEP_CAPS.
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
Diffstat (limited to 'man7/capabilities.7')
| -rw-r--r-- | man7/capabilities.7 | 3 |
1 files changed, 0 insertions, 3 deletions
diff --git a/man7/capabilities.7 b/man7/capabilities.7 index 7dea796b4e..204601e128 100644 --- a/man7/capabilities.7 +++ b/man7/capabilities.7 @@ -1239,9 +1239,6 @@ are enabled in the effective set. If a thread that has a 0 value for one or more of its user IDs wants to prevent its permitted capability set being cleared when it resets all of its user IDs to nonzero values, it can do so using the -.BR prctl (2) -.B PR_SET_KEEPCAPS -operation or the .B SECBIT_KEEP_CAPS securebits flag described below. .\" |
