diff options
author | Aleksey Manevich <manevich.aleksey@gmail.com> | 2016-09-10 21:59:20 +0300 |
---|---|---|
committer | Aleksey Manevich <manevich.aleksey@gmail.com> | 2016-09-10 21:59:20 +0300 |
commit | 214b62cebecab39340b523880cc44994f343244b (patch) | |
tree | 6e28a41806b29a65639abcf0eacd72c7bd5e0fff /src/man/firejail-profile.txt | |
parent | add x11=block option (diff) | |
download | firejail-214b62cebecab39340b523880cc44994f343244b.tar.gz firejail-214b62cebecab39340b523880cc44994f343244b.tar.zst firejail-214b62cebecab39340b523880cc44994f343244b.zip |
update man
Diffstat (limited to 'src/man/firejail-profile.txt')
-rw-r--r-- | src/man/firejail-profile.txt | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt index 51b45cd10..d4ab0af55 100644 --- a/src/man/firejail-profile.txt +++ b/src/man/firejail-profile.txt | |||
@@ -267,6 +267,17 @@ There is no root account (uid 0) defined in the namespace. | |||
267 | .TP | 267 | .TP |
268 | \fBx11 | 268 | \fBx11 |
269 | Enable X11 sandboxing. | 269 | Enable X11 sandboxing. |
270 | .TP | ||
271 | \fBx11 xpra | ||
272 | Enable X11 sandboxing with xpra. | ||
273 | .TP | ||
274 | \fBx11 xephyr | ||
275 | Enable X11 sandboxing with xephyr. | ||
276 | .TP | ||
277 | \fBx11 block | ||
278 | Blacklist /tmp/.X11-unix directory, ${HOME}/.Xauthority and file specified in ${XAUTHORITY} enviroment variable. | ||
279 | Remove DISPLAY and XAUTHORITY enviroment variables. | ||
280 | Stop with error message if X11 abstract socket will be accessible in jail. | ||
270 | 281 | ||
271 | .SH Resource limits, CPU affinity, Control Groups | 282 | .SH Resource limits, CPU affinity, Control Groups |
272 | These profile entries define the limits on system resources (rlimits) for the processes inside the sandbox. | 283 | These profile entries define the limits on system resources (rlimits) for the processes inside the sandbox. |