aboutsummaryrefslogtreecommitdiffstats
path: root/src/man
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2016-08-21 20:37:54 -0400
committerLibravatar netblue30 <netblue30@yahoo.com>2016-08-21 20:37:54 -0400
commit45306ca2adbe0ccfd655ac356cd7a989706a06a1 (patch)
tree782d163c4ab94884c5235fdcf2f9d2bdce8b3156 /src/man
parentdisable ssh-agent sockets in disable-programs.inc (diff)
downloadfirejail-45306ca2adbe0ccfd655ac356cd7a989706a06a1.tar.gz
firejail-45306ca2adbe0ccfd655ac356cd7a989706a06a1.tar.zst
firejail-45306ca2adbe0ccfd655ac356cd7a989706a06a1.zip
fixed whitelist description in man pages
Diffstat (limited to 'src/man')
-rw-r--r--src/man/firejail-profile.txt12
-rw-r--r--src/man/firejail.txt14
2 files changed, 19 insertions, 7 deletions
diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt
index 637519902..52802755f 100644
--- a/src/man/firejail-profile.txt
+++ b/src/man/firejail-profile.txt
@@ -198,9 +198,15 @@ Mount an empty tmpfs filesystem on top of directory. This option is available on
198Blacklist violations logged to syslog. 198Blacklist violations logged to syslog.
199.TP 199.TP
200\fBwhitelist file_or_directory 200\fBwhitelist file_or_directory
201Build a new user home in a temporary filesystem, and mount-bind file_or_directory. 201Whitelist directory or file. A temporary file system is mounted on the top directory, and the
202The modifications to file_or_directory are persistent, everything else is discarded 202whitelisted files are mount-binded inside. Modifications to whitelisted files are persistent,
203when the sandbox is closed. 203everything else is discarded when the sandbox is closed. The top directory could be
204user home, /dev, /media, /opt, /var, and /tmp.
205.br
206
207.br
208Symbolic link handling: with the exception of user home, both the link and the real file should be in
209the same top directory. For user home, both the link and the real file should be owned by the user.
204.TP 210.TP
205\fBwritable-etc 211\fBwritable-etc
206Mount /etc directory read-write. 212Mount /etc directory read-write.
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index 732d14624..d08b244f7 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -1587,9 +1587,15 @@ $ firejail \-\-version
1587firejail version 0.9.27 1587firejail version 0.9.27
1588.TP 1588.TP
1589\fB\-\-whitelist=dirname_or_filename 1589\fB\-\-whitelist=dirname_or_filename
1590Whitelist directory or file. This feature is implemented only for user home, /dev, /media, /opt, /var, and /tmp directories. 1590Whitelist directory or file. A temporary file system is mounted on the top directory, and the
1591With the exception of user home, both the link and the real file should be in 1591whitelisted files are mount-binded inside. Modifications to whitelisted files are persistent,
1592the same top directory. For /home, both the link and the real file should be owned by the user. 1592everything else is discarded when the sandbox is closed. The top directory could be
1593user home, /dev, /media, /opt, /var, and /tmp.
1594.br
1595
1596.br
1597Symbolic link handling: with the exception of user home, both the link and the real file should be in
1598the same top directory. For user home, both the link and the real file should be owned by the user.
1593.br 1599.br
1594 1600
1595.br 1601.br
@@ -1630,7 +1636,7 @@ applications started in the sandbox from accessing other X11 displays.
1630A network namespace needs to be instantiated in order to deny access to X11 abstract Unix domain socket. 1636A network namespace needs to be instantiated in order to deny access to X11 abstract Unix domain socket.
1631.br 1637.br
1632 1638
1633.br 1639br
1634Firejail will try first Xpra, and if Xpra is not installed on the system, it will try to find Xephyr. 1640Firejail will try first Xpra, and if Xpra is not installed on the system, it will try to find Xephyr.
1635This feature is not available when running as root. 1641This feature is not available when running as root.
1636.br 1642.br