aboutsummaryrefslogtreecommitdiffstats
path: root/src/man/firejail-profile.txt
diff options
context:
space:
mode:
Diffstat (limited to 'src/man/firejail-profile.txt')
-rw-r--r--src/man/firejail-profile.txt26
1 files changed, 12 insertions, 14 deletions
diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt
index 8897efc09..c5de79118 100644
--- a/src/man/firejail-profile.txt
+++ b/src/man/firejail-profile.txt
@@ -223,9 +223,13 @@ Enable seccomp filter and whitelist the system calls in the list.
223Use this command to enable an user namespace. The namespace has only one user, the current user. 223Use this command to enable an user namespace. The namespace has only one user, the current user.
224There is no root account (uid 0) defined in the namespace. 224There is no root account (uid 0) defined in the namespace.
225 225
226.SH Resource limits 226.SH Resource limits, CPU affinity, Control Groups
227These profile entries define the limits on system resources (rlimits) for the processes inside the sandbox. 227These profile entries define the limits on system resources (rlimits) for the processes inside the sandbox.
228The limits can be modified inside the sandbox using the regular \fBulimit\fR command. Example: 228The limits can be modified inside the sandbox using the regular \fBulimit\fR command. \fBcpu\fR command
229configures the CPU cores available, and \fBcgroup\fR command
230place the sandbox in an existing control group.
231
232Examples:
229 233
230.TP 234.TP
231\fBrlimit-fsize 1024 235\fBrlimit-fsize 1024
@@ -239,23 +243,14 @@ Set the maximum number of files that can be opened by a process to 500.
239.TP 243.TP
240\fBrlimit-sigpending 200 244\fBrlimit-sigpending 200
241Set the maximum number of processes that can be created for the real user ID of the calling process to 200. 245Set the maximum number of processes that can be created for the real user ID of the calling process to 200.
242
243.SH CPU Affinity
244Set the CPU cores available for this sandbox using \fBcpu\fR command. Examples:
245
246.TP 246.TP
247cpu 1,2,3 247\fBcpu 1,2,3
248Use only CPU cores 0, 1 and 2. 248Use only CPU cores 0, 1 and 2.
249
250.TP 249.TP
251nice -5 250\fBnice -5
252Set a nice value of -5 to all processes running inside the sandbox. 251Set a nice value of -5 to all processes running inside the sandbox.
253
254.SH Control Groups
255Place the sandbox in an existing control group specified by the full path of the task file using \fBcgroup\fR. Example:
256
257.TP 252.TP
258cgroup /sys/fs/cgroup/g1/tasks 253\fBcgroup /sys/fs/cgroup/g1/tasks
259The sandbox is placed in g1 control group. 254The sandbox is placed in g1 control group.
260 255
261.SH User Environment 256.SH User Environment
@@ -286,6 +281,9 @@ Run the program directly, without a shell.
286.TP 281.TP
287\fBipc-namespace 282\fBipc-namespace
288Enable IPC namespace. 283Enable IPC namespace.
284.TP
285\fBnosound
286Disable sound system.
289.SH Networking 287.SH Networking
290Networking features available in profile files. 288Networking features available in profile files.
291 289