diff options
Diffstat (limited to 'src/man/firejail.txt')
-rw-r--r-- | src/man/firejail.txt | 15 |
1 files changed, 3 insertions, 12 deletions
diff --git a/src/man/firejail.txt b/src/man/firejail.txt index a18b53fea..c2c0bc297 100644 --- a/src/man/firejail.txt +++ b/src/man/firejail.txt | |||
@@ -289,15 +289,6 @@ $ firejail \-\-caps.print=3272 | |||
289 | \fB\-\-cat=name|pid filename | 289 | \fB\-\-cat=name|pid filename |
290 | Print content of file from sandbox container, see FILE TRANSFER section for more details. | 290 | Print content of file from sandbox container, see FILE TRANSFER section for more details. |
291 | #endif | 291 | #endif |
292 | .TP | ||
293 | \fB\-\-cgroup=file | ||
294 | Place the sandbox in the specified control group. file is the full path of a tasks or cgroup.procs file. | ||
295 | .br | ||
296 | |||
297 | .br | ||
298 | Example: | ||
299 | .br | ||
300 | # firejail \-\-cgroup=/sys/fs/cgroup/g1/tasks | ||
301 | #ifdef HAVE_CHROOT | 292 | #ifdef HAVE_CHROOT |
302 | .TP | 293 | .TP |
303 | \fB\-\-chroot=dirname | 294 | \fB\-\-chroot=dirname |
@@ -994,7 +985,7 @@ $ firejail \-\-ipc-namespace firefox | |||
994 | Join the sandbox identified by name or by PID. By default a /bin/bash shell is started after joining the sandbox. | 985 | Join the sandbox identified by name or by PID. By default a /bin/bash shell is started after joining the sandbox. |
995 | If a program is specified, the program is run in the sandbox. If \-\-join command is issued as a regular user, | 986 | If a program is specified, the program is run in the sandbox. If \-\-join command is issued as a regular user, |
996 | all security filters are configured for the new process the same they are configured in the sandbox. | 987 | all security filters are configured for the new process the same they are configured in the sandbox. |
997 | If \-\-join command is issued as root, the security filters, cgroups and cpus configurations are not applied | 988 | If \-\-join command is issued as root, the security filters and cpus configurations are not applied |
998 | to the process joining the sandbox. | 989 | to the process joining the sandbox. |
999 | .br | 990 | .br |
1000 | 991 | ||
@@ -1019,13 +1010,13 @@ $ firejail \-\-join=3272 | |||
1019 | \fB\-\-join-filesystem=name|pid | 1010 | \fB\-\-join-filesystem=name|pid |
1020 | Join the mount namespace of the sandbox identified by name or PID. By default a /bin/bash shell is started after joining the sandbox. | 1011 | Join the mount namespace of the sandbox identified by name or PID. By default a /bin/bash shell is started after joining the sandbox. |
1021 | If a program is specified, the program is run in the sandbox. This command is available only to root user. | 1012 | If a program is specified, the program is run in the sandbox. This command is available only to root user. |
1022 | Security filters, cgroups and cpus configurations are not applied to the process joining the sandbox. | 1013 | Security filters and cpus configurations are not applied to the process joining the sandbox. |
1023 | #ifdef HAVE_NETWORK | 1014 | #ifdef HAVE_NETWORK |
1024 | .TP | 1015 | .TP |
1025 | \fB\-\-join-network=name|pid | 1016 | \fB\-\-join-network=name|pid |
1026 | Join the network namespace of the sandbox identified by name. By default a /bin/bash shell is started after joining the sandbox. | 1017 | Join the network namespace of the sandbox identified by name. By default a /bin/bash shell is started after joining the sandbox. |
1027 | If a program is specified, the program is run in the sandbox. This command is available only to root user. | 1018 | If a program is specified, the program is run in the sandbox. This command is available only to root user. |
1028 | Security filters, cgroups and cpus configurations are not applied to the process joining the sandbox. Example: | 1019 | Security filters and cpus configurations are not applied to the process joining the sandbox. Example: |
1029 | .br | 1020 | .br |
1030 | 1021 | ||
1031 | .br | 1022 | .br |