Путеводитель по Руководству Linux

  User  |  Syst  |  Libr  |  Device  |  Files  |  Other  |  Admin  |  Head  |



   firejail    ( 1 )

программа-песочница для пространств имен Linux (Linux namespaces sandbox program)

Использование (Usage)

Without any options, the sandbox consists of a filesystem build
       in a new mount namespace, and new PID and UTS namespaces. IPC,
       network and user namespaces can be added using the command line
       options. The default Firejail filesystem is based on the host
       filesystem with the main system directories mounted read-only.
       These directories are /etc, /var, /usr, /bin, /sbin, /lib,
       /lib32, /libx32 and /lib64. Only /home and /tmp are writable.

Upon execution Firejail first looks in ~/.config/firejail/ for a profile and if it doesn't find one, it looks in /etc/firejail/. For profile resolution detail see https://github.com/netblue30/firejail/wiki/Creating-Profiles#locations-and-types. If an appropriate profile is not found, Firejail will use a default profile. The default profile is quite restrictive. In case the application doesn't work, use --noprofile option to disable it. For more information, please see SECURITY PROFILES section below.

If a program argument is not specified, Firejail starts the user's preferred shell. Examples:

$ firejail [OPTIONS] # starting the program specified in $SHELL, usually /bin/bash

$ firejail [OPTIONS] firefox # starting Mozilla Firefox

# sudo firejail [OPTIONS] /etc/init.d/nginx start