diff options
author | valoq <valoq@mailbox.org> | 2016-12-11 19:18:09 +0100 |
---|---|---|
committer | valoq <valoq@mailbox.org> | 2016-12-11 19:18:09 +0100 |
commit | 9a415a34dd3ce2b69b780fb9884dc15b61dcfd96 (patch) | |
tree | 8b7ae2aa05b685c0c2c08f0d1c3d433567f1cce5 /src | |
parent | fixed ipc blacklist (diff) | |
download | firejail-9a415a34dd3ce2b69b780fb9884dc15b61dcfd96.tar.gz firejail-9a415a34dd3ce2b69b780fb9884dc15b61dcfd96.tar.zst firejail-9a415a34dd3ce2b69b780fb9884dc15b61dcfd96.zip |
fix comment
Diffstat (limited to 'src')
-rw-r--r-- | src/firejail/fs.c | 6 | ||||
-rw-r--r-- | src/man/firejail.txt | 2 |
2 files changed, 4 insertions, 4 deletions
diff --git a/src/firejail/fs.c b/src/firejail/fs.c index f469cba0a..adddf626b 100644 --- a/src/firejail/fs.c +++ b/src/firejail/fs.c | |||
@@ -532,7 +532,7 @@ void fs_proc_sys_dev_boot(void) { | |||
532 | disable_file(BLACKLIST_FILE, "/dev/port"); | 532 | disable_file(BLACKLIST_FILE, "/dev/port"); |
533 | 533 | ||
534 | 534 | ||
535 | /* // disable various ipc sockets */ | 535 | // disable various ipc sockets |
536 | struct stat s; | 536 | struct stat s; |
537 | 537 | ||
538 | // disable /run/user/{uid}/gnupg | 538 | // disable /run/user/{uid}/gnupg |
@@ -601,8 +601,8 @@ void fs_proc_sys_dev_boot(void) { | |||
601 | // using kde: | 601 | // using kde: |
602 | // kdeinit__0, ... | 602 | // kdeinit__0, ... |
603 | 603 | ||
604 | //more files with sockets to be blacklisted | 604 | // more files with sockets to be blacklisted |
605 | // /run/dbus /run/systemd /run/udev /run/lvm | 605 | // /run/dbus /run/systemd /run/udev /run/lvm |
606 | 606 | ||
607 | // /run/user/{uid} does not exist on some systems, usually used and created by desktop applications | 607 | // /run/user/{uid} does not exist on some systems, usually used and created by desktop applications |
608 | 608 | ||
diff --git a/src/man/firejail.txt b/src/man/firejail.txt index fdeb9ea3f..5b43b1ca5 100644 --- a/src/man/firejail.txt +++ b/src/man/firejail.txt | |||
@@ -85,7 +85,7 @@ Example: | |||
85 | $ firejail --allow-debuggers --profile=/etc/firejail/firefox.profile strace -f firefox | 85 | $ firejail --allow-debuggers --profile=/etc/firejail/firefox.profile strace -f firefox |
86 | .TP | 86 | .TP |
87 | \fB\-\-allusers | 87 | \fB\-\-allusers |
88 | All user home directories are visible inside the sandbox. By default, only current user home directory is visible. | 88 | All directories under /home are visible inside the sandbox. By default, only current user home directory is visible. |
89 | .br | 89 | .br |
90 | 90 | ||
91 | .br | 91 | .br |