aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorLibravatar The Fox in the Shell <KellerFuchs@hashbang.sh>2016-05-25 02:26:31 +0200
committerLibravatar The Fox in the Shell <KellerFuchs@hashbang.sh>2016-05-25 15:01:13 +0200
commit2cecda837db48f92d5f6089ba680ae5292382e6c (patch)
treef6f25f8812228e842a53850b5dfdb21ca4f2d97a /src
parentMake NO_NEW_PRIVS configurable (diff)
downloadfirejail-2cecda837db48f92d5f6089ba680ae5292382e6c.tar.gz
firejail-2cecda837db48f92d5f6089ba680ae5292382e6c.tar.zst
firejail-2cecda837db48f92d5f6089ba680ae5292382e6c.zip
Document nonewprivs
Diffstat (limited to 'src')
-rw-r--r--src/man/firejail-profile.txt6
-rw-r--r--src/man/firejail.txt7
2 files changed, 13 insertions, 0 deletions
diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt
index 4d1de76f5..1f7c8beac 100644
--- a/src/man/firejail-profile.txt
+++ b/src/man/firejail-profile.txt
@@ -239,6 +239,12 @@ Enable seccomp filter and blacklist the system calls in the list.
239\fBseccomp.keep syscall,syscall,syscall 239\fBseccomp.keep syscall,syscall,syscall
240Enable seccomp filter and whitelist the system calls in the list. 240Enable seccomp filter and whitelist the system calls in the list.
241.TP 241.TP
242\fBnonewprivs
243Sets the NO_NEW_PRIVS prctl. This ensures that child processes
244cannot acquire new privileges using execve(2); in particular,
245this means that calling a suid binary (or one with file capabilities)
246does not results in an increase of privilege.
247.TP
242\fBnoroot 248\fBnoroot
243Use this command to enable an user namespace. The namespace has only one user, the current user. 249Use this command to enable an user namespace. The namespace has only one user, the current user.
244There is no root account (uid 0) defined in the namespace. 250There is no root account (uid 0) defined in the namespace.
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index 2ea15ff2b..7b22a5bf2 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -904,6 +904,13 @@ ping: icmp open socket: Operation not permitted
904$ 904$
905 905
906.TP 906.TP
907\fB\-\-nonewprivs
908Sets the NO_NEW_PRIVS prctl. This ensures that child processes
909cannot acquire new privileges using execve(2); in particular,
910this means that calling a suid binary (or one with file capabilities)
911does not results in an increase of privilege.
912
913.TP
907\fB\-\-nosound 914\fB\-\-nosound
908Disable sound system. 915Disable sound system.
909.br 916.br