aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLibravatar smitsohu <smitsohu@gmail.com>2018-04-20 20:32:43 +0200
committerLibravatar smitsohu <smitsohu@gmail.com>2018-04-20 20:41:13 +0200
commit5395e525f68f2fcf78e933f731b1da0009f64149 (patch)
treed482748f7b8eaf3d41db03ea435dee2a52c8d98b
parentmerges (diff)
downloadfirejail-5395e525f68f2fcf78e933f731b1da0009f64149.tar.gz
firejail-5395e525f68f2fcf78e933f731b1da0009f64149.tar.zst
firejail-5395e525f68f2fcf78e933f731b1da0009f64149.zip
docs and comment updates
adds sorting to syscall list in firejail man page
-rw-r--r--etc/firejail-default10
-rw-r--r--etc/skypeforlinux.profile2
-rw-r--r--src/firejail/x11.c2
-rw-r--r--src/man/firejail-profile.txt9
-rw-r--r--src/man/firejail.txt26
5 files changed, 26 insertions, 23 deletions
diff --git a/etc/firejail-default b/etc/firejail-default
index 2e48439f5..5cfb1b5ea 100644
--- a/etc/firejail-default
+++ b/etc/firejail-default
@@ -21,10 +21,10 @@ profile firejail-default flags=(attach_disconnected,mediate_deleted) {
21#dbus, 21#dbus,
22 22
23########## 23##########
24# Allows to attach to a running program and modify the process memory. 24# With ptrace it is possible to inspect and hijack running programs. Usually this
25# May be needed by chromium crash handler. Uncomment if you need it. 25# is needed only for debugging. To allow ptrace, uncomment the following line
26########## 26##########
27#ptrace (trace tracedby), 27#ptrace,
28 28
29########## 29##########
30# Line starting with /run/firejail/mnt/oroot deal with --overlay sandboxes 30# Line starting with /run/firejail/mnt/oroot deal with --overlay sandboxes
@@ -133,8 +133,8 @@ network raw,
133signal, 133signal,
134 134
135########## 135##########
136# We let Firejail deal with capabilities, 136# We let Firejail deal with capabilities, but ensure that
137# but mac_admin should be dropped in any case. 137# some AppArmor related capabilities will not be available.
138########## 138##########
139capability chown, 139capability chown,
140capability dac_override, 140capability dac_override,
diff --git a/etc/skypeforlinux.profile b/etc/skypeforlinux.profile
index 015709247..c2270ce39 100644
--- a/etc/skypeforlinux.profile
+++ b/etc/skypeforlinux.profile
@@ -25,7 +25,7 @@ seccomp
25shell none 25shell none
26 26
27disable-mnt 27disable-mnt
28#private-dev 28# private-dev - needs /dev/disk
29private-tmp 29private-tmp
30 30
31noexec ${HOME} 31noexec ${HOME}
diff --git a/src/firejail/x11.c b/src/firejail/x11.c
index 7040dea18..8cf4fccf3 100644
--- a/src/firejail/x11.c
+++ b/src/firejail/x11.c
@@ -1078,7 +1078,7 @@ void x11_xorg(void) {
1078 // check xauth utility is present in the system 1078 // check xauth utility is present in the system
1079 struct stat s; 1079 struct stat s;
1080 if (stat("/usr/bin/xauth", &s) == -1) { 1080 if (stat("/usr/bin/xauth", &s) == -1) {
1081 fprintf(stderr, "Error: xauth utility not found in PATH. Please install it:\n" 1081 fprintf(stderr, "Error: xauth utility not found in /usr/bin. Please install it:\n"
1082 " Debian/Ubuntu/Mint: sudo apt-get install xauth\n"); 1082 " Debian/Ubuntu/Mint: sudo apt-get install xauth\n");
1083 exit(1); 1083 exit(1);
1084 } 1084 }
diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt
index b529f63e3..0217e1353 100644
--- a/src/man/firejail-profile.txt
+++ b/src/man/firejail-profile.txt
@@ -223,7 +223,8 @@ Build a new /bin in a temporary filesystem, and copy the programs in the list.
223The same directory is also bind-mounted over /sbin, /usr/bin and /usr/sbin. 223The same directory is also bind-mounted over /sbin, /usr/bin and /usr/sbin.
224.TP 224.TP
225\fBprivate-dev 225\fBprivate-dev
226Create a new /dev directory. Only dri, null, full, zero, tty, pts, ptmx, random, urandom, log and shm devices are available. 226Create a new /dev directory. Only disc, dri, null, full, zero, tty, pts, ptmx,
227random, snd, urandom, video, log and shm devices are available.
227.TP 228.TP
228\fBprivate-etc file,directory 229\fBprivate-etc file,directory
229Build a new /etc in a temporary 230Build a new /etc in a temporary
@@ -448,6 +449,12 @@ Run the program directly, without a shell.
448\fBipc-namespace 449\fBipc-namespace
449Enable IPC namespace. 450Enable IPC namespace.
450.TP 451.TP
452\fBnodbus
453Disable D-Bus access. Only the regular UNIX socket is handled by
454this command. To disable the abstract socket, you would need to
455request a new network namespace using the net command. Another
456option is to remove unix from protocol set.
457.TP
451\fBnosound 458\fBnosound
452Disable sound system. 459Disable sound system.
453.TP 460.TP
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index 2e410061d..d8fed1f31 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -1602,20 +1602,16 @@ $ firejail \-\-net=eth0 \-\-scan
1602.TP 1602.TP
1603\fB\-\-seccomp 1603\fB\-\-seccomp
1604Enable seccomp filter and blacklist the syscalls in the default list (@default). The default list is as follows: 1604Enable seccomp filter and blacklist the syscalls in the default list (@default). The default list is as follows:
1605mount, umount2, ptrace, kexec_load, kexec_file_load, name_to_handle_at, open_by_handle_at, create_module, init_module, finit_module, delete_module, 1605_sysctl, acct, add_key, adjtimex, afs_syscall, bdflush, bpf, break, chroot, clock_adjtime, clock_settime,
1606iopl, ioperm, ioprio_set, swapon, swapoff, syslog, process_vm_readv, process_vm_writev, 1606create_module, delete_module, fanotify_init, finit_module, ftime, get_kernel_syms, getpmsg, gtty, init_module,
1607sysfs,_sysctl, adjtimex, clock_adjtime, lookup_dcookie, perf_event_open, fanotify_init, kcmp, 1607io_cancel, io_destroy, io_getevents, io_setup, io_submit, ioperm, iopl, ioprio_set, kcmp, kexec_file_load,
1608add_key, request_key, keyctl, uselib, acct, modify_ldt, pivot_root, io_setup, 1608kexec_load, keyctl, lock, lookup_dcookie, mbind, mfsservctl, migrate_pages, modify_ldt, mount, move_pages, mpx,
1609io_destroy, io_getevents, io_submit, io_cancel, 1609name_to_handle_at, open_by_handle_at, pciconfig_iobase, pciconfig_read, pciconfig_write, perf_event_open,
1610remap_file_pages, mbind, set_mempolicy, 1610personality, pivot_root, process_vm_readv, process_vm_writev, process_vm_writev, prof, profil, ptrace, putpmsg,
1611migrate_pages, move_pages, vmsplice, chroot, 1611query_module, reboot, remap_file_pages, request_key, rtas, s390_mmio_read, s390_mmio_write, s390_runtime_instr,
1612tuxcall, reboot, mfsservctl, get_kernel_syms, 1612security, set_mempolicy, setdomainname, sethostname, settimeofday, sgetmask, ssetmask, stime, stty, subpage_prot,
1613bpf, clock_settime, personality, process_vm_writev, query_module, 1613swapoff, swapon, switch_endian, sysfs, syslog, tuxcall, ulimit, umount, umount2, uselib, userfaultfd, ustat, vhangup,
1614settimeofday, stime, umount, userfaultfd, ustat, vm86, vm86old, 1614vm86, vm86old, vmsplice and vserver.
1615afs_syscall, bdflush, break, ftime, getpmsg, gtty, lock, mpx, pciconfig_iobase, pciconfig_read,
1616pciconfig_write, prof, profil, putpmsg, rtas, s390_runtime_instr, s390_mmio_read, s390_mmio_write,
1617security, setdomainname, sethostname, sgetmask, ssetmask, stty, subpage_prot, switch_endian,
1618ulimit, vhangup and vserver.
1619 1615
1620.br 1616.br
1621To help creating useful seccomp filters more easily, the following 1617To help creating useful seccomp filters more easily, the following
@@ -1698,7 +1694,7 @@ Bad system call
1698.br 1694.br
1699 1695
1700.TP 1696.TP
1701\fB\-\-seccomp.block_secondary 1697\fB\-\-seccomp.block-secondary
1702Enable seccomp filter and filter system call architectures so that 1698Enable seccomp filter and filter system call architectures so that
1703only the native architecture is allowed. For example, on amd64, i386 1699only the native architecture is allowed. For example, on amd64, i386
1704and x32 system calls are blocked as well as changing the execution 1700and x32 system calls are blocked as well as changing the execution