Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: mention capabilities(7) on --caps #5078

Merged
merged 1 commit into from
Mar 29, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
docs: mention capabilities(7) on --caps
  • Loading branch information
kmk3 committed Mar 27, 2022
commit 2183e4d296e598c6407d4a1f64368039a7ae1efa
1 change: 1 addition & 0 deletions src/man/firejail-profile.txt
Original file line number Diff line number Diff line change
Expand Up @@ -483,6 +483,7 @@ Enable AppArmor confinement.
.TP
\fBcaps
Enable default Linux capabilities filter.
See capabilities(7) for details.
.TP
\fBcaps.drop capability,capability,capability
Blacklist given Linux capabilities.
Expand Down
1 change: 1 addition & 0 deletions src/man/firejail.txt
Original file line number Diff line number Diff line change
Expand Up @@ -216,6 +216,7 @@ not change the execution of firejail.
Linux capabilities is a kernel feature designed to split up the root privilege into a set of distinct privileges.
These privileges can be enabled or disabled independently, thus restricting what a process running
as root can do in the system.
See capabilities(7) for details.

By default root programs run with all capabilities enabled. \-\-caps option disables the following capabilities:
CAP_SYS_MODULE, CAP_SYS_RAWIO,
Expand Down