aboutsummaryrefslogtreecommitdiffstats
path: root/src/man/firejail.txt
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2018-09-01 07:59:40 -0400
committerLibravatar netblue30 <netblue30@yahoo.com>2018-09-01 07:59:40 -0400
commit07384ab64a4a98ff920e7667795282ae9ad21322 (patch)
tree10a6408aca31a2f48ee254d577a2481507a67ef2 /src/man/firejail.txt
parenterror strings (diff)
downloadfirejail-07384ab64a4a98ff920e7667795282ae9ad21322.tar.gz
firejail-07384ab64a4a98ff920e7667795282ae9ad21322.tar.zst
firejail-07384ab64a4a98ff920e7667795282ae9ad21322.zip
--chroot fixes (Debian problem)
Diffstat (limited to 'src/man/firejail.txt')
-rw-r--r--src/man/firejail.txt10
1 files changed, 6 insertions, 4 deletions
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index d7e402e31..c09684596 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -100,7 +100,8 @@ $ firejail --allusers
100Enable AppArmor confinement. For more information, please see \fBAPPARMOR\fR section below. 100Enable AppArmor confinement. For more information, please see \fBAPPARMOR\fR section below.
101.TP 101.TP
102\fB\-\-appimage 102\fB\-\-appimage
103Sandbox an AppImage (https://appimage.org/) application. 103Sandbox an AppImage (https://appimage.org/) application. If the sandbox is started as a
104regular user, default seccomp and capabilities filters are enabled.
104.br 105.br
105 106
106.br 107.br
@@ -272,8 +273,7 @@ Example:
272\fB\-\-chroot=dirname 273\fB\-\-chroot=dirname
273Chroot the sandbox into a root filesystem. Unlike the regular filesystem container, 274Chroot the sandbox into a root filesystem. Unlike the regular filesystem container,
274the system directories are mounted read-write. If the sandbox is started as a 275the system directories are mounted read-write. If the sandbox is started as a
275regular user, default seccomp and capabilities filters are enabled. This 276regular user, default seccomp and capabilities filters are enabled.
276option is not available on Grsecurity systems.
277.br 277.br
278 278
279.br 279.br
@@ -1268,6 +1268,7 @@ Similar to \-\-output, but stderr is also stored.
1268Mount a filesystem overlay on top of the current filesystem. Unlike the regular filesystem container, 1268Mount a filesystem overlay on top of the current filesystem. Unlike the regular filesystem container,
1269the system directories are mounted read-write. All filesystem modifications go into the overlay. 1269the system directories are mounted read-write. All filesystem modifications go into the overlay.
1270Directories /run, /tmp and /dev are not covered by the overlay. The overlay is stored in $HOME/.firejail/<PID> directory. 1270Directories /run, /tmp and /dev are not covered by the overlay. The overlay is stored in $HOME/.firejail/<PID> directory.
1271If the sandbox is started as a regular user, default seccomp and capabilities filters are enabled.
1271.br 1272.br
1272 1273
1273.br 1274.br
@@ -1287,6 +1288,7 @@ Mount a filesystem overlay on top of the current filesystem. Unlike the regular
1287the system directories are mounted read-write. All filesystem modifications go into the overlay. 1288the system directories are mounted read-write. All filesystem modifications go into the overlay.
1288Directories /run, /tmp and /dev are not covered by the overlay. The overlay is stored in $HOME/.firejail/<NAME> directory. 1289Directories /run, /tmp and /dev are not covered by the overlay. The overlay is stored in $HOME/.firejail/<NAME> directory.
1289The created overlay can be reused between multiple sessions. 1290The created overlay can be reused between multiple sessions.
1291If the sandbox is started as a regular user, default seccomp and capabilities filters are enabled.
1290.br 1292.br
1291 1293
1292.br 1294.br
@@ -1304,7 +1306,7 @@ $ firejail \-\-overlay-named=jail1 firefox
1304\fB\-\-overlay-tmpfs 1306\fB\-\-overlay-tmpfs
1305Mount a filesystem overlay on top of the current filesystem. All filesystem modifications 1307Mount a filesystem overlay on top of the current filesystem. All filesystem modifications
1306are discarded when the sandbox is closed. Directories /run, /tmp and /dev are not covered by the overlay. 1308are discarded when the sandbox is closed. Directories /run, /tmp and /dev are not covered by the overlay.
1307 1309If the sandbox is started as a regular user, default seccomp and capabilities filters are enabled.
1308.br 1310.br
1309 1311
1310.br 1312.br