From afe9fe993293a27dc345f6bca2a4b7ea964120b8 Mon Sep 17 00:00:00 2001 From: netblue30 Date: Tue, 19 Jul 2016 13:03:24 -0400 Subject: --read-write rework --- src/man/firejail.txt | 17 ++++++++++++----- 1 file changed, 12 insertions(+), 5 deletions(-) (limited to 'src/man') diff --git a/src/man/firejail.txt b/src/man/firejail.txt index f7079200e..fed573e6c 100644 --- a/src/man/firejail.txt +++ b/src/man/firejail.txt @@ -1183,17 +1183,24 @@ $ firejail \-\-read-only=~/.mozilla firefox A short note about mixing \-\-whitelist and \-\-read-only options. Whitelisted directories should be made read-only independently. Making a parent directory read-only, will not make the whitelist read-only. Example: +.br + .br $ firejail --whitelist=~/work --read-only=~ --read-only=~/work .TP \fB\-\-read-write=dirname_or_filename -By default, the sandbox mounts system directories read-only. -These directories are /etc, /var, /usr, /bin, /sbin, /lib, /lib32, /libx32 and /lib64. -Use this option to mount read-write files or directories inside the system directories. +Set directory or file read-write. Only files or directories belonging to the current user are allowed for +this operation. Example: +.br + +.br +$ mkdir ~/test +.br +$ touch ~/test/a +.br +$ firejail --read-only=~/test --read-write=~/test/a -This option is available only to root user. It has no effect when --chroot or --overlay are also set. In these -cases the system directories are mounted read-write. .TP \fB\-\-rlimit-fsize=number -- cgit v1.2.3-70-g09d2