aboutsummaryrefslogtreecommitdiffstats
path: root/src/firejail/firejail.h
diff options
context:
space:
mode:
authorLibravatar smitsohu <smitsohu@gmail.com>2019-09-29 17:58:27 +0200
committerLibravatar smitsohu <smitsohu@gmail.com>2019-09-29 17:58:27 +0200
commit94aba62229f083173cb28ffe370eaa9f3ee540b9 (patch)
treeb1a70e5ff502df77bf0ddc45e82f11547677f09a /src/firejail/firejail.h
parentmove chroot from path based to file descriptor based mounts (diff)
downloadfirejail-94aba62229f083173cb28ffe370eaa9f3ee540b9.tar.gz
firejail-94aba62229f083173cb28ffe370eaa9f3ee540b9.tar.zst
firejail-94aba62229f083173cb28ffe370eaa9f3ee540b9.zip
chroot module
Diffstat (limited to 'src/firejail/firejail.h')
-rw-r--r--src/firejail/firejail.h10
1 files changed, 7 insertions, 3 deletions
diff --git a/src/firejail/firejail.h b/src/firejail/firejail.h
index a6377261f..80cf71caf 100644
--- a/src/firejail/firejail.h
+++ b/src/firejail/firejail.h
@@ -386,18 +386,22 @@ void fs_remount(const char *dir, OPERATION op, unsigned check_mnt);
386void fs_remount_rec(const char *dir, OPERATION op, unsigned check_mnt); 386void fs_remount_rec(const char *dir, OPERATION op, unsigned check_mnt);
387// mount /proc and /sys directories 387// mount /proc and /sys directories
388void fs_proc_sys_dev_boot(void); 388void fs_proc_sys_dev_boot(void);
389// blacklist firejail configuration and runtime directories
390void disable_config(void);
389// build a basic read-only filesystem 391// build a basic read-only filesystem
390void fs_basic_fs(void); 392void fs_basic_fs(void);
391// mount overlayfs on top of / directory 393// mount overlayfs on top of / directory
392char *fs_check_overlay_dir(const char *subdirname, int allow_reuse); 394char *fs_check_overlay_dir(const char *subdirname, int allow_reuse);
393void fs_overlayfs(void); 395void fs_overlayfs(void);
394// chroot into an existing directory; mount exiting /dev and update /etc/resolv.conf
395void fs_chroot(const char *rootdir);
396void fs_check_chroot_dir(const char *rootdir);
397void fs_private_tmp(void); 396void fs_private_tmp(void);
398void fs_private_cache(void); 397void fs_private_cache(void);
399void fs_mnt(const int enforce); 398void fs_mnt(const int enforce);
400 399
400// chroot.c
401// chroot into an existing directory; mount existing /dev and update /etc/resolv.conf
402void fs_check_chroot_dir(const char *rootdir);
403void fs_chroot(const char *rootdir);
404
401// profile.c 405// profile.c
402// find and read the profile specified by name from dir directory 406// find and read the profile specified by name from dir directory
403int profile_find_firejail(const char *name, int add_ext); 407int profile_find_firejail(const char *name, int add_ext);