diff options
author | 2020-02-27 19:55:52 +0100 | |
---|---|---|
committer | 2020-04-06 21:26:41 +0200 | |
commit | 0afb43a5607574fa946fdfd65f3a4cfa25cfa018 (patch) | |
tree | a09eb41b57cbecfccf6e284817d0043f0bbe0ab4 /src/firejail/firejail.h | |
parent | Add sbox_exec_v and SBOX_KEEP_FDS (diff) | |
download | firejail-0afb43a5607574fa946fdfd65f3a4cfa25cfa018.tar.gz firejail-0afb43a5607574fa946fdfd65f3a4cfa25cfa018.tar.zst firejail-0afb43a5607574fa946fdfd65f3a4cfa25cfa018.zip |
Add xdg-dbus-proxy support
* The proxy is forked off outside the sandbox namespace to protect the
fds of the original buses from the sandboxed process.
* The /run/firejail/dbus directory (with the sticky bit set) holds the proxy
sockets. The sockets are <parent pid>-user and <parent pid>-system for the
user and system buses, respectively. Each socket is owned by the sandbox user.
* The sockets are bind-mounted over their expected locations and the
/run/firejail/dbus directory is subsequently hidden from the sandbox.
* Upon sandbox exit, the xdg-dbus-proxy instance is terminated and the sockets
are cleaned up.
* Filter rules will be added in a future commit.
Diffstat (limited to 'src/firejail/firejail.h')
-rw-r--r-- | src/firejail/firejail.h | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/src/firejail/firejail.h b/src/firejail/firejail.h index d35e0d155..36ffd89b6 100644 --- a/src/firejail/firejail.h +++ b/src/firejail/firejail.h | |||
@@ -846,6 +846,8 @@ void set_x11_run_file(pid_t pid, int display); | |||
846 | void set_profile_run_file(pid_t pid, const char *fname); | 846 | void set_profile_run_file(pid_t pid, const char *fname); |
847 | 847 | ||
848 | // dbus.c | 848 | // dbus.c |
849 | void dbus_proxy_start(void); | ||
850 | void dbus_proxy_stop(void); | ||
849 | void dbus_apply_policy(void); | 851 | void dbus_apply_policy(void); |
850 | 852 | ||
851 | // dhcp.c | 853 | // dhcp.c |