aboutsummaryrefslogtreecommitdiffstats
path: root/src/man/firejail.txt
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@protonmail.com>2022-06-13 09:26:37 -0400
committerLibravatar netblue30 <netblue30@protonmail.com>2022-06-13 09:26:37 -0400
commit95544a17fac7e5fb2b0eabe3d96305813fc96a1b (patch)
treeca0259eb8523de487c297f2a14e23f87d512b17d /src/man/firejail.txt
parentdisable cgroup code (diff)
downloadfirejail-95544a17fac7e5fb2b0eabe3d96305813fc96a1b.tar.gz
firejail-95544a17fac7e5fb2b0eabe3d96305813fc96a1b.tar.zst
firejail-95544a17fac7e5fb2b0eabe3d96305813fc96a1b.zip
more on disable cgroups
Diffstat (limited to 'src/man/firejail.txt')
-rw-r--r--src/man/firejail.txt15
1 files changed, 3 insertions, 12 deletions
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index a18b53fea..c2c0bc297 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -289,15 +289,6 @@ $ firejail \-\-caps.print=3272
289\fB\-\-cat=name|pid filename 289\fB\-\-cat=name|pid filename
290Print content of file from sandbox container, see FILE TRANSFER section for more details. 290Print content of file from sandbox container, see FILE TRANSFER section for more details.
291#endif 291#endif
292.TP
293\fB\-\-cgroup=file
294Place the sandbox in the specified control group. file is the full path of a tasks or cgroup.procs file.
295.br
296
297.br
298Example:
299.br
300# firejail \-\-cgroup=/sys/fs/cgroup/g1/tasks
301#ifdef HAVE_CHROOT 292#ifdef HAVE_CHROOT
302.TP 293.TP
303\fB\-\-chroot=dirname 294\fB\-\-chroot=dirname
@@ -994,7 +985,7 @@ $ firejail \-\-ipc-namespace firefox
994Join the sandbox identified by name or by PID. By default a /bin/bash shell is started after joining the sandbox. 985Join the sandbox identified by name or by PID. By default a /bin/bash shell is started after joining the sandbox.
995If a program is specified, the program is run in the sandbox. If \-\-join command is issued as a regular user, 986If a program is specified, the program is run in the sandbox. If \-\-join command is issued as a regular user,
996all security filters are configured for the new process the same they are configured in the sandbox. 987all security filters are configured for the new process the same they are configured in the sandbox.
997If \-\-join command is issued as root, the security filters, cgroups and cpus configurations are not applied 988If \-\-join command is issued as root, the security filters and cpus configurations are not applied
998to the process joining the sandbox. 989to the process joining the sandbox.
999.br 990.br
1000 991
@@ -1019,13 +1010,13 @@ $ firejail \-\-join=3272
1019\fB\-\-join-filesystem=name|pid 1010\fB\-\-join-filesystem=name|pid
1020Join the mount namespace of the sandbox identified by name or PID. By default a /bin/bash shell is started after joining the sandbox. 1011Join the mount namespace of the sandbox identified by name or PID. By default a /bin/bash shell is started after joining the sandbox.
1021If a program is specified, the program is run in the sandbox. This command is available only to root user. 1012If a program is specified, the program is run in the sandbox. This command is available only to root user.
1022Security filters, cgroups and cpus configurations are not applied to the process joining the sandbox. 1013Security filters and cpus configurations are not applied to the process joining the sandbox.
1023#ifdef HAVE_NETWORK 1014#ifdef HAVE_NETWORK
1024.TP 1015.TP
1025\fB\-\-join-network=name|pid 1016\fB\-\-join-network=name|pid
1026Join the network namespace of the sandbox identified by name. By default a /bin/bash shell is started after joining the sandbox. 1017Join the network namespace of the sandbox identified by name. By default a /bin/bash shell is started after joining the sandbox.
1027If a program is specified, the program is run in the sandbox. This command is available only to root user. 1018If a program is specified, the program is run in the sandbox. This command is available only to root user.
1028Security filters, cgroups and cpus configurations are not applied to the process joining the sandbox. Example: 1019Security filters and cpus configurations are not applied to the process joining the sandbox. Example:
1029.br 1020.br
1030 1021
1031.br 1022.br