diff options
author | netblue30 <netblue30@yahoo.com> | 2016-01-14 12:10:55 -0500 |
---|---|---|
committer | netblue30 <netblue30@yahoo.com> | 2016-01-14 12:10:55 -0500 |
commit | e9166dc417066e90bd2e544f0a2c79af159d43e7 (patch) | |
tree | 971572c3d6d55a5a3f22d3c7d45c7c8eb49ad8b5 /README.md | |
parent | --join fixes (diff) | |
download | firejail-e9166dc417066e90bd2e544f0a2c79af159d43e7.tar.gz firejail-e9166dc417066e90bd2e544f0a2c79af159d43e7.tar.zst firejail-e9166dc417066e90bd2e544f0a2c79af159d43e7.zip |
join command enhancements
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 37 |
1 files changed, 37 insertions, 0 deletions
@@ -52,6 +52,43 @@ FAQ: https://firejail.wordpress.com/support/frequently-asked-questions/ | |||
52 | 52 | ||
53 | ````` | 53 | ````` |
54 | 54 | ||
55 | ## join command enhancements | ||
56 | ''''' | ||
57 | --join-filesystem=name | ||
58 | Join the mount namespace of the sandbox identified by name. By | ||
59 | default a /bin/bash shell is started after joining the sandbox. | ||
60 | If a program is specified, the program is run in the sandbox. | ||
61 | This command is available only to root user. Security filters, | ||
62 | cgroups and cpus configurations are not applied to the process | ||
63 | joining the sandbox. | ||
64 | |||
65 | --join-filesystem=pid | ||
66 | Join the mount namespace of the sandbox identified by process | ||
67 | ID. By default a /bin/bash shell is started after joining the | ||
68 | sandbox. If a program is specified, the program is run in the | ||
69 | sandbox. This command is available only to root user. Security | ||
70 | filters, cgroups and cpus configurations are not applied to the | ||
71 | process joining the sandbox. | ||
72 | |||
73 | --join-network=name | ||
74 | Join the network namespace of the sandbox identified by name. By | ||
75 | default a /bin/bash shell is started after joining the sandbox. | ||
76 | If a program is specified, the program is run in the sandbox. | ||
77 | This command is available only to root user. Security filters, | ||
78 | cgroups and cpus configurations are not applied to the process | ||
79 | joining the sandbox. | ||
80 | |||
81 | --join-network=pid | ||
82 | Join the network namespace of the sandbox identified by process | ||
83 | ID. By default a /bin/bash shell is started after joining the | ||
84 | sandbox. If a program is specified, the program is run in the | ||
85 | sandbox. This command is available only to root user. Security | ||
86 | filters, cgroups and cpus configurations are not applied to the | ||
87 | process joining the sandbox. | ||
88 | |||
89 | ''''' | ||
90 | |||
91 | |||
55 | ## New profiles: KMail | 92 | ## New profiles: KMail |
56 | 93 | ||
57 | 94 | ||