@@ -36,21 +36,21 @@ of the hardware sio2jail runs on.
36
36
37
37
* -s, --stderr*
38
38
Pass stderr from the sandboxed program,
39
- instead of redirecting it to stderr .
39
+ instead of redirecting it to /dev/null .
40
40
41
41
* -o* _ format_ , * --output* _ format_
42
42
Use the specified _ format_ for outputting the execution report.
43
43
44
- * --stimelimit* _ limit_ [ * u* |* ms* |* s* |* m* |* h* |* d* ] ++
45
- * --utimelimit* _ limit_ [ * u* |* ms* |* s* |* m* |* h* |* d* ] ++
44
+ * --stimelimit* _ limit_ [ * u* |* ms* |* s* |* m* |* h* |* d* ] ++
45
+ * --utimelimit* _ limit_ [ * u* |* ms* |* s* |* m* |* h* |* d* ] ++
46
46
* --ustimelimit* _ limit_ [ * u* |* ms* |* s* |* m* |* h* |* d* ] ++
47
- * --rtimelimit* _ limit_ [ * u* |* ms* |* s* |* m* |* h* |* d* ] ++
47
+ * --rtimelimit* _ limit_ [ * u* |* ms* |* s* |* m* |* h* |* d* ]
48
48
Set system (* stimelimit* ), user (* utimelimit* ),
49
49
user+system (* ustimelimit* ) or real (* rtimelimit* )
50
50
time limit to _ limit_ .
51
51
52
52
Use *u*/*ms*/*s*/*m*/*h*/*d* (case-insensitive) unit suffices
53
- to specify time in microseconds, miliseconds , seconds, minutes,
53
+ to specify time in microseconds, milliseconds , seconds, minutes,
54
54
hours and days respectively.
55
55
Defaults to microseconds if unit is not specified.
56
56
@@ -59,8 +59,8 @@ of the hardware sio2jail runs on.
59
59
* --output-limit* _ limit_ [ * b* |* k* |* m* |* g* ]
60
60
Set the output file size limit to _ limit_ .
61
61
62
- Use with *k*/*m*/*g* (case-insensitive) unit suffices
63
- for 1, 1024, 1024**2, 1024**3 bytes respectively. Default is kibibytes.
62
+ Use with *b*/* k*/*m*/*g* (case-insensitive) unit suffices
63
+ for 1024\*\*{0,1,2,3} bytes respectively. Default is kibibytes.
64
64
65
65
This is currently implemented as an rlimit of maximum created file
66
66
size (See: *RLIMIT\_FSIZE* in *getrlimit*(2)), which means:
@@ -85,7 +85,7 @@ of the hardware sio2jail runs on.
85
85
* --instruction-count-limit* _ limit_ [ * k* |* m* |* g* ]
86
86
Set instruction count limit. Requires * --perf* .
87
87
88
- Use with *k*/*m*/*g* sufixes for 10* *{3,6,9} respectively.
88
+ Use with *k*/*m*/*g* suffixes for 10\*\ *{3,6,9} respectively.
89
89
90
90
Use 0 for no limit (the default).
91
91
@@ -110,7 +110,7 @@ of the hardware sio2jail runs on.
110
110
To select syscall policy use *--policy*.
111
111
112
112
* -p* _ policy_ , * --policy* _ policy_
113
- Select * seccomp* (2) syscall policy. Requires seccomp.
113
+ Select * seccomp* (2) syscall policy. Requires * -- seccomp* .
114
114
115
115
_policy_ must be one of available syscall policies:
116
116
@@ -123,17 +123,17 @@ of the hardware sio2jail runs on.
123
123
124
124
Ptrace is used for two purposes:
125
125
126
- - restoring normal singal behaviour when pid- namespaces are in use
126
+ - restoring normal signal behaviour when PID namespaces are in use
127
127
128
128
- providing seccomp policy more flexibility by using the *TRACE*
129
129
seccomp action and making the decision whether to allow
130
130
the syscall in userspace
131
131
132
132
* -m* _ limit_ , * --memory-limit* _ limit_
133
- Set memory limit to _ limit_ . Requires seccomp.
133
+ Set memory limit to _ limit_ . Requires * -- seccomp* .
134
134
135
- Use with *k*/*m*/*g* (case-insensitive) unit suffices
136
- for 1, 1024, 1024**2, 1024**3 bytes respectively. Default is kibibytes.
135
+ Use with *b*/* k*/*m*/*g* (case-insensitive) unit suffices
136
+ for 1024\*\*{0,1,2,3} bytes respectively. Default is kibibytes.
137
137
138
138
Use 0 for no limit.
139
139
@@ -159,9 +159,9 @@ of the hardware sio2jail runs on.
159
159
a separate view of the filesystem (kinda like chroot).
160
160
161
161
This prevents the sandboxed program from seeing or manipulating
162
- files which were not explicitely made accessible to it,
162
+ files which were not explicitly made accessible to it,
163
163
and allows for use of runtime environments different than
164
- those installed systemwite (eg. different compiler version).
164
+ those installed systemwide (eg. a different compiler version).
165
165
166
166
* -b* _ path-outside_ :_ path-inside_ [ :_ flags_ ]
167
167
* --bind* _ path-outside_ :_ path-inside_ [ :_ flags_ ]
@@ -171,19 +171,14 @@ of the hardware sio2jail runs on.
171
171
This option can be passed multiple times to define multiple
172
172
bind-mounts.
173
173
174
- _path-inside_ must be a valid mountpoint.
175
-
176
- This means that it must be either an empty directory,
177
- if _path-outside_ is a directory
174
+ _path-inside_ must be a valid mountpoint. This means that it must be
175
+ either an empty directory, if _path-outside_ is a directory
178
176
or a regular file, if _path-outside_ is a regular file.
179
177
180
- _flags_, if specified, must be of form (*ro*|*rw*)[*,dev*]
181
-
182
- *ro* - mount read-only (the default)
183
-
184
- *rw* - mount read-write
185
-
186
- *dev* - allow the mounted file to behave as a device node
178
+ _flags_, if specified, must be of form (*ro*|*rw*)[*,dev*], where:
179
+ - *ro* - mount read-only (the default)
180
+ - *rw* - mount read-write
181
+ - *dev* - allow the mounted file to behave as a device node
187
182
188
183
By default, unless *-B* is specified, the file to be executed
189
184
is mounted read-only at /exe, as if the following was passed:
@@ -226,7 +221,7 @@ of the hardware sio2jail runs on.
226
221
* --uts-namespace* * on* |* off*
227
222
Enable or disable use of UTS namespaces to eliminate the impact of
228
223
hostname and other UTS metadata on the sandboxed program.
229
- Requiers * --user-namespace* . Enabled by default.
224
+ Requires * --user-namespace* . Enabled by default.
230
225
231
226
When enabled, this option sets the hostname and domainname
232
227
inside the sandbox to "sio2jail".
@@ -244,7 +239,7 @@ of the hardware sio2jail runs on.
244
239
network isolated from anything outside the sandbox.
245
240
246
241
* --ipc-namespace* * on* |* off*
247
- Enable or disable the ose of IPC namespaces.
242
+ Enable or disable the use of IPC namespaces.
248
243
Requires * --user-namespace* . Enabled by default.
249
244
250
245
This confines the sandboxed program to a view of IPC
0 commit comments