diff options
author | 2019-09-29 17:58:27 +0200 | |
---|---|---|
committer | 2019-09-29 17:58:27 +0200 | |
commit | 94aba62229f083173cb28ffe370eaa9f3ee540b9 (patch) | |
tree | b1a70e5ff502df77bf0ddc45e82f11547677f09a /src/firejail/firejail.h | |
parent | move chroot from path based to file descriptor based mounts (diff) | |
download | firejail-94aba62229f083173cb28ffe370eaa9f3ee540b9.tar.gz firejail-94aba62229f083173cb28ffe370eaa9f3ee540b9.tar.zst firejail-94aba62229f083173cb28ffe370eaa9f3ee540b9.zip |
chroot module
Diffstat (limited to 'src/firejail/firejail.h')
-rw-r--r-- | src/firejail/firejail.h | 10 |
1 files changed, 7 insertions, 3 deletions
diff --git a/src/firejail/firejail.h b/src/firejail/firejail.h index a6377261f..80cf71caf 100644 --- a/src/firejail/firejail.h +++ b/src/firejail/firejail.h | |||
@@ -386,18 +386,22 @@ void fs_remount(const char *dir, OPERATION op, unsigned check_mnt); | |||
386 | void fs_remount_rec(const char *dir, OPERATION op, unsigned check_mnt); | 386 | void fs_remount_rec(const char *dir, OPERATION op, unsigned check_mnt); |
387 | // mount /proc and /sys directories | 387 | // mount /proc and /sys directories |
388 | void fs_proc_sys_dev_boot(void); | 388 | void fs_proc_sys_dev_boot(void); |
389 | // blacklist firejail configuration and runtime directories | ||
390 | void disable_config(void); | ||
389 | // build a basic read-only filesystem | 391 | // build a basic read-only filesystem |
390 | void fs_basic_fs(void); | 392 | void fs_basic_fs(void); |
391 | // mount overlayfs on top of / directory | 393 | // mount overlayfs on top of / directory |
392 | char *fs_check_overlay_dir(const char *subdirname, int allow_reuse); | 394 | char *fs_check_overlay_dir(const char *subdirname, int allow_reuse); |
393 | void fs_overlayfs(void); | 395 | void fs_overlayfs(void); |
394 | // chroot into an existing directory; mount exiting /dev and update /etc/resolv.conf | ||
395 | void fs_chroot(const char *rootdir); | ||
396 | void fs_check_chroot_dir(const char *rootdir); | ||
397 | void fs_private_tmp(void); | 396 | void fs_private_tmp(void); |
398 | void fs_private_cache(void); | 397 | void fs_private_cache(void); |
399 | void fs_mnt(const int enforce); | 398 | void fs_mnt(const int enforce); |
400 | 399 | ||
400 | // chroot.c | ||
401 | // chroot into an existing directory; mount existing /dev and update /etc/resolv.conf | ||
402 | void fs_check_chroot_dir(const char *rootdir); | ||
403 | void fs_chroot(const char *rootdir); | ||
404 | |||
401 | // profile.c | 405 | // profile.c |
402 | // find and read the profile specified by name from dir directory | 406 | // find and read the profile specified by name from dir directory |
403 | int profile_find_firejail(const char *name, int add_ext); | 407 | int profile_find_firejail(const char *name, int add_ext); |