Skip to content

Commit 022efd9

Browse files
committed
docs: clarify --noprofile and mention --profile=noprofile
Note that certain restrictions are applied even with `--noprofile` and that some of them can be lifted by using `--profile=noprofile`. Additionally, add a few cross-references for related commands.
1 parent 30ba35f commit 022efd9

File tree

1 file changed

+39
-1
lines changed

1 file changed

+39
-1
lines changed

src/man/firejail.1.in

+39-1
Original file line numberDiff line numberDiff line change
@@ -966,6 +966,7 @@ $ firejail \-\-ids-init
966966
.TP
967967
\fB\-\-ignore=command
968968
Ignore command in profile file.
969+
See also \fB\-\-profile\fR and \fB\-\-noprofile\fR.
969970
.br
970971

971972
.br
@@ -980,6 +981,7 @@ $ firejail \-\-ignore="net eth0" firefox
980981
.TP
981982
\fB\-\-include=file.profile
982983
Include a profile file before the regular profiles are used.
984+
See also \fB\-\-profile\fR.
983985
.br
984986

985987
.br
@@ -1891,7 +1893,30 @@ Do not use a security profile.
18911893
.br
18921894

18931895
.br
1894-
Example:
1896+
Note: This option is intended for profile debugging and development.
1897+
This disables practically all security restrictions when running a program.
1898+
.br
1899+
1900+
Note: While most restrictions are specified in profiles, some of them are done
1901+
in the source code.
1902+
That is, they are imposed by the firejail program itself.
1903+
If \fB\-\-noprofile\fR does not work, try also \fB\-\-profile=noprofile\fR,
1904+
which attempts to make the sandbox as unrestricted as possible by lifting some
1905+
of the source-code-based restrictions.
1906+
If that still does not work, then the program might be incompatible with
1907+
firejail, as some restrictions are enabled unconditionally (that is, there are
1908+
no commands to lift them).
1909+
See \fBnoprofile.profile\fR for the relevant commands and other details.
1910+
.br
1911+
1912+
.br
1913+
See also commands such as \fB--noblacklist\fR, \fB--nowhitelist\fR and
1914+
\fB--ignore\fR to ignore specific entries in a profile and \fB\-\-profile\fR to
1915+
use a specific security profile.
1916+
.br
1917+
1918+
.br
1919+
Examples:
18951920
.br
18961921
$ firejail
18971922
.br
@@ -1912,6 +1937,18 @@ Parent pid 8553, child pid 8554
19121937
Child process initialized
19131938
.br
19141939
[...]
1940+
.br
1941+
1942+
.br
1943+
$ firejail \-\-profile=noprofile
1944+
.br
1945+
Reading profile /etc/firejail/noprofile.profile
1946+
.br
1947+
Parent pid 8553, child pid 8554
1948+
.br
1949+
Child process initialized
1950+
.br
1951+
[...]
19151952
#ifdef HAVE_USERNS
19161953
.TP
19171954
\fB\-\-noroot
@@ -2404,6 +2441,7 @@ drwxrwxrwt 2 nobody nogroup 4096 Apr 30 10:52 .X11-unix
24042441
\fB\-\-profile=filename_or_profilename
24052442
Load a custom security profile from filename. For filename use an absolute path or a path relative to the current path.
24062443
For more information, see \fBSECURITY PROFILES\fR section below.
2444+
See also \fB\-\-include\fR \fB\-\-noprofile\fR.
24072445
.br
24082446

24092447
.br

0 commit comments

Comments
 (0)