From eefe95f10c49cf154dd78bcc0c4f034ebdfe398b Mon Sep 17 00:00:00 2001 From: Christian Goeschel Ndjomouo Date: Mon, 5 Jan 2026 21:36:29 -0500 Subject: [PATCH] setpriv: (manpage) fix typo in option description Signed-off-by: Christian Goeschel Ndjomouo --- sys-utils/setpriv.1.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sys-utils/setpriv.1.adoc b/sys-utils/setpriv.1.adoc index abb185a44..97366e33e 100644 --- a/sys-utils/setpriv.1.adoc +++ b/sys-utils/setpriv.1.adoc @@ -56,7 +56,7 @@ Initialize supplementary groups using initgroups3. Only useful in conjunction wi *--list-caps*:: List all known capabilities. This option must be specified alone. -*--no-new-privs*:: +*--nnp*, *--no-new-privs*:: Set the _no_new_privs_ bit. With this bit set, *execve*(2) will not grant new privileges. For example, the set-user-ID and set-group-ID bits as well as file capabilities will be disabled. (Executing binaries with these bits set will still work, but they will not gain privileges. Certain LSMs, especially AppArmor, may result in failures to execute certain programs.) This bit is inherited by child processes and cannot be unset. See *prctl*(2) and _Documentation/prctl/no_new_privs.txt_ in the Linux kernel source. + The _no_new_privs_ bit is supported since Linux 3.5. -- 2.47.3