firemon(1) — Linux manual page


FIREMON(1)                  firemon man page                  FIREMON(1)

NAME         top

       Firemon - Monitoring program for processes started in a Firejail

SYNOPSIS         top

       firemon [OPTIONS] [PID]

DESCRIPTION         top

       Firemon monitors programs started in a Firejail sandbox.  Without
       a PID specified, all processes started by Firejail are monitored.
       Descendants of these processes are also being monitored. On
       Grsecurity systems only root user can run this program.

OPTIONS         top

              Print AppArmor confinement status for each sandbox.

       --arp  Print ARP table for each sandbox.

       --caps Print capabilities configuration for each sandbox.

       --cpu  Print CPU affinity for each sandbox.

              Print debug messages

       -?, --help
              Print options end exit.

       --list List all sandboxes.

              Print information only about named sandbox.

              Monitor network statistics for sandboxes creating a new
              network namespace.

              Print route table for each sandbox.

              Print seccomp configuration for each sandbox.

       --top  Monitor the most CPU-intensive sandboxes. This command is
              similar to the regular UNIX top command, however it
              applies only to sandboxes.

       --tree Print a tree of all sandboxed processes.

              Print program version and exit.

       --wrap Enable line wrapping in terminals. By default the lines
              are trimmed.

       --x11  Print X11 display number.

       The format for each listed sandbox entry is as follows:

            PID:USER:Sandbox Name:Command

       Listed below are the available fields (columns) in various
       firemon commands in alphabetical order:

              Command used to start the sandbox.

       CPU%   CPU usage, the sandbox share of the elapsed CPU time since
              the last screen update

       PID    Unique process ID for the task controlling the sandbox.

       Prcs   Number of processes running in sandbox, including the
              controlling process.

       RES    Resident Memory Size (KiB), sandbox non-swapped physical
              memory.  It is a sum of the RES values for all processes
              running in the sandbox.

       Sandbox Name
              The name of the sandbox, if any.

       SHR    Shared Memory Size (KiB), it reflects memory shared with
              other processes. It is a sum of the SHR values for all
              processes running in the sandbox, including the
              controlling process.

       Uptime Sandbox running time in hours:minutes:seconds format.

       USER   The owner of the sandbox.

LICENSE         top

       This program is free software; you can redistribute it and/or
       modify it under the terms of the GNU General Public License as
       published by the Free Software Foundation; either version 2 of
       the License, or (at your option) any later version.


SEE ALSO         top

       firejail(1), firecfg(1), firejail-profile(5), firejail-login(5),
       firejail-users(5), jailcheck(1)

COLOPHON         top

       This page is part of the Firejail (Firejail security sandbox)
       project.  Information about the project can be found at 
       ⟨⟩.  If you have a bug report for
       this manual page, see ⟨⟩.
       This page was obtained from the project's upstream Git repository
       ⟨⟩ on 2023-12-22.  (At
       that time, the date of the most recent commit that was found in
       the repository was 2023-12-21.)  If you discover any rendering
       problems in this HTML version of the page, or you believe there
       is a better or more up-to-date source for the page, or you have
       corrections or improvements to the information in this COLOPHON
       (which is not part of the original manual page), send a mail to

0.9.73                          Jun 2023                      FIREMON(1)

Pages that refer to this page: firecfg(1)firejail(1)jailcheck(1)firejail-login(5)firejail-profile(5)firejail-users(5)