aboutsummaryrefslogtreecommitdiffstats
path: root/src/man/firejail-profile.txt
diff options
context:
space:
mode:
Diffstat (limited to 'src/man/firejail-profile.txt')
-rw-r--r--src/man/firejail-profile.txt24
1 files changed, 19 insertions, 5 deletions
diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt
index 46da19ecd..f85e10171 100644
--- a/src/man/firejail-profile.txt
+++ b/src/man/firejail-profile.txt
@@ -1,4 +1,4 @@
1.TH man 5 "MONTH YEAR" "VERSION" "firejail profiles man page" 1.TH FIREJAIL-PROFILE 5 "MONTH YEAR" "VERSION" "firejail profiles man page"
2.SH NAME 2.SH NAME
3profile \- Profile file syntax for Firejail 3profile \- Profile file syntax for Firejail
4 4
@@ -15,8 +15,19 @@ directory and ~/.config/firejail directory.
15Include and comment support: 15Include and comment support:
16 16
17.TP 17.TP
18\f\include other.profile 18\f\include other.profile exclude-token
19Include other.profile file. 19Include other.profile file. exclued-token disables blacklist commands in other.profile
20if exclude-token word is found in the name section of blacklist command.
21exclude-tyoken is optional.
22
23Example: "include /etc/firejail/disable-common.inc .filezilla"
24loads disable-common.inc file disables "blacklist ${HOME}/.filezilla" command in this file.
25
26other.profile file name can be prefixed with ${HOME}. This will force Firejail to look for the
27file in user home directory.
28
29Example: "include ${HOME}/myprofiles/profile1" will load "~/myprofiles/profile1" file.
30
20.TP 31.TP
21# this is a comment 32# this is a comment
22 33
@@ -81,14 +92,17 @@ Enable default Linux capabilities filter.
81caps.drop all 92caps.drop all
82Blacklist all Linux capabilities. 93Blacklist all Linux capabilities.
83.TP 94.TP
84caps.drop capability,capability,capability 95caps.keep capability,capability,capability
85Blacklist Linux capabilities filter. 96Blacklist Linux capabilities filter.
86.TP 97.TP
87caps.drop capability,capability,capability 98caps.drop capability,capability,capability
88Whitelist Linux capabilities filter. 99Whitelist Linux capabilities filter.
89.TP 100.TP
90\f\seccomp 101\f\seccomp
91Enable default seccomp filter. 102Enable default seccomp filter. The default list is as follows:
103mount, umount2, ptrace, kexec_load, open_by_handle_at, init_module, finit_module, delete_module,
104iopl, ioperm, swapon, swapoff, mknode, syslog, process_vm_readv and process_vm_writev,
105sysfs,_sysctl, adjtimex, clock_adjtime, lookup_dcookie, perf_event_open, fanotify_init and kcmp.
92.TP 106.TP
93\f\seccomp syscall,syscall,syscall 107\f\seccomp syscall,syscall,syscall
94Enable seccomp filter and blacklist the system calls in the list on top of default seccomp filter. 108Enable seccomp filter and blacklist the system calls in the list on top of default seccomp filter.