aboutsummaryrefslogtreecommitdiffstats
path: root/src/man/firejail.txt
diff options
context:
space:
mode:
Diffstat (limited to 'src/man/firejail.txt')
-rw-r--r--src/man/firejail.txt12
1 files changed, 6 insertions, 6 deletions
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index bb0d3099b..2d0bd26d0 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -100,8 +100,8 @@ $ firejail --allusers
100Enable AppArmor confinement. For more information, please see \fBAPPARMOR\fR section below. 100Enable AppArmor confinement. For more information, please see \fBAPPARMOR\fR section below.
101.TP 101.TP
102\fB\-\-appimage 102\fB\-\-appimage
103Sandbox an AppImage (https://appimage.org/) application. If the sandbox is started as a 103Sandbox an AppImage (https://appimage.org/) application. If the sandbox is started
104regular user, default seccomp and capabilities filters are enabled. 104as a regular user, nonewprivs and a default capabilities filter are enabled.
105.br 105.br
106 106
107.br 107.br
@@ -275,7 +275,7 @@ Example:
275\fB\-\-chroot=dirname 275\fB\-\-chroot=dirname
276Chroot the sandbox into a root filesystem. Unlike the regular filesystem container, 276Chroot the sandbox into a root filesystem. Unlike the regular filesystem container,
277the system directories are mounted read-write. If the sandbox is started as a 277the system directories are mounted read-write. If the sandbox is started as a
278regular user, default seccomp and capabilities filters are enabled. 278regular user, nonewprivs and a default capabilities filter are enabled.
279.br 279.br
280 280
281.br 281.br
@@ -1287,7 +1287,7 @@ Similar to \-\-output, but stderr is also stored.
1287Mount a filesystem overlay on top of the current filesystem. Unlike the regular filesystem container, 1287Mount a filesystem overlay on top of the current filesystem. Unlike the regular filesystem container,
1288the system directories are mounted read-write. All filesystem modifications go into the overlay. 1288the system directories are mounted read-write. All filesystem modifications go into the overlay.
1289Directories /run, /tmp and /dev are not covered by the overlay. The overlay is stored in $HOME/.firejail/<PID> directory. 1289Directories /run, /tmp and /dev are not covered by the overlay. The overlay is stored in $HOME/.firejail/<PID> directory.
1290If the sandbox is started as a regular user, default seccomp and capabilities filters are enabled. 1290If the sandbox is started as a regular user, nonewprivs and a default capabilities filter are enabled.
1291.br 1291.br
1292 1292
1293.br 1293.br
@@ -1307,7 +1307,7 @@ Mount a filesystem overlay on top of the current filesystem. Unlike the regular
1307the system directories are mounted read-write. All filesystem modifications go into the overlay. 1307the system directories are mounted read-write. All filesystem modifications go into the overlay.
1308Directories /run, /tmp and /dev are not covered by the overlay. The overlay is stored in $HOME/.firejail/<NAME> directory. 1308Directories /run, /tmp and /dev are not covered by the overlay. The overlay is stored in $HOME/.firejail/<NAME> directory.
1309The created overlay can be reused between multiple sessions. 1309The created overlay can be reused between multiple sessions.
1310If the sandbox is started as a regular user, default seccomp and capabilities filters are enabled. 1310If the sandbox is started as a regular user, nonewprivs and a default capabilities filter are enabled.
1311.br 1311.br
1312 1312
1313.br 1313.br
@@ -1325,7 +1325,7 @@ $ firejail \-\-overlay-named=jail1 firefox
1325\fB\-\-overlay-tmpfs 1325\fB\-\-overlay-tmpfs
1326Mount a filesystem overlay on top of the current filesystem. All filesystem modifications 1326Mount a filesystem overlay on top of the current filesystem. All filesystem modifications
1327are discarded when the sandbox is closed. Directories /run, /tmp and /dev are not covered by the overlay. 1327are discarded when the sandbox is closed. Directories /run, /tmp and /dev are not covered by the overlay.
1328If the sandbox is started as a regular user, default seccomp and capabilities filters are enabled. 1328If the sandbox is started as a regular user, nonewprivs and a default capabilities filter are enabled.
1329.br 1329.br
1330 1330
1331.br 1331.br