From 0579100e2df9b9af899a7143ff1dd2511ca226c1 Mon Sep 17 00:00:00 2001 From: netblue30 Date: Mon, 3 Oct 2016 10:15:14 -0400 Subject: --x11=xorg --- src/man/firejail-profile.txt | 15 +++++++++------ 1 file changed, 9 insertions(+), 6 deletions(-) (limited to 'src/man/firejail-profile.txt') diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt index f4b2c22fa..d420fab7a 100644 --- a/src/man/firejail-profile.txt +++ b/src/man/firejail-profile.txt @@ -279,16 +279,19 @@ There is no root account (uid 0) defined in the namespace. \fBx11 Enable X11 sandboxing. .TP -\fBx11 xpra -Enable X11 sandboxing with xpra. -.TP -\fBx11 xephyr -Enable X11 sandboxing with xephyr. -.TP \fBx11 none Blacklist /tmp/.X11-unix directory, ${HOME}/.Xauthority and file specified in ${XAUTHORITY} environment variable. Remove DISPLAY and XAUTHORITY environment variables. Stop with error message if X11 abstract socket will be accessible in jail. +.TP +\fBx11 xephyr +Enable X11 sandboxing with xephyr. +.TP +\fBx11 xorg +Enable X11 sandboxing with X11 security extension. +.TP +\fBx11 xpra +Enable X11 sandboxing with xpra. .SH Resource limits, CPU affinity, Control Groups These profile entries define the limits on system resources (rlimits) for the processes inside the sandbox. -- cgit v1.2.3-70-g09d2