@@ -966,6 +966,7 @@ $ firejail \-\-ids-init
966
966
.TP
967
967
\fB \-\- ignore=command
968
968
Ignore command in profile file.
969
+ See also \fB \-\- profile \fR and \fB \-\- noprofile \fR .
969
970
.br
970
971
971
972
.br
@@ -980,6 +981,7 @@ $ firejail \-\-ignore="net eth0" firefox
980
981
.TP
981
982
\fB \-\- include=file.profile
982
983
Include a profile file before the regular profiles are used.
984
+ See also \fB \-\- profile \fR .
983
985
.br
984
986
985
987
.br
@@ -1891,7 +1893,30 @@ Do not use a security profile.
1891
1893
.br
1892
1894
1893
1895
.br
1894
- Example:
1896
+ Note: This option is intended for profile debugging and development.
1897
+ This disables practically all security restrictions when running a program.
1898
+ .br
1899
+
1900
+ Note: While most restrictions are specified in profiles, some of them are done
1901
+ in the source code.
1902
+ That is, they are imposed by the firejail program itself.
1903
+ If \fB \-\- noprofile \fR does not work, try also \fB \-\- profile=noprofile \fR ,
1904
+ which attempts to make the sandbox as unrestricted as possible by lifting some
1905
+ of the source-code-based restrictions.
1906
+ If that still does not work, then the program might be incompatible with
1907
+ firejail, as some restrictions are enabled unconditionally (that is, there are
1908
+ no commands to lift them).
1909
+ See \fB noprofile.profile \fR for the relevant commands and other details.
1910
+ .br
1911
+
1912
+ .br
1913
+ See also commands such as \fB --noblacklist \fR , \fB --nowhitelist \fR and
1914
+ \fB --ignore \fR to ignore specific entries in a profile and \fB \-\- profile \fR to
1915
+ use a specific security profile.
1916
+ .br
1917
+
1918
+ .br
1919
+ Examples:
1895
1920
.br
1896
1921
$ firejail
1897
1922
.br
@@ -1912,6 +1937,18 @@ Parent pid 8553, child pid 8554
1912
1937
Child process initialized
1913
1938
.br
1914
1939
[...]
1940
+ .br
1941
+
1942
+ .br
1943
+ $ firejail \-\- profile=noprofile
1944
+ .br
1945
+ Reading profile /etc/firejail/noprofile.profile
1946
+ .br
1947
+ Parent pid 8553, child pid 8554
1948
+ .br
1949
+ Child process initialized
1950
+ .br
1951
+ [...]
1915
1952
#ifdef HAVE_USERNS
1916
1953
.TP
1917
1954
\fB \-\- noroot
@@ -2404,6 +2441,7 @@ drwxrwxrwt 2 nobody nogroup 4096 Apr 30 10:52 .X11-unix
2404
2441
\fB \-\- profile=filename_or_profilename
2405
2442
Load a custom security profile from filename. For filename use an absolute path or a path relative to the current path.
2406
2443
For more information, see \fB SECURITY PROFILES \fR section below.
2444
+ See also \fB \-\- include \fR \fB \-\- noprofile \fR .
2407
2445
.br
2408
2446
2409
2447
.br
0 commit comments