aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2016-07-10 10:08:53 -0400
committerLibravatar netblue30 <netblue30@yahoo.com>2016-07-10 10:08:53 -0400
commita344c555ff282c23a8274d10ad0f75eb4fae6836 (patch)
treeb86fde69dc1cb71a476745c974196735d694952a /src
parentnoexec inside /var directory (diff)
downloadfirejail-a344c555ff282c23a8274d10ad0f75eb4fae6836.tar.gz
firejail-a344c555ff282c23a8274d10ad0f75eb4fae6836.tar.zst
firejail-a344c555ff282c23a8274d10ad0f75eb4fae6836.zip
--noexec
Diffstat (limited to 'src')
-rw-r--r--src/firejail/usage.c4
-rw-r--r--src/man/firejail-profile.txt3
-rw-r--r--src/man/firejail.txt15
3 files changed, 21 insertions, 1 deletions
diff --git a/src/firejail/usage.c b/src/firejail/usage.c
index 6b7a666db..f7a93174f 100644
--- a/src/firejail/usage.c
+++ b/src/firejail/usage.c
@@ -147,9 +147,11 @@ void usage(void) {
147 printf(" --nice=value - set nice value\n\n"); 147 printf(" --nice=value - set nice value\n\n");
148 printf(" --noblacklist=dirname_or_filename - disable blacklist for directory or\n"); 148 printf(" --noblacklist=dirname_or_filename - disable blacklist for directory or\n");
149 printf("\tfile.\n\n"); 149 printf("\tfile.\n\n");
150 printf(" --noexec=dirname_of_filenam - remount the file or directory noexec\n");
151 printf("\tnosuid and nodev\n\n");
150 printf(" --nogroups - disable supplementary groups. Without this option,\n"); 152 printf(" --nogroups - disable supplementary groups. Without this option,\n");
151 printf("\tsupplementary groups are enabled for the user starting the sandbox.\n"); 153 printf("\tsupplementary groups are enabled for the user starting the sandbox.\n");
152 printf("\t For root, groups are always disabled.\n\n"); 154 printf("\tFor root, groups are always disabled.\n\n");
153 155
154 printf(" --noprofile - do not use a profile. Profile priority is use the one\n"); 156 printf(" --noprofile - do not use a profile. Profile priority is use the one\n");
155 printf("\tspecified on the command line, next try to find one that\n"); 157 printf("\tspecified on the command line, next try to find one that\n");
diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt
index 98fa17908..504842a9e 100644
--- a/src/man/firejail-profile.txt
+++ b/src/man/firejail-profile.txt
@@ -157,6 +157,9 @@ whitelist ~/.cache/mozilla/firefox
157Similar to mkdir, this command creates a file in user home before the sandbox is started. 157Similar to mkdir, this command creates a file in user home before the sandbox is started.
158The file is created if it doesn't already exist. 158The file is created if it doesn't already exist.
159.TP 159.TP
160\fBnoexec file_or_directory
161Remount the file or the directory noexec, nodev and nosuid.
162.TP
160\fBprivate 163\fBprivate
161Mount new /root and /home/user directories in temporary 164Mount new /root and /home/user directories in temporary
162filesystems. All modifications are discarded when the sandbox is 165filesystems. All modifications are discarded when the sandbox is
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index 7c9cd98de..cd9ea6a8a 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -851,6 +851,21 @@ $ nc dict.org 2628
851220 pan.alephnull.com dictd 1.12.1/rf on Linux 3.14-1-amd64 851220 pan.alephnull.com dictd 1.12.1/rf on Linux 3.14-1-amd64
852.br 852.br
853.TP 853.TP
854\fB\-\-noexec=dirname_or_filename
855Remount directory or file noexec, nodev and nosuid.
856.br
857
858.br
859Example:
860.br
861$ firejail \-\-noexec=/tmp
862.br
863
864.br
865/etc and /var are noexec by default. If there are more than one mount operation
866on the path of the file or directory, noexec should be applied to the last one. Always check if the change took effect inside the sandbox.
867
868.TP
854\fB\-\-nogroups 869\fB\-\-nogroups
855Disable supplementary groups. Without this option, supplementary groups are enabled for the user starting the 870Disable supplementary groups. Without this option, supplementary groups are enabled for the user starting the
856sandbox. For root user supplementary groups are always disabled. 871sandbox. For root user supplementary groups are always disabled.