diff options
Diffstat (limited to 'src/firejail/usage.c')
-rw-r--r-- | src/firejail/usage.c | 4 |
1 files changed, 0 insertions, 4 deletions
diff --git a/src/firejail/usage.c b/src/firejail/usage.c index 2390706f2..d58bbb409 100644 --- a/src/firejail/usage.c +++ b/src/firejail/usage.c | |||
@@ -123,10 +123,8 @@ static char *usage_str = | |||
123 | " --mac=xx:xx:xx:xx:xx:xx - set interface MAC address.\n" | 123 | " --mac=xx:xx:xx:xx:xx:xx - set interface MAC address.\n" |
124 | #endif | 124 | #endif |
125 | " --machine-id - preserve /etc/machine-id\n" | 125 | " --machine-id - preserve /etc/machine-id\n" |
126 | #ifdef HAVE_SECCOMP | ||
127 | " --memory-deny-write-execute - seccomp filter to block attempts to create\n" | 126 | " --memory-deny-write-execute - seccomp filter to block attempts to create\n" |
128 | "\tmemory mappings that are both writable and executable.\n" | 127 | "\tmemory mappings that are both writable and executable.\n" |
129 | #endif | ||
130 | #ifdef HAVE_NETWORK | 128 | #ifdef HAVE_NETWORK |
131 | " --mtu=number - set interface MTU.\n" | 129 | " --mtu=number - set interface MTU.\n" |
132 | #endif | 130 | #endif |
@@ -215,7 +213,6 @@ static char *usage_str = | |||
215 | #ifdef HAVE_NETWORK | 213 | #ifdef HAVE_NETWORK |
216 | " --scan - ARP-scan all the networks from inside a network namespace.\n" | 214 | " --scan - ARP-scan all the networks from inside a network namespace.\n" |
217 | #endif | 215 | #endif |
218 | #ifdef HAVE_SECCOMP | ||
219 | " --seccomp - enable seccomp filter and apply the default blacklist.\n" | 216 | " --seccomp - enable seccomp filter and apply the default blacklist.\n" |
220 | " --seccomp=syscall,syscall,syscall - enable seccomp filter, blacklist the\n" | 217 | " --seccomp=syscall,syscall,syscall - enable seccomp filter, blacklist the\n" |
221 | "\tdefault syscall list and the syscalls specified by the command.\n" | 218 | "\tdefault syscall list and the syscalls specified by the command.\n" |
@@ -229,7 +226,6 @@ static char *usage_str = | |||
229 | " --seccomp.32[.drop,.keep][=syscall] - like above but for 32 bit architecture.\n" | 226 | " --seccomp.32[.drop,.keep][=syscall] - like above but for 32 bit architecture.\n" |
230 | " --seccomp-error-action=errno|kill|log - change error code, kill process\n" | 227 | " --seccomp-error-action=errno|kill|log - change error code, kill process\n" |
231 | "\tor log the attempt.\n" | 228 | "\tor log the attempt.\n" |
232 | #endif | ||
233 | " --shell=none - run the program directly without a user shell.\n" | 229 | " --shell=none - run the program directly without a user shell.\n" |
234 | " --shell=program - set default user shell.\n" | 230 | " --shell=program - set default user shell.\n" |
235 | " --shutdown=name|pid - shutdown the sandbox identified by name or PID.\n" | 231 | " --shutdown=name|pid - shutdown the sandbox identified by name or PID.\n" |