aboutsummaryrefslogtreecommitdiffstats
path: root/src/man/firejail-profile.txt
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2016-10-03 10:15:14 -0400
committerLibravatar netblue30 <netblue30@yahoo.com>2016-10-03 10:15:14 -0400
commit0579100e2df9b9af899a7143ff1dd2511ca226c1 (patch)
tree850382d42d3aa0afa71b00d5fdd1703b0c5f5658 /src/man/firejail-profile.txt
parentrenamed --x11=block to --x11=none, brought back the requirement for network n... (diff)
downloadfirejail-0579100e2df9b9af899a7143ff1dd2511ca226c1.tar.gz
firejail-0579100e2df9b9af899a7143ff1dd2511ca226c1.tar.zst
firejail-0579100e2df9b9af899a7143ff1dd2511ca226c1.zip
--x11=xorg
Diffstat (limited to 'src/man/firejail-profile.txt')
-rw-r--r--src/man/firejail-profile.txt15
1 files changed, 9 insertions, 6 deletions
diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt
index f4b2c22fa..d420fab7a 100644
--- a/src/man/firejail-profile.txt
+++ b/src/man/firejail-profile.txt
@@ -279,16 +279,19 @@ There is no root account (uid 0) defined in the namespace.
279\fBx11 279\fBx11
280Enable X11 sandboxing. 280Enable X11 sandboxing.
281.TP 281.TP
282\fBx11 xpra
283Enable X11 sandboxing with xpra.
284.TP
285\fBx11 xephyr
286Enable X11 sandboxing with xephyr.
287.TP
288\fBx11 none 282\fBx11 none
289Blacklist /tmp/.X11-unix directory, ${HOME}/.Xauthority and file specified in ${XAUTHORITY} environment variable. 283Blacklist /tmp/.X11-unix directory, ${HOME}/.Xauthority and file specified in ${XAUTHORITY} environment variable.
290Remove DISPLAY and XAUTHORITY environment variables. 284Remove DISPLAY and XAUTHORITY environment variables.
291Stop with error message if X11 abstract socket will be accessible in jail. 285Stop with error message if X11 abstract socket will be accessible in jail.
286.TP
287\fBx11 xephyr
288Enable X11 sandboxing with xephyr.
289.TP
290\fBx11 xorg
291Enable X11 sandboxing with X11 security extension.
292.TP
293\fBx11 xpra
294Enable X11 sandboxing with xpra.
292 295
293.SH Resource limits, CPU affinity, Control Groups 296.SH Resource limits, CPU affinity, Control Groups
294These profile entries define the limits on system resources (rlimits) for the processes inside the sandbox. 297These profile entries define the limits on system resources (rlimits) for the processes inside the sandbox.