tags 626387 fixed-upstream
thanks

On Wed, May 11, 2011 at 3:47 PM, Marc Haber <mh+debian-b...@zugschlus.de> wrote:
> Package: manpages
> Version: 3.27-1
> Severity: normal
>
> Hi,
>
> capabilities(7) mentions that
>       Removing  capabilities  from the bounding set is only supported if file
>       capabilities are compiled into the  kernel  (CONFIG_SECURITY_FILE_CAPA‐
>       BILITIES).
>
> In recent kernels, there is no CONFIG_SECURITY_FILE_CAPABILITIES
> option any more, it is now on by default and cannot be turned off.
> This de-sync of docs and software may lead to people searching for
> that kernel option.
>
> The man page should explicitly mention that
> CONFIG_SECURITY_FILE_CAPABILITIES is only needed for pre-squeeze
> kernels.

Thanks for this report. In upstream man-pages-3.33, I have changed the
page as below.

Cheers,

Michael


--- a/man7/capabilities.7
+++ b/man7/capabilities.7
@@ -701,9 +701,14 @@ A thread can determine if a capability is in its
bounding set using the
 operation.

 Removing capabilities from the bounding set is only supported if file
-capabilities are compiled into the kernel
-(CONFIG_SECURITY_FILE_CAPABILITIES).
-In that case, the
+capabilities are compiled into the kernel.
+In kernels before Linux 2.6.33,
+file capabilities were an optional feature configurable via the
+CONFIG_SECURITY_FILE_CAPABILITIES
+option.
+Since Linux 2.6.33, the configuration option has been removed
+and file capabilities are always part of the kernel.
+When file capabilities are compiled into the kernel, the
 .B init
 process (the ancestor of all processes) begins with a full bounding set.
 If file capabilities are not compiled into the kernel, then


-- 
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Author of "The Linux Programming Interface"; http://man7.org/tlpi/



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to