aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--.github/workflows/build-extra.yml70
-rw-r--r--.github/workflows/build.yml28
-rw-r--r--.github/workflows/codeql-analysis.yml39
-rw-r--r--.github/workflows/profile-checks.yml23
-rw-r--r--CONTRIBUTING.md1
-rw-r--r--Makefile9
-rw-r--r--README3
-rw-r--r--README.md51
-rw-r--r--RELNOTES34
-rw-r--r--config.mk.in7
-rwxr-xr-xconfigure66
-rw-r--r--configure.ac79
-rw-r--r--contrib/gtksourceview-5/language-specs/firejail-profile.lang69
-rwxr-xr-xcontrib/sort.py91
-rw-r--r--etc/apparmor/firejail-local6
-rw-r--r--etc/inc/disable-common.inc3
-rw-r--r--etc/inc/disable-proc.inc2
-rw-r--r--etc/inc/disable-programs.inc14
-rw-r--r--etc/inc/whitelist-run-common.inc1
-rw-r--r--etc/inc/whitelist-usr-share-common.inc1
-rw-r--r--etc/profile-a-l/0ad.profile2
-rw-r--r--etc/profile-a-l/2048-qt.profile2
-rw-r--r--etc/profile-a-l/Cryptocat.profile2
-rw-r--r--etc/profile-a-l/Fritzing.profile1
-rw-r--r--etc/profile-a-l/JDownloader.profile2
-rw-r--r--etc/profile-a-l/abiword.profile2
-rw-r--r--etc/profile-a-l/agetpkg.profile1
-rw-r--r--etc/profile-a-l/akonadi_control.profile1
-rw-r--r--etc/profile-a-l/akregator.profile1
-rw-r--r--etc/profile-a-l/alacarte.profile1
-rw-r--r--etc/profile-a-l/alienarena.profile2
-rw-r--r--etc/profile-a-l/alpine.profile1
-rw-r--r--etc/profile-a-l/amarok.profile2
-rw-r--r--etc/profile-a-l/amule.profile1
-rw-r--r--etc/profile-a-l/android-studio.profile1
-rw-r--r--etc/profile-a-l/anki.profile2
-rw-r--r--etc/profile-a-l/anydesk.profile2
-rw-r--r--etc/profile-a-l/aosp.profile2
-rw-r--r--etc/profile-a-l/apktool.profile2
-rw-r--r--etc/profile-a-l/apostrophe.profile2
-rw-r--r--etc/profile-a-l/arch-audit.profile1
-rw-r--r--etc/profile-a-l/archaudit-report.profile1
-rw-r--r--etc/profile-a-l/archiver-common.profile1
-rw-r--r--etc/profile-a-l/ardour5.profile2
-rw-r--r--etc/profile-a-l/arduino.profile1
-rw-r--r--etc/profile-a-l/aria2c.profile1
-rw-r--r--etc/profile-a-l/ark.profile2
-rw-r--r--etc/profile-a-l/arm.profile1
-rw-r--r--etc/profile-a-l/artha.profile1
-rw-r--r--etc/profile-a-l/assogiate.profile1
-rw-r--r--etc/profile-a-l/asunder.profile1
-rw-r--r--etc/profile-a-l/atril.profile1
-rw-r--r--etc/profile-a-l/audacious.profile2
-rw-r--r--etc/profile-a-l/audacity.profile13
-rw-r--r--etc/profile-a-l/audio-recorder.profile1
-rw-r--r--etc/profile-a-l/authenticator-rs.profile2
-rw-r--r--etc/profile-a-l/authenticator.profile1
-rw-r--r--etc/profile-a-l/autokey-common.profile1
-rw-r--r--etc/profile-a-l/avidemux.profile6
-rw-r--r--etc/profile-a-l/avidemux3_cli.profile11
-rw-r--r--etc/profile-a-l/avidemux3_jobs_qt5.profile18
-rw-r--r--etc/profile-a-l/avidemux3_qt5.profile15
-rw-r--r--etc/profile-a-l/aweather.profile2
-rw-r--r--etc/profile-a-l/awesome.profile3
-rw-r--r--etc/profile-a-l/ballbuster.profile2
-rw-r--r--etc/profile-a-l/baloo_file.profile2
-rw-r--r--etc/profile-a-l/balsa.profile1
-rw-r--r--etc/profile-a-l/baobab.profile1
-rw-r--r--etc/profile-a-l/barrier.profile1
-rw-r--r--etc/profile-a-l/basilisk.profile3
-rw-r--r--etc/profile-a-l/bcompare.profile2
-rw-r--r--etc/profile-a-l/bibletime.profile2
-rw-r--r--etc/profile-a-l/bijiben.profile1
-rw-r--r--etc/profile-a-l/bitcoin-qt.profile1
-rw-r--r--etc/profile-a-l/bitlbee.profile1
-rw-r--r--etc/profile-a-l/blackbox.profile3
-rw-r--r--etc/profile-a-l/bleachbit.profile1
-rw-r--r--etc/profile-a-l/blender.profile2
-rw-r--r--etc/profile-a-l/bless.profile2
-rw-r--r--etc/profile-a-l/blobby.profile1
-rw-r--r--etc/profile-a-l/blobwars.profile2
-rw-r--r--etc/profile-a-l/bluefish.profile2
-rw-r--r--etc/profile-a-l/brackets.profile2
-rw-r--r--etc/profile-a-l/brasero.profile2
-rw-r--r--etc/profile-a-l/brave.profile2
-rw-r--r--etc/profile-a-l/build-systems-common.profile2
-rw-r--r--etc/profile-a-l/bzflag.profile2
-rw-r--r--etc/profile-a-l/calibre.profile2
-rw-r--r--etc/profile-a-l/calligra.profile1
-rw-r--r--etc/profile-a-l/cameramonitor.profile1
-rw-r--r--etc/profile-a-l/cantata.profile4
-rw-r--r--etc/profile-a-l/catfish.profile2
-rw-r--r--etc/profile-a-l/cawbird.profile2
-rw-r--r--etc/profile-a-l/celluloid.profile1
-rw-r--r--etc/profile-a-l/chafa.profile1
-rw-r--r--etc/profile-a-l/chatterino.profile92
-rw-r--r--etc/profile-a-l/checkbashisms.profile1
-rw-r--r--etc/profile-a-l/cheese.profile2
-rw-r--r--etc/profile-a-l/cherrytree.profile1
-rw-r--r--etc/profile-a-l/chromium-common-hardened.inc.profile2
-rw-r--r--etc/profile-a-l/cin.profile2
-rw-r--r--etc/profile-a-l/cinelerra-gg.profile (renamed from etc/profile-a-l/cinelerra-gg)0
-rw-r--r--etc/profile-a-l/clamav.profile1
-rw-r--r--etc/profile-a-l/clamtk.profile2
-rw-r--r--etc/profile-a-l/clawsker.profile1
-rw-r--r--etc/profile-a-l/clementine.profile2
-rw-r--r--etc/profile-a-l/clion.profile1
-rw-r--r--etc/profile-a-l/clipgrab.profile2
-rw-r--r--etc/profile-a-l/clipit.profile14
-rw-r--r--etc/profile-a-l/cmus.profile2
-rw-r--r--etc/profile-a-l/cointop.profile1
-rw-r--r--etc/profile-a-l/colorful.profile2
-rw-r--r--etc/profile-a-l/com.github.bleakgrey.tootle.profile2
-rw-r--r--etc/profile-a-l/com.github.dahenson.agenda.profile1
-rw-r--r--etc/profile-a-l/com.github.johnfactotum.Foliate.profile1
-rw-r--r--etc/profile-a-l/com.github.phase1geo.minder.profile2
-rw-r--r--etc/profile-a-l/com.github.tchx84.Flatseal.profile1
-rw-r--r--etc/profile-a-l/conkeror.profile2
-rw-r--r--etc/profile-a-l/conky.profile1
-rw-r--r--etc/profile-a-l/corebird.profile1
-rw-r--r--etc/profile-a-l/cower.profile1
-rw-r--r--etc/profile-a-l/coyim.profile1
-rw-r--r--etc/profile-a-l/crawl.profile2
-rw-r--r--etc/profile-a-l/crow.profile1
-rw-r--r--etc/profile-a-l/curl.profile2
-rw-r--r--etc/profile-a-l/d-feet.profile1
-rw-r--r--etc/profile-a-l/darktable.profile1
-rw-r--r--etc/profile-a-l/dbus-send.profile1
-rw-r--r--etc/profile-a-l/dconf-editor.profile2
-rw-r--r--etc/profile-a-l/dconf.profile1
-rw-r--r--etc/profile-a-l/ddgtk.profile1
-rw-r--r--etc/profile-a-l/deadbeef.profile1
-rw-r--r--etc/profile-a-l/default.profile2
-rw-r--r--etc/profile-a-l/deluge.profile2
-rw-r--r--etc/profile-a-l/desktopeditors.profile2
-rw-r--r--etc/profile-a-l/devhelp.profile1
-rw-r--r--etc/profile-a-l/devilspie.profile1
-rw-r--r--etc/profile-a-l/dex2jar.profile2
-rw-r--r--etc/profile-a-l/dia.profile2
-rw-r--r--etc/profile-a-l/dig.profile1
-rw-r--r--etc/profile-a-l/digikam.profile2
-rw-r--r--etc/profile-a-l/dillo.profile1
-rw-r--r--etc/profile-a-l/dino.profile2
-rw-r--r--etc/profile-a-l/display.profile2
-rw-r--r--etc/profile-a-l/dnscrypt-proxy.profile1
-rw-r--r--etc/profile-a-l/dnsmasq.profile2
-rw-r--r--etc/profile-a-l/dolphin-emu.profile2
-rw-r--r--etc/profile-a-l/dooble.profile1
-rw-r--r--etc/profile-a-l/dosbox.profile2
-rw-r--r--etc/profile-a-l/dragon.profile1
-rw-r--r--etc/profile-a-l/drawio.profile1
-rw-r--r--etc/profile-a-l/drill.profile1
-rw-r--r--etc/profile-a-l/dropbox.profile1
-rw-r--r--etc/profile-a-l/easystroke.profile1
-rw-r--r--etc/profile-a-l/electrum.profile2
-rw-r--r--etc/profile-a-l/emacs.profile1
-rw-r--r--etc/profile-a-l/email-common.profile3
-rw-r--r--etc/profile-a-l/empathy.profile2
-rw-r--r--etc/profile-a-l/enchant.profile1
-rw-r--r--etc/profile-a-l/engrampa.profile2
-rw-r--r--etc/profile-a-l/enpass.profile1
-rw-r--r--etc/profile-a-l/eo-common.profile2
-rw-r--r--etc/profile-a-l/ephemeral.profile2
-rw-r--r--etc/profile-a-l/epiphany.profile2
-rw-r--r--etc/profile-a-l/equalx.profile1
-rw-r--r--etc/profile-a-l/etr.profile2
-rw-r--r--etc/profile-a-l/evince.profile15
-rw-r--r--etc/profile-a-l/evolution.profile2
-rw-r--r--etc/profile-a-l/exiftool.profile1
-rw-r--r--etc/profile-a-l/falkon.profile2
-rw-r--r--etc/profile-a-l/fbreader.profile2
-rw-r--r--etc/profile-a-l/fdns.profile1
-rw-r--r--etc/profile-a-l/feedreader.profile2
-rw-r--r--etc/profile-a-l/feh.profile2
-rw-r--r--etc/profile-a-l/ferdi.profile2
-rw-r--r--etc/profile-a-l/fetchmail.profile2
-rw-r--r--etc/profile-a-l/ffmpeg.profile1
-rw-r--r--etc/profile-a-l/file-manager-common.profile2
-rw-r--r--etc/profile-a-l/file-roller.profile2
-rw-r--r--etc/profile-a-l/file.profile1
-rw-r--r--etc/profile-a-l/filezilla.profile2
-rw-r--r--etc/profile-a-l/firefox-common-addons.profile5
-rw-r--r--etc/profile-a-l/firefox-common.profile4
-rw-r--r--etc/profile-a-l/flameshot.profile2
-rw-r--r--etc/profile-a-l/flowblade.profile1
-rw-r--r--etc/profile-a-l/fluxbox.profile3
-rw-r--r--etc/profile-a-l/font-manager.profile1
-rw-r--r--etc/profile-a-l/fontforge.profile1
-rw-r--r--etc/profile-a-l/fractal.profile2
-rw-r--r--etc/profile-a-l/franz.profile2
-rw-r--r--etc/profile-a-l/freecad.profile2
-rw-r--r--etc/profile-a-l/freeciv.profile2
-rw-r--r--etc/profile-a-l/freecol.profile2
-rw-r--r--etc/profile-a-l/freemind.profile2
-rw-r--r--etc/profile-a-l/freshclam.profile1
-rw-r--r--etc/profile-a-l/frogatto.profile2
-rw-r--r--etc/profile-a-l/frozen-bubble.profile2
-rw-r--r--etc/profile-a-l/ftp.profile1
-rw-r--r--etc/profile-a-l/funnyboat.profile1
-rw-r--r--etc/profile-a-l/gajim.profile1
-rw-r--r--etc/profile-a-l/galculator.profile1
-rw-r--r--etc/profile-a-l/gapplication.profile1
-rw-r--r--etc/profile-a-l/gcloud.profile2
-rw-r--r--etc/profile-a-l/gconf.profile1
-rw-r--r--etc/profile-a-l/gdu.profile1
-rw-r--r--etc/profile-a-l/geany.profile2
-rw-r--r--etc/profile-a-l/geary.profile1
-rw-r--r--etc/profile-a-l/gedit.profile2
-rw-r--r--etc/profile-a-l/geekbench.profile1
-rw-r--r--etc/profile-a-l/geeqie.profile2
-rw-r--r--etc/profile-a-l/gfeeds.profile2
-rw-r--r--etc/profile-a-l/gget.profile1
-rw-r--r--etc/profile-a-l/ghostwriter.profile2
-rw-r--r--etc/profile-a-l/gimp.profile2
-rw-r--r--etc/profile-a-l/gist.profile1
-rw-r--r--etc/profile-a-l/git-cola.profile2
-rw-r--r--etc/profile-a-l/git.profile1
-rw-r--r--etc/profile-a-l/gitg.profile2
-rw-r--r--etc/profile-a-l/gitter.profile1
-rw-r--r--etc/profile-a-l/gjs.profile2
-rw-r--r--etc/profile-a-l/gl-117.profile2
-rw-r--r--etc/profile-a-l/glaxium.profile2
-rw-r--r--etc/profile-a-l/globaltime.profile1
-rw-r--r--etc/profile-a-l/gmpc.profile1
-rw-r--r--etc/profile-a-l/gnome-books.profile1
-rw-r--r--etc/profile-a-l/gnome-builder.profile1
-rw-r--r--etc/profile-a-l/gnome-calculator.profile2
-rw-r--r--etc/profile-a-l/gnome-calendar.profile1
-rw-r--r--etc/profile-a-l/gnome-characters.profile1
-rw-r--r--etc/profile-a-l/gnome-chess.profile2
-rw-r--r--etc/profile-a-l/gnome-clocks.profile1
-rw-r--r--etc/profile-a-l/gnome-contacts.profile1
-rw-r--r--etc/profile-a-l/gnome-documents.profile1
-rw-r--r--etc/profile-a-l/gnome-font-viewer.profile1
-rw-r--r--etc/profile-a-l/gnome-hexgl.profile1
-rw-r--r--etc/profile-a-l/gnome-keyring.profile1
-rw-r--r--etc/profile-a-l/gnome-latex.profile2
-rw-r--r--etc/profile-a-l/gnome-logs.profile1
-rw-r--r--etc/profile-a-l/gnome-maps.profile2
-rw-r--r--etc/profile-a-l/gnome-mplayer.profile1
-rw-r--r--etc/profile-a-l/gnome-music.profile1
-rw-r--r--etc/profile-a-l/gnome-nettool.profile2
-rw-r--r--etc/profile-a-l/gnome-passwordsafe.profile2
-rw-r--r--etc/profile-a-l/gnome-photos.profile1
-rw-r--r--etc/profile-a-l/gnome-pie.profile1
-rw-r--r--etc/profile-a-l/gnome-pomodoro.profile1
-rw-r--r--etc/profile-a-l/gnome-recipes.profile1
-rw-r--r--etc/profile-a-l/gnome-ring.profile1
-rw-r--r--etc/profile-a-l/gnome-schedule.profile1
-rw-r--r--etc/profile-a-l/gnome-screenshot.profile2
-rw-r--r--etc/profile-a-l/gnome-sound-recorder.profile2
-rw-r--r--etc/profile-a-l/gnome-system-log.profile1
-rw-r--r--etc/profile-a-l/gnome-todo.profile1
-rw-r--r--etc/profile-a-l/gnome-twitch.profile1
-rw-r--r--etc/profile-a-l/gnome-weather.profile1
-rw-r--r--etc/profile-a-l/gnome_games-common.profile2
-rw-r--r--etc/profile-a-l/gnote.profile2
-rw-r--r--etc/profile-a-l/gnubik.profile2
-rw-r--r--etc/profile-a-l/godot.profile2
-rw-r--r--etc/profile-a-l/goldendict.profile2
-rw-r--r--etc/profile-a-l/goobox.profile2
-rw-r--r--etc/profile-a-l/google-earth.profile1
-rw-r--r--etc/profile-a-l/google-play-music-desktop-player.profile2
-rw-r--r--etc/profile-a-l/googler-common.profile2
-rw-r--r--etc/profile-a-l/gpa.profile2
-rw-r--r--etc/profile-a-l/gpg-agent.profile4
-rw-r--r--etc/profile-a-l/gpg.profile3
-rw-r--r--etc/profile-a-l/gpicview.profile1
-rw-r--r--etc/profile-a-l/gpredict.profile1
-rw-r--r--etc/profile-a-l/gradio.profile2
-rw-r--r--etc/profile-a-l/gramps.profile2
-rw-r--r--etc/profile-a-l/gravity-beams-and-evaporating-stars.profile2
-rw-r--r--etc/profile-a-l/gthumb.profile2
-rw-r--r--etc/profile-a-l/gtk-update-icon-cache.profile1
-rw-r--r--etc/profile-a-l/guayadeque.profile1
-rw-r--r--etc/profile-a-l/gucharmap.profile1
-rw-r--r--etc/profile-a-l/guvcview.profile2
-rw-r--r--etc/profile-a-l/gwenview.profile1
-rw-r--r--etc/profile-a-l/handbrake.profile2
-rw-r--r--etc/profile-a-l/hashcat.profile2
-rw-r--r--etc/profile-a-l/hasher-common.profile1
-rw-r--r--etc/profile-a-l/hedgewars.profile2
-rw-r--r--etc/profile-a-l/hexchat.profile1
-rw-r--r--etc/profile-a-l/highlight.profile2
-rw-r--r--etc/profile-a-l/homebank.profile1
-rw-r--r--etc/profile-a-l/host.profile1
-rw-r--r--etc/profile-a-l/hugin.profile2
-rw-r--r--etc/profile-a-l/hyperrogue.profile2
-rw-r--r--etc/profile-a-l/i2prouter.profile2
-rw-r--r--etc/profile-a-l/i3.profile3
-rw-r--r--etc/profile-a-l/iagno.profile2
-rw-r--r--etc/profile-a-l/idea.sh.profile1
-rw-r--r--etc/profile-a-l/imagej.profile2
-rw-r--r--etc/profile-a-l/img2txt.profile1
-rw-r--r--etc/profile-a-l/impressive.profile1
-rw-r--r--etc/profile-a-l/imv.profile1
-rw-r--r--etc/profile-a-l/inkscape.profile1
-rw-r--r--etc/profile-a-l/io.github.lainsce.Notejot.profile2
-rw-r--r--etc/profile-a-l/ipcalc.profile1
-rw-r--r--etc/profile-a-l/itch.profile1
-rw-r--r--etc/profile-a-l/jami-gnome.profile1
-rw-r--r--etc/profile-a-l/jd-gui.profile2
-rw-r--r--etc/profile-a-l/jerry.profile1
-rw-r--r--etc/profile-a-l/jitsi.profile2
-rw-r--r--etc/profile-a-l/jumpnbump.profile2
-rw-r--r--etc/profile-a-l/k3b.profile2
-rw-r--r--etc/profile-a-l/kaffeine.profile1
-rw-r--r--etc/profile-a-l/kalgebra.profile2
-rw-r--r--etc/profile-a-l/kate.profile1
-rw-r--r--etc/profile-a-l/kazam.profile2
-rw-r--r--etc/profile-a-l/kcalc.profile9
-rw-r--r--etc/profile-a-l/kdeinit4.profile1
-rw-r--r--etc/profile-a-l/kdenlive.profile2
-rw-r--r--etc/profile-a-l/kdiff3.profile2
-rw-r--r--etc/profile-a-l/keepass.profile1
-rw-r--r--etc/profile-a-l/keepassx.profile1
-rw-r--r--etc/profile-a-l/keepassxc.profile2
-rw-r--r--etc/profile-a-l/kfind.profile2
-rw-r--r--etc/profile-a-l/kget.profile1
-rw-r--r--etc/profile-a-l/kid3.profile1
-rw-r--r--etc/profile-a-l/kino.profile1
-rw-r--r--etc/profile-a-l/kiwix-desktop.profile2
-rw-r--r--etc/profile-a-l/klatexformula.profile2
-rw-r--r--etc/profile-a-l/klavaro.profile2
-rw-r--r--etc/profile-a-l/kmail.profile2
-rw-r--r--etc/profile-a-l/kmplayer.profile1
-rw-r--r--etc/profile-a-l/kodi.profile2
-rw-r--r--etc/profile-a-l/konversation.profile1
-rw-r--r--etc/profile-a-l/kopete.profile1
-rw-r--r--etc/profile-a-l/krita.profile2
-rw-r--r--etc/profile-a-l/krunner.profile2
-rw-r--r--etc/profile-a-l/ktorrent.profile15
-rw-r--r--etc/profile-a-l/ktouch.profile2
-rw-r--r--etc/profile-a-l/kube.profile1
-rw-r--r--etc/profile-a-l/kwin_x11.profile2
-rw-r--r--etc/profile-a-l/kwrite.profile1
-rw-r--r--etc/profile-a-l/latex-common.profile2
-rw-r--r--etc/profile-a-l/leafpad.profile1
-rw-r--r--etc/profile-a-l/less.profile1
-rw-r--r--etc/profile-a-l/librecad.profile3
-rw-r--r--etc/profile-a-l/libreoffice.profile1
-rw-r--r--etc/profile-a-l/lifeograph.profile2
-rw-r--r--etc/profile-a-l/liferea.profile2
-rw-r--r--etc/profile-a-l/lincity-ng.profile2
-rw-r--r--etc/profile-a-l/links-common.profile1
-rw-r--r--etc/profile-a-l/linphone.profile1
-rw-r--r--etc/profile-a-l/lmms.profile2
-rw-r--r--etc/profile-a-l/lollypop.profile1
-rw-r--r--etc/profile-a-l/lugaru.profile2
-rw-r--r--etc/profile-a-l/luminance-hdr.profile1
-rw-r--r--etc/profile-a-l/lutris.profile5
-rw-r--r--etc/profile-a-l/lximage-qt.profile1
-rw-r--r--etc/profile-a-l/lxmusic.profile1
-rw-r--r--etc/profile-a-l/lynx.profile2
-rw-r--r--etc/profile-m-z/Maelstrom.profile2
-rw-r--r--etc/profile-m-z/Mathematica.profile2
-rw-r--r--etc/profile-m-z/PCSX2.profile2
-rw-r--r--etc/profile-m-z/QMediathekView.profile1
-rw-r--r--etc/profile-m-z/QOwnNotes.profile1
-rw-r--r--etc/profile-m-z/Viber.profile2
-rw-r--r--etc/profile-m-z/XMind.profile1
-rw-r--r--etc/profile-m-z/Xephyr.profile2
-rw-r--r--etc/profile-m-z/Xvfb.profile2
-rw-r--r--etc/profile-m-z/ZeGrapher.profile2
-rw-r--r--etc/profile-m-z/macrofusion.profile2
-rw-r--r--etc/profile-m-z/magicor.profile2
-rw-r--r--etc/profile-m-z/makepkg.profile1
-rw-r--r--etc/profile-m-z/man.profile1
-rw-r--r--etc/profile-m-z/manaplus.profile2
-rw-r--r--etc/profile-m-z/marker.profile2
-rw-r--r--etc/profile-m-z/masterpdfeditor.profile1
-rw-r--r--etc/profile-m-z/mate-calc.profile1
-rw-r--r--etc/profile-m-z/mate-color-select.profile1
-rw-r--r--etc/profile-m-z/mate-dictionary.profile1
-rw-r--r--etc/profile-m-z/mcabber.profile2
-rw-r--r--etc/profile-m-z/mcomix.profile1
-rw-r--r--etc/profile-m-z/mdr.profile1
-rw-r--r--etc/profile-m-z/mediainfo.profile1
-rw-r--r--etc/profile-m-z/mediathekview.profile1
-rw-r--r--etc/profile-m-z/megaglest.profile2
-rw-r--r--etc/profile-m-z/meld.profile1
-rw-r--r--etc/profile-m-z/mendeleydesktop.profile2
-rw-r--r--etc/profile-m-z/menulibre.profile1
-rw-r--r--etc/profile-m-z/meteo-qt.profile1
-rw-r--r--etc/profile-m-z/midori.profile2
-rw-r--r--etc/profile-m-z/mindless.profile1
-rw-r--r--etc/profile-m-z/minecraft-launcher.profile2
-rw-r--r--etc/profile-m-z/minetest.profile2
-rw-r--r--etc/profile-m-z/minitube.profile2
-rw-r--r--etc/profile-m-z/mirage.profile2
-rw-r--r--etc/profile-m-z/mirrormagic.profile2
-rw-r--r--etc/profile-m-z/mocp.profile1
-rw-r--r--etc/profile-m-z/mousepad.profile2
-rw-r--r--etc/profile-m-z/mp3splt-gtk.profile2
-rw-r--r--etc/profile-m-z/mp3splt.profile5
-rw-r--r--etc/profile-m-z/mpDris2.profile1
-rw-r--r--etc/profile-m-z/mpd.profile1
-rw-r--r--etc/profile-m-z/mpg123.profile1
-rw-r--r--etc/profile-m-z/mplayer.profile2
-rw-r--r--etc/profile-m-z/mpsyt.profile1
-rw-r--r--etc/profile-m-z/mpv.profile2
-rw-r--r--etc/profile-m-z/mrrescue.profile2
-rw-r--r--etc/profile-m-z/ms-office.profile2
-rw-r--r--etc/profile-m-z/mtpaint.profile2
-rw-r--r--etc/profile-m-z/multimc5.profile1
-rw-r--r--etc/profile-m-z/mumble.profile1
-rw-r--r--etc/profile-m-z/mupdf.profile1
-rw-r--r--etc/profile-m-z/mupen64plus.profile2
-rw-r--r--etc/profile-m-z/musescore.profile2
-rw-r--r--etc/profile-m-z/musictube.profile2
-rw-r--r--etc/profile-m-z/musixmatch.profile1
-rw-r--r--etc/profile-m-z/mutt.profile1
-rw-r--r--etc/profile-m-z/mypaint.profile2
-rw-r--r--etc/profile-m-z/nano.profile1
-rw-r--r--etc/profile-m-z/natron.profile2
-rw-r--r--etc/profile-m-z/ncdu.profile1
-rw-r--r--etc/profile-m-z/neochat.profile2
-rw-r--r--etc/profile-m-z/neomutt.profile1
-rw-r--r--etc/profile-m-z/netactview.profile1
-rw-r--r--etc/profile-m-z/nethack-vultures.profile2
-rw-r--r--etc/profile-m-z/nethack.profile1
-rw-r--r--etc/profile-m-z/netsurf.profile2
-rw-r--r--etc/profile-m-z/neverball.profile2
-rw-r--r--etc/profile-m-z/newsboat.profile1
-rw-r--r--etc/profile-m-z/newsflash.profile2
-rw-r--r--etc/profile-m-z/nextcloud.profile2
-rw-r--r--etc/profile-m-z/nheko.profile2
-rw-r--r--etc/profile-m-z/nicotine.profile9
-rw-r--r--etc/profile-m-z/nitroshare.profile1
-rw-r--r--etc/profile-m-z/nodejs-common.profile1
-rw-r--r--etc/profile-m-z/nomacs.profile2
-rw-r--r--etc/profile-m-z/notify-send.profile1
-rw-r--r--etc/profile-m-z/nslookup.profile1
-rw-r--r--etc/profile-m-z/nvim.profile1
-rw-r--r--etc/profile-m-z/nylas.profile2
-rw-r--r--etc/profile-m-z/nyx.profile2
-rw-r--r--etc/profile-m-z/obs.profile1
-rw-r--r--etc/profile-m-z/ocenaudio.profile2
-rw-r--r--etc/profile-m-z/odt2txt.profile1
-rw-r--r--etc/profile-m-z/okular.profile1
-rw-r--r--etc/profile-m-z/onboard.profile2
-rw-r--r--etc/profile-m-z/onionshare-gui.profile1
-rw-r--r--etc/profile-m-z/open-invaders.profile2
-rw-r--r--etc/profile-m-z/openarena.profile2
-rw-r--r--etc/profile-m-z/openbox.profile3
-rw-r--r--etc/profile-m-z/opencity.profile2
-rw-r--r--etc/profile-m-z/openclonk.profile2
-rw-r--r--etc/profile-m-z/openmw.profile2
-rw-r--r--etc/profile-m-z/openshot.profile2
-rw-r--r--etc/profile-m-z/openstego.profile2
-rw-r--r--etc/profile-m-z/openttd.profile2
-rw-r--r--etc/profile-m-z/orage.profile1
-rw-r--r--etc/profile-m-z/ostrichriders.profile2
-rw-r--r--etc/profile-m-z/otter-browser.profile2
-rw-r--r--etc/profile-m-z/palemoon.profile3
-rw-r--r--etc/profile-m-z/pandoc.profile1
-rw-r--r--etc/profile-m-z/parole.profile2
-rw-r--r--etc/profile-m-z/patch.profile1
-rw-r--r--etc/profile-m-z/pavucontrol.profile1
-rw-r--r--etc/profile-m-z/pcsxr.profile2
-rw-r--r--etc/profile-m-z/pdfchain.profile1
-rw-r--r--etc/profile-m-z/pdfmod.profile2
-rw-r--r--etc/profile-m-z/pdfsam.profile2
-rw-r--r--etc/profile-m-z/pdftotext.profile2
-rw-r--r--etc/profile-m-z/peek.profile1
-rw-r--r--etc/profile-m-z/penguin-command.profile2
-rw-r--r--etc/profile-m-z/photoflare.profile2
-rw-r--r--etc/profile-m-z/picard.profile1
-rw-r--r--etc/profile-m-z/pidgin.profile2
-rw-r--r--etc/profile-m-z/pinball.profile2
-rw-r--r--etc/profile-m-z/ping-hardened.inc.profile1
-rw-r--r--etc/profile-m-z/ping.profile3
-rw-r--r--etc/profile-m-z/pingus.profile2
-rw-r--r--etc/profile-m-z/pinta.profile2
-rw-r--r--etc/profile-m-z/pioneer.profile2
-rw-r--r--etc/profile-m-z/pithos.profile1
-rw-r--r--etc/profile-m-z/pitivi.profile1
-rw-r--r--etc/profile-m-z/pix.profile2
-rw-r--r--etc/profile-m-z/pkglog.profile1
-rw-r--r--etc/profile-m-z/pluma.profile1
-rw-r--r--etc/profile-m-z/plv.profile1
-rw-r--r--etc/profile-m-z/pngquant.profile1
-rw-r--r--etc/profile-m-z/polari.profile1
-rw-r--r--etc/profile-m-z/ppsspp.profile2
-rw-r--r--etc/profile-m-z/pragha.profile1
-rw-r--r--etc/profile-m-z/profanity.profile1
-rw-r--r--etc/profile-m-z/psi-plus.profile2
-rw-r--r--etc/profile-m-z/psi.profile2
-rw-r--r--etc/profile-m-z/pybitmessage.profile1
-rw-r--r--etc/profile-m-z/pycharm-community.profile9
-rw-r--r--etc/profile-m-z/pycharm-professional.profile2
-rw-r--r--etc/profile-m-z/qbittorrent.profile3
-rw-r--r--etc/profile-m-z/qcomicbook.profile1
-rw-r--r--etc/profile-m-z/qemu-launcher.profile1
-rw-r--r--etc/profile-m-z/qemu-system-x86_64.profile1
-rw-r--r--etc/profile-m-z/qgis.profile2
-rw-r--r--etc/profile-m-z/qlipper.profile1
-rw-r--r--etc/profile-m-z/qmmp.profile2
-rw-r--r--etc/profile-m-z/qnapi.profile2
-rw-r--r--etc/profile-m-z/qpdfview.profile2
-rw-r--r--etc/profile-m-z/qrencode.profile1
-rw-r--r--etc/profile-m-z/qtox.profile1
-rw-r--r--etc/profile-m-z/quassel.profile2
-rw-r--r--etc/profile-m-z/quaternion.profile2
-rw-r--r--etc/profile-m-z/quiterss.profile1
-rw-r--r--etc/profile-m-z/quodlibet.profile2
-rw-r--r--etc/profile-m-z/qutebrowser.profile6
-rw-r--r--etc/profile-m-z/raincat.profile1
-rw-r--r--etc/profile-m-z/rambox.profile4
-rw-r--r--etc/profile-m-z/redeclipse.profile2
-rw-r--r--etc/profile-m-z/rednotebook.profile2
-rw-r--r--etc/profile-m-z/redshift.profile1
-rw-r--r--etc/profile-m-z/regextester.profile1
-rw-r--r--etc/profile-m-z/remmina.profile1
-rw-r--r--etc/profile-m-z/retroarch.profile2
-rw-r--r--etc/profile-m-z/rhythmbox.profile2
-rw-r--r--etc/profile-m-z/ricochet.profile1
-rw-r--r--etc/profile-m-z/ripperx.profile2
-rw-r--r--etc/profile-m-z/ristretto.profile1
-rw-r--r--etc/profile-m-z/rpcs3.profile4
-rw-r--r--etc/profile-m-z/rsync-download_only.profile1
-rw-r--r--etc/profile-m-z/rtin.profile1
-rw-r--r--etc/profile-m-z/rtorrent.profile2
-rw-r--r--etc/profile-m-z/rtv.profile2
-rw-r--r--etc/profile-m-z/sayonara.profile1
-rw-r--r--etc/profile-m-z/scallion.profile2
-rw-r--r--etc/profile-m-z/scorched3d.profile2
-rw-r--r--etc/profile-m-z/scorchwentbonkers.profile2
-rw-r--r--etc/profile-m-z/scribus.profile2
-rw-r--r--etc/profile-m-z/sdat2img.profile2
-rw-r--r--etc/profile-m-z/seafile-applet.profile2
-rw-r--r--etc/profile-m-z/seahorse-adventures.profile2
-rw-r--r--etc/profile-m-z/seahorse-daemon.profile3
-rw-r--r--etc/profile-m-z/seahorse-tool.profile4
-rw-r--r--etc/profile-m-z/seahorse.profile8
-rw-r--r--etc/profile-m-z/seamonkey.profile2
-rw-r--r--etc/profile-m-z/server.profile8
-rw-r--r--etc/profile-m-z/servo.profile2
-rw-r--r--etc/profile-m-z/shellcheck.profile2
-rw-r--r--etc/profile-m-z/shortwave.profile2
-rw-r--r--etc/profile-m-z/shotcut.profile2
-rw-r--r--etc/profile-m-z/shotwell.profile2
-rw-r--r--etc/profile-m-z/signal-cli.profile2
-rw-r--r--etc/profile-m-z/silentarmy.profile1
-rw-r--r--etc/profile-m-z/simple-scan.profile2
-rw-r--r--etc/profile-m-z/simplescreenrecorder.profile2
-rw-r--r--etc/profile-m-z/simutrans.profile2
-rw-r--r--etc/profile-m-z/skanlite.profile2
-rw-r--r--etc/profile-m-z/slashem.profile1
-rw-r--r--etc/profile-m-z/smplayer.profile2
-rw-r--r--etc/profile-m-z/smtube.profile1
-rw-r--r--etc/profile-m-z/smuxi-frontend-gnome.profile2
-rw-r--r--etc/profile-m-z/softmaker-common.profile2
-rw-r--r--etc/profile-m-z/sol.profile1
-rw-r--r--etc/profile-m-z/songrec.profile2
-rw-r--r--etc/profile-m-z/sound-juicer.profile2
-rw-r--r--etc/profile-m-z/soundconverter.profile1
-rw-r--r--etc/profile-m-z/spectacle.profile2
-rw-r--r--etc/profile-m-z/spectral.profile2
-rw-r--r--etc/profile-m-z/spectre-meltdown-checker.profile4
-rw-r--r--etc/profile-m-z/spotify.profile6
-rw-r--r--etc/profile-m-z/sqlitebrowser.profile1
-rw-r--r--etc/profile-m-z/ssh-agent.profile2
-rw-r--r--etc/profile-m-z/ssh.profile1
-rw-r--r--etc/profile-m-z/ssmtp.profile75
-rw-r--r--etc/profile-m-z/standardnotes-desktop.profile2
-rw-r--r--etc/profile-m-z/steam.profile5
-rw-r--r--etc/profile-m-z/stellarium.profile1
-rw-r--r--etc/profile-m-z/strawberry.profile2
-rw-r--r--etc/profile-m-z/strings.profile1
-rw-r--r--etc/profile-m-z/subdownloader.profile1
-rw-r--r--etc/profile-m-z/supertux2.profile2
-rw-r--r--etc/profile-m-z/supertuxkart.profile2
-rw-r--r--etc/profile-m-z/surf.profile1
-rw-r--r--etc/profile-m-z/sushi.profile1
-rw-r--r--etc/profile-m-z/sway.profile2
-rw-r--r--etc/profile-m-z/synfigstudio.profile2
-rw-r--r--etc/profile-m-z/sysprof.profile1
-rw-r--r--etc/profile-m-z/tcpdump.profile1
-rw-r--r--etc/profile-m-z/teamspeak3.profile1
-rw-r--r--etc/profile-m-z/teeworlds.profile2
-rw-r--r--etc/profile-m-z/telegram.profile2
-rw-r--r--etc/profile-m-z/telnet.profile1
-rw-r--r--etc/profile-m-z/terasology.profile2
-rw-r--r--etc/profile-m-z/tesseract.profile65
-rw-r--r--etc/profile-m-z/tilp.profile1
-rw-r--r--etc/profile-m-z/tin.profile1
-rw-r--r--etc/profile-m-z/tmux.profile2
-rw-r--r--etc/profile-m-z/tor.profile2
-rw-r--r--etc/profile-m-z/torbrowser-launcher.profile2
-rw-r--r--etc/profile-m-z/torcs.profile2
-rw-r--r--etc/profile-m-z/totem.profile2
-rw-r--r--etc/profile-m-z/tracker.profile2
-rw-r--r--etc/profile-m-z/transgui.profile1
-rw-r--r--etc/profile-m-z/transmission-common.profile1
-rw-r--r--etc/profile-m-z/tremulous.profile2
-rw-r--r--etc/profile-m-z/trojita.profile1
-rw-r--r--etc/profile-m-z/truecraft.profile1
-rw-r--r--etc/profile-m-z/tuxguitar.profile2
-rw-r--r--etc/profile-m-z/tvbrowser.profile2
-rw-r--r--etc/profile-m-z/udiskie.profile2
-rw-r--r--etc/profile-m-z/uefitool.profile2
-rw-r--r--etc/profile-m-z/uget-gtk.profile2
-rw-r--r--etc/profile-m-z/unbound.profile1
-rw-r--r--etc/profile-m-z/unf.profile1
-rw-r--r--etc/profile-m-z/unknown-horizons.profile1
-rw-r--r--etc/profile-m-z/utox.profile1
-rw-r--r--etc/profile-m-z/uudeview.profile2
-rw-r--r--etc/profile-m-z/uzbl-browser.profile2
-rw-r--r--etc/profile-m-z/viewnior.profile1
-rw-r--r--etc/profile-m-z/viking.profile1
-rw-r--r--etc/profile-m-z/vim.profile2
-rw-r--r--etc/profile-m-z/vlc.profile2
-rw-r--r--etc/profile-m-z/vmware-view.profile2
-rw-r--r--etc/profile-m-z/vym.profile1
-rw-r--r--etc/profile-m-z/w3m.profile1
-rw-r--r--etc/profile-m-z/warmux.profile2
-rw-r--r--etc/profile-m-z/warsow.profile2
-rw-r--r--etc/profile-m-z/warzone2100.profile2
-rw-r--r--etc/profile-m-z/webstorm.profile2
-rw-r--r--etc/profile-m-z/webui-aria2.profile2
-rw-r--r--etc/profile-m-z/weechat.profile2
-rw-r--r--etc/profile-m-z/wesnoth.profile2
-rw-r--r--etc/profile-m-z/wget.profile1
-rw-r--r--etc/profile-m-z/whalebird.profile3
-rw-r--r--etc/profile-m-z/whois.profile1
-rw-r--r--etc/profile-m-z/widelands.profile2
-rw-r--r--etc/profile-m-z/wine.profile2
-rw-r--r--etc/profile-m-z/wireshark.profile2
-rw-r--r--etc/profile-m-z/wordwarvi.profile2
-rw-r--r--etc/profile-m-z/wps.profile2
-rw-r--r--etc/profile-m-z/x-terminal-emulator.profile1
-rw-r--r--etc/profile-m-z/x2goclient.profile1
-rw-r--r--etc/profile-m-z/xbill.profile1
-rw-r--r--etc/profile-m-z/xcalc.profile2
-rw-r--r--etc/profile-m-z/xchat.profile2
-rw-r--r--etc/profile-m-z/xed.profile1
-rw-r--r--etc/profile-m-z/xfburn.profile2
-rw-r--r--etc/profile-m-z/xfce4-dict.profile1
-rw-r--r--etc/profile-m-z/xfce4-mixer.profile1
-rw-r--r--etc/profile-m-z/xfce4-notes.profile1
-rw-r--r--etc/profile-m-z/xfce4-screenshooter.profile1
-rw-r--r--etc/profile-m-z/xiphos.profile2
-rw-r--r--etc/profile-m-z/xlinks2.profile (renamed from etc/profile-m-z/xlinks2)0
-rw-r--r--etc/profile-m-z/xmms.profile2
-rw-r--r--etc/profile-m-z/xmr-stak.profile1
-rw-r--r--etc/profile-m-z/xonotic.profile1
-rw-r--r--etc/profile-m-z/xournal.profile2
-rw-r--r--etc/profile-m-z/xpdf.profile1
-rw-r--r--etc/profile-m-z/xplayer.profile2
-rw-r--r--etc/profile-m-z/xpra.profile2
-rw-r--r--etc/profile-m-z/xreader.profile1
-rw-r--r--etc/profile-m-z/xviewer.profile1
-rw-r--r--etc/profile-m-z/yelp.profile2
-rw-r--r--etc/profile-m-z/youtube-dl-gui.profile2
-rw-r--r--etc/profile-m-z/youtube-dl.profile1
-rw-r--r--etc/profile-m-z/youtube-viewers-common.profile14
-rw-r--r--etc/profile-m-z/ytmdesktop.profile2
-rw-r--r--etc/profile-m-z/zaproxy.profile1
-rw-r--r--etc/profile-m-z/zart.profile2
-rw-r--r--etc/profile-m-z/zathura.profile1
-rw-r--r--etc/profile-m-z/zeal.profile1
-rw-r--r--etc/profile-m-z/zim.profile2
-rw-r--r--etc/profile-m-z/zulip.profile2
-rw-r--r--etc/templates/profile.template2
-rw-r--r--src/common.mk16
-rw-r--r--src/fbuilder/Makefile18
-rw-r--r--src/fcopy/Makefile19
-rw-r--r--src/fids/Makefile19
-rw-r--r--src/firecfg/Makefile23
-rw-r--r--src/firecfg/firecfg.config4
-rw-r--r--src/firejail/Makefile32
-rw-r--r--src/firejail/chroot.c5
-rw-r--r--src/firejail/firejail.h1
-rw-r--r--src/firejail/main.c2
-rw-r--r--src/firejail/profile.c10
-rw-r--r--src/firejail/sandbox.c6
-rw-r--r--src/firejail/usage.c8
-rw-r--r--src/firemon/Makefile19
-rw-r--r--src/fldd/Makefile19
-rw-r--r--src/fnet/Makefile19
-rw-r--r--src/fnetfilter/Makefile19
-rw-r--r--src/fnettrace-dns/Makefile18
-rw-r--r--src/fnettrace-dns/main.c2
-rw-r--r--src/fnettrace-icmp/Makefile18
-rw-r--r--src/fnettrace-icmp/main.c7
-rw-r--r--src/fnettrace-sni/Makefile18
-rw-r--r--src/fnettrace-sni/main.c2
-rw-r--r--src/fnettrace/Makefile18
-rw-r--r--src/fnettrace/static-ip-map97
-rw-r--r--src/fsec-optimize/Makefile19
-rw-r--r--src/fsec-print/Makefile19
-rw-r--r--src/fseccomp/Makefile19
-rw-r--r--src/ftee/Makefile18
-rw-r--r--src/fzenity/Makefile18
-rw-r--r--src/jailcheck/Makefile19
-rw-r--r--src/lib/Makefile15
-rw-r--r--src/libpostexecseccomp/Makefile23
-rw-r--r--src/libtrace/Makefile23
-rw-r--r--src/libtracelog/Makefile23
-rw-r--r--src/man/firejail-profile.txt13
-rw-r--r--src/man/firejail.txt17
-rw-r--r--src/profstats/Makefile18
-rw-r--r--src/profstats/main.c14
-rw-r--r--src/prog.mk37
-rw-r--r--src/so.mk32
-rwxr-xr-xtest/filters/filters.sh10
-rwxr-xr-xtest/filters/namespacesbin0 -> 17392 bytes
-rwxr-xr-xtest/filters/namespaces-32bin0 -> 16104 bytes
-rwxr-xr-xtest/filters/namespaces-32.exp173
-rw-r--r--test/filters/namespaces.c96
-rwxr-xr-xtest/filters/namespaces.exp173
712 files changed, 2609 insertions, 601 deletions
diff --git a/.github/workflows/build-extra.yml b/.github/workflows/build-extra.yml
index a319e1ac6..839ba6f49 100644
--- a/.github/workflows/build-extra.yml
+++ b/.github/workflows/build-extra.yml
@@ -4,33 +4,47 @@ on:
4 push: 4 push:
5 branches: [ master ] 5 branches: [ master ]
6 paths-ignore: 6 paths-ignore:
7 - '.github/ISSUE_TEMPLATE/*'
8 - 'etc/**'
9 - 'contrib/gtksourceview-5/**'
10 - 'contrib/vim/**'
11 - 'src/man/*.txt'
7 - .git-blame-ignore-revs 12 - .git-blame-ignore-revs
13 - .github/dependabot.yml
14 - .github/pull_request_template.md
15 - .github/workflows/codeql-analysis.yml
16 - .github/workflows/profile-checks.yml
8 - .gitignore 17 - .gitignore
18 - .gitlab-ci.yml
9 - CONTRIBUTING.md 19 - CONTRIBUTING.md
10 - COPYING 20 - COPYING
11 - README 21 - README
12 - README.md 22 - README.md
13 - RELNOTES 23 - RELNOTES
14 - SECURITY.md 24 - SECURITY.md
15 - 'etc/**' 25 - src/firecfg/firecfg.config
16 - 'src/firecfg/firecfg.config'
17 - '.github/ISSUE_TEMPLATE/*'
18 - '.github/pull_request_template.md'
19 pull_request: 26 pull_request:
20 branches: [ master ] 27 branches: [ master ]
21 paths-ignore: 28 paths-ignore:
29 - '.github/ISSUE_TEMPLATE/*'
30 - 'etc/**'
31 - 'contrib/gtksourceview-5/**'
32 - 'contrib/vim/**'
33 - 'src/man/*.txt'
22 - .git-blame-ignore-revs 34 - .git-blame-ignore-revs
35 - .github/dependabot.yml
36 - .github/pull_request_template.md
37 - .github/workflows/codeql-analysis.yml
38 - .github/workflows/profile-checks.yml
23 - .gitignore 39 - .gitignore
40 - .gitlab-ci.yml
24 - CONTRIBUTING.md 41 - CONTRIBUTING.md
25 - COPYING 42 - COPYING
26 - README 43 - README
27 - README.md 44 - README.md
28 - RELNOTES 45 - RELNOTES
29 - SECURITY.md 46 - SECURITY.md
30 - 'etc/**' 47 - src/firecfg/firecfg.config
31 - 'src/firecfg/firecfg.config'
32 - '.github/ISSUE_TEMPLATE/*'
33 - '.github/pull_request_template.md'
34 48
35permissions: # added using https://github.com/step-security/secure-workflows 49permissions: # added using https://github.com/step-security/secure-workflows
36 contents: read 50 contents: read
@@ -40,11 +54,13 @@ jobs:
40 runs-on: ubuntu-22.04 54 runs-on: ubuntu-22.04
41 steps: 55 steps:
42 - name: Harden Runner 56 - name: Harden Runner
43 uses: step-security/harden-runner@2e205a28d0e1da00c5f53b161f4067b052c61f34 57 uses: step-security/harden-runner@ebacdc22ef6c2cfb85ee5ded8f2e640f4c776dd5
44 with: 58 with:
45 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs 59 egress-policy: block
46 60 allowed-endpoints: >
47 - uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 61 azure.archive.ubuntu.com:80
62 github.com:443
63 - uses: actions/checkout@755da8c3cf115ac066823e79a1e1788f8940201b
48 - name: install dependencies 64 - name: install dependencies
49 run: sudo apt-get install libapparmor-dev libselinux1-dev 65 run: sudo apt-get install libapparmor-dev libselinux1-dev
50 - name: configure 66 - name: configure
@@ -59,11 +75,13 @@ jobs:
59 runs-on: ubuntu-22.04 75 runs-on: ubuntu-22.04
60 steps: 76 steps:
61 - name: Harden Runner 77 - name: Harden Runner
62 uses: step-security/harden-runner@2e205a28d0e1da00c5f53b161f4067b052c61f34 78 uses: step-security/harden-runner@ebacdc22ef6c2cfb85ee5ded8f2e640f4c776dd5
63 with: 79 with:
64 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs 80 egress-policy: block
65 81 allowed-endpoints: >
66 - uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 82 azure.archive.ubuntu.com:80
83 github.com:443
84 - uses: actions/checkout@755da8c3cf115ac066823e79a1e1788f8940201b
67 - name: install clang-tools-14 and dependencies 85 - name: install clang-tools-14 and dependencies
68 run: sudo apt-get install clang-tools-14 libapparmor-dev libselinux1-dev 86 run: sudo apt-get install clang-tools-14 libapparmor-dev libselinux1-dev
69 - name: configure 87 - name: configure
@@ -74,11 +92,13 @@ jobs:
74 runs-on: ubuntu-22.04 92 runs-on: ubuntu-22.04
75 steps: 93 steps:
76 - name: Harden Runner 94 - name: Harden Runner
77 uses: step-security/harden-runner@2e205a28d0e1da00c5f53b161f4067b052c61f34 95 uses: step-security/harden-runner@ebacdc22ef6c2cfb85ee5ded8f2e640f4c776dd5
78 with: 96 with:
79 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs 97 egress-policy: block
80 98 allowed-endpoints: >
81 - uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 99 azure.archive.ubuntu.com:80
100 github.com:443
101 - uses: actions/checkout@755da8c3cf115ac066823e79a1e1788f8940201b
82 - name: install cppcheck 102 - name: install cppcheck
83 run: sudo apt-get install cppcheck 103 run: sudo apt-get install cppcheck
84 - name: cppcheck 104 - name: cppcheck
@@ -89,11 +109,13 @@ jobs:
89 runs-on: ubuntu-20.04 109 runs-on: ubuntu-20.04
90 steps: 110 steps:
91 - name: Harden Runner 111 - name: Harden Runner
92 uses: step-security/harden-runner@2e205a28d0e1da00c5f53b161f4067b052c61f34 112 uses: step-security/harden-runner@ebacdc22ef6c2cfb85ee5ded8f2e640f4c776dd5
93 with: 113 with:
94 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs 114 egress-policy: block
95 115 allowed-endpoints: >
96 - uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 116 azure.archive.ubuntu.com:80
117 github.com:443
118 - uses: actions/checkout@755da8c3cf115ac066823e79a1e1788f8940201b
97 - name: install cppcheck 119 - name: install cppcheck
98 run: sudo apt-get install cppcheck 120 run: sudo apt-get install cppcheck
99 - name: cppcheck 121 - name: cppcheck
diff --git a/.github/workflows/build.yml b/.github/workflows/build.yml
index e383c9ef2..852575532 100644
--- a/.github/workflows/build.yml
+++ b/.github/workflows/build.yml
@@ -4,8 +4,14 @@ on:
4 push: 4 push:
5 branches: [ master ] 5 branches: [ master ]
6 paths-ignore: 6 paths-ignore:
7 - '.github/ISSUE_TEMPLATE/*'
7 - .git-blame-ignore-revs 8 - .git-blame-ignore-revs
9 - .github/dependabot.yml
10 - .github/pull_request_template.md
11 - .github/workflows/codeql-analysis.yml
12 - .github/workflows/profile-checks.yml
8 - .gitignore 13 - .gitignore
14 - .gitlab-ci.yml
9 - CONTRIBUTING.md 15 - CONTRIBUTING.md
10 - COPYING 16 - COPYING
11 - README 17 - README
@@ -15,8 +21,14 @@ on:
15 pull_request: 21 pull_request:
16 branches: [ master ] 22 branches: [ master ]
17 paths-ignore: 23 paths-ignore:
24 - '.github/ISSUE_TEMPLATE/*'
18 - .git-blame-ignore-revs 25 - .git-blame-ignore-revs
26 - .github/dependabot.yml
27 - .github/pull_request_template.md
28 - .github/workflows/codeql-analysis.yml
29 - .github/workflows/profile-checks.yml
19 - .gitignore 30 - .gitignore
31 - .gitlab-ci.yml
20 - CONTRIBUTING.md 32 - CONTRIBUTING.md
21 - COPYING 33 - COPYING
22 - README 34 - README
@@ -32,11 +44,19 @@ jobs:
32 runs-on: ubuntu-22.04 44 runs-on: ubuntu-22.04
33 steps: 45 steps:
34 - name: Harden Runner 46 - name: Harden Runner
35 uses: step-security/harden-runner@2e205a28d0e1da00c5f53b161f4067b052c61f34 47 uses: step-security/harden-runner@ebacdc22ef6c2cfb85ee5ded8f2e640f4c776dd5
36 with: 48 with:
37 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs 49 egress-policy: block
38 50 allowed-endpoints: >
39 - uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 51 azure.archive.ubuntu.com:80
52 debian.org:80
53 github.com:443
54 packages.microsoft.com:443
55 ppa.launchpadcontent.net:443
56 www.debian.org:443
57 www.debian.org:80
58 yahoo.com:1025
59 - uses: actions/checkout@755da8c3cf115ac066823e79a1e1788f8940201b
40 - name: update package information 60 - name: update package information
41 run: sudo apt-get update 61 run: sudo apt-get update
42 - name: install dependencies 62 - name: install dependencies
diff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml
index 6c8a9bf99..47b4bfca3 100644
--- a/.github/workflows/codeql-analysis.yml
+++ b/.github/workflows/codeql-analysis.yml
@@ -9,28 +9,46 @@ on:
9 push: 9 push:
10 branches: [ master ] 10 branches: [ master ]
11 paths-ignore: 11 paths-ignore:
12 - '.github/ISSUE_TEMPLATE/*'
13 - 'etc/**'
14 - 'contrib/gtksourceview-5/**'
15 - 'contrib/vim/**'
16 - 'src/man/*.txt'
12 - .git-blame-ignore-revs 17 - .git-blame-ignore-revs
18 - .github/dependabot.yml
19 - .github/pull_request_template.md
20 - .github/workflows/profile-checks.yml
13 - .gitignore 21 - .gitignore
22 - .gitlab-ci.yml
14 - CONTRIBUTING.md 23 - CONTRIBUTING.md
15 - COPYING 24 - COPYING
16 - README 25 - README
17 - README.md 26 - README.md
18 - RELNOTES 27 - RELNOTES
19 - SECURITY.md 28 - SECURITY.md
20 - 'etc/**' 29 - src/firecfg/firecfg.config
21 pull_request: 30 pull_request:
22 # The branches below must be a subset of the branches above 31 # The branches below must be a subset of the branches above
23 branches: [ master ] 32 branches: [ master ]
24 paths-ignore: 33 paths-ignore:
34 - '.github/ISSUE_TEMPLATE/*'
35 - 'etc/**'
36 - 'contrib/gtksourceview-5/**'
37 - 'contrib/vim/**'
38 - 'src/man/*.txt'
25 - .git-blame-ignore-revs 39 - .git-blame-ignore-revs
40 - .github/dependabot.yml
41 - .github/pull_request_template.md
42 - .github/workflows/profile-checks.yml
26 - .gitignore 43 - .gitignore
44 - .gitlab-ci.yml
27 - CONTRIBUTING.md 45 - CONTRIBUTING.md
28 - COPYING 46 - COPYING
29 - README 47 - README
30 - README.md 48 - README.md
31 - RELNOTES 49 - RELNOTES
32 - SECURITY.md 50 - SECURITY.md
33 - 'etc/**' 51 - src/firecfg/firecfg.config
34 schedule: 52 schedule:
35 - cron: '0 7 * * 2' 53 - cron: '0 7 * * 2'
36 54
@@ -56,16 +74,21 @@ jobs:
56 74
57 steps: 75 steps:
58 - name: Harden Runner 76 - name: Harden Runner
59 uses: step-security/harden-runner@2e205a28d0e1da00c5f53b161f4067b052c61f34 77 uses: step-security/harden-runner@ebacdc22ef6c2cfb85ee5ded8f2e640f4c776dd5
60 with: 78 with:
61 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs 79 disable-sudo: true
80 egress-policy: block
81 allowed-endpoints: >
82 api.github.com:443
83 github.com:443
84 uploads.github.com:443
62 85
63 - name: Checkout repository 86 - name: Checkout repository
64 uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 87 uses: actions/checkout@755da8c3cf115ac066823e79a1e1788f8940201b
65 88
66 # Initializes the CodeQL tools for scanning. 89 # Initializes the CodeQL tools for scanning.
67 - name: Initialize CodeQL 90 - name: Initialize CodeQL
68 uses: github/codeql-action/init@c3b6fce4ee2ca25bc1066aa3bf73962fda0e8898 91 uses: github/codeql-action/init@959cbb7472c4d4ad70cdfe6f4976053fe48ab394
69 with: 92 with:
70 languages: ${{ matrix.language }} 93 languages: ${{ matrix.language }}
71 # If you wish to specify custom queries, you can do so here or in a config file. 94 # If you wish to specify custom queries, you can do so here or in a config file.
@@ -76,7 +99,7 @@ jobs:
76 # Autobuild attempts to build any compiled languages (C/C++, C#, or Java). 99 # Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
77 # If this step fails, then you should remove it and run the build manually (see below) 100 # If this step fails, then you should remove it and run the build manually (see below)
78 - name: Autobuild 101 - name: Autobuild
79 uses: github/codeql-action/autobuild@c3b6fce4ee2ca25bc1066aa3bf73962fda0e8898 102 uses: github/codeql-action/autobuild@959cbb7472c4d4ad70cdfe6f4976053fe48ab394
80 103
81 # ℹ️ Command-line programs to run using the OS shell. 104 # ℹ️ Command-line programs to run using the OS shell.
82 # 📚 https://git.io/JvXDl 105 # 📚 https://git.io/JvXDl
@@ -90,4 +113,4 @@ jobs:
90 # make release 113 # make release
91 114
92 - name: Perform CodeQL Analysis 115 - name: Perform CodeQL Analysis
93 uses: github/codeql-action/analyze@c3b6fce4ee2ca25bc1066aa3bf73962fda0e8898 116 uses: github/codeql-action/analyze@959cbb7472c4d4ad70cdfe6f4976053fe48ab394
diff --git a/.github/workflows/profile-checks.yml b/.github/workflows/profile-checks.yml
index f5de62412..4acd94c96 100644
--- a/.github/workflows/profile-checks.yml
+++ b/.github/workflows/profile-checks.yml
@@ -4,17 +4,19 @@ on:
4 push: 4 push:
5 branches: [ master ] 5 branches: [ master ]
6 paths: 6 paths:
7 - 'etc/**'
8 - 'ci/check/profiles/**' 7 - 'ci/check/profiles/**'
9 - 'src/firecfg/firecfg.config' 8 - 'etc/**'
10 - 'contrib/sort.py' 9 - .github/workflows/profile-checks.yml
10 - contrib/sort.py
11 - src/firecfg/firecfg.config
11 pull_request: 12 pull_request:
12 branches: [ master ] 13 branches: [ master ]
13 paths: 14 paths:
14 - 'etc/**'
15 - 'ci/check/profiles/**' 15 - 'ci/check/profiles/**'
16 - 'src/firecfg/firecfg.config' 16 - 'etc/**'
17 - 'contrib/sort.py' 17 - .github/workflows/profile-checks.yml
18 - contrib/sort.py
19 - src/firecfg/firecfg.config
18 20
19permissions: # added using https://github.com/step-security/secure-workflows 21permissions: # added using https://github.com/step-security/secure-workflows
20 contents: read 22 contents: read
@@ -24,11 +26,14 @@ jobs:
24 runs-on: ubuntu-latest 26 runs-on: ubuntu-latest
25 steps: 27 steps:
26 - name: Harden Runner 28 - name: Harden Runner
27 uses: step-security/harden-runner@2e205a28d0e1da00c5f53b161f4067b052c61f34 29 uses: step-security/harden-runner@ebacdc22ef6c2cfb85ee5ded8f2e640f4c776dd5
28 with: 30 with:
29 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs 31 disable-sudo: true
32 egress-policy: block
33 allowed-endpoints: >
34 github.com:443
30 35
31 - uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 36 - uses: actions/checkout@755da8c3cf115ac066823e79a1e1788f8940201b
32 - name: sort.py 37 - name: sort.py
33 run: ./ci/check/profiles/sort.py etc/inc/*.inc etc/{profile-a-l,profile-m-z}/*.profile 38 run: ./ci/check/profiles/sort.py etc/inc/*.inc etc/{profile-a-l,profile-m-z}/*.profile
34 - name: private-etc-always-required.sh 39 - name: private-etc-always-required.sh
diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md
index 0f868d6c4..9a5f19b54 100644
--- a/CONTRIBUTING.md
+++ b/CONTRIBUTING.md
@@ -39,6 +39,7 @@ If you add a new command, here's the checklist:
39 - [ ] Update manpages: firejail(1) and firejail-profile(5) 39 - [ ] Update manpages: firejail(1) and firejail-profile(5)
40 - [ ] Update shell completions 40 - [ ] Update shell completions
41 - [ ] Update vim syntax files 41 - [ ] Update vim syntax files
42 - [ ] Update gtksourceview language specs
42 - [ ] Update --help 43 - [ ] Update --help
43 44
44# Editing the wiki 45# Editing the wiki
diff --git a/Makefile b/Makefile
index 0499ff170..c5d823cac 100644
--- a/Makefile
+++ b/Makefile
@@ -1,3 +1,4 @@
1ROOT = .
1-include config.mk 2-include config.mk
2 3
3ifneq ($(HAVE_MAN),no) 4ifneq ($(HAVE_MAN),no)
@@ -7,8 +8,6 @@ endif
7 8
8COMPLETIONDIRS = src/zsh_completion src/bash_completion 9COMPLETIONDIRS = src/zsh_completion src/bash_completion
9 10
10.PHONY: all
11all: all_items mydirs $(MAN_TARGET) filters
12APPS = src/firecfg/firecfg src/firejail/firejail src/firemon/firemon src/profstats/profstats src/jailcheck/jailcheck 11APPS = src/firecfg/firecfg src/firejail/firejail src/firemon/firemon src/profstats/profstats src/jailcheck/jailcheck
13SBOX_APPS = src/fbuilder/fbuilder src/ftee/ftee src/fids/fids 12SBOX_APPS = src/fbuilder/fbuilder src/ftee/ftee src/fids/fids
14SBOX_APPS_NON_DUMPABLE = src/fcopy/fcopy src/fldd/fldd src/fnet/fnet src/fnetfilter/fnetfilter src/fzenity/fzenity 13SBOX_APPS_NON_DUMPABLE = src/fcopy/fcopy src/fldd/fldd src/fnet/fnet src/fnetfilter/fnetfilter src/fzenity/fzenity
@@ -22,6 +21,9 @@ MANPAGES = firejail.1 firemon.1 firecfg.1 firejail-profile.5 firejail-login.5 fi
22SECCOMP_FILTERS = seccomp seccomp.debug seccomp.32 seccomp.block_secondary seccomp.mdwx seccomp.mdwx.32 21SECCOMP_FILTERS = seccomp seccomp.debug seccomp.32 seccomp.block_secondary seccomp.mdwx seccomp.mdwx.32
23ALL_ITEMS = $(APPS) $(SBOX_APPS) $(SBOX_APPS_NON_DUMPABLE) $(MYLIBS) 22ALL_ITEMS = $(APPS) $(SBOX_APPS) $(SBOX_APPS_NON_DUMPABLE) $(MYLIBS)
24 23
24.PHONY: all
25all: all_items mydirs $(MAN_TARGET) filters
26
25config.mk config.sh: 27config.mk config.sh:
26 printf 'run ./configure to generate %s\n' "$@" >&2 28 printf 'run ./configure to generate %s\n' "$@" >&2
27 false 29 false
@@ -123,6 +125,9 @@ ifeq ($(HAVE_CONTRIB_INSTALL),yes)
123 install -m 0755 -d $(DESTDIR)$(datarootdir)/vim/vimfiles/syntax 125 install -m 0755 -d $(DESTDIR)$(datarootdir)/vim/vimfiles/syntax
124 install -m 0644 contrib/vim/ftdetect/firejail.vim $(DESTDIR)$(datarootdir)/vim/vimfiles/ftdetect 126 install -m 0644 contrib/vim/ftdetect/firejail.vim $(DESTDIR)$(datarootdir)/vim/vimfiles/ftdetect
125 install -m 0644 contrib/vim/syntax/firejail.vim $(DESTDIR)$(datarootdir)/vim/vimfiles/syntax 127 install -m 0644 contrib/vim/syntax/firejail.vim $(DESTDIR)$(datarootdir)/vim/vimfiles/syntax
128 # gtksourceview-5 language-specs
129 install -m 0755 -d $(DESTDIR)$(datarootdir)/gtksourceview-5/language-specs
130 install -m 0644 contrib/gtksourceview-5/language-specs/firejail-profile.lang $(DESTDIR)$(datarootdir)/gtksourceview-5/language-specs
126endif 131endif
127 # documents 132 # documents
128 install -m 0755 -d $(DESTDIR)$(docdir) 133 install -m 0755 -d $(DESTDIR)$(docdir)
diff --git a/README b/README
index 03a68e95c..0d0a161c6 100644
--- a/README
+++ b/README
@@ -505,6 +505,7 @@ hhzek0014 (https://github.com/hhzek0014)
505hknaack (https://github.com/hknaack) 505hknaack (https://github.com/hknaack)
506 - Kate profile fixes 506 - Kate profile fixes
507 - seamonkey.profile: support enigmail/gpg 507 - seamonkey.profile: support enigmail/gpg
508 - Avidemux tools support
508hlein (https://github.com/hlein) 509hlein (https://github.com/hlein)
509 - strip out \r's from jail prober 510 - strip out \r's from jail prober
510 - make env/arg sanity check failure messages more useful 511 - make env/arg sanity check failure messages more useful
@@ -615,6 +616,8 @@ juan (https://github.com/nyancat18)
615 - fixed Kdenlive, Shotcut profiles 616 - fixed Kdenlive, Shotcut profiles
616 - new profiles for Cinelerra, Cliqz, Bluefish 617 - new profiles for Cinelerra, Cliqz, Bluefish
617 - profile hardening 618 - profile hardening
619k4leg (https://github.com/k4leg)
620 - fix PyCharm profiles
618Kaan Genç (https://github.com/SeriousBug) 621Kaan Genç (https://github.com/SeriousBug)
619 - dynamic allocation of noblacklist buffer 622 - dynamic allocation of noblacklist buffer
620Karoshi42 (https://github.com/karoshi42) 623Karoshi42 (https://github.com/karoshi42)
diff --git a/README.md b/README.md
index a9df34c77..21ee88979 100644
--- a/README.md
+++ b/README.md
@@ -306,34 +306,39 @@ No include .local found in /etc/firejail/noprofile.profile
306Warning: multiple caps in /etc/firejail/transmission-daemon.profile 306Warning: multiple caps in /etc/firejail/transmission-daemon.profile
307 307
308Stats: 308Stats:
309 profiles 1196 309 profiles 1205
310 include local profile 1195 (include profile-name.local) 310 include local profile 1204 (include profile-name.local)
311 include globals 1169 (include globals.local) 311 include globals 1178 (include globals.local)
312 blacklist ~/.ssh 1067 (include disable-common.inc) 312 blacklist ~/.ssh 1076 (include disable-common.inc)
313 seccomp 1087 313 seccomp 1095
314 capabilities 1190 314 capabilities 1199
315 noexec 1075 (include disable-exec.inc) 315 noexec 1084 (include disable-exec.inc)
316 noroot 995 316 noroot 1002
317 memory-deny-write-execute 269 317 memory-deny-write-execute 272
318 apparmor 713 318 restrict-namespaces 962
319 private-bin 695 319 apparmor 720
320 private-dev 1045 320 private-bin 704
321 private-etc 542 321 private-dev 1055
322 private-lib 70 322 private-etc 546
323 private-tmp 918 323 private-lib 71
324 whitelist home directory 575 324 private-tmp 929
325 whitelist var 858 (include whitelist-var-common.inc) 325 whitelist home directory 581
326 whitelist run/user 1164 (include whitelist-runuser-common.inc 326 whitelist var 867 (include whitelist-var-common.inc)
327 whitelist run/user 1173 (include whitelist-runuser-common.inc
327 or blacklist ${RUNUSER}) 328 or blacklist ${RUNUSER})
328 whitelist usr/share 630 (include whitelist-usr-share-common.inc 329 whitelist usr/share 637 (include whitelist-usr-share-common.inc
329 net none 404 330 net none 410
330 dbus-user none 677 331 dbus-user none 677
331 dbus-user filter 123 332 dbus-user filter 137
332 dbus-system none 837 333 dbus-system none 848
333 dbus-system filter 12 334 dbus-system filter 12
335
334``` 336```
335 337
336### New profiles: 338### New profiles:
337 339
338onionshare, onionshare-cli, opera-developer, songrec, gdu, makedeb, lbry-viewer, tuir, 340onionshare, onionshare-cli, opera-developer, songrec, gdu, makedeb, lbry-viewer, tuir,
339cinelerra-gg 341cinelerra-gg, tesseract, avidemux3_cli, avidemux3_jobs_qt5, avidemux3_qt5, ssmtp
342
343
344
diff --git a/RELNOTES b/RELNOTES
index 327cfdb36..4d01e9651 100644
--- a/RELNOTES
+++ b/RELNOTES
@@ -1,13 +1,21 @@
1firejail (0.9.71) baseline; urgency=low 1firejail (0.9.72rc1) baseline; urgency=low
2 * work in progress 2 * work in progress
3 * feature: On failing to remount a fuse filesystem, give warning instead of 3 * feature: On failing to remount a fuse filesystem, give warning instead of
4 erroring out (#5240 #5242) 4 erroring out (#5240 #5242)
5 * feature: restrict namespaces (--restrict-namespaces) implemented as 5 * feature: Update syscall tables and seccomp groups (#5188)
6 a seccomp filter for both 64 and 32 bit architectures (#4939 #5259) 6 * feature: improve force-nonewprivs security guarantees (#5217 #5271)
7 * feature: support for custom AppArmor profiles (--apparmor=) (#5274 #5316 7 * feature: add support for restricting the creation of Linux namespaces
8 #5317) 8 (--restrict-namespaces, --restrict-namespaces=), implemented as a seccomp
9 * feature: added support for ICMP in nettrace 9 filter for both 64 and 32 bit architectures (#4939 #5259)
10 * feature: --dnstrace, --icmptrace, and --snitrace 10 * feature: add support for custom AppArmor profiles (--apparmor=) (#5274
11 #5316 #5317)
12 * feature: add support for ICMP in nettrace
13 * feature: add --dnstrace, --icmptrace, and --snitrace commands
14 * feature: Add basic gtksourceview language-spec (file type detection/syntax
15 highlighting for profiles) (#5502)
16 * feature: add restrict-namespaces to (almost) all applicable profiles (#5440
17 #5537)
18 * feature: add support for netlock in profile files
11 * modif: removed --cgroup= command (#5190 #5200) 19 * modif: removed --cgroup= command (#5190 #5200)
12 * modif: set --shell=none as the default (#5190) 20 * modif: set --shell=none as the default (#5190)
13 * modif: removed --shell= command (#5190 #5196 #5209) 21 * modif: removed --shell= command (#5190 #5196 #5209)
@@ -29,8 +37,16 @@ firejail (0.9.71) baseline; urgency=low
29 * build: only install ids.config when --enable-ids is set (#5356 #5357) 37 * build: only install ids.config when --enable-ids is set (#5356 #5357)
30 * build: Remove deprecated syntax and modernize shell test scripts (#5370) 38 * build: Remove deprecated syntax and modernize shell test scripts (#5370)
31 * build: Fix musl warnings (#5421 #5431) 39 * build: Fix musl warnings (#5421 #5431)
40 * build: sort.py improvements (#5429)
41 * build: deduplicate makefiles (#5478)
42 * build: fix formatting and misc in configure (#5488)
43 * build: actually set LDFLAGS/LIBS & stop overriding CFLAGS/LDFLAGS (#5504)
32 * ci: bump ubuntu to 22.04 and use newer compilers / analyzers (#5275) 44 * ci: bump ubuntu to 22.04 and use newer compilers / analyzers (#5275)
33 * ci: ignore git-related paths and the project license (#5249) 45 * ci: ignore git-related paths and the project license (#5249)
46 * ci: Harden GitHub Actions (StepSecurity) (#5439)
47 * ci: sort and ignore more paths (#5481)
48 * ci: whitelist needed endpoints and block access to sudo (#5485)
49 * docs: fix typos (#5189 #5349)
34 * docs: mention risk of SUID binaries and also firejail-users(5) (#5288 50 * docs: mention risk of SUID binaries and also firejail-users(5) (#5288
35 #5290) 51 #5290)
36 * docs: set vim filetype on man pages for syntax highlighting (#5296) 52 * docs: set vim filetype on man pages for syntax highlighting (#5296)
@@ -38,6 +54,10 @@ firejail (0.9.71) baseline; urgency=low
38 * docs: Add IRC channel info to README.md (#5361) 54 * docs: Add IRC channel info to README.md (#5361)
39 * docs: man: Note that some commands can be disabled in firejail.config 55 * docs: man: Note that some commands can be disabled in firejail.config
40 (#5366) 56 (#5366)
57 * docs: Add gist note to bug_report.md (#5398)
58 * docs: clarify that --appimage should appear before --profile (#5402 #5451)
59 * docs: add more Firefox examples to the firejail-local AppArmor profile
60 (#5493)
41 -- netblue30 <netblue30@yahoo.com> Sat, 11 Jun 2022 09:00:00 -0500 61 -- netblue30 <netblue30@yahoo.com> Sat, 11 Jun 2022 09:00:00 -0500
42 62
43firejail (0.9.70) baseline; urgency=low 63firejail (0.9.70) baseline; urgency=low
diff --git a/config.mk.in b/config.mk.in
index 9973b7eaa..cfef6b8d3 100644
--- a/config.mk.in
+++ b/config.mk.in
@@ -51,8 +51,15 @@ HAVE_ONLY_SYSCFG_PROFILES=@HAVE_ONLY_SYSCFG_PROFILES@
51 51
52MANFLAGS = $(HAVE_LTS) $(HAVE_OUTPUT) $(HAVE_X11) $(HAVE_PRIVATE_HOME) $(HAVE_APPARMOR) $(HAVE_IDS) $(HAVE_OVERLAYFS) $(HAVE_USERTMPFS) $(HAVE_DBUSPROXY) $(HAVE_FIRETUNNEL) $(HAVE_GLOBALCFG) $(HAVE_CHROOT) $(HAVE_NETWORK) $(HAVE_USERNS) $(HAVE_FILE_TRANSFER) $(HAVE_SELINUX) $(HAVE_SUID) $(HAVE_FORCE_NONEWPRIVS) $(HAVE_ONLY_SYSCFG_PROFILES) 52MANFLAGS = $(HAVE_LTS) $(HAVE_OUTPUT) $(HAVE_X11) $(HAVE_PRIVATE_HOME) $(HAVE_APPARMOR) $(HAVE_IDS) $(HAVE_OVERLAYFS) $(HAVE_USERTMPFS) $(HAVE_DBUSPROXY) $(HAVE_FIRETUNNEL) $(HAVE_GLOBALCFG) $(HAVE_CHROOT) $(HAVE_NETWORK) $(HAVE_USERNS) $(HAVE_FILE_TRANSFER) $(HAVE_SELINUX) $(HAVE_SUID) $(HAVE_FORCE_NONEWPRIVS) $(HAVE_ONLY_SYSCFG_PROFILES)
53 53
54# User variables - should not be modified in the code (as they are reserved for
55# the user building the package); see the following for details:
56# https://www.gnu.org/software/automake/manual/1.16.5/html_node/User-Variables.html
54CC=@CC@ 57CC=@CC@
55CFLAGS=@CFLAGS@ 58CFLAGS=@CFLAGS@
59LDFLAGS=@LDFLAGS@
60
61# Project variables
62LIBS=@LIBS@
56 63
57ifdef NO_EXTRA_CFLAGS 64ifdef NO_EXTRA_CFLAGS
58else 65else
diff --git a/configure b/configure
index f3bd77169..71deb5512 100755
--- a/configure
+++ b/configure
@@ -1,6 +1,6 @@
1#! /bin/sh 1#! /bin/sh
2# Guess values for system-dependent variables and create Makefiles. 2# Guess values for system-dependent variables and create Makefiles.
3# Generated by GNU Autoconf 2.69 for firejail 0.9.71. 3# Generated by GNU Autoconf 2.69 for firejail 0.9.72rc1.
4# 4#
5# Report bugs to <netblue30@protonmail.com>. 5# Report bugs to <netblue30@protonmail.com>.
6# 6#
@@ -580,8 +580,8 @@ MAKEFLAGS=
580# Identity of this package. 580# Identity of this package.
581PACKAGE_NAME='firejail' 581PACKAGE_NAME='firejail'
582PACKAGE_TARNAME='firejail' 582PACKAGE_TARNAME='firejail'
583PACKAGE_VERSION='0.9.71' 583PACKAGE_VERSION='0.9.72rc1'
584PACKAGE_STRING='firejail 0.9.71' 584PACKAGE_STRING='firejail 0.9.72rc1'
585PACKAGE_BUGREPORT='netblue30@protonmail.com' 585PACKAGE_BUGREPORT='netblue30@protonmail.com'
586PACKAGE_URL='https://firejail.wordpress.com' 586PACKAGE_URL='https://firejail.wordpress.com'
587 587
@@ -1298,7 +1298,7 @@ if test "$ac_init_help" = "long"; then
1298 # Omit some internal or obsolete options to make the list less imposing. 1298 # Omit some internal or obsolete options to make the list less imposing.
1299 # This message is too long to be a string in the A/UX 3.1 sh. 1299 # This message is too long to be a string in the A/UX 3.1 sh.
1300 cat <<_ACEOF 1300 cat <<_ACEOF
1301\`configure' configures firejail 0.9.71 to adapt to many kinds of systems. 1301\`configure' configures firejail 0.9.72rc1 to adapt to many kinds of systems.
1302 1302
1303Usage: $0 [OPTION]... [VAR=VALUE]... 1303Usage: $0 [OPTION]... [VAR=VALUE]...
1304 1304
@@ -1360,7 +1360,7 @@ fi
1360 1360
1361if test -n "$ac_init_help"; then 1361if test -n "$ac_init_help"; then
1362 case $ac_init_help in 1362 case $ac_init_help in
1363 short | recursive ) echo "Configuration of firejail 0.9.71:";; 1363 short | recursive ) echo "Configuration of firejail 0.9.72rc1:";;
1364 esac 1364 esac
1365 cat <<\_ACEOF 1365 cat <<\_ACEOF
1366 1366
@@ -1484,7 +1484,7 @@ fi
1484test -n "$ac_init_help" && exit $ac_status 1484test -n "$ac_init_help" && exit $ac_status
1485if $ac_init_version; then 1485if $ac_init_version; then
1486 cat <<\_ACEOF 1486 cat <<\_ACEOF
1487firejail configure 0.9.71 1487firejail configure 0.9.72rc1
1488generated by GNU Autoconf 2.69 1488generated by GNU Autoconf 2.69
1489 1489
1490Copyright (C) 2012 Free Software Foundation, Inc. 1490Copyright (C) 2012 Free Software Foundation, Inc.
@@ -1740,7 +1740,7 @@ cat >config.log <<_ACEOF
1740This file contains any messages produced by compilers while 1740This file contains any messages produced by compilers while
1741running configure, to aid debugging if configure makes a mistake. 1741running configure, to aid debugging if configure makes a mistake.
1742 1742
1743It was created by firejail $as_me 0.9.71, which was 1743It was created by firejail $as_me 0.9.72rc1, which was
1744generated by GNU Autoconf 2.69. Invocation command line was 1744generated by GNU Autoconf 2.69. Invocation command line was
1745 1745
1746 $ $0 $@ 1746 $ $0 $@
@@ -2914,7 +2914,9 @@ fi
2914{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $ax_cv_check_cflags___mindirect_branch_thunk" >&5 2914{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $ax_cv_check_cflags___mindirect_branch_thunk" >&5
2915$as_echo "$ax_cv_check_cflags___mindirect_branch_thunk" >&6; } 2915$as_echo "$ax_cv_check_cflags___mindirect_branch_thunk" >&6; }
2916if test "x$ax_cv_check_cflags___mindirect_branch_thunk" = xyes; then : 2916if test "x$ax_cv_check_cflags___mindirect_branch_thunk" = xyes; then :
2917 HAVE_SPECTRE="yes" && EXTRA_CFLAGS="$EXTRA_CFLAGS -mindirect-branch=thunk" 2917
2918 HAVE_SPECTRE="yes"
2919 EXTRA_CFLAGS="$EXTRA_CFLAGS -mindirect-branch=thunk"
2918 2920
2919else 2921else
2920 : 2922 :
@@ -2950,7 +2952,9 @@ fi
2950{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $ax_cv_check_cflags___mretpoline" >&5 2952{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $ax_cv_check_cflags___mretpoline" >&5
2951$as_echo "$ax_cv_check_cflags___mretpoline" >&6; } 2953$as_echo "$ax_cv_check_cflags___mretpoline" >&6; }
2952if test "x$ax_cv_check_cflags___mretpoline" = xyes; then : 2954if test "x$ax_cv_check_cflags___mretpoline" = xyes; then :
2953 HAVE_SPECTRE="yes" && EXTRA_CFLAGS="$EXTRA_CFLAGS -mretpoline" 2955
2956 HAVE_SPECTRE="yes"
2957 EXTRA_CFLAGS="$EXTRA_CFLAGS -mretpoline"
2954 2958
2955else 2959else
2956 : 2960 :
@@ -2986,7 +2990,9 @@ fi
2986{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $ax_cv_check_cflags___fstack_clash_protection" >&5 2990{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $ax_cv_check_cflags___fstack_clash_protection" >&5
2987$as_echo "$ax_cv_check_cflags___fstack_clash_protection" >&6; } 2991$as_echo "$ax_cv_check_cflags___fstack_clash_protection" >&6; }
2988if test "x$ax_cv_check_cflags___fstack_clash_protection" = xyes; then : 2992if test "x$ax_cv_check_cflags___fstack_clash_protection" = xyes; then :
2989 HAVE_SPECTRE="yes" && EXTRA_CFLAGS="$EXTRA_CFLAGS -fstack-clash-protection" 2993
2994 HAVE_SPECTRE="yes"
2995 EXTRA_CFLAGS="$EXTRA_CFLAGS -fstack-clash-protection"
2990 2996
2991else 2997else
2992 : 2998 :
@@ -3022,7 +3028,9 @@ fi
3022{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $ax_cv_check_cflags___fstack_protector_strong" >&5 3028{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $ax_cv_check_cflags___fstack_protector_strong" >&5
3023$as_echo "$ax_cv_check_cflags___fstack_protector_strong" >&6; } 3029$as_echo "$ax_cv_check_cflags___fstack_protector_strong" >&6; }
3024if test "x$ax_cv_check_cflags___fstack_protector_strong" = xyes; then : 3030if test "x$ax_cv_check_cflags___fstack_protector_strong" = xyes; then :
3025 HAVE_SPECTRE="yes" && EXTRA_CFLAGS="$EXTRA_CFLAGS -fstack-protector-strong" 3031
3032 HAVE_SPECTRE="yes"
3033 EXTRA_CFLAGS="$EXTRA_CFLAGS -fstack-protector-strong"
3026 3034
3027else 3035else
3028 : 3036 :
@@ -3048,7 +3056,8 @@ else
3048fi 3056fi
3049 3057
3050if test "x$enable_sanitizer" != "xno" ; then : 3058if test "x$enable_sanitizer" != "xno" ; then :
3051 as_CACHEVAR=`$as_echo "ax_cv_check_cflags__-fsanitize=$enable_sanitizer" | $as_tr_sh` 3059
3060 as_CACHEVAR=`$as_echo "ax_cv_check_cflags__-fsanitize=$enable_sanitizer" | $as_tr_sh`
3052{ $as_echo "$as_me:${as_lineno-$LINENO}: checking whether C compiler accepts -fsanitize=$enable_sanitizer" >&5 3061{ $as_echo "$as_me:${as_lineno-$LINENO}: checking whether C compiler accepts -fsanitize=$enable_sanitizer" >&5
3053$as_echo_n "checking whether C compiler accepts -fsanitize=$enable_sanitizer... " >&6; } 3062$as_echo_n "checking whether C compiler accepts -fsanitize=$enable_sanitizer... " >&6; }
3054if eval \${$as_CACHEVAR+:} false; then : 3063if eval \${$as_CACHEVAR+:} false; then :
@@ -3086,9 +3095,9 @@ if eval test \"x\$"$as_CACHEVAR"\" = x"yes"; then :
3086 3095
3087else 3096else
3088 as_fn_error $? "sanitizer not supported: $enable_sanitizer" "$LINENO" 5 3097 as_fn_error $? "sanitizer not supported: $enable_sanitizer" "$LINENO" 5
3089
3090fi 3098fi
3091 3099
3100
3092fi 3101fi
3093 3102
3094HAVE_IDS="" 3103HAVE_IDS=""
@@ -3323,7 +3332,10 @@ else
3323 AA_LIBS=$pkg_cv_AA_LIBS 3332 AA_LIBS=$pkg_cv_AA_LIBS
3324 { $as_echo "$as_me:${as_lineno-$LINENO}: result: yes" >&5 3333 { $as_echo "$as_me:${as_lineno-$LINENO}: result: yes" >&5
3325$as_echo "yes" >&6; } 3334$as_echo "yes" >&6; }
3326 EXTRA_CFLAGS="$EXTRA_CFLAGS $AA_CFLAGS" && EXTRA_LDFLAGS="$EXTRA_LDFLAGS $AA_LIBS" 3335
3336 EXTRA_CFLAGS="$EXTRA_CFLAGS $AA_CFLAGS"
3337 LIBS="$LIBS $AA_LIBS"
3338
3327fi 3339fi
3328 3340
3329fi 3341fi
@@ -3338,14 +3350,13 @@ fi
3338if test "x$enable_selinux" = "xyes"; then : 3350if test "x$enable_selinux" = "xyes"; then :
3339 3351
3340 HAVE_SELINUX="-DHAVE_SELINUX" 3352 HAVE_SELINUX="-DHAVE_SELINUX"
3341 EXTRA_LDFLAGS="$EXTRA_LDFLAGS -lselinux" 3353 LIBS="$LIBS -lselinux"
3342 3354
3343fi 3355fi
3344 3356
3345 3357
3346 3358
3347 3359
3348
3349HAVE_DBUSPROXY="" 3360HAVE_DBUSPROXY=""
3350 3361
3351# Check whether --enable-dbusproxy was given. 3362# Check whether --enable-dbusproxy was given.
@@ -3591,7 +3602,6 @@ if test "x$enable_busybox_workaround" = "xyes"; then :
3591 3602
3592fi 3603fi
3593 3604
3594
3595HAVE_GCOV="" 3605HAVE_GCOV=""
3596 3606
3597# Check whether --enable-gcov was given. 3607# Check whether --enable-gcov was given.
@@ -3602,7 +3612,8 @@ fi
3602if test "x$enable_gcov" = "xyes"; then : 3612if test "x$enable_gcov" = "xyes"; then :
3603 3613
3604 HAVE_GCOV="--coverage -DHAVE_GCOV" 3614 HAVE_GCOV="--coverage -DHAVE_GCOV"
3605 EXTRA_LDFLAGS="$EXTRA_LDFLAGS -lgcov --coverage" 3615 EXTRA_LDFLAGS="$EXTRA_LDFLAGS --coverage"
3616 LIBS="$LIBS -lgcov"
3606 3617
3607fi 3618fi
3608 3619
@@ -3615,7 +3626,7 @@ fi
3615 3626
3616if test "x$enable_contrib_install" = "xno"; then : 3627if test "x$enable_contrib_install" = "xno"; then :
3617 3628
3618 HAVE_CONTRIB_INSTALL="no" 3629 HAVE_CONTRIB_INSTALL="no"
3619 3630
3620fi 3631fi
3621 3632
@@ -3641,7 +3652,7 @@ fi
3641 3652
3642if test "x$enable_only_syscfg_profiles" = "xyes"; then : 3653if test "x$enable_only_syscfg_profiles" = "xyes"; then :
3643 3654
3644 HAVE_ONLY_SYSCFG_PROFILES="-DHAVE_ONLY_SYSCFG_PROFILES" 3655 HAVE_ONLY_SYSCFG_PROFILES="-DHAVE_ONLY_SYSCFG_PROFILES"
3645 3656
3646fi 3657fi
3647 3658
@@ -3670,7 +3681,7 @@ if test "x$enable_lts" = "xyes"; then :
3670 HAVE_FILE_TRANSFER="" 3681 HAVE_FILE_TRANSFER=""
3671 HAVE_SUID="-DHAVE_SUID" 3682 HAVE_SUID="-DHAVE_SUID"
3672 BUSYBOX_WORKAROUND="no" 3683 BUSYBOX_WORKAROUND="no"
3673 HAVE_CONTRIB_INSTALL="no", 3684 HAVE_CONTRIB_INSTALL="no"
3674 3685
3675fi 3686fi
3676 3687
@@ -4629,7 +4640,7 @@ cat >>$CONFIG_STATUS <<\_ACEOF || ac_write_fail=1
4629# report actual input values of CONFIG_FILES etc. instead of their 4640# report actual input values of CONFIG_FILES etc. instead of their
4630# values after options handling. 4641# values after options handling.
4631ac_log=" 4642ac_log="
4632This file was extended by firejail $as_me 0.9.71, which was 4643This file was extended by firejail $as_me 0.9.72rc1, which was
4633generated by GNU Autoconf 2.69. Invocation command line was 4644generated by GNU Autoconf 2.69. Invocation command line was
4634 4645
4635 CONFIG_FILES = $CONFIG_FILES 4646 CONFIG_FILES = $CONFIG_FILES
@@ -4683,7 +4694,7 @@ _ACEOF
4683cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1 4694cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1
4684ac_cs_config="`$as_echo "$ac_configure_args" | sed 's/^ //; s/[\\""\`\$]/\\\\&/g'`" 4695ac_cs_config="`$as_echo "$ac_configure_args" | sed 's/^ //; s/[\\""\`\$]/\\\\&/g'`"
4685ac_cs_version="\\ 4696ac_cs_version="\\
4686firejail config.status 0.9.71 4697firejail config.status 0.9.72rc1
4687configured by $0, generated by GNU Autoconf 2.69, 4698configured by $0, generated by GNU Autoconf 2.69,
4688 with options \\"\$ac_cs_config\\" 4699 with options \\"\$ac_cs_config\\"
4689 4700
@@ -5248,8 +5259,12 @@ fi
5248cat <<EOF 5259cat <<EOF
5249 5260
5250Compile options: 5261Compile options:
5262 CC: $CC
5263 CFLAGS: $CFLAGS
5264 LDFLAGS: $LDFLAGS
5251 EXTRA_CFLAGS: $EXTRA_CFLAGS 5265 EXTRA_CFLAGS: $EXTRA_CFLAGS
5252 EXTRA_LDFLAGS: $EXTRA_LDFLAGS 5266 EXTRA_LDFLAGS: $EXTRA_LDFLAGS
5267 LIBS: $LIBS
5253 fatal warnings: $HAVE_FATAL_WARNINGS 5268 fatal warnings: $HAVE_FATAL_WARNINGS
5254 gcov instrumentation: $HAVE_GCOV 5269 gcov instrumentation: $HAVE_GCOV
5255 install as a SUID executable: $HAVE_SUID 5270 install as a SUID executable: $HAVE_SUID
@@ -5284,13 +5299,10 @@ EOF
5284 5299
5285if test "$HAVE_LTS" = -DHAVE_LTS; then 5300if test "$HAVE_LTS" = -DHAVE_LTS; then
5286 cat <<\EOF 5301 cat <<\EOF
5287
5288
5289********************************************************* 5302*********************************************************
5290* Warning: Long-term support (LTS) was enabled! * 5303* Warning: Long-term support (LTS) was enabled! *
5291* Most compile-time options have bean rewritten! * 5304* Most compile-time options have been rewritten! *
5292********************************************************* 5305*********************************************************
5293 5306
5294
5295EOF 5307EOF
5296fi 5308fi
diff --git a/configure.ac b/configure.ac
index 8a488ff43..bee9143c2 100644
--- a/configure.ac
+++ b/configure.ac
@@ -12,7 +12,7 @@
12# 12#
13 13
14AC_PREREQ([2.68]) 14AC_PREREQ([2.68])
15AC_INIT([firejail], [0.9.71], [netblue30@protonmail.com], [], 15AC_INIT([firejail], [0.9.72rc1], [netblue30@protonmail.com], [],
16 [https://firejail.wordpress.com]) 16 [https://firejail.wordpress.com])
17 17
18AC_CONFIG_SRCDIR([src/firejail/main.c]) 18AC_CONFIG_SRCDIR([src/firejail/main.c])
@@ -21,22 +21,22 @@ AC_CONFIG_MACRO_DIR([m4])
21AC_PROG_CC 21AC_PROG_CC
22 22
23HAVE_SPECTRE="no" 23HAVE_SPECTRE="no"
24AX_CHECK_COMPILE_FLAG( 24AX_CHECK_COMPILE_FLAG([-mindirect-branch=thunk], [
25 [-mindirect-branch=thunk], 25 HAVE_SPECTRE="yes"
26 [HAVE_SPECTRE="yes" && EXTRA_CFLAGS="$EXTRA_CFLAGS -mindirect-branch=thunk"] 26 EXTRA_CFLAGS="$EXTRA_CFLAGS -mindirect-branch=thunk"
27) 27])
28AX_CHECK_COMPILE_FLAG( 28AX_CHECK_COMPILE_FLAG([-mretpoline], [
29 [-mretpoline], 29 HAVE_SPECTRE="yes"
30 [HAVE_SPECTRE="yes" && EXTRA_CFLAGS="$EXTRA_CFLAGS -mretpoline"] 30 EXTRA_CFLAGS="$EXTRA_CFLAGS -mretpoline"
31) 31])
32AX_CHECK_COMPILE_FLAG( 32AX_CHECK_COMPILE_FLAG([-fstack-clash-protection], [
33 [-fstack-clash-protection], 33 HAVE_SPECTRE="yes"
34 [HAVE_SPECTRE="yes" && EXTRA_CFLAGS="$EXTRA_CFLAGS -fstack-clash-protection"] 34 EXTRA_CFLAGS="$EXTRA_CFLAGS -fstack-clash-protection"
35) 35])
36AX_CHECK_COMPILE_FLAG( 36AX_CHECK_COMPILE_FLAG([-fstack-protector-strong], [
37 [-fstack-protector-strong], 37 HAVE_SPECTRE="yes"
38 [HAVE_SPECTRE="yes" && EXTRA_CFLAGS="$EXTRA_CFLAGS -fstack-protector-strong"] 38 EXTRA_CFLAGS="$EXTRA_CFLAGS -fstack-protector-strong"
39) 39])
40 40
41AC_ARG_ENABLE([analyzer], 41AC_ARG_ENABLE([analyzer],
42 [AS_HELP_STRING([--enable-analyzer], [enable GCC static analyzer])]) 42 [AS_HELP_STRING([--enable-analyzer], [enable GCC static analyzer])])
@@ -45,14 +45,16 @@ AS_IF([test "x$enable_analyzer" = "xyes"], [
45]) 45])
46 46
47AC_ARG_ENABLE([sanitizer], 47AC_ARG_ENABLE([sanitizer],
48 [AS_HELP_STRING([--enable-sanitizer=@<:@address | memory | undefined@:>@], [enable a compiler-based sanitizer (debug)])], 48 [AS_HELP_STRING([--enable-sanitizer=@<:@address | memory | undefined@:>@],
49 [], [enable_sanitizer=no]) 49 [enable a compiler-based sanitizer (debug)])],
50AS_IF([test "x$enable_sanitizer" != "xno" ], 50 [],
51 [AX_CHECK_COMPILE_FLAG([-fsanitize=$enable_sanitizer], [ 51 [enable_sanitizer=no])
52AS_IF([test "x$enable_sanitizer" != "xno" ], [
53 AX_CHECK_COMPILE_FLAG([-fsanitize=$enable_sanitizer], [
52 EXTRA_CFLAGS="$EXTRA_CFLAGS -fsanitize=$enable_sanitizer -fno-omit-frame-pointer" 54 EXTRA_CFLAGS="$EXTRA_CFLAGS -fsanitize=$enable_sanitizer -fno-omit-frame-pointer"
53 EXTRA_LDFLAGS="$EXTRA_LDFLAGS -fsanitize=$enable_sanitizer" 55 EXTRA_LDFLAGS="$EXTRA_LDFLAGS -fsanitize=$enable_sanitizer"
54 ], [AC_MSG_ERROR([sanitizer not supported: $enable_sanitizer])] 56 ], [AC_MSG_ERROR([sanitizer not supported: $enable_sanitizer])])
55)]) 57])
56 58
57HAVE_IDS="" 59HAVE_IDS=""
58AC_SUBST([HAVE_IDS]) 60AC_SUBST([HAVE_IDS])
@@ -68,8 +70,10 @@ AC_ARG_ENABLE([apparmor],
68 [AS_HELP_STRING([--enable-apparmor], [enable apparmor])]) 70 [AS_HELP_STRING([--enable-apparmor], [enable apparmor])])
69AS_IF([test "x$enable_apparmor" = "xyes"], [ 71AS_IF([test "x$enable_apparmor" = "xyes"], [
70 HAVE_APPARMOR="-DHAVE_APPARMOR" 72 HAVE_APPARMOR="-DHAVE_APPARMOR"
71 PKG_CHECK_MODULES([AA], [libapparmor], 73 PKG_CHECK_MODULES([AA], [libapparmor], [
72 [EXTRA_CFLAGS="$EXTRA_CFLAGS $AA_CFLAGS" && EXTRA_LDFLAGS="$EXTRA_LDFLAGS $AA_LIBS"]) 74 EXTRA_CFLAGS="$EXTRA_CFLAGS $AA_CFLAGS"
75 LIBS="$LIBS $AA_LIBS"
76 ])
73]) 77])
74 78
75HAVE_SELINUX="" 79HAVE_SELINUX=""
@@ -78,13 +82,12 @@ AC_ARG_ENABLE([selinux],
78 [AS_HELP_STRING([--enable-selinux], [SELinux labeling support])]) 82 [AS_HELP_STRING([--enable-selinux], [SELinux labeling support])])
79AS_IF([test "x$enable_selinux" = "xyes"], [ 83AS_IF([test "x$enable_selinux" = "xyes"], [
80 HAVE_SELINUX="-DHAVE_SELINUX" 84 HAVE_SELINUX="-DHAVE_SELINUX"
81 EXTRA_LDFLAGS="$EXTRA_LDFLAGS -lselinux" 85 LIBS="$LIBS -lselinux"
82]) 86])
83 87
84AC_SUBST([EXTRA_CFLAGS]) 88AC_SUBST([EXTRA_CFLAGS])
85AC_SUBST([EXTRA_LDFLAGS]) 89AC_SUBST([EXTRA_LDFLAGS])
86 90
87
88HAVE_DBUSPROXY="" 91HAVE_DBUSPROXY=""
89AC_SUBST([HAVE_DBUSPROXY]) 92AC_SUBST([HAVE_DBUSPROXY])
90AC_ARG_ENABLE([dbusproxy], 93AC_ARG_ENABLE([dbusproxy],
@@ -217,14 +220,14 @@ AS_IF([test "x$enable_busybox_workaround" = "xyes"], [
217 BUSYBOX_WORKAROUND="yes" 220 BUSYBOX_WORKAROUND="yes"
218]) 221])
219 222
220
221HAVE_GCOV="" 223HAVE_GCOV=""
222AC_SUBST([HAVE_GCOV]) 224AC_SUBST([HAVE_GCOV])
223AC_ARG_ENABLE([gcov], 225AC_ARG_ENABLE([gcov],
224 [AS_HELP_STRING([--enable-gcov], [Gcov instrumentation])]) 226 [AS_HELP_STRING([--enable-gcov], [Gcov instrumentation])])
225AS_IF([test "x$enable_gcov" = "xyes"], [ 227AS_IF([test "x$enable_gcov" = "xyes"], [
226 HAVE_GCOV="--coverage -DHAVE_GCOV" 228 HAVE_GCOV="--coverage -DHAVE_GCOV"
227 EXTRA_LDFLAGS="$EXTRA_LDFLAGS -lgcov --coverage" 229 EXTRA_LDFLAGS="$EXTRA_LDFLAGS --coverage"
230 LIBS="$LIBS -lgcov"
228]) 231])
229 232
230HAVE_CONTRIB_INSTALL="yes" 233HAVE_CONTRIB_INSTALL="yes"
@@ -232,7 +235,7 @@ AC_SUBST([HAVE_CONTRIB_INSTALL])
232AC_ARG_ENABLE([contrib-install], 235AC_ARG_ENABLE([contrib-install],
233 [AS_HELP_STRING([--enable-contrib-install], [install contrib scripts])]) 236 [AS_HELP_STRING([--enable-contrib-install], [install contrib scripts])])
234AS_IF([test "x$enable_contrib_install" = "xno"], [ 237AS_IF([test "x$enable_contrib_install" = "xno"], [
235 HAVE_CONTRIB_INSTALL="no" 238 HAVE_CONTRIB_INSTALL="no"
236]) 239])
237 240
238HAVE_FORCE_NONEWPRIVS="" 241HAVE_FORCE_NONEWPRIVS=""
@@ -248,7 +251,7 @@ AC_SUBST([HAVE_ONLY_SYSCFG_PROFILES])
248AC_ARG_ENABLE([only-syscfg-profiles], 251AC_ARG_ENABLE([only-syscfg-profiles],
249 [AS_HELP_STRING([--enable-only-syscfg-profiles], [disable profiles in $HOME/.config/firejail])]) 252 [AS_HELP_STRING([--enable-only-syscfg-profiles], [disable profiles in $HOME/.config/firejail])])
250AS_IF([test "x$enable_only_syscfg_profiles" = "xyes"], [ 253AS_IF([test "x$enable_only_syscfg_profiles" = "xyes"], [
251 HAVE_ONLY_SYSCFG_PROFILES="-DHAVE_ONLY_SYSCFG_PROFILES" 254 HAVE_ONLY_SYSCFG_PROFILES="-DHAVE_ONLY_SYSCFG_PROFILES"
252]) 255])
253 256
254HAVE_LTS="" 257HAVE_LTS=""
@@ -272,10 +275,11 @@ AS_IF([test "x$enable_lts" = "xyes"], [
272 HAVE_FILE_TRANSFER="" 275 HAVE_FILE_TRANSFER=""
273 HAVE_SUID="-DHAVE_SUID" 276 HAVE_SUID="-DHAVE_SUID"
274 BUSYBOX_WORKAROUND="no" 277 BUSYBOX_WORKAROUND="no"
275 HAVE_CONTRIB_INSTALL="no", 278 HAVE_CONTRIB_INSTALL="no"
276]) 279])
277 280
278AC_CHECK_HEADER([linux/seccomp.h], [], AC_MSG_ERROR([*** SECCOMP support is not installed (/usr/include/linux/seccomp.h missing) ***])) 281AC_CHECK_HEADER([linux/seccomp.h], [],
282 [AC_MSG_ERROR([*** SECCOMP support is not installed (/usr/include/linux/seccomp.h missing) ***])])
279 283
280# set sysconfdir 284# set sysconfdir
281if test "$prefix" = /usr; then 285if test "$prefix" = /usr; then
@@ -288,8 +292,12 @@ AC_OUTPUT
288cat <<EOF 292cat <<EOF
289 293
290Compile options: 294Compile options:
295 CC: $CC
296 CFLAGS: $CFLAGS
297 LDFLAGS: $LDFLAGS
291 EXTRA_CFLAGS: $EXTRA_CFLAGS 298 EXTRA_CFLAGS: $EXTRA_CFLAGS
292 EXTRA_LDFLAGS: $EXTRA_LDFLAGS 299 EXTRA_LDFLAGS: $EXTRA_LDFLAGS
300 LIBS: $LIBS
293 fatal warnings: $HAVE_FATAL_WARNINGS 301 fatal warnings: $HAVE_FATAL_WARNINGS
294 gcov instrumentation: $HAVE_GCOV 302 gcov instrumentation: $HAVE_GCOV
295 install as a SUID executable: $HAVE_SUID 303 install as a SUID executable: $HAVE_SUID
@@ -324,13 +332,10 @@ EOF
324 332
325if test "$HAVE_LTS" = -DHAVE_LTS; then 333if test "$HAVE_LTS" = -DHAVE_LTS; then
326 cat <<\EOF 334 cat <<\EOF
327
328
329********************************************************* 335*********************************************************
330* Warning: Long-term support (LTS) was enabled! * 336* Warning: Long-term support (LTS) was enabled! *
331* Most compile-time options have bean rewritten! * 337* Most compile-time options have been rewritten! *
332********************************************************* 338*********************************************************
333 339
334
335EOF 340EOF
336fi 341fi
diff --git a/contrib/gtksourceview-5/language-specs/firejail-profile.lang b/contrib/gtksourceview-5/language-specs/firejail-profile.lang
new file mode 100644
index 000000000..61c37f98f
--- /dev/null
+++ b/contrib/gtksourceview-5/language-specs/firejail-profile.lang
@@ -0,0 +1,69 @@
1<?xml version="1.0" encoding="UTF-8"?>
2<!-- vim: set ts=2 sts=2 sw=2 et: -->
3<!--
4 https://gitlab.gnome.org/GNOME/gtksourceview/-/blob/master/docs/lang-tutorial.md
5 https://gitlab.gnome.org/GNOME/gtksourceview/-/blob/master/docs/lang-reference.md
6-->
7<language id="firejail-profile" name="Firejail Profile" version="2.0" _section="Other">
8 <metadata>
9 <property name="mimetypes">text/plain;text/x-firejail-profile</property>
10 <property name="globs">*.profile;*.local;*.inc</property>
11 <property name="line-comment-start">#</property>
12 </metadata>
13
14 <styles>
15 <style id="comment" name="Comment" map-to="def:comment"/>
16 <style id="condition" name="Condition" map-to="def:preprocessor"/>
17 <style id="command" name="Command" map-to="def:keyword"/>
18 <style id="invalid" name="Invalid" map-to="def:error"/>
19 </styles>
20
21 <definitions>
22 <define-regex id="commands-with-arguments" extended="true">
23 (apparmor|bind|blacklist-nolog|blacklist|caps.drop|caps.keep|cpu|dbus-system.broadcast|dbus-system.call|dbus-system.own|dbus-system.see|dbus-system.talk|dbus-system|dbus-user.broadcast|dbus-user.call|dbus-user.own|dbus-user.see|dbus-user.talk|dbus-user|defaultgw|dns|env|hostname|hosts-file|ignore|include|ip6|ip|iprange|join-or-start|keep-fd|mac|mkdir|mkfile|mtu|name|net|netfilter6|netfilter|netmask|netns|nice|noblacklist|noexec|nowhitelist|overlay-named|private-bin|private-cwd|private-etc|private-home|private-lib|private-opt|private-srv|private|protocol|read-only|read-write|restrict-namespaces|rlimit-as|rlimit-cpu|rlimit-fsize|rlimit-nofile|rlimit-nproc|rlimit-sigpending|rlimit|rmenv|seccomp-error-action|seccomp.32.drop|seccomp.32.keep|seccomp.32|seccomp.drop|seccomp.keep|seccomp|shell|timeout|tmpfs|veth-name|whitelist-ro|whitelist|x11|xephyr-screen)
24 </define-regex>
25
26 <define-regex id="commands-without-arguments" extended="true">
27 (allow-debuggers|allusers|apparmor|caps|deterministic-exit-code|deterministic-shutdown|disable-mnt|ipc-namespace|keep-config-pulse|keep-dev-shm|keep-fd|keep-var-tmp|machine-id|memory-deny-write-execute|netfilter|no3d|noautopulse|nodbus|nodvd|nogroups|noinput|nonewprivs|noprinters|noroot|nosound|notv|nou2f|novideo|overlay-tmpfs|overlay|private-cache|private-cwd|private-dev|private-lib|private-tmp|private|quiet|restrict-namespaces|seccomp.32|seccomp.block-secondary|seccomp|tab|tracelog|writable-etc|writable-run-user|writable-var-log|writable-var|x11)
28 </define-regex>
29
30 <define-regex id="conditions" extended="true">
31 (ALLOW_TRAY|BROWSER_ALLOW_DRM|BROWSER_DISABLE_U2F|HAS_APPIMAGE|HAS_NET|HAS_NODBUS|HAS_NOSOUND|HAS_X11)
32 </define-regex>
33
34 <context id="conditional-line">
35 <match>\?(?P&lt;condition&gt;\%{conditions}): </match>
36 <include>
37 <context sub-pattern="condition" style-ref="condition"/>
38 </include>
39 </context>
40
41 <context id="command-with-args">
42 <match>(?P&lt;command&gt;\%{commands-with-arguments}) (?P&lt;args&gt;.+)</match>
43 <include>
44 <context sub-pattern="command" style-ref="command"/>
45 </include>
46 </context>
47
48 <context id="command-without-args">
49 <match dupnames="true">(?P&lt;command&gt;\%{commands-without-arguments})</match>
50 <include>
51 <context sub-pattern="command" style-ref="command"/>
52 </include>
53 </context>
54
55 <context id="invalid" style-ref="invalid">
56 <match>.+</match>
57 </context>
58
59 <context id="firejail-profile" class="no-spell-check">
60 <include>
61 <context ref="def:shell-like-comment"/>
62 <context ref="conditional-line"/>
63 <context ref="command-with-args"/>
64 <context ref="command-without-args"/>
65 <context ref="invalid"/>
66 </include>
67 </context>
68 </definitions>
69</language>
diff --git a/contrib/sort.py b/contrib/sort.py
index 6f21370ec..638f14516 100755
--- a/contrib/sort.py
+++ b/contrib/sort.py
@@ -2,48 +2,61 @@
2# This file is part of Firejail project 2# This file is part of Firejail project
3# Copyright (C) 2014-2022 Firejail Authors 3# Copyright (C) 2014-2022 Firejail Authors
4# License GPL v2 4# License GPL v2
5"""
6Sort the items of multi-item options in profiles, the following options are supported:
7 private-bin, private-etc, private-lib, caps.drop, caps.keep, seccomp.drop, seccomp.drop, protocol
8 5
9Usage: 6# Requirements:
10 $ ./sort.py /path/to/profile [ /path/to/profile2 /path/to/profile3 ... ] 7# python >= 3.6
8from os import path
9from sys import argv, exit as sys_exit, stderr
10
11__doc__ = f"""\
12Sort the arguments of commands in profiles.
13
14Usage: {path.basename(argv[0])} [/path/to/profile ...]
15
16The following commands are supported:
17
18 private-bin, private-etc, private-lib, caps.drop, caps.keep, seccomp.drop,
19 seccomp.drop, protocol
20
21Note that this is only applicable to commands that support multiple arguments.
22
11Keep in mind that this will overwrite your profile(s). 23Keep in mind that this will overwrite your profile(s).
12 24
13Examples: 25Examples:
14 $ ./sort.py MyAwesomeProfile.profile 26 $ {argv[0]} MyAwesomeProfile.profile
15 $ ./sort.py new_profile.profile second_new_profile.profile 27 $ {argv[0]} new_profile.profile second_new_profile.profile
16 $ ./sort.py ~/.config/firejail/*.{profile,inc,local} 28 $ {argv[0]} ~/.config/firejail/*.{{profile,inc,local}}
17 $ sudo ./sort.py /etc/firejail/*.{profile,inc,local} 29 $ sudo {argv[0]} /etc/firejail/*.{{profile,inc,local}}
18 30
19Exit-Codes: 31Exit Codes:
20 0: No Error; No Profile Fixed. 32 0: Success: No profiles needed fixing.
21 1: Error, one or more profiles were not processed correctly. 33 1: Error: One or more profiles could not be processed correctly.
22 101: No Error; One or more profile were fixed. 34 2: Error: Missing arguments.
35 101: Info: One or more profiles were fixed.
23""" 36"""
24 37
25# Requirements:
26# python >= 3.6
27from sys import argv, exit as sys_exit
28
29 38
30def sort_alphabetical(raw_items): 39def sort_alphabetical(original_items):
31 items = raw_items.split(",") 40 items = original_items.split(",")
32 items.sort(key=lambda s: s.casefold()) 41 items.sort(key=str.casefold)
33 return ",".join(items) 42 return ",".join(items)
34 43
35 44
36def sort_protocol(protocols): 45def sort_protocol(original_protocols):
37 """sort the given protocols into this scheme: unix,inet,inet6,netlink,packet,bluetooth""" 46 """
47 Sort the given protocols into the following order:
48
49 unix,inet,inet6,netlink,packet,bluetooth
50 """
38 51
39 # shortcut for common protocol lines 52 # shortcut for common protocol lines
40 if protocols in ("unix", "unix,inet,inet6"): 53 if original_protocols in ("unix", "unix,inet,inet6"):
41 return protocols 54 return original_protocols
42 55
43 fixed_protocols = "" 56 fixed_protocols = ""
44 for protocol in ("unix", "inet", "inet6", "netlink", "packet", "bluetooth"): 57 for protocol in ("unix", "inet", "inet6", "netlink", "packet", "bluetooth"):
45 for prefix in ("", "-", "+", "="): 58 for prefix in ("", "-", "+", "="):
46 if f",{prefix}{protocol}," in f",{protocols},": 59 if f",{prefix}{protocol}," in f",{original_protocols},":
47 fixed_protocols += f"{prefix}{protocol}," 60 fixed_protocols += f"{prefix}{protocol},"
48 return fixed_protocols[:-1] 61 return fixed_protocols[:-1]
49 62
@@ -53,7 +66,7 @@ def fix_profile(filename):
53 lines = profile.read().split("\n") 66 lines = profile.read().split("\n")
54 was_fixed = False 67 was_fixed = False
55 fixed_profile = [] 68 fixed_profile = []
56 for lineno, line in enumerate(lines): 69 for lineno, line in enumerate(lines, 1):
57 if line[:12] in ("private-bin ", "private-etc ", "private-lib "): 70 if line[:12] in ("private-bin ", "private-etc ", "private-lib "):
58 fixed_line = f"{line[:12]}{sort_alphabetical(line[12:])}" 71 fixed_line = f"{line[:12]}{sort_alphabetical(line[12:])}"
59 elif line[:13] in ("seccomp.drop ", "seccomp.keep "): 72 elif line[:13] in ("seccomp.drop ", "seccomp.keep "):
@@ -69,8 +82,8 @@ def fix_profile(filename):
69 if fixed_line != line: 82 if fixed_line != line:
70 was_fixed = True 83 was_fixed = True
71 print( 84 print(
72 f"{filename}:{lineno + 1}:-{line}\n" 85 f"{filename}:{lineno}:-{line}\n"
73 f"{filename}:{lineno + 1}:+{fixed_line}" 86 f"{filename}:{lineno}:+{fixed_line}"
74 ) 87 )
75 fixed_profile.append(fixed_line) 88 fixed_profile.append(fixed_line)
76 if was_fixed: 89 if was_fixed:
@@ -84,22 +97,30 @@ def fix_profile(filename):
84 97
85 98
86def main(args): 99def main(args):
100 if len(args) < 1:
101 print(__doc__, file=stderr)
102 return 2
103
104 print(f"sort.py: checking {len(args)} profile(s)...")
105
87 exit_code = 0 106 exit_code = 0
88 print(f"sort.py: checking {len(args)} {'profiles' if len(args) != 1 else 'profile'}...")
89 for filename in args: 107 for filename in args:
90 try: 108 try:
91 if exit_code not in (1, 101): 109 if exit_code not in (1, 101):
92 exit_code = fix_profile(filename) 110 exit_code = fix_profile(filename)
93 else: 111 else:
94 fix_profile(filename) 112 fix_profile(filename)
95 except FileNotFoundError: 113 except FileNotFoundError as err:
96 print(f"[ Error ] Can't find `{filename}'") 114 print(f"[ Error ] {err}", file=stderr)
97 exit_code = 1 115 exit_code = 1
98 except PermissionError: 116 except PermissionError as err:
99 print(f"[ Error ] Can't read/write `{filename}'") 117 print(f"[ Error ] {err}", file=stderr)
100 exit_code = 1 118 exit_code = 1
101 except Exception as err: 119 except Exception as err:
102 print(f"[ Error ] An error occurred while processing `{filename}': {err}") 120 print(
121 f"[ Error ] An error occurred while processing '{filename}': {err}",
122 file=stderr,
123 )
103 exit_code = 1 124 exit_code = 1
104 return exit_code 125 return exit_code
105 126
diff --git a/etc/apparmor/firejail-local b/etc/apparmor/firejail-local
index 59c8f7f8a..e7236b0bc 100644
--- a/etc/apparmor/firejail-local
+++ b/etc/apparmor/firejail-local
@@ -14,5 +14,11 @@
14# Uncomment to opt-in to apparmor for brave + tor 14# Uncomment to opt-in to apparmor for brave + tor
15#owner @{HOME}/.config/BraveSoftware/Brave-Browser/biahpgbdmdkfgndcmfiipgcebobojjkp/*/** ix, 15#owner @{HOME}/.config/BraveSoftware/Brave-Browser/biahpgbdmdkfgndcmfiipgcebobojjkp/*/** ix,
16 16
17# Uncomment to opt-in to apparmor for firefox DRM (gmp-widevinecdm)
18#owner @{HOME}/.mozilla/firefox/*/gm*/** ix,
19
20# Uncomment to opt-in to apparmor for firefox native-messaging-hosts under ${HOME}
21#owner @{HOME}/.mozilla/native-messaging-hosts/** ix,
22
17# Uncomment to opt-in to apparmor for torbrowser-launcher 23# Uncomment to opt-in to apparmor for torbrowser-launcher
18#owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/** ix, 24#owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/** ix,
diff --git a/etc/inc/disable-common.inc b/etc/inc/disable-common.inc
index 23886f1b6..44e45d416 100644
--- a/etc/inc/disable-common.inc
+++ b/etc/inc/disable-common.inc
@@ -558,6 +558,7 @@ blacklist /tmp/tmux-*
558# disable terminals running as server resulting in sandbox escape 558# disable terminals running as server resulting in sandbox escape
559blacklist ${PATH}/gnome-terminal 559blacklist ${PATH}/gnome-terminal
560blacklist ${PATH}/gnome-terminal.wrapper 560blacklist ${PATH}/gnome-terminal.wrapper
561blacklist ${PATH}/kgx
561# blacklist ${PATH}/konsole 562# blacklist ${PATH}/konsole
562# konsole doesn't seem to have this problem - last tested on Ubuntu 16.04 563# konsole doesn't seem to have this problem - last tested on Ubuntu 16.04
563blacklist ${PATH}/lilyterm 564blacklist ${PATH}/lilyterm
@@ -619,7 +620,7 @@ blacklist ${HOME}/mail
619blacklist ${HOME}/postponed 620blacklist ${HOME}/postponed
620blacklist ${HOME}/sent 621blacklist ${HOME}/sent
621 622
622# kernel configuration 623# kernel configuration - keep this here although it's also in disable-proc.inc
623blacklist /proc/config.gz 624blacklist /proc/config.gz
624 625
625# prevent DNS malware attempting to communicate with the server using regular DNS tools 626# prevent DNS malware attempting to communicate with the server using regular DNS tools
diff --git a/etc/inc/disable-proc.inc b/etc/inc/disable-proc.inc
index 81a8883f3..7cb1ec2ab 100644
--- a/etc/inc/disable-proc.inc
+++ b/etc/inc/disable-proc.inc
@@ -8,7 +8,7 @@ blacklist /proc/bootconfig
8blacklist /proc/buddyinfo 8blacklist /proc/buddyinfo
9blacklist /proc/cgroups 9blacklist /proc/cgroups
10blacklist /proc/cmdline 10blacklist /proc/cmdline
11blacklist /proc/config.gz 11blacklist /proc/config.gz # keep this here even though it's also in disable-common.inc
12blacklist /proc/consoles 12blacklist /proc/consoles
13#blacklist /proc/cpuinfo 13#blacklist /proc/cpuinfo
14blacklist /proc/crypto 14blacklist /proc/crypto
diff --git a/etc/inc/disable-programs.inc b/etc/inc/disable-programs.inc
index b86e0bbe4..5e253f232 100644
--- a/etc/inc/disable-programs.inc
+++ b/etc/inc/disable-programs.inc
@@ -42,6 +42,7 @@ blacklist ${HOME}/.asunder_album_title
42blacklist ${HOME}/.atom 42blacklist ${HOME}/.atom
43blacklist ${HOME}/.attic 43blacklist ${HOME}/.attic
44blacklist ${HOME}/.audacity-data 44blacklist ${HOME}/.audacity-data
45blacklist ${HOME}/.avidemux3
45blacklist ${HOME}/.avidemux6 46blacklist ${HOME}/.avidemux6
46blacklist ${HOME}/.ballbuster.hs 47blacklist ${HOME}/.ballbuster.hs
47blacklist ${HOME}/.balsa 48blacklist ${HOME}/.balsa
@@ -67,6 +68,7 @@ blacklist ${HOME}/.cache/GoldenDict
67blacklist ${HOME}/.cache/INRIA 68blacklist ${HOME}/.cache/INRIA
68blacklist ${HOME}/.cache/INRIA/Natron 69blacklist ${HOME}/.cache/INRIA/Natron
69blacklist ${HOME}/.cache/JetBrains/CLion* 70blacklist ${HOME}/.cache/JetBrains/CLion*
71blacklist ${HOME}/.cache/JetBrains/PyCharm*
70blacklist ${HOME}/.cache/KDE/neochat 72blacklist ${HOME}/.cache/KDE/neochat
71blacklist ${HOME}/.cache/Mendeley Ltd. 73blacklist ${HOME}/.cache/Mendeley Ltd.
72blacklist ${HOME}/.cache/MusicBrainz 74blacklist ${HOME}/.cache/MusicBrainz
@@ -83,6 +85,7 @@ blacklist ${HOME}/.cache/agenda
83blacklist ${HOME}/.cache/akonadi* 85blacklist ${HOME}/.cache/akonadi*
84blacklist ${HOME}/.cache/atril 86blacklist ${HOME}/.cache/atril
85blacklist ${HOME}/.cache/attic 87blacklist ${HOME}/.cache/attic
88blacklist ${HOME}/.cache/audacity
86blacklist ${HOME}/.cache/babl 89blacklist ${HOME}/.cache/babl
87blacklist ${HOME}/.cache/bnox 90blacklist ${HOME}/.cache/bnox
88blacklist ${HOME}/.cache/borg 91blacklist ${HOME}/.cache/borg
@@ -113,6 +116,7 @@ blacklist ${HOME}/.cache/fossamail
113blacklist ${HOME}/.cache/fractal 116blacklist ${HOME}/.cache/fractal
114blacklist ${HOME}/.cache/freecol 117blacklist ${HOME}/.cache/freecol
115blacklist ${HOME}/.cache/gajim 118blacklist ${HOME}/.cache/gajim
119blacklist ${HOME}/.cache/gdfuse
116blacklist ${HOME}/.cache/geary 120blacklist ${HOME}/.cache/geary
117blacklist ${HOME}/.cache/geeqie 121blacklist ${HOME}/.cache/geeqie
118blacklist ${HOME}/.cache/gegl-0.4 122blacklist ${HOME}/.cache/gegl-0.4
@@ -280,6 +284,7 @@ blacklist ${HOME}/.config/Gpredict
280blacklist ${HOME}/.config/INRIA 284blacklist ${HOME}/.config/INRIA
281blacklist ${HOME}/.config/InSilmaril 285blacklist ${HOME}/.config/InSilmaril
282blacklist ${HOME}/.config/JetBrains/CLion* 286blacklist ${HOME}/.config/JetBrains/CLion*
287blacklist ${HOME}/.config/JetBrains/PyCharm*
283blacklist ${HOME}/.config/Jitsi Meet 288blacklist ${HOME}/.config/Jitsi Meet
284blacklist ${HOME}/.config/KDE/neochat 289blacklist ${HOME}/.config/KDE/neochat
285blacklist ${HOME}/.config/KeePass 290blacklist ${HOME}/.config/KeePass
@@ -356,6 +361,7 @@ blacklist ${HOME}/.config/artha.log
356blacklist ${HOME}/.config/asunder 361blacklist ${HOME}/.config/asunder
357blacklist ${HOME}/.config/atril 362blacklist ${HOME}/.config/atril
358blacklist ${HOME}/.config/audacious 363blacklist ${HOME}/.config/audacious
364blacklist ${HOME}/.config/audacity
359blacklist ${HOME}/.config/autokey 365blacklist ${HOME}/.config/autokey
360blacklist ${HOME}/.config/avidemux3_qt5rc 366blacklist ${HOME}/.config/avidemux3_qt5rc
361blacklist ${HOME}/.config/aweather 367blacklist ${HOME}/.config/aweather
@@ -431,6 +437,7 @@ blacklist ${HOME}/.config/gajim
431blacklist ${HOME}/.config/galculator 437blacklist ${HOME}/.config/galculator
432blacklist ${HOME}/.config/gallery-dl 438blacklist ${HOME}/.config/gallery-dl
433blacklist ${HOME}/.config/gconf 439blacklist ${HOME}/.config/gconf
440blacklist ${HOME}/.config/gdfuse
434blacklist ${HOME}/.config/geany 441blacklist ${HOME}/.config/geany
435blacklist ${HOME}/.config/geary 442blacklist ${HOME}/.config/geary
436blacklist ${HOME}/.config/gedit 443blacklist ${HOME}/.config/gedit
@@ -609,6 +616,7 @@ blacklist ${HOME}/.config/sound-juicer
609blacklist ${HOME}/.config/specialmailcollectionsrc 616blacklist ${HOME}/.config/specialmailcollectionsrc
610blacklist ${HOME}/.config/spectaclerc 617blacklist ${HOME}/.config/spectaclerc
611blacklist ${HOME}/.config/spotify 618blacklist ${HOME}/.config/spotify
619blacklist ${HOME}/.config/spotify-adblock
612blacklist ${HOME}/.config/sqlitebrowser 620blacklist ${HOME}/.config/sqlitebrowser
613blacklist ${HOME}/.config/stellarium 621blacklist ${HOME}/.config/stellarium
614blacklist ${HOME}/.config/straw-viewer 622blacklist ${HOME}/.config/straw-viewer
@@ -702,6 +710,7 @@ blacklist ${HOME}/.frozen-bubble
702blacklist ${HOME}/.funnyboat 710blacklist ${HOME}/.funnyboat
703blacklist ${HOME}/.g8 711blacklist ${HOME}/.g8
704blacklist ${HOME}/.gallery-dl.conf 712blacklist ${HOME}/.gallery-dl.conf
713blacklist ${HOME}/.gdfuse
705blacklist ${HOME}/.geekbench5 714blacklist ${HOME}/.geekbench5
706blacklist ${HOME}/.gimp* 715blacklist ${HOME}/.gimp*
707blacklist ${HOME}/.gist 716blacklist ${HOME}/.gist
@@ -857,6 +866,7 @@ blacklist ${HOME}/.local/share/akonadi*
857blacklist ${HOME}/.local/share/akregator 866blacklist ${HOME}/.local/share/akregator
858blacklist ${HOME}/.local/share/apps/korganizer 867blacklist ${HOME}/.local/share/apps/korganizer
859blacklist ${HOME}/.local/share/aspyr-media 868blacklist ${HOME}/.local/share/aspyr-media
869blacklist ${HOME}/.local/share/audacity
860blacklist ${HOME}/.local/share/authenticator-rs 870blacklist ${HOME}/.local/share/authenticator-rs
861blacklist ${HOME}/.local/share/autokey 871blacklist ${HOME}/.local/share/autokey
862blacklist ${HOME}/.local/share/backintime 872blacklist ${HOME}/.local/share/backintime
@@ -869,6 +879,7 @@ blacklist ${HOME}/.local/share/caja-python
869blacklist ${HOME}/.local/share/calligragemini 879blacklist ${HOME}/.local/share/calligragemini
870blacklist ${HOME}/.local/share/cantata 880blacklist ${HOME}/.local/share/cantata
871blacklist ${HOME}/.local/share/cdprojektred 881blacklist ${HOME}/.local/share/cdprojektred
882blacklist ${HOME}/.local/share/chatterino
872blacklist ${HOME}/.local/share/clipit 883blacklist ${HOME}/.local/share/clipit
873blacklist ${HOME}/.local/share/com.github.johnfactotum.Foliate 884blacklist ${HOME}/.local/share/com.github.johnfactotum.Foliate
874blacklist ${HOME}/.local/share/contacts 885blacklist ${HOME}/.local/share/contacts
@@ -890,6 +901,7 @@ blacklist ${HOME}/.local/share/feral-interactive
890blacklist ${HOME}/.local/share/five-or-more 901blacklist ${HOME}/.local/share/five-or-more
891blacklist ${HOME}/.local/share/freecol 902blacklist ${HOME}/.local/share/freecol
892blacklist ${HOME}/.local/share/gajim 903blacklist ${HOME}/.local/share/gajim
904blacklist ${HOME}/.local/share/gdfuse
893blacklist ${HOME}/.local/share/geary 905blacklist ${HOME}/.local/share/geary
894blacklist ${HOME}/.local/share/geeqie 906blacklist ${HOME}/.local/share/geeqie
895blacklist ${HOME}/.local/share/ghostwriter 907blacklist ${HOME}/.local/share/ghostwriter
@@ -1011,6 +1023,7 @@ blacklist ${HOME}/.local/share/wormux
1011blacklist ${HOME}/.local/share/xplayer 1023blacklist ${HOME}/.local/share/xplayer
1012blacklist ${HOME}/.local/share/xreader 1024blacklist ${HOME}/.local/share/xreader
1013blacklist ${HOME}/.local/share/zathura 1025blacklist ${HOME}/.local/share/zathura
1026blacklist ${HOME}/.local/state/audacity
1014blacklist ${HOME}/.local/state/pipewire 1027blacklist ${HOME}/.local/state/pipewire
1015blacklist ${HOME}/.lv2 1028blacklist ${HOME}/.lv2
1016blacklist ${HOME}/.lyx 1029blacklist ${HOME}/.lyx
@@ -1173,6 +1186,7 @@ blacklist ${HOME}/yt-dlp.conf.txt
1173blacklist ${RUNUSER}/*firefox* 1186blacklist ${RUNUSER}/*firefox*
1174blacklist ${RUNUSER}/akonadi 1187blacklist ${RUNUSER}/akonadi
1175blacklist ${RUNUSER}/psd/*firefox* 1188blacklist ${RUNUSER}/psd/*firefox*
1189blacklist /etc/ssmtp
1176blacklist /tmp/.wine-* 1190blacklist /tmp/.wine-*
1177blacklist /tmp/akonadi-* 1191blacklist /tmp/akonadi-*
1178blacklist /var/games/nethack 1192blacklist /var/games/nethack
diff --git a/etc/inc/whitelist-run-common.inc b/etc/inc/whitelist-run-common.inc
index 72e677ba5..75151ed1f 100644
--- a/etc/inc/whitelist-run-common.inc
+++ b/etc/inc/whitelist-run-common.inc
@@ -3,6 +3,7 @@
3include whitelist-run-common.local 3include whitelist-run-common.local
4 4
5whitelist /run/NetworkManager/resolv.conf 5whitelist /run/NetworkManager/resolv.conf
6whitelist /run/avahi-daemon/socket
6whitelist /run/cups/cups.sock 7whitelist /run/cups/cups.sock
7whitelist /run/dbus/system_bus_socket 8whitelist /run/dbus/system_bus_socket
8whitelist /run/media 9whitelist /run/media
diff --git a/etc/inc/whitelist-usr-share-common.inc b/etc/inc/whitelist-usr-share-common.inc
index 1dbaf8bdb..bb0bcd050 100644
--- a/etc/inc/whitelist-usr-share-common.inc
+++ b/etc/inc/whitelist-usr-share-common.inc
@@ -55,6 +55,7 @@ whitelist /usr/share/qt
55whitelist /usr/share/qt4 55whitelist /usr/share/qt4
56whitelist /usr/share/qt5 56whitelist /usr/share/qt5
57whitelist /usr/share/qt5ct 57whitelist /usr/share/qt5ct
58whitelist /usr/share/qt6
58whitelist /usr/share/qt6ct 59whitelist /usr/share/qt6ct
59whitelist /usr/share/sounds 60whitelist /usr/share/sounds
60whitelist /usr/share/tcl8.6 61whitelist /usr/share/tcl8.6
diff --git a/etc/profile-a-l/0ad.profile b/etc/profile-a-l/0ad.profile
index 04f58abb9..48a2afdf2 100644
--- a/etc/profile-a-l/0ad.profile
+++ b/etc/profile-a-l/0ad.profile
@@ -54,3 +54,5 @@ private-tmp
54 54
55dbus-user none 55dbus-user none
56dbus-system none 56dbus-system none
57
58restrict-namespaces
diff --git a/etc/profile-a-l/2048-qt.profile b/etc/profile-a-l/2048-qt.profile
index 7913fdea9..1cd207996 100644
--- a/etc/profile-a-l/2048-qt.profile
+++ b/etc/profile-a-l/2048-qt.profile
@@ -40,3 +40,5 @@ seccomp
40disable-mnt 40disable-mnt
41private-dev 41private-dev
42private-tmp 42private-tmp
43
44restrict-namespaces
diff --git a/etc/profile-a-l/Cryptocat.profile b/etc/profile-a-l/Cryptocat.profile
index af026fc86..4a850f1bd 100644
--- a/etc/profile-a-l/Cryptocat.profile
+++ b/etc/profile-a-l/Cryptocat.profile
@@ -28,3 +28,5 @@ seccomp
28private-cache 28private-cache
29private-dev 29private-dev
30private-tmp 30private-tmp
31
32restrict-namespaces
diff --git a/etc/profile-a-l/Fritzing.profile b/etc/profile-a-l/Fritzing.profile
index 09149350d..462bfa517 100644
--- a/etc/profile-a-l/Fritzing.profile
+++ b/etc/profile-a-l/Fritzing.profile
@@ -36,3 +36,4 @@ seccomp
36private-dev 36private-dev
37private-tmp 37private-tmp
38 38
39restrict-namespaces
diff --git a/etc/profile-a-l/JDownloader.profile b/etc/profile-a-l/JDownloader.profile
index 8d56c0d95..b229c151d 100644
--- a/etc/profile-a-l/JDownloader.profile
+++ b/etc/profile-a-l/JDownloader.profile
@@ -45,3 +45,5 @@ private-tmp
45 45
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48
49restrict-namespaces
diff --git a/etc/profile-a-l/abiword.profile b/etc/profile-a-l/abiword.profile
index ce3d0630f..eb7a5254f 100644
--- a/etc/profile-a-l/abiword.profile
+++ b/etc/profile-a-l/abiword.profile
@@ -46,3 +46,5 @@ private-tmp
46 46
47# dbus-user none 47# dbus-user none
48# dbus-system none 48# dbus-system none
49
50restrict-namespaces
diff --git a/etc/profile-a-l/agetpkg.profile b/etc/profile-a-l/agetpkg.profile
index ee9420d62..96c56d85d 100644
--- a/etc/profile-a-l/agetpkg.profile
+++ b/etc/profile-a-l/agetpkg.profile
@@ -56,3 +56,4 @@ dbus-user none
56dbus-system none 56dbus-system none
57 57
58memory-deny-write-execute 58memory-deny-write-execute
59restrict-namespaces
diff --git a/etc/profile-a-l/akonadi_control.profile b/etc/profile-a-l/akonadi_control.profile
index 2f58d9146..184036f24 100644
--- a/etc/profile-a-l/akonadi_control.profile
+++ b/etc/profile-a-l/akonadi_control.profile
@@ -55,3 +55,4 @@ tracelog
55private-dev 55private-dev
56# private-tmp - breaks programs that depend on akonadi 56# private-tmp - breaks programs that depend on akonadi
57 57
58# restrict-namespaces
diff --git a/etc/profile-a-l/akregator.profile b/etc/profile-a-l/akregator.profile
index 8e6935fb8..d88a1fcad 100644
--- a/etc/profile-a-l/akregator.profile
+++ b/etc/profile-a-l/akregator.profile
@@ -49,3 +49,4 @@ private-dev
49private-tmp 49private-tmp
50 50
51deterministic-shutdown 51deterministic-shutdown
52# restrict-namespaces
diff --git a/etc/profile-a-l/alacarte.profile b/etc/profile-a-l/alacarte.profile
index 5dc306147..9612ffdd2 100644
--- a/etc/profile-a-l/alacarte.profile
+++ b/etc/profile-a-l/alacarte.profile
@@ -62,3 +62,4 @@ read-write ${HOME}/.config/menus
62read-write ${HOME}/.gnome/apps 62read-write ${HOME}/.gnome/apps
63read-write ${HOME}/.local/share/applications 63read-write ${HOME}/.local/share/applications
64read-write ${HOME}/.local/share/flatpak/exports 64read-write ${HOME}/.local/share/flatpak/exports
65restrict-namespaces
diff --git a/etc/profile-a-l/alienarena.profile b/etc/profile-a-l/alienarena.profile
index ee6be4bc9..0f7407f05 100644
--- a/etc/profile-a-l/alienarena.profile
+++ b/etc/profile-a-l/alienarena.profile
@@ -48,3 +48,5 @@ private-tmp
48 48
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51
52restrict-namespaces
diff --git a/etc/profile-a-l/alpine.profile b/etc/profile-a-l/alpine.profile
index e00aef423..4e994c025 100644
--- a/etc/profile-a-l/alpine.profile
+++ b/etc/profile-a-l/alpine.profile
@@ -100,3 +100,4 @@ dbus-system none
100 100
101memory-deny-write-execute 101memory-deny-write-execute
102read-only ${HOME}/.signature 102read-only ${HOME}/.signature
103restrict-namespaces
diff --git a/etc/profile-a-l/amarok.profile b/etc/profile-a-l/amarok.profile
index 7211f0cf7..3171d738e 100644
--- a/etc/profile-a-l/amarok.profile
+++ b/etc/profile-a-l/amarok.profile
@@ -44,3 +44,5 @@ dbus-user.talk org.freedesktop.Notifications
44#dbus-user.own org.kde.klauncher 44#dbus-user.own org.kde.klauncher
45#dbus-user.talk org.kde.knotify 45#dbus-user.talk org.kde.knotify
46dbus-system none 46dbus-system none
47
48# restrict-namespaces
diff --git a/etc/profile-a-l/amule.profile b/etc/profile-a-l/amule.profile
index bce22fbfd..ccf7231bd 100644
--- a/etc/profile-a-l/amule.profile
+++ b/etc/profile-a-l/amule.profile
@@ -40,3 +40,4 @@ private-bin amule
40private-dev 40private-dev
41private-tmp 41private-tmp
42 42
43restrict-namespaces
diff --git a/etc/profile-a-l/android-studio.profile b/etc/profile-a-l/android-studio.profile
index add75c849..3dfa0f95a 100644
--- a/etc/profile-a-l/android-studio.profile
+++ b/etc/profile-a-l/android-studio.profile
@@ -40,3 +40,4 @@ private-cache
40 40
41# noexec /tmp breaks 'Android Profiler' 41# noexec /tmp breaks 'Android Profiler'
42#noexec /tmp 42#noexec /tmp
43restrict-namespaces
diff --git a/etc/profile-a-l/anki.profile b/etc/profile-a-l/anki.profile
index 45d000012..466f60bda 100644
--- a/etc/profile-a-l/anki.profile
+++ b/etc/profile-a-l/anki.profile
@@ -54,3 +54,5 @@ private-tmp
54 54
55dbus-user none 55dbus-user none
56dbus-system none 56dbus-system none
57
58# restrict-namespaces
diff --git a/etc/profile-a-l/anydesk.profile b/etc/profile-a-l/anydesk.profile
index fd92f63db..4c2dcf0e6 100644
--- a/etc/profile-a-l/anydesk.profile
+++ b/etc/profile-a-l/anydesk.profile
@@ -33,3 +33,5 @@ disable-mnt
33private-bin anydesk 33private-bin anydesk
34private-dev 34private-dev
35private-tmp 35private-tmp
36
37restrict-namespaces
diff --git a/etc/profile-a-l/aosp.profile b/etc/profile-a-l/aosp.profile
index 0d3131f8c..80ee71831 100644
--- a/etc/profile-a-l/aosp.profile
+++ b/etc/profile-a-l/aosp.profile
@@ -40,3 +40,5 @@ protocol unix,inet,inet6
40#seccomp 40#seccomp
41 41
42private-tmp 42private-tmp
43
44#restrict-namespaces
diff --git a/etc/profile-a-l/apktool.profile b/etc/profile-a-l/apktool.profile
index e03ff3084..9f1940a4d 100644
--- a/etc/profile-a-l/apktool.profile
+++ b/etc/profile-a-l/apktool.profile
@@ -35,3 +35,5 @@ private-dev
35 35
36dbus-user none 36dbus-user none
37dbus-system none 37dbus-system none
38
39restrict-namespaces
diff --git a/etc/profile-a-l/apostrophe.profile b/etc/profile-a-l/apostrophe.profile
index ca4dec918..dab91fe7d 100644
--- a/etc/profile-a-l/apostrophe.profile
+++ b/etc/profile-a-l/apostrophe.profile
@@ -69,3 +69,5 @@ dbus-user filter
69dbus-user.own org.gnome.gitlab.somas.Apostrophe 69dbus-user.own org.gnome.gitlab.somas.Apostrophe
70dbus-user.talk ca.desrt.dconf 70dbus-user.talk ca.desrt.dconf
71dbus-system none 71dbus-system none
72
73restrict-namespaces
diff --git a/etc/profile-a-l/arch-audit.profile b/etc/profile-a-l/arch-audit.profile
index 7db947be8..766c2c96d 100644
--- a/etc/profile-a-l/arch-audit.profile
+++ b/etc/profile-a-l/arch-audit.profile
@@ -49,3 +49,4 @@ dbus-user none
49dbus-system none 49dbus-system none
50 50
51memory-deny-write-execute 51memory-deny-write-execute
52restrict-namespaces
diff --git a/etc/profile-a-l/archaudit-report.profile b/etc/profile-a-l/archaudit-report.profile
index 6ad75d68c..3e3f77576 100644
--- a/etc/profile-a-l/archaudit-report.profile
+++ b/etc/profile-a-l/archaudit-report.profile
@@ -36,3 +36,4 @@ private-bin arch-audit,archaudit-report,bash,cat,comm,cut,date,fold,grep,pacman,
36private-tmp 36private-tmp
37 37
38memory-deny-write-execute 38memory-deny-write-execute
39restrict-namespaces
diff --git a/etc/profile-a-l/archiver-common.profile b/etc/profile-a-l/archiver-common.profile
index b82563099..b0f83aa32 100644
--- a/etc/profile-a-l/archiver-common.profile
+++ b/etc/profile-a-l/archiver-common.profile
@@ -49,3 +49,4 @@ dbus-user none
49dbus-system none 49dbus-system none
50 50
51memory-deny-write-execute 51memory-deny-write-execute
52restrict-namespaces
diff --git a/etc/profile-a-l/ardour5.profile b/etc/profile-a-l/ardour5.profile
index c93cecf9f..341fe1ed8 100644
--- a/etc/profile-a-l/ardour5.profile
+++ b/etc/profile-a-l/ardour5.profile
@@ -40,3 +40,5 @@ private-tmp
40 40
41dbus-user none 41dbus-user none
42dbus-system none 42dbus-system none
43
44restrict-namespaces
diff --git a/etc/profile-a-l/arduino.profile b/etc/profile-a-l/arduino.profile
index bb0bc3513..85ea76939 100644
--- a/etc/profile-a-l/arduino.profile
+++ b/etc/profile-a-l/arduino.profile
@@ -33,3 +33,4 @@ seccomp
33private-cache 33private-cache
34private-tmp 34private-tmp
35 35
36restrict-namespaces
diff --git a/etc/profile-a-l/aria2c.profile b/etc/profile-a-l/aria2c.profile
index f108a6291..17eb2451c 100644
--- a/etc/profile-a-l/aria2c.profile
+++ b/etc/profile-a-l/aria2c.profile
@@ -53,3 +53,4 @@ dbus-user none
53dbus-system none 53dbus-system none
54 54
55memory-deny-write-execute 55memory-deny-write-execute
56restrict-namespaces
diff --git a/etc/profile-a-l/ark.profile b/etc/profile-a-l/ark.profile
index 53697a367..272e06219 100644
--- a/etc/profile-a-l/ark.profile
+++ b/etc/profile-a-l/ark.profile
@@ -44,3 +44,5 @@ private-tmp
44 44
45# dbus-user none 45# dbus-user none
46# dbus-system none 46# dbus-system none
47
48restrict-namespaces
diff --git a/etc/profile-a-l/arm.profile b/etc/profile-a-l/arm.profile
index 556a354e7..db388eee1 100644
--- a/etc/profile-a-l/arm.profile
+++ b/etc/profile-a-l/arm.profile
@@ -45,3 +45,4 @@ private-dev
45private-etc alternatives,ca-certificates,crypto-policies,ld.so.cache,ld.so.preload,passwd,pki,ssl,tor 45private-etc alternatives,ca-certificates,crypto-policies,ld.so.cache,ld.so.preload,passwd,pki,ssl,tor
46private-tmp 46private-tmp
47 47
48restrict-namespaces
diff --git a/etc/profile-a-l/artha.profile b/etc/profile-a-l/artha.profile
index b83b6bb10..b1347b0d9 100644
--- a/etc/profile-a-l/artha.profile
+++ b/etc/profile-a-l/artha.profile
@@ -65,3 +65,4 @@ dbus-user.talk org.freedesktop.Notifications
65dbus-system none 65dbus-system none
66 66
67memory-deny-write-execute 67memory-deny-write-execute
68restrict-namespaces
diff --git a/etc/profile-a-l/assogiate.profile b/etc/profile-a-l/assogiate.profile
index 26eddf1b6..f28f77748 100644
--- a/etc/profile-a-l/assogiate.profile
+++ b/etc/profile-a-l/assogiate.profile
@@ -51,3 +51,4 @@ dbus-system none
51 51
52memory-deny-write-execute 52memory-deny-write-execute
53read-write ${HOME}/.local/share/mime 53read-write ${HOME}/.local/share/mime
54restrict-namespaces
diff --git a/etc/profile-a-l/asunder.profile b/etc/profile-a-l/asunder.profile
index 445aa3985..c09ad7936 100644
--- a/etc/profile-a-l/asunder.profile
+++ b/etc/profile-a-l/asunder.profile
@@ -45,3 +45,4 @@ dbus-system none
45 45
46# mdwe is disabled due to breaking hardware accelerated decoding 46# mdwe is disabled due to breaking hardware accelerated decoding
47# memory-deny-write-execute 47# memory-deny-write-execute
48restrict-namespaces
diff --git a/etc/profile-a-l/atril.profile b/etc/profile-a-l/atril.profile
index 8ec6f433e..f24aff108 100644
--- a/etc/profile-a-l/atril.profile
+++ b/etc/profile-a-l/atril.profile
@@ -49,3 +49,4 @@ private-tmp
49 49
50# webkit gtk killed by memory-deny-write-execute 50# webkit gtk killed by memory-deny-write-execute
51#memory-deny-write-execute 51#memory-deny-write-execute
52restrict-namespaces
diff --git a/etc/profile-a-l/audacious.profile b/etc/profile-a-l/audacious.profile
index fe23049f4..b31f3f1b2 100644
--- a/etc/profile-a-l/audacious.profile
+++ b/etc/profile-a-l/audacious.profile
@@ -42,3 +42,5 @@ private-tmp
42# dbus needed for MPRIS 42# dbus needed for MPRIS
43# dbus-user none 43# dbus-user none
44# dbus-system none 44# dbus-system none
45
46restrict-namespaces
diff --git a/etc/profile-a-l/audacity.profile b/etc/profile-a-l/audacity.profile
index 2831fec72..371054728 100644
--- a/etc/profile-a-l/audacity.profile
+++ b/etc/profile-a-l/audacity.profile
@@ -6,7 +6,16 @@ include audacity.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Add the below lines to your audacity.local if you need online plugins.
10#ignore net none
11#netfilter
12#protocol inet6
13
9noblacklist ${HOME}/.audacity-data 14noblacklist ${HOME}/.audacity-data
15noblacklist ${HOME}/.cache/audacity
16noblacklist ${HOME}/.config/audacity
17noblacklist ${HOME}/.local/share/audacity
18noblacklist ${HOME}/.local/state/audacity
10noblacklist ${DOCUMENTS} 19noblacklist ${DOCUMENTS}
11noblacklist ${MUSIC} 20noblacklist ${MUSIC}
12 21
@@ -20,6 +29,8 @@ include disable-xdg.inc
20 29
21include whitelist-var-common.inc 30include whitelist-var-common.inc
22 31
32# Silence blacklist violation. See #5539.
33allow-debuggers
23## Enabling App Armor appears to break some Fedora / Arch installs 34## Enabling App Armor appears to break some Fedora / Arch installs
24#apparmor 35#apparmor
25caps.drop all 36caps.drop all
@@ -44,3 +55,5 @@ private-tmp
44# problems on Fedora 27 55# problems on Fedora 27
45# dbus-user none 56# dbus-user none
46# dbus-system none 57# dbus-system none
58
59restrict-namespaces
diff --git a/etc/profile-a-l/audio-recorder.profile b/etc/profile-a-l/audio-recorder.profile
index 6c8a90c0b..74dba7411 100644
--- a/etc/profile-a-l/audio-recorder.profile
+++ b/etc/profile-a-l/audio-recorder.profile
@@ -51,3 +51,4 @@ dbus-user.talk ca.desrt.dconf
51dbus-system none 51dbus-system none
52 52
53# memory-deny-write-execute - breaks on Arch 53# memory-deny-write-execute - breaks on Arch
54restrict-namespaces
diff --git a/etc/profile-a-l/authenticator-rs.profile b/etc/profile-a-l/authenticator-rs.profile
index 8e898b5ee..73a2e1806 100644
--- a/etc/profile-a-l/authenticator-rs.profile
+++ b/etc/profile-a-l/authenticator-rs.profile
@@ -52,3 +52,5 @@ private-tmp
52dbus-user filter 52dbus-user filter
53dbus-user.talk ca.desrt.dconf 53dbus-user.talk ca.desrt.dconf
54dbus-system none 54dbus-system none
55
56restrict-namespaces
diff --git a/etc/profile-a-l/authenticator.profile b/etc/profile-a-l/authenticator.profile
index 5f26a39f5..02c1d8768 100644
--- a/etc/profile-a-l/authenticator.profile
+++ b/etc/profile-a-l/authenticator.profile
@@ -46,3 +46,4 @@ private-tmp
46# dbus-system none 46# dbus-system none
47 47
48#memory-deny-write-execute - breaks on Arch (see issue #1803) 48#memory-deny-write-execute - breaks on Arch (see issue #1803)
49restrict-namespaces
diff --git a/etc/profile-a-l/autokey-common.profile b/etc/profile-a-l/autokey-common.profile
index ee63f0ead..834eac11a 100644
--- a/etc/profile-a-l/autokey-common.profile
+++ b/etc/profile-a-l/autokey-common.profile
@@ -39,3 +39,4 @@ private-dev
39private-tmp 39private-tmp
40 40
41#memory-deny-write-execute - breaks on Arch (see issue #1803) 41#memory-deny-write-execute - breaks on Arch (see issue #1803)
42restrict-namespaces
diff --git a/etc/profile-a-l/avidemux.profile b/etc/profile-a-l/avidemux.profile
index 69fc38c44..8707dca5b 100644
--- a/etc/profile-a-l/avidemux.profile
+++ b/etc/profile-a-l/avidemux.profile
@@ -1,10 +1,12 @@
1# Firejail profile for Avidemux 1# Firejail profile for Avidemux
2# Description: Avidemux is a free video editor designed for simple cutting, filtering and encoding tasks. 2# Description: Avidemux is a free video editor designed for simple cutting, filtering and encoding tasks.
3# This file is overwritten after every install/update
3# Persistent local customizations 4# Persistent local customizations
4include avidemux.local 5include avidemux.local
5# Persistent global definitions 6# Persistent global definitions
6include globals.local 7include globals.local
7 8
9noblacklist ${HOME}/.avidemux3
8noblacklist ${HOME}/.avidemux6 10noblacklist ${HOME}/.avidemux6
9noblacklist ${HOME}/.config/avidemux3_qt5rc 11noblacklist ${HOME}/.config/avidemux3_qt5rc
10noblacklist ${VIDEOS} 12noblacklist ${VIDEOS}
@@ -17,8 +19,10 @@ include disable-programs.inc
17include disable-shell.inc 19include disable-shell.inc
18include disable-xdg.inc 20include disable-xdg.inc
19 21
22mkdir ${HOME}/.avidemux3
20mkdir ${HOME}/.avidemux6 23mkdir ${HOME}/.avidemux6
21mkdir ${HOME}/.config/avidemux3_qt5rc 24mkdir ${HOME}/.config/avidemux3_qt5rc
25whitelist ${HOME}/.avidemux3
22whitelist ${HOME}/.avidemux6 26whitelist ${HOME}/.avidemux6
23whitelist ${HOME}/.config/avidemux3_qt5rc 27whitelist ${HOME}/.config/avidemux3_qt5rc
24whitelist ${VIDEOS} 28whitelist ${VIDEOS}
@@ -51,3 +55,5 @@ private-tmp
51 55
52dbus-user none 56dbus-user none
53dbus-system none 57dbus-system none
58
59restrict-namespaces
diff --git a/etc/profile-a-l/avidemux3_cli.profile b/etc/profile-a-l/avidemux3_cli.profile
new file mode 100644
index 000000000..18d05a031
--- /dev/null
+++ b/etc/profile-a-l/avidemux3_cli.profile
@@ -0,0 +1,11 @@
1# Firejail profile for avidemux3_cli
2# Description: The command-line interface for Avidemux.
3# This file is overwritten after every install/update
4# Persistent local customizations
5include avidemux3_cli.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include avidemux.profile
diff --git a/etc/profile-a-l/avidemux3_jobs_qt5.profile b/etc/profile-a-l/avidemux3_jobs_qt5.profile
new file mode 100644
index 000000000..d84d67494
--- /dev/null
+++ b/etc/profile-a-l/avidemux3_jobs_qt5.profile
@@ -0,0 +1,18 @@
1# Firejail profile for avidemux3_jobs_qt5
2# Description: The Qt5 GUI to run Avidemux jobs.
3# This file is overwritten after every install/update
4# Persistent local customizations
5include avidemux3_jobs_qt5.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Provide a shell to spawn avidemux3_cli
11include allow-bin-sh.inc
12private-bin sh
13
14# Needs to bind to a socket on localhost
15protocol inet,inet6
16
17# Redirect
18include avidemux3_qt5.profile
diff --git a/etc/profile-a-l/avidemux3_qt5.profile b/etc/profile-a-l/avidemux3_qt5.profile
new file mode 100644
index 000000000..65aacd942
--- /dev/null
+++ b/etc/profile-a-l/avidemux3_qt5.profile
@@ -0,0 +1,15 @@
1# Firejail profile for avidemux3_qt5
2# Description: The Qt5 GUI for Avidemux.
3# This file is overwritten after every install/update
4# Persistent local customizations
5include avidemux3_qt5.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Allow translations
11whitelist /usr/share/avidemux3
12whitelist /usr/share/avidemux6
13
14# Redirect
15include avidemux.profile
diff --git a/etc/profile-a-l/aweather.profile b/etc/profile-a-l/aweather.profile
index 0a80a2203..e2646095c 100644
--- a/etc/profile-a-l/aweather.profile
+++ b/etc/profile-a-l/aweather.profile
@@ -37,3 +37,5 @@ tracelog
37private-bin aweather 37private-bin aweather
38private-dev 38private-dev
39private-tmp 39private-tmp
40
41restrict-namespaces
diff --git a/etc/profile-a-l/awesome.profile b/etc/profile-a-l/awesome.profile
index 5d1bf5071..d8c073c8d 100644
--- a/etc/profile-a-l/awesome.profile
+++ b/etc/profile-a-l/awesome.profile
@@ -14,6 +14,7 @@ caps.drop all
14netfilter 14netfilter
15noroot 15noroot
16protocol unix,inet,inet6 16protocol unix,inet,inet6
17seccomp 17seccomp !chroot
18 18
19read-only ${HOME}/.config/awesome/autorun.sh 19read-only ${HOME}/.config/awesome/autorun.sh
20#restrict-namespaces
diff --git a/etc/profile-a-l/ballbuster.profile b/etc/profile-a-l/ballbuster.profile
index 05637d247..b60b5715c 100644
--- a/etc/profile-a-l/ballbuster.profile
+++ b/etc/profile-a-l/ballbuster.profile
@@ -49,3 +49,5 @@ private-tmp
49 49
50dbus-user none 50dbus-user none
51dbus-system none 51dbus-system none
52
53restrict-namespaces
diff --git a/etc/profile-a-l/baloo_file.profile b/etc/profile-a-l/baloo_file.profile
index 24bb53981..084b7c702 100644
--- a/etc/profile-a-l/baloo_file.profile
+++ b/etc/profile-a-l/baloo_file.profile
@@ -52,3 +52,5 @@ private-bin baloo_file,baloo_file_extractor,baloo_filemetadata_temp_extractor,kb
52private-cache 52private-cache
53private-dev 53private-dev
54private-tmp 54private-tmp
55
56restrict-namespaces
diff --git a/etc/profile-a-l/balsa.profile b/etc/profile-a-l/balsa.profile
index c78caad77..661356ff6 100644
--- a/etc/profile-a-l/balsa.profile
+++ b/etc/profile-a-l/balsa.profile
@@ -79,3 +79,4 @@ dbus-user.talk org.gnome.keyring.SystemPrompter
79dbus-system none 79dbus-system none
80 80
81read-only ${HOME}/.mozilla/firefox/profiles.ini 81read-only ${HOME}/.mozilla/firefox/profiles.ini
82restrict-namespaces
diff --git a/etc/profile-a-l/baobab.profile b/etc/profile-a-l/baobab.profile
index 40f50e991..31ef66a58 100644
--- a/etc/profile-a-l/baobab.profile
+++ b/etc/profile-a-l/baobab.profile
@@ -41,3 +41,4 @@ private-tmp
41# dbus-system none 41# dbus-system none
42 42
43read-only ${HOME} 43read-only ${HOME}
44restrict-namespaces
diff --git a/etc/profile-a-l/barrier.profile b/etc/profile-a-l/barrier.profile
index dbd3d38f1..a78d202a2 100644
--- a/etc/profile-a-l/barrier.profile
+++ b/etc/profile-a-l/barrier.profile
@@ -42,3 +42,4 @@ private-cache
42private-tmp 42private-tmp
43 43
44memory-deny-write-execute 44memory-deny-write-execute
45restrict-namespaces
diff --git a/etc/profile-a-l/basilisk.profile b/etc/profile-a-l/basilisk.profile
index 8dc3847a0..a962bfe02 100644
--- a/etc/profile-a-l/basilisk.profile
+++ b/etc/profile-a-l/basilisk.profile
@@ -22,5 +22,8 @@ ignore seccomp
22#private-etc basilisk 22#private-etc basilisk
23#private-opt basilisk 23#private-opt basilisk
24 24
25restrict-namespaces
26ignore restrict-namespaces
27
25# Redirect 28# Redirect
26include firefox-common.profile 29include firefox-common.profile
diff --git a/etc/profile-a-l/bcompare.profile b/etc/profile-a-l/bcompare.profile
index b43c670b6..d566b94e8 100644
--- a/etc/profile-a-l/bcompare.profile
+++ b/etc/profile-a-l/bcompare.profile
@@ -44,3 +44,5 @@ private-tmp
44 44
45dbus-user none 45dbus-user none
46dbus-system none 46dbus-system none
47
48restrict-namespaces
diff --git a/etc/profile-a-l/bibletime.profile b/etc/profile-a-l/bibletime.profile
index bc1cb18ac..85a1a58c7 100644
--- a/etc/profile-a-l/bibletime.profile
+++ b/etc/profile-a-l/bibletime.profile
@@ -56,3 +56,5 @@ private-tmp
56 56
57dbus-user none 57dbus-user none
58dbus-system none 58dbus-system none
59
60# restrict-namespaces
diff --git a/etc/profile-a-l/bijiben.profile b/etc/profile-a-l/bijiben.profile
index e6675e0d3..b6b52601e 100644
--- a/etc/profile-a-l/bijiben.profile
+++ b/etc/profile-a-l/bijiben.profile
@@ -60,3 +60,4 @@ dbus-user.talk org.freedesktop.Tracker1
60dbus-system none 60dbus-system none
61 61
62env WEBKIT_FORCE_SANDBOX=0 62env WEBKIT_FORCE_SANDBOX=0
63restrict-namespaces
diff --git a/etc/profile-a-l/bitcoin-qt.profile b/etc/profile-a-l/bitcoin-qt.profile
index 390d002ed..9fc01a2fd 100644
--- a/etc/profile-a-l/bitcoin-qt.profile
+++ b/etc/profile-a-l/bitcoin-qt.profile
@@ -47,3 +47,4 @@ private-dev
47private-tmp 47private-tmp
48 48
49memory-deny-write-execute 49memory-deny-write-execute
50restrict-namespaces
diff --git a/etc/profile-a-l/bitlbee.profile b/etc/profile-a-l/bitlbee.profile
index 773fa7500..988a1479e 100644
--- a/etc/profile-a-l/bitlbee.profile
+++ b/etc/profile-a-l/bitlbee.profile
@@ -38,3 +38,4 @@ private-dev
38private-tmp 38private-tmp
39 39
40read-write /var/lib/bitlbee 40read-write /var/lib/bitlbee
41restrict-namespaces
diff --git a/etc/profile-a-l/blackbox.profile b/etc/profile-a-l/blackbox.profile
index 233f9a96f..f89026899 100644
--- a/etc/profile-a-l/blackbox.profile
+++ b/etc/profile-a-l/blackbox.profile
@@ -14,5 +14,6 @@ caps.drop all
14netfilter 14netfilter
15noroot 15noroot
16protocol unix,inet,inet6 16protocol unix,inet,inet6
17seccomp 17seccomp !chroot
18 18
19#restrict-namespaces
diff --git a/etc/profile-a-l/bleachbit.profile b/etc/profile-a-l/bleachbit.profile
index a352ab8d8..45ae345c3 100644
--- a/etc/profile-a-l/bleachbit.profile
+++ b/etc/profile-a-l/bleachbit.profile
@@ -40,3 +40,4 @@ dbus-system none
40 40
41# memory-deny-write-execute breaks some systems, see issue #1850 41# memory-deny-write-execute breaks some systems, see issue #1850
42# memory-deny-write-execute 42# memory-deny-write-execute
43restrict-namespaces
diff --git a/etc/profile-a-l/blender.profile b/etc/profile-a-l/blender.profile
index 8ee852ab5..cd8fac61f 100644
--- a/etc/profile-a-l/blender.profile
+++ b/etc/profile-a-l/blender.profile
@@ -37,3 +37,5 @@ protocol unix,inet,inet6,netlink
37seccomp !mbind 37seccomp !mbind
38 38
39private-dev 39private-dev
40
41restrict-namespaces
diff --git a/etc/profile-a-l/bless.profile b/etc/profile-a-l/bless.profile
index 0e38889c0..9badb4357 100644
--- a/etc/profile-a-l/bless.profile
+++ b/etc/profile-a-l/bless.profile
@@ -39,3 +39,5 @@ private-tmp
39 39
40dbus-user none 40dbus-user none
41dbus-system none 41dbus-system none
42
43restrict-namespaces
diff --git a/etc/profile-a-l/blobby.profile b/etc/profile-a-l/blobby.profile
index 3bd8c79d0..6e7a87e5f 100644
--- a/etc/profile-a-l/blobby.profile
+++ b/etc/profile-a-l/blobby.profile
@@ -48,3 +48,4 @@ dbus-user none
48dbus-system none 48dbus-system none
49 49
50memory-deny-write-execute 50memory-deny-write-execute
51restrict-namespaces
diff --git a/etc/profile-a-l/blobwars.profile b/etc/profile-a-l/blobwars.profile
index 9dfbd8f8e..e6926ee29 100644
--- a/etc/profile-a-l/blobwars.profile
+++ b/etc/profile-a-l/blobwars.profile
@@ -47,3 +47,5 @@ private-tmp
47 47
48dbus-user none 48dbus-user none
49dbus-system none 49dbus-system none
50
51restrict-namespaces
diff --git a/etc/profile-a-l/bluefish.profile b/etc/profile-a-l/bluefish.profile
index ac949d561..d24f76262 100644
--- a/etc/profile-a-l/bluefish.profile
+++ b/etc/profile-a-l/bluefish.profile
@@ -37,3 +37,5 @@ private-tmp
37 37
38dbus-user none 38dbus-user none
39dbus-system none 39dbus-system none
40
41restrict-namespaces
diff --git a/etc/profile-a-l/brackets.profile b/etc/profile-a-l/brackets.profile
index 0ab28fffe..a483c2b0a 100644
--- a/etc/profile-a-l/brackets.profile
+++ b/etc/profile-a-l/brackets.profile
@@ -31,3 +31,5 @@ seccomp !chroot,!ioperm
31 31
32private-cache 32private-cache
33private-dev 33private-dev
34
35# restrict-namespaces
diff --git a/etc/profile-a-l/brasero.profile b/etc/profile-a-l/brasero.profile
index f80ad9f20..12d7062ab 100644
--- a/etc/profile-a-l/brasero.profile
+++ b/etc/profile-a-l/brasero.profile
@@ -33,3 +33,5 @@ tracelog
33private-cache 33private-cache
34# private-dev 34# private-dev
35# private-tmp 35# private-tmp
36
37restrict-namespaces
diff --git a/etc/profile-a-l/brave.profile b/etc/profile-a-l/brave.profile
index 09548c761..071a279b0 100644
--- a/etc/profile-a-l/brave.profile
+++ b/etc/profile-a-l/brave.profile
@@ -13,6 +13,8 @@ ignore noexec /tmp
13# you will need to uncomment the 'brave + tor' rule in /etc/apparmor.d/local/firejail-default. 13# you will need to uncomment the 'brave + tor' rule in /etc/apparmor.d/local/firejail-default.
14# Alternatively you can add 'ignore apparmor' to your brave.local. 14# Alternatively you can add 'ignore apparmor' to your brave.local.
15ignore noexec ${HOME} 15ignore noexec ${HOME}
16# Causes slow starts (#4604)
17ignore private-cache
16 18
17noblacklist ${HOME}/.cache/BraveSoftware 19noblacklist ${HOME}/.cache/BraveSoftware
18noblacklist ${HOME}/.config/BraveSoftware 20noblacklist ${HOME}/.config/BraveSoftware
diff --git a/etc/profile-a-l/build-systems-common.profile b/etc/profile-a-l/build-systems-common.profile
index bd6719b62..cf5f462ae 100644
--- a/etc/profile-a-l/build-systems-common.profile
+++ b/etc/profile-a-l/build-systems-common.profile
@@ -63,3 +63,5 @@ private-tmp
63 63
64dbus-user none 64dbus-user none
65dbus-system none 65dbus-system none
66
67restrict-namespaces
diff --git a/etc/profile-a-l/bzflag.profile b/etc/profile-a-l/bzflag.profile
index 5bfe3751b..b28f982fc 100644
--- a/etc/profile-a-l/bzflag.profile
+++ b/etc/profile-a-l/bzflag.profile
@@ -44,3 +44,5 @@ private-tmp
44 44
45dbus-user none 45dbus-user none
46dbus-system none 46dbus-system none
47
48restrict-namespaces
diff --git a/etc/profile-a-l/calibre.profile b/etc/profile-a-l/calibre.profile
index acfc1ba0a..b347941d7 100644
--- a/etc/profile-a-l/calibre.profile
+++ b/etc/profile-a-l/calibre.profile
@@ -35,3 +35,5 @@ seccomp !chroot
35 35
36private-dev 36private-dev
37private-tmp 37private-tmp
38
39# restrict-namespaces
diff --git a/etc/profile-a-l/calligra.profile b/etc/profile-a-l/calligra.profile
index 6fccf2122..c2972f902 100644
--- a/etc/profile-a-l/calligra.profile
+++ b/etc/profile-a-l/calligra.profile
@@ -37,3 +37,4 @@ private-dev
37 37
38# noexec ${HOME} 38# noexec ${HOME}
39noexec /tmp 39noexec /tmp
40restrict-namespaces
diff --git a/etc/profile-a-l/cameramonitor.profile b/etc/profile-a-l/cameramonitor.profile
index fb3a6df7e..b2248ad06 100644
--- a/etc/profile-a-l/cameramonitor.profile
+++ b/etc/profile-a-l/cameramonitor.profile
@@ -52,3 +52,4 @@ private-tmp
52# dbus-system none 52# dbus-system none
53 53
54# memory-deny-write-execute - breaks on Arch 54# memory-deny-write-execute - breaks on Arch
55restrict-namespaces
diff --git a/etc/profile-a-l/cantata.profile b/etc/profile-a-l/cantata.profile
index 2146d1291..7cb56efee 100644
--- a/etc/profile-a-l/cantata.profile
+++ b/etc/profile-a-l/cantata.profile
@@ -34,6 +34,8 @@ novideo
34protocol unix,inet,inet6,netlink 34protocol unix,inet,inet6,netlink
35seccomp 35seccomp
36 36
37# private-etc drirc,fonts,gcrypt,hosts,kde5rc,mpd.conf,passwd,samba,ssl,xdg 37# private-etc alternatives,drirc,fonts,gcrypt,hosts,kde5rc,mpd.conf,passwd,samba,ssl,xdg
38private-bin cantata,mpd,perl 38private-bin cantata,mpd,perl
39private-dev 39private-dev
40
41restrict-namespaces
diff --git a/etc/profile-a-l/catfish.profile b/etc/profile-a-l/catfish.profile
index d076c3ca0..e2df341e9 100644
--- a/etc/profile-a-l/catfish.profile
+++ b/etc/profile-a-l/catfish.profile
@@ -46,3 +46,5 @@ tracelog
46 46
47dbus-user none 47dbus-user none
48dbus-system none 48dbus-system none
49
50restrict-namespaces
diff --git a/etc/profile-a-l/cawbird.profile b/etc/profile-a-l/cawbird.profile
index e9affe09e..e4e32b265 100644
--- a/etc/profile-a-l/cawbird.profile
+++ b/etc/profile-a-l/cawbird.profile
@@ -43,3 +43,5 @@ private-tmp
43 43
44# dbus-user none 44# dbus-user none
45dbus-system none 45dbus-system none
46
47restrict-namespaces
diff --git a/etc/profile-a-l/celluloid.profile b/etc/profile-a-l/celluloid.profile
index 48522c002..0c4335e8f 100644
--- a/etc/profile-a-l/celluloid.profile
+++ b/etc/profile-a-l/celluloid.profile
@@ -64,3 +64,4 @@ dbus-system none
64 64
65read-only ${HOME} 65read-only ${HOME}
66read-write ${HOME}/.config/celluloid 66read-write ${HOME}/.config/celluloid
67restrict-namespaces
diff --git a/etc/profile-a-l/chafa.profile b/etc/profile-a-l/chafa.profile
index b042ac189..72f79681d 100644
--- a/etc/profile-a-l/chafa.profile
+++ b/etc/profile-a-l/chafa.profile
@@ -53,3 +53,4 @@ dbus-user none
53dbus-system none 53dbus-system none
54 54
55read-only ${HOME} 55read-only ${HOME}
56restrict-namespaces
diff --git a/etc/profile-a-l/chatterino.profile b/etc/profile-a-l/chatterino.profile
new file mode 100644
index 000000000..4dfd85740
--- /dev/null
+++ b/etc/profile-a-l/chatterino.profile
@@ -0,0 +1,92 @@
1# Firejail profile for Chatterino
2# Description: Chat client for https://twitch.tv
3# This file is overwritten after every install/update
4# Persistent local customizations
5include chatterino.local
6# Persistent global definitions
7include globals.local
8
9# To upload images, whitelist/noblacklist their path in chatterino.local.
10#whitelist ${PICTURES}
11# For custom notification sounds, whitelist/noblacklist their path in chatterino.local.
12#whitelist ${MUSIC}
13
14# Also allow access to mpv/vlc, they're usable via streamlink.
15noblacklist ${HOME}/.config/mpv
16noblacklist ${HOME}/.config/pulse
17noblacklist ${HOME}/.config/vlc
18noblacklist ${HOME}/.local/share/chatterino
19noblacklist ${HOME}/.local/share/vlc
20
21# Allow Lua for mpv (blacklisted by disable-interpreters.inc)
22include allow-lua.inc
23
24# Allow Python for Streamlink integration (blacklisted by disable-interpreters.inc)
25include allow-python3.inc
26
27include disable-common.inc
28include disable-devel.inc
29include disable-exec.inc
30include disable-interpreters.inc
31include disable-proc.inc
32include disable-programs.inc
33include disable-xdg.inc
34
35# Also allow read-only access to mpv/VLC, they're usable via streamlink.
36mkdir ${HOME}/.local/share/chatterino
37# VLC preferences will fail to save with read-only set.
38whitelist ${HOME}/.local/share/chatterino
39whitelist-ro ${HOME}/.config/mpv
40whitelist-ro ${HOME}/.config/pulse
41whitelist-ro ${HOME}/.config/vlc
42whitelist-ro ${HOME}/.local/share/vlc
43include whitelist-common.inc
44include whitelist-run-common.inc
45include whitelist-runuser-common.inc
46include whitelist-usr-share-common.inc
47include whitelist-var-common.inc
48
49# Streamlink+VLC doesn't seem to close properly with apparmor enabled.
50#apparmor
51caps.drop all
52netfilter
53nodvd
54nogroups
55nonewprivs
56noprinters
57noroot
58notv
59nou2f
60# Netlink is required for streamlink integration.
61protocol unix,inet,inet6,netlink
62# Seccomp may break browser integration.
63seccomp
64seccomp.block-secondary
65tracelog
66
67disable-mnt
68# Add more private-bin lines for browsers or video players to chatterino.local if wanted.
69private-bin chatterino,cvlc,env,ffmpeg,mpv,nvlc,pgrep,python*,qvlc,rvlc,streamlink,svlc,vlc
70# private-cache may cause issues with mpv (see #2838)
71private-cache
72private-dev
73private-etc alsa,alternatives,asound.conf,ca-certificates,dbus-1,fonts,hostname,hosts,kde4rc,kde5rc,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,machine-id,nvidia,passwd,pulse,resolv.conf,rpc,services,ssl,Trolltech.conf,X11
74private-srv none
75private-tmp
76
77dbus-user filter
78dbus-user.own com.chatterino.*
79# Allow notifications.
80dbus-user.talk org.freedesktop.Notifications
81# For media player integration.
82dbus-user.talk org.freedesktop.ScreenSaver
83?ALLOW_TRAY: dbus-user.talk org.kde.StatusNotifierWatcher
84dbus-user.own org.mpris.MediaPlayer2.chatterino
85dbus-user.talk org.mpris.MediaPlayer2.Player
86dbus-system none
87
88# Prevents browsers/players from lingering after Chatterino is closed.
89#deterministic-shutdown
90# memory-deny-write-execute may break streamlink and browser integration.
91#memory-deny-write-execute
92restrict-namespaces
diff --git a/etc/profile-a-l/checkbashisms.profile b/etc/profile-a-l/checkbashisms.profile
index 835b884ad..3baa80d50 100644
--- a/etc/profile-a-l/checkbashisms.profile
+++ b/etc/profile-a-l/checkbashisms.profile
@@ -52,3 +52,4 @@ dbus-user none
52dbus-system none 52dbus-system none
53 53
54memory-deny-write-execute 54memory-deny-write-execute
55restrict-namespaces
diff --git a/etc/profile-a-l/cheese.profile b/etc/profile-a-l/cheese.profile
index 1e498259c..8aed77c04 100644
--- a/etc/profile-a-l/cheese.profile
+++ b/etc/profile-a-l/cheese.profile
@@ -58,3 +58,5 @@ dbus-user filter
58dbus-user.own org.gnome.Cheese 58dbus-user.own org.gnome.Cheese
59dbus-user.talk ca.desrt.dconf 59dbus-user.talk ca.desrt.dconf
60dbus-system none 60dbus-system none
61
62restrict-namespaces
diff --git a/etc/profile-a-l/cherrytree.profile b/etc/profile-a-l/cherrytree.profile
index fe0c7cfe8..528d6203e 100644
--- a/etc/profile-a-l/cherrytree.profile
+++ b/etc/profile-a-l/cherrytree.profile
@@ -40,3 +40,4 @@ private-cache
40private-dev 40private-dev
41private-tmp 41private-tmp
42 42
43restrict-namespaces
diff --git a/etc/profile-a-l/chromium-common-hardened.inc.profile b/etc/profile-a-l/chromium-common-hardened.inc.profile
index 19addd285..c3944bd65 100644
--- a/etc/profile-a-l/chromium-common-hardened.inc.profile
+++ b/etc/profile-a-l/chromium-common-hardened.inc.profile
@@ -7,3 +7,5 @@ nonewprivs
7noroot 7noroot
8protocol unix,inet,inet6,netlink 8protocol unix,inet,inet6,netlink
9seccomp !chroot 9seccomp !chroot
10
11#restrict-namespaces
diff --git a/etc/profile-a-l/cin.profile b/etc/profile-a-l/cin.profile
index 3e62d7ba2..0930c9361 100644
--- a/etc/profile-a-l/cin.profile
+++ b/etc/profile-a-l/cin.profile
@@ -34,3 +34,5 @@ private-dev
34 34
35dbus-user none 35dbus-user none
36dbus-system none 36dbus-system none
37
38restrict-namespaces
diff --git a/etc/profile-a-l/cinelerra-gg b/etc/profile-a-l/cinelerra-gg.profile
index ccb9fe04b..ccb9fe04b 100644
--- a/etc/profile-a-l/cinelerra-gg
+++ b/etc/profile-a-l/cinelerra-gg.profile
diff --git a/etc/profile-a-l/clamav.profile b/etc/profile-a-l/clamav.profile
index f5f665215..ddd0eb1f9 100644
--- a/etc/profile-a-l/clamav.profile
+++ b/etc/profile-a-l/clamav.profile
@@ -37,3 +37,4 @@ dbus-system none
37read-only ${HOME} 37read-only ${HOME}
38 38
39memory-deny-write-execute 39memory-deny-write-execute
40restrict-namespaces
diff --git a/etc/profile-a-l/clamtk.profile b/etc/profile-a-l/clamtk.profile
index 842416171..9fc73ee55 100644
--- a/etc/profile-a-l/clamtk.profile
+++ b/etc/profile-a-l/clamtk.profile
@@ -27,3 +27,5 @@ private-dev
27 27
28dbus-user none 28dbus-user none
29dbus-system none 29dbus-system none
30
31restrict-namespaces
diff --git a/etc/profile-a-l/clawsker.profile b/etc/profile-a-l/clawsker.profile
index 268cf01b4..4f4e8e7bf 100644
--- a/etc/profile-a-l/clawsker.profile
+++ b/etc/profile-a-l/clawsker.profile
@@ -51,3 +51,4 @@ dbus-user none
51dbus-system none 51dbus-system none
52 52
53#memory-deny-write-execute - breaks on Arch (see issue #1803) 53#memory-deny-write-execute - breaks on Arch (see issue #1803)
54restrict-namespaces
diff --git a/etc/profile-a-l/clementine.profile b/etc/profile-a-l/clementine.profile
index b1509f391..ee01fa653 100644
--- a/etc/profile-a-l/clementine.profile
+++ b/etc/profile-a-l/clementine.profile
@@ -38,3 +38,5 @@ private-tmp
38 38
39dbus-system none 39dbus-system none
40# dbus-user none 40# dbus-user none
41
42restrict-namespaces
diff --git a/etc/profile-a-l/clion.profile b/etc/profile-a-l/clion.profile
index a8d57d63d..652809f1b 100644
--- a/etc/profile-a-l/clion.profile
+++ b/etc/profile-a-l/clion.profile
@@ -40,3 +40,4 @@ private-dev
40# private-tmp 40# private-tmp
41 41
42noexec /tmp 42noexec /tmp
43restrict-namespaces
diff --git a/etc/profile-a-l/clipgrab.profile b/etc/profile-a-l/clipgrab.profile
index 4086f46ba..3f3748e1a 100644
--- a/etc/profile-a-l/clipgrab.profile
+++ b/etc/profile-a-l/clipgrab.profile
@@ -48,3 +48,5 @@ private-tmp
48# 'dbus-user none' breaks tray menu - add 'dbus-user none' to your clipgrab.local if you don't need it. 48# 'dbus-user none' breaks tray menu - add 'dbus-user none' to your clipgrab.local if you don't need it.
49# dbus-user none 49# dbus-user none
50# dbus-system none 50# dbus-system none
51
52# restrict-namespaces
diff --git a/etc/profile-a-l/clipit.profile b/etc/profile-a-l/clipit.profile
index ef1800aaa..504bce0b1 100644
--- a/etc/profile-a-l/clipit.profile
+++ b/etc/profile-a-l/clipit.profile
@@ -13,7 +13,9 @@ include disable-common.inc
13include disable-devel.inc 13include disable-devel.inc
14include disable-exec.inc 14include disable-exec.inc
15include disable-interpreters.inc 15include disable-interpreters.inc
16include disable-proc.inc
16include disable-programs.inc 17include disable-programs.inc
18include disable-shell.inc
17include disable-xdg.inc 19include disable-xdg.inc
18 20
19mkdir ${HOME}/.config/clipit 21mkdir ${HOME}/.config/clipit
@@ -21,6 +23,8 @@ mkdir ${HOME}/.local/share/clipit
21whitelist ${HOME}/.config/clipit 23whitelist ${HOME}/.config/clipit
22whitelist ${HOME}/.local/share/clipit 24whitelist ${HOME}/.local/share/clipit
23include whitelist-common.inc 25include whitelist-common.inc
26include whitelist-run-common.inc
27include whitelist-runuser-common.inc
24include whitelist-usr-share-common.inc 28include whitelist-usr-share-common.inc
25include whitelist-var-common.inc 29include whitelist-var-common.inc
26 30
@@ -34,6 +38,7 @@ nodvd
34nogroups 38nogroups
35noinput 39noinput
36nonewprivs 40nonewprivs
41noprinters
37noroot 42noroot
38nosound 43nosound
39notv 44notv
@@ -41,9 +46,18 @@ nou2f
41novideo 46novideo
42protocol unix 47protocol unix
43seccomp 48seccomp
49tracelog
44 50
45disable-mnt 51disable-mnt
52private-bin clipit,xdotool
46private-cache 53private-cache
47private-dev 54private-dev
55private-lib libxdo.so.*
48private-tmp 56private-tmp
49 57
58dbus-user none
59dbus-system none
60
61#memory-deny-write-execute
62read-only ${HOME}
63restrict-namespaces
diff --git a/etc/profile-a-l/cmus.profile b/etc/profile-a-l/cmus.profile
index fa5693901..ad6332f78 100644
--- a/etc/profile-a-l/cmus.profile
+++ b/etc/profile-a-l/cmus.profile
@@ -27,3 +27,5 @@ seccomp
27 27
28private-bin cmus 28private-bin cmus
29private-etc alternatives,asound.conf,ca-certificates,crypto-policies,group,ld.so.cache,ld.so.preload,machine-id,pki,pulse,resolv.conf,ssl 29private-etc alternatives,asound.conf,ca-certificates,crypto-policies,group,ld.so.cache,ld.so.preload,machine-id,pki,pulse,resolv.conf,ssl
30
31restrict-namespaces
diff --git a/etc/profile-a-l/cointop.profile b/etc/profile-a-l/cointop.profile
index b4f73458c..c341c4ea2 100644
--- a/etc/profile-a-l/cointop.profile
+++ b/etc/profile-a-l/cointop.profile
@@ -60,3 +60,4 @@ dbus-user none
60dbus-system none 60dbus-system none
61 61
62memory-deny-write-execute 62memory-deny-write-execute
63restrict-namespaces
diff --git a/etc/profile-a-l/colorful.profile b/etc/profile-a-l/colorful.profile
index 79ab5e7b1..442d50259 100644
--- a/etc/profile-a-l/colorful.profile
+++ b/etc/profile-a-l/colorful.profile
@@ -49,3 +49,5 @@ private-tmp
49 49
50dbus-user none 50dbus-user none
51dbus-system none 51dbus-system none
52
53restrict-namespaces
diff --git a/etc/profile-a-l/com.github.bleakgrey.tootle.profile b/etc/profile-a-l/com.github.bleakgrey.tootle.profile
index 7024ddb28..990b6bc5a 100644
--- a/etc/profile-a-l/com.github.bleakgrey.tootle.profile
+++ b/etc/profile-a-l/com.github.bleakgrey.tootle.profile
@@ -52,3 +52,5 @@ private-tmp
52# dbus-user.own com.github.bleakgrey.tootle 52# dbus-user.own com.github.bleakgrey.tootle
53# dbus-user.talk ca.desrt.dconf 53# dbus-user.talk ca.desrt.dconf
54dbus-system none 54dbus-system none
55
56restrict-namespaces
diff --git a/etc/profile-a-l/com.github.dahenson.agenda.profile b/etc/profile-a-l/com.github.dahenson.agenda.profile
index 05768977d..5f2a1c3e6 100644
--- a/etc/profile-a-l/com.github.dahenson.agenda.profile
+++ b/etc/profile-a-l/com.github.dahenson.agenda.profile
@@ -63,3 +63,4 @@ read-only ${HOME}
63read-write ${HOME}/.cache/agenda 63read-write ${HOME}/.cache/agenda
64read-write ${HOME}/.config/agenda 64read-write ${HOME}/.config/agenda
65read-write ${HOME}/.local/share/agenda 65read-write ${HOME}/.local/share/agenda
66restrict-namespaces
diff --git a/etc/profile-a-l/com.github.johnfactotum.Foliate.profile b/etc/profile-a-l/com.github.johnfactotum.Foliate.profile
index 06c6e5f84..21f37494b 100644
--- a/etc/profile-a-l/com.github.johnfactotum.Foliate.profile
+++ b/etc/profile-a-l/com.github.johnfactotum.Foliate.profile
@@ -60,3 +60,4 @@ private-tmp
60read-only ${HOME} 60read-only ${HOME}
61read-write ${HOME}/.cache/com.github.johnfactotum.Foliate 61read-write ${HOME}/.cache/com.github.johnfactotum.Foliate
62read-write ${HOME}/.local/share/com.github.johnfactotum.Foliate 62read-write ${HOME}/.local/share/com.github.johnfactotum.Foliate
63restrict-namespaces
diff --git a/etc/profile-a-l/com.github.phase1geo.minder.profile b/etc/profile-a-l/com.github.phase1geo.minder.profile
index 667f9805c..07a6a6813 100644
--- a/etc/profile-a-l/com.github.phase1geo.minder.profile
+++ b/etc/profile-a-l/com.github.phase1geo.minder.profile
@@ -58,3 +58,5 @@ dbus-user filter
58dbus-user.own com.github.phase1geo.minder 58dbus-user.own com.github.phase1geo.minder
59dbus-user.talk ca.desrt.dconf 59dbus-user.talk ca.desrt.dconf
60dbus-system none 60dbus-system none
61
62restrict-namespaces
diff --git a/etc/profile-a-l/com.github.tchx84.Flatseal.profile b/etc/profile-a-l/com.github.tchx84.Flatseal.profile
index 20236c161..fd4494e92 100644
--- a/etc/profile-a-l/com.github.tchx84.Flatseal.profile
+++ b/etc/profile-a-l/com.github.tchx84.Flatseal.profile
@@ -62,3 +62,4 @@ dbus-user.talk org.gnome.Software
62dbus-system none 62dbus-system none
63 63
64read-write ${HOME}/.local/share/flatpak/overrides 64read-write ${HOME}/.local/share/flatpak/overrides
65restrict-namespaces
diff --git a/etc/profile-a-l/conkeror.profile b/etc/profile-a-l/conkeror.profile
index 38edf0d21..6486990f5 100644
--- a/etc/profile-a-l/conkeror.profile
+++ b/etc/profile-a-l/conkeror.profile
@@ -34,3 +34,5 @@ protocol unix,inet,inet6
34seccomp 34seccomp
35 35
36disable-mnt 36disable-mnt
37
38restrict-namespaces
diff --git a/etc/profile-a-l/conky.profile b/etc/profile-a-l/conky.profile
index 49a0a40ff..39e6d3cf9 100644
--- a/etc/profile-a-l/conky.profile
+++ b/etc/profile-a-l/conky.profile
@@ -43,3 +43,4 @@ private-dev
43private-tmp 43private-tmp
44 44
45memory-deny-write-execute 45memory-deny-write-execute
46restrict-namespaces
diff --git a/etc/profile-a-l/corebird.profile b/etc/profile-a-l/corebird.profile
index 41b9f79a1..1774669f1 100644
--- a/etc/profile-a-l/corebird.profile
+++ b/etc/profile-a-l/corebird.profile
@@ -35,3 +35,4 @@ private-bin corebird
35private-dev 35private-dev
36private-tmp 36private-tmp
37 37
38restrict-namespaces
diff --git a/etc/profile-a-l/cower.profile b/etc/profile-a-l/cower.profile
index 2245903a4..e896f3537 100644
--- a/etc/profile-a-l/cower.profile
+++ b/etc/profile-a-l/cower.profile
@@ -46,3 +46,4 @@ private-tmp
46 46
47memory-deny-write-execute 47memory-deny-write-execute
48read-only ${HOME}/.config/cower/config 48read-only ${HOME}/.config/cower/config
49restrict-namespaces
diff --git a/etc/profile-a-l/coyim.profile b/etc/profile-a-l/coyim.profile
index 24a149c5f..793de8ab4 100644
--- a/etc/profile-a-l/coyim.profile
+++ b/etc/profile-a-l/coyim.profile
@@ -46,3 +46,4 @@ dbus-user none
46dbus-system none 46dbus-system none
47 47
48#memory-deny-write-execute 48#memory-deny-write-execute
49restrict-namespaces
diff --git a/etc/profile-a-l/crawl.profile b/etc/profile-a-l/crawl.profile
index 7928dd93c..7df7b4480 100644
--- a/etc/profile-a-l/crawl.profile
+++ b/etc/profile-a-l/crawl.profile
@@ -44,3 +44,5 @@ private-tmp
44 44
45dbus-user none 45dbus-user none
46dbus-system none 46dbus-system none
47
48restrict-namespaces
diff --git a/etc/profile-a-l/crow.profile b/etc/profile-a-l/crow.profile
index ba0dfb1a6..842191f3f 100644
--- a/etc/profile-a-l/crow.profile
+++ b/etc/profile-a-l/crow.profile
@@ -43,3 +43,4 @@ private-opt none
43private-tmp 43private-tmp
44private-srv none 44private-srv none
45 45
46restrict-namespaces
diff --git a/etc/profile-a-l/curl.profile b/etc/profile-a-l/curl.profile
index 3fa6ab764..3e5878574 100644
--- a/etc/profile-a-l/curl.profile
+++ b/etc/profile-a-l/curl.profile
@@ -58,3 +58,5 @@ private-tmp
58 58
59dbus-user none 59dbus-user none
60dbus-system none 60dbus-system none
61
62restrict-namespaces
diff --git a/etc/profile-a-l/d-feet.profile b/etc/profile-a-l/d-feet.profile
index a3a16fa0c..63d89ec36 100644
--- a/etc/profile-a-l/d-feet.profile
+++ b/etc/profile-a-l/d-feet.profile
@@ -53,3 +53,4 @@ private-etc alternatives,dbus-1,fonts,ld.so.cache,ld.so.preload,machine-id
53private-tmp 53private-tmp
54 54
55#memory-deny-write-execute - breaks on Arch (see issue #1803) 55#memory-deny-write-execute - breaks on Arch (see issue #1803)
56restrict-namespaces
diff --git a/etc/profile-a-l/darktable.profile b/etc/profile-a-l/darktable.profile
index 20d5657eb..f871b80aa 100644
--- a/etc/profile-a-l/darktable.profile
+++ b/etc/profile-a-l/darktable.profile
@@ -41,3 +41,4 @@ seccomp
41private-dev 41private-dev
42private-tmp 42private-tmp
43 43
44restrict-namespaces
diff --git a/etc/profile-a-l/dbus-send.profile b/etc/profile-a-l/dbus-send.profile
index 95f24a0ad..b259c7e93 100644
--- a/etc/profile-a-l/dbus-send.profile
+++ b/etc/profile-a-l/dbus-send.profile
@@ -56,3 +56,4 @@ private-tmp
56 56
57memory-deny-write-execute 57memory-deny-write-execute
58read-only ${HOME} 58read-only ${HOME}
59restrict-namespaces
diff --git a/etc/profile-a-l/dconf-editor.profile b/etc/profile-a-l/dconf-editor.profile
index 110c9f58e..876e637b2 100644
--- a/etc/profile-a-l/dconf-editor.profile
+++ b/etc/profile-a-l/dconf-editor.profile
@@ -50,3 +50,5 @@ dbus-user filter
50dbus-user.own ca.desrt.dconf-editor 50dbus-user.own ca.desrt.dconf-editor
51dbus-user.talk ca.desrt.dconf 51dbus-user.talk ca.desrt.dconf
52dbus-system none 52dbus-system none
53
54restrict-namespaces
diff --git a/etc/profile-a-l/dconf.profile b/etc/profile-a-l/dconf.profile
index 56583838e..5136445da 100644
--- a/etc/profile-a-l/dconf.profile
+++ b/etc/profile-a-l/dconf.profile
@@ -50,3 +50,4 @@ private-lib
50private-tmp 50private-tmp
51 51
52memory-deny-write-execute 52memory-deny-write-execute
53restrict-namespaces
diff --git a/etc/profile-a-l/ddgtk.profile b/etc/profile-a-l/ddgtk.profile
index be1f2eece..8ea5d178e 100644
--- a/etc/profile-a-l/ddgtk.profile
+++ b/etc/profile-a-l/ddgtk.profile
@@ -51,3 +51,4 @@ dbus-user none
51dbus-system none 51dbus-system none
52 52
53# memory-deny-write-execute - breaks on Arch 53# memory-deny-write-execute - breaks on Arch
54restrict-namespaces
diff --git a/etc/profile-a-l/deadbeef.profile b/etc/profile-a-l/deadbeef.profile
index 205424a62..4eb89503a 100644
--- a/etc/profile-a-l/deadbeef.profile
+++ b/etc/profile-a-l/deadbeef.profile
@@ -32,3 +32,4 @@ seccomp
32private-dev 32private-dev
33private-tmp 33private-tmp
34 34
35restrict-namespaces
diff --git a/etc/profile-a-l/default.profile b/etc/profile-a-l/default.profile
index 397a89bee..a10bbab5b 100644
--- a/etc/profile-a-l/default.profile
+++ b/etc/profile-a-l/default.profile
@@ -60,4 +60,4 @@ seccomp
60# deterministic-shutdown 60# deterministic-shutdown
61# memory-deny-write-execute 61# memory-deny-write-execute
62# read-only ${HOME} 62# read-only ${HOME}
63# restrict-namespaces 63restrict-namespaces
diff --git a/etc/profile-a-l/deluge.profile b/etc/profile-a-l/deluge.profile
index d8a27da62..ebc751e1a 100644
--- a/etc/profile-a-l/deluge.profile
+++ b/etc/profile-a-l/deluge.profile
@@ -43,3 +43,5 @@ seccomp
43private-bin deluge,deluge-console,deluge-gtk,deluge-web,deluged,python*,sh,uname 43private-bin deluge,deluge-console,deluge-gtk,deluge-web,deluged,python*,sh,uname
44private-dev 44private-dev
45private-tmp 45private-tmp
46
47restrict-namespaces
diff --git a/etc/profile-a-l/desktopeditors.profile b/etc/profile-a-l/desktopeditors.profile
index 2b03f0ea0..71579905e 100644
--- a/etc/profile-a-l/desktopeditors.profile
+++ b/etc/profile-a-l/desktopeditors.profile
@@ -42,3 +42,5 @@ private-tmp
42 42
43dbus-user none 43dbus-user none
44dbus-system none 44dbus-system none
45
46restrict-namespaces
diff --git a/etc/profile-a-l/devhelp.profile b/etc/profile-a-l/devhelp.profile
index 42318527c..ef31fc3eb 100644
--- a/etc/profile-a-l/devhelp.profile
+++ b/etc/profile-a-l/devhelp.profile
@@ -50,3 +50,4 @@ private-tmp
50 50
51#memory-deny-write-execute - breaks on Arch (see issue #1803) 51#memory-deny-write-execute - breaks on Arch (see issue #1803)
52read-only ${HOME} 52read-only ${HOME}
53restrict-namespaces
diff --git a/etc/profile-a-l/devilspie.profile b/etc/profile-a-l/devilspie.profile
index 4b4bfbc5f..0579547af 100644
--- a/etc/profile-a-l/devilspie.profile
+++ b/etc/profile-a-l/devilspie.profile
@@ -56,3 +56,4 @@ dbus-system none
56 56
57memory-deny-write-execute 57memory-deny-write-execute
58read-only ${HOME} 58read-only ${HOME}
59restrict-namespaces
diff --git a/etc/profile-a-l/dex2jar.profile b/etc/profile-a-l/dex2jar.profile
index 0908c16f1..b71387b2f 100644
--- a/etc/profile-a-l/dex2jar.profile
+++ b/etc/profile-a-l/dex2jar.profile
@@ -39,3 +39,5 @@ private-dev
39 39
40dbus-user none 40dbus-user none
41dbus-system none 41dbus-system none
42
43restrict-namespaces
diff --git a/etc/profile-a-l/dia.profile b/etc/profile-a-l/dia.profile
index 30db25ee9..efcdb7ce4 100644
--- a/etc/profile-a-l/dia.profile
+++ b/etc/profile-a-l/dia.profile
@@ -54,3 +54,5 @@ private-tmp
54 54
55dbus-user none 55dbus-user none
56dbus-system none 56dbus-system none
57
58restrict-namespaces
diff --git a/etc/profile-a-l/dig.profile b/etc/profile-a-l/dig.profile
index a6de5e05e..048b92800 100644
--- a/etc/profile-a-l/dig.profile
+++ b/etc/profile-a-l/dig.profile
@@ -56,3 +56,4 @@ dbus-user none
56dbus-system none 56dbus-system none
57 57
58memory-deny-write-execute 58memory-deny-write-execute
59restrict-namespaces
diff --git a/etc/profile-a-l/digikam.profile b/etc/profile-a-l/digikam.profile
index c1f0e3a14..05f0dfba8 100644
--- a/etc/profile-a-l/digikam.profile
+++ b/etc/profile-a-l/digikam.profile
@@ -43,3 +43,5 @@ private-tmp
43 43
44# dbus-user none 44# dbus-user none
45# dbus-system none 45# dbus-system none
46
47# restrict-namespaces
diff --git a/etc/profile-a-l/dillo.profile b/etc/profile-a-l/dillo.profile
index 19b99b5fd..c7cecf23e 100644
--- a/etc/profile-a-l/dillo.profile
+++ b/etc/profile-a-l/dillo.profile
@@ -37,3 +37,4 @@ private-dev
37private-tmp 37private-tmp
38 38
39deterministic-shutdown 39deterministic-shutdown
40restrict-namespaces
diff --git a/etc/profile-a-l/dino.profile b/etc/profile-a-l/dino.profile
index 6802c7eed..1f7134ff2 100644
--- a/etc/profile-a-l/dino.profile
+++ b/etc/profile-a-l/dino.profile
@@ -53,3 +53,5 @@ dbus-user.talk org.freedesktop.Notifications
53dbus-system filter 53dbus-system filter
54# Integration with systemd-logind or elogind 54# Integration with systemd-logind or elogind
55dbus-system.talk org.freedesktop.login1 55dbus-system.talk org.freedesktop.login1
56
57restrict-namespaces
diff --git a/etc/profile-a-l/display.profile b/etc/profile-a-l/display.profile
index 6e8e30bfe..15f6e441d 100644
--- a/etc/profile-a-l/display.profile
+++ b/etc/profile-a-l/display.profile
@@ -45,3 +45,5 @@ private-tmp
45 45
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48
49restrict-namespaces
diff --git a/etc/profile-a-l/dnscrypt-proxy.profile b/etc/profile-a-l/dnscrypt-proxy.profile
index 0efebd9a6..0d52805b7 100644
--- a/etc/profile-a-l/dnscrypt-proxy.profile
+++ b/etc/profile-a-l/dnscrypt-proxy.profile
@@ -51,3 +51,4 @@ dbus-system none
51 51
52# mdwe can break modules/plugins 52# mdwe can break modules/plugins
53memory-deny-write-execute 53memory-deny-write-execute
54restrict-namespaces
diff --git a/etc/profile-a-l/dnsmasq.profile b/etc/profile-a-l/dnsmasq.profile
index 13efd2fa8..40ccab8c7 100644
--- a/etc/profile-a-l/dnsmasq.profile
+++ b/etc/profile-a-l/dnsmasq.profile
@@ -40,3 +40,5 @@ private
40private-dev 40private-dev
41private-tmp 41private-tmp
42writable-var 42writable-var
43
44restrict-namespaces
diff --git a/etc/profile-a-l/dolphin-emu.profile b/etc/profile-a-l/dolphin-emu.profile
index b8a29beb7..acaf2e021 100644
--- a/etc/profile-a-l/dolphin-emu.profile
+++ b/etc/profile-a-l/dolphin-emu.profile
@@ -60,3 +60,5 @@ private-tmp
60 60
61dbus-user none 61dbus-user none
62dbus-system none 62dbus-system none
63
64restrict-namespaces
diff --git a/etc/profile-a-l/dooble.profile b/etc/profile-a-l/dooble.profile
index 427d70e97..6e8d32848 100644
--- a/etc/profile-a-l/dooble.profile
+++ b/etc/profile-a-l/dooble.profile
@@ -38,3 +38,4 @@ disable-mnt
38private-dev 38private-dev
39private-tmp 39private-tmp
40 40
41restrict-namespaces
diff --git a/etc/profile-a-l/dosbox.profile b/etc/profile-a-l/dosbox.profile
index 845277396..1edbb7ca0 100644
--- a/etc/profile-a-l/dosbox.profile
+++ b/etc/profile-a-l/dosbox.profile
@@ -41,3 +41,5 @@ private-tmp
41 41
42dbus-user none 42dbus-user none
43dbus-system none 43dbus-system none
44
45restrict-namespaces
diff --git a/etc/profile-a-l/dragon.profile b/etc/profile-a-l/dragon.profile
index 14c5e7155..742385855 100644
--- a/etc/profile-a-l/dragon.profile
+++ b/etc/profile-a-l/dragon.profile
@@ -39,3 +39,4 @@ private-bin dragon
39private-dev 39private-dev
40private-tmp 40private-tmp
41 41
42restrict-namespaces
diff --git a/etc/profile-a-l/drawio.profile b/etc/profile-a-l/drawio.profile
index b533ad590..9d9fa291b 100644
--- a/etc/profile-a-l/drawio.profile
+++ b/etc/profile-a-l/drawio.profile
@@ -51,3 +51,4 @@ dbus-user none
51dbus-system none 51dbus-system none
52 52
53# memory-deny-write-execute - breaks on Arch 53# memory-deny-write-execute - breaks on Arch
54# restrict-namespaces
diff --git a/etc/profile-a-l/drill.profile b/etc/profile-a-l/drill.profile
index ffbd06cb6..bd6fb6dcc 100644
--- a/etc/profile-a-l/drill.profile
+++ b/etc/profile-a-l/drill.profile
@@ -52,3 +52,4 @@ dbus-user none
52dbus-system none 52dbus-system none
53 53
54memory-deny-write-execute 54memory-deny-write-execute
55restrict-namespaces
diff --git a/etc/profile-a-l/dropbox.profile b/etc/profile-a-l/dropbox.profile
index 5d83485d2..4fdf1bbfe 100644
--- a/etc/profile-a-l/dropbox.profile
+++ b/etc/profile-a-l/dropbox.profile
@@ -46,3 +46,4 @@ private-dev
46private-tmp 46private-tmp
47 47
48noexec /tmp 48noexec /tmp
49restrict-namespaces
diff --git a/etc/profile-a-l/easystroke.profile b/etc/profile-a-l/easystroke.profile
index 9db24f5a3..920eb7697 100644
--- a/etc/profile-a-l/easystroke.profile
+++ b/etc/profile-a-l/easystroke.profile
@@ -53,3 +53,4 @@ private-tmp
53# dbus-system none 53# dbus-system none
54 54
55memory-deny-write-execute 55memory-deny-write-execute
56restrict-namespaces
diff --git a/etc/profile-a-l/electrum.profile b/etc/profile-a-l/electrum.profile
index ad3a38bfa..78a996f71 100644
--- a/etc/profile-a-l/electrum.profile
+++ b/etc/profile-a-l/electrum.profile
@@ -51,3 +51,5 @@ private-tmp
51 51
52# dbus-user none 52# dbus-user none
53# dbus-system none 53# dbus-system none
54
55restrict-namespaces
diff --git a/etc/profile-a-l/emacs.profile b/etc/profile-a-l/emacs.profile
index 7e9be653d..5b44f4ccd 100644
--- a/etc/profile-a-l/emacs.profile
+++ b/etc/profile-a-l/emacs.profile
@@ -30,3 +30,4 @@ seccomp
30 30
31read-write ${HOME}/.emacs 31read-write ${HOME}/.emacs
32read-write ${HOME}/.emacs.d 32read-write ${HOME}/.emacs.d
33restrict-namespaces
diff --git a/etc/profile-a-l/email-common.profile b/etc/profile-a-l/email-common.profile
index 2b26b3727..86fb27514 100644
--- a/etc/profile-a-l/email-common.profile
+++ b/etc/profile-a-l/email-common.profile
@@ -65,7 +65,7 @@ tracelog
65# disable-mnt 65# disable-mnt
66private-cache 66private-cache
67private-dev 67private-dev
68private-etc alternatives,ca-certificates,crypto-policies,dconf,fonts,gcrypt,gnupg,groups,gtk-2.0,gtk-3.0,hostname,hosts,hosts.conf,ld.so.cache,ld.so.preload,machine-id,mailname,nsswitch.conf,passwd,pki,resolv.conf,selinux,ssl,xdg 68private-etc alternatives,ca-certificates,crypto-policies,dconf,fonts,gcrypt,gnupg,groups,gtk-2.0,gtk-3.0,hostname,hosts,hosts.conf,ld.so.cache,ld.so.preload,localtime,machine-id,mailname,nsswitch.conf,passwd,pki,resolv.conf,selinux,ssl,xdg
69private-tmp 69private-tmp
70# encrypting and signing email 70# encrypting and signing email
71writable-run-user 71writable-run-user
@@ -81,3 +81,4 @@ dbus-system none
81 81
82read-only ${HOME}/.mozilla/firefox/profiles.ini 82read-only ${HOME}/.mozilla/firefox/profiles.ini
83read-only ${HOME}/.signature 83read-only ${HOME}/.signature
84restrict-namespaces
diff --git a/etc/profile-a-l/empathy.profile b/etc/profile-a-l/empathy.profile
index 5ca640d30..9a128d7af 100644
--- a/etc/profile-a-l/empathy.profile
+++ b/etc/profile-a-l/empathy.profile
@@ -24,3 +24,5 @@ seccomp
24 24
25private-cache 25private-cache
26private-tmp 26private-tmp
27
28restrict-namespaces
diff --git a/etc/profile-a-l/enchant.profile b/etc/profile-a-l/enchant.profile
index d9abe52b0..37a6c088b 100644
--- a/etc/profile-a-l/enchant.profile
+++ b/etc/profile-a-l/enchant.profile
@@ -55,3 +55,4 @@ dbus-user none
55dbus-system none 55dbus-system none
56 56
57memory-deny-write-execute 57memory-deny-write-execute
58restrict-namespaces
diff --git a/etc/profile-a-l/engrampa.profile b/etc/profile-a-l/engrampa.profile
index 37eb21546..1118c3bf0 100644
--- a/etc/profile-a-l/engrampa.profile
+++ b/etc/profile-a-l/engrampa.profile
@@ -38,3 +38,5 @@ private-dev
38dbus-user filter 38dbus-user filter
39dbus-user.talk ca.desrt.dconf 39dbus-user.talk ca.desrt.dconf
40dbus-system none 40dbus-system none
41
42restrict-namespaces
diff --git a/etc/profile-a-l/enpass.profile b/etc/profile-a-l/enpass.profile
index 2d3367255..45a1125b4 100644
--- a/etc/profile-a-l/enpass.profile
+++ b/etc/profile-a-l/enpass.profile
@@ -59,3 +59,4 @@ private-opt Enpass
59private-tmp 59private-tmp
60 60
61#memory-deny-write-execute - breaks on Arch (see issue #1803) 61#memory-deny-write-execute - breaks on Arch (see issue #1803)
62restrict-namespaces
diff --git a/etc/profile-a-l/eo-common.profile b/etc/profile-a-l/eo-common.profile
index f25f2a291..83abb551e 100644
--- a/etc/profile-a-l/eo-common.profile
+++ b/etc/profile-a-l/eo-common.profile
@@ -49,3 +49,5 @@ private-dev
49private-etc alternatives,dconf,fonts,gtk-3.0,ld.so.cache,ld.so.preload 49private-etc alternatives,dconf,fonts,gtk-3.0,ld.so.cache,ld.so.preload
50private-lib eog,eom,gdk-pixbuf-2.*,gio,girepository-1.*,gvfs,libgconf-2.so.* 50private-lib eog,eom,gdk-pixbuf-2.*,gio,girepository-1.*,gvfs,libgconf-2.so.*
51private-tmp 51private-tmp
52
53restrict-namespaces
diff --git a/etc/profile-a-l/ephemeral.profile b/etc/profile-a-l/ephemeral.profile
index 37b7fdf11..adda53660 100644
--- a/etc/profile-a-l/ephemeral.profile
+++ b/etc/profile-a-l/ephemeral.profile
@@ -61,3 +61,5 @@ private-tmp
61# breaks preferences 61# breaks preferences
62# dbus-user none 62# dbus-user none
63# dbus-system none 63# dbus-system none
64
65restrict-namespaces
diff --git a/etc/profile-a-l/epiphany.profile b/etc/profile-a-l/epiphany.profile
index 225811226..a8d00d045 100644
--- a/etc/profile-a-l/epiphany.profile
+++ b/etc/profile-a-l/epiphany.profile
@@ -34,3 +34,5 @@ nonewprivs
34notv 34notv
35protocol unix,inet,inet6 35protocol unix,inet,inet6
36seccomp 36seccomp
37
38restrict-namespaces
diff --git a/etc/profile-a-l/equalx.profile b/etc/profile-a-l/equalx.profile
index 60d50a7fa..2fe0a4af4 100644
--- a/etc/profile-a-l/equalx.profile
+++ b/etc/profile-a-l/equalx.profile
@@ -60,3 +60,4 @@ dbus-user none
60dbus-system none 60dbus-system none
61 61
62memory-deny-write-execute 62memory-deny-write-execute
63restrict-namespaces
diff --git a/etc/profile-a-l/etr.profile b/etc/profile-a-l/etr.profile
index 8fa6cd3b4..7d27f12c9 100644
--- a/etc/profile-a-l/etr.profile
+++ b/etc/profile-a-l/etr.profile
@@ -53,3 +53,5 @@ private-tmp
53 53
54dbus-user none 54dbus-user none
55dbus-system none 55dbus-system none
56
57restrict-namespaces
diff --git a/etc/profile-a-l/evince.profile b/etc/profile-a-l/evince.profile
index 21bf7eabf..95115d484 100644
--- a/etc/profile-a-l/evince.profile
+++ b/etc/profile-a-l/evince.profile
@@ -6,9 +6,9 @@ include evince.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# WARNING: using bookmarks possibly exposes information, including file history from other programs. 9# WARNING: This exposes information like file history from other programs.
10# Add the next line to your evince.local if you need bookmarks support. This also needs additional dbus-user filtering (see below). 10# You can add a blacklist for it in your evince.local for additional hardening if you can live with some restrictions.
11#noblacklist ${HOME}/.local/share/gvfs-metadata 11noblacklist ${HOME}/.local/share/gvfs-metadata
12 12
13noblacklist ${HOME}/.config/evince 13noblacklist ${HOME}/.config/evince
14noblacklist ${DOCUMENTS} 14noblacklist ${DOCUMENTS}
@@ -59,9 +59,10 @@ private-etc alternatives,fonts,group,ld.so.cache,ld.so.preload,machine-id,passwd
59private-lib evince,gcc/*/*/libgcc_s.so.*,gcc/*/*/libstdc++.so.*,gconv,gdk-pixbuf-2.*,gio,gvfs/libgvfscommon.so,libarchive.so.*,libdjvulibre.so.*,libgconf-2.so.*,libgraphite2.so.*,libpoppler-glib.so.*,librsvg-2.so.*,libspectre.so.* 59private-lib evince,gcc/*/*/libgcc_s.so.*,gcc/*/*/libstdc++.so.*,gconv,gdk-pixbuf-2.*,gio,gvfs/libgvfscommon.so,libarchive.so.*,libdjvulibre.so.*,libgconf-2.so.*,libgraphite2.so.*,libpoppler-glib.so.*,librsvg-2.so.*,libspectre.so.*
60private-tmp 60private-tmp
61 61
62# dbus-user filtering might break two-page-view on some systems
63dbus-user filter 62dbus-user filter
64# Add the next two lines to your evince.local if you need bookmarks support. 63dbus-user.talk ca.desrt.dconf
65#dbus-user.talk org.gtk.vfs.Daemon 64dbus-user.talk org.gtk.vfs.Daemon
66#dbus-user.talk org.gtk.vfs.Metadata 65dbus-user.talk org.gtk.vfs.Metadata
67dbus-system none 66dbus-system none
67
68restrict-namespaces
diff --git a/etc/profile-a-l/evolution.profile b/etc/profile-a-l/evolution.profile
index 6f959df6e..517bb6206 100644
--- a/etc/profile-a-l/evolution.profile
+++ b/etc/profile-a-l/evolution.profile
@@ -43,3 +43,5 @@ seccomp
43private-dev 43private-dev
44private-tmp 44private-tmp
45writable-var 45writable-var
46
47restrict-namespaces
diff --git a/etc/profile-a-l/exiftool.profile b/etc/profile-a-l/exiftool.profile
index dd5e32f49..45331487c 100644
--- a/etc/profile-a-l/exiftool.profile
+++ b/etc/profile-a-l/exiftool.profile
@@ -54,3 +54,4 @@ dbus-user none
54dbus-system none 54dbus-system none
55 55
56memory-deny-write-execute 56memory-deny-write-execute
57restrict-namespaces
diff --git a/etc/profile-a-l/falkon.profile b/etc/profile-a-l/falkon.profile
index 321cb0145..2daf1ff15 100644
--- a/etc/profile-a-l/falkon.profile
+++ b/etc/profile-a-l/falkon.profile
@@ -53,3 +53,5 @@ private-tmp
53# dbus-user filter 53# dbus-user filter
54# dbus-user.own org.kde.Falkon 54# dbus-user.own org.kde.Falkon
55dbus-system none 55dbus-system none
56
57# restrict-namespaces
diff --git a/etc/profile-a-l/fbreader.profile b/etc/profile-a-l/fbreader.profile
index 5679f7cc1..434371aee 100644
--- a/etc/profile-a-l/fbreader.profile
+++ b/etc/profile-a-l/fbreader.profile
@@ -36,3 +36,5 @@ seccomp
36private-bin fbreader,FBReader 36private-bin fbreader,FBReader
37private-dev 37private-dev
38private-tmp 38private-tmp
39
40restrict-namespaces
diff --git a/etc/profile-a-l/fdns.profile b/etc/profile-a-l/fdns.profile
index ee775566e..248cb5b49 100644
--- a/etc/profile-a-l/fdns.profile
+++ b/etc/profile-a-l/fdns.profile
@@ -47,3 +47,4 @@ private-etc alternatives,ca-certificates,crypto-policies,fdns,ld.so.cache,ld.so.
47private-tmp 47private-tmp
48 48
49memory-deny-write-execute 49memory-deny-write-execute
50restrict-namespaces
diff --git a/etc/profile-a-l/feedreader.profile b/etc/profile-a-l/feedreader.profile
index 83de90908..6aa24cc86 100644
--- a/etc/profile-a-l/feedreader.profile
+++ b/etc/profile-a-l/feedreader.profile
@@ -56,3 +56,5 @@ dbus-user.talk org.freedesktop.secrets
56#dbus-user.talk org.freedesktop.Notifications 56#dbus-user.talk org.freedesktop.Notifications
57#dbus-user.talk org.gnome.OnlineAccounts 57#dbus-user.talk org.gnome.OnlineAccounts
58dbus-system none 58dbus-system none
59
60restrict-namespaces
diff --git a/etc/profile-a-l/feh.profile b/etc/profile-a-l/feh.profile
index 9b0262f5b..be5ab8627 100644
--- a/etc/profile-a-l/feh.profile
+++ b/etc/profile-a-l/feh.profile
@@ -40,3 +40,5 @@ private-tmp
40 40
41dbus-user none 41dbus-user none
42dbus-system none 42dbus-system none
43
44restrict-namespaces
diff --git a/etc/profile-a-l/ferdi.profile b/etc/profile-a-l/ferdi.profile
index e11baa536..3a044542f 100644
--- a/etc/profile-a-l/ferdi.profile
+++ b/etc/profile-a-l/ferdi.profile
@@ -44,3 +44,5 @@ seccomp !chroot
44disable-mnt 44disable-mnt
45private-dev 45private-dev
46private-tmp 46private-tmp
47
48# restrict-namespaces
diff --git a/etc/profile-a-l/fetchmail.profile b/etc/profile-a-l/fetchmail.profile
index cb01fc5dd..ea90239e0 100644
--- a/etc/profile-a-l/fetchmail.profile
+++ b/etc/profile-a-l/fetchmail.profile
@@ -31,3 +31,5 @@ seccomp
31 31
32#private-bin bash,chmod,fetchmail,procmail 32#private-bin bash,chmod,fetchmail,procmail
33private-dev 33private-dev
34
35restrict-namespaces
diff --git a/etc/profile-a-l/ffmpeg.profile b/etc/profile-a-l/ffmpeg.profile
index 42de048d7..160f26f78 100644
--- a/etc/profile-a-l/ffmpeg.profile
+++ b/etc/profile-a-l/ffmpeg.profile
@@ -54,3 +54,4 @@ dbus-user none
54dbus-system none 54dbus-system none
55 55
56# memory-deny-write-execute - it breaks old versions of ffmpeg 56# memory-deny-write-execute - it breaks old versions of ffmpeg
57restrict-namespaces
diff --git a/etc/profile-a-l/file-manager-common.profile b/etc/profile-a-l/file-manager-common.profile
index 9ab7e36d3..bf8475758 100644
--- a/etc/profile-a-l/file-manager-common.profile
+++ b/etc/profile-a-l/file-manager-common.profile
@@ -49,3 +49,5 @@ private-dev
49 49
50#dbus-user none 50#dbus-user none
51#dbus-system none 51#dbus-system none
52
53restrict-namespaces
diff --git a/etc/profile-a-l/file-roller.profile b/etc/profile-a-l/file-roller.profile
index 06744cdd3..ef4e0e117 100644
--- a/etc/profile-a-l/file-roller.profile
+++ b/etc/profile-a-l/file-roller.profile
@@ -46,3 +46,5 @@ private-etc alternatives,dconf,fonts,gtk-3.0,ld.so.cache,ld.so.preload,xdg
46# private-tmp 46# private-tmp
47 47
48dbus-system none 48dbus-system none
49
50restrict-namespaces
diff --git a/etc/profile-a-l/file.profile b/etc/profile-a-l/file.profile
index bcb2abc8b..a5fd05bc7 100644
--- a/etc/profile-a-l/file.profile
+++ b/etc/profile-a-l/file.profile
@@ -44,3 +44,4 @@ dbus-system none
44 44
45memory-deny-write-execute 45memory-deny-write-execute
46read-only ${HOME} 46read-only ${HOME}
47restrict-namespaces
diff --git a/etc/profile-a-l/filezilla.profile b/etc/profile-a-l/filezilla.profile
index 273e6180c..e80a875f1 100644
--- a/etc/profile-a-l/filezilla.profile
+++ b/etc/profile-a-l/filezilla.profile
@@ -41,3 +41,5 @@ seccomp
41private-bin bash,filezilla,fzputtygen,fzsftp,lsb_release,python*,sh,uname,zsh 41private-bin bash,filezilla,fzputtygen,fzsftp,lsb_release,python*,sh,uname,zsh
42private-dev 42private-dev
43private-tmp 43private-tmp
44
45restrict-namespaces
diff --git a/etc/profile-a-l/firefox-common-addons.profile b/etc/profile-a-l/firefox-common-addons.profile
index b2b7c362a..6dc1fca8a 100644
--- a/etc/profile-a-l/firefox-common-addons.profile
+++ b/etc/profile-a-l/firefox-common-addons.profile
@@ -2,8 +2,13 @@
2# Persistent customizations should go in a .local file. 2# Persistent customizations should go in a .local file.
3include firefox-common-addons.local 3include firefox-common-addons.local
4 4
5# Prevent whitelisting in ${RUNUSER}
5ignore whitelist ${RUNUSER}/*firefox* 6ignore whitelist ${RUNUSER}/*firefox*
7ignore whitelist ${RUNUSER}/psd/*firefox*
8ignore whitelist ${RUNUSER}/kpxc_server
9ignore whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer
6ignore include whitelist-runuser-common.inc 10ignore include whitelist-runuser-common.inc
11
7ignore private-cache 12ignore private-cache
8 13
9noblacklist ${HOME}/.cache/youtube-dl 14noblacklist ${HOME}/.cache/youtube-dl
diff --git a/etc/profile-a-l/firefox-common.profile b/etc/profile-a-l/firefox-common.profile
index 47eb8638e..60d64736e 100644
--- a/etc/profile-a-l/firefox-common.profile
+++ b/etc/profile-a-l/firefox-common.profile
@@ -8,6 +8,8 @@ include firefox-common.local
8 8
9# noexec ${HOME} breaks DRM binaries. 9# noexec ${HOME} breaks DRM binaries.
10?BROWSER_ALLOW_DRM: ignore noexec ${HOME} 10?BROWSER_ALLOW_DRM: ignore noexec ${HOME}
11# noexec ${RUNUSER} breaks DRM binaries when using profile-sync-daemon.
12?BROWSER_ALLOW_DRM: ignore noexec ${RUNUSER}
11 13
12# Add the next line to your firefox-common.local to allow access to common programs/addons/plugins. 14# Add the next line to your firefox-common.local to allow access to common programs/addons/plugins.
13#include firefox-common-addons.profile 15#include firefox-common-addons.profile
@@ -68,3 +70,5 @@ blacklist ${PATH}/wget2
68# Gnome connector, KDE connect and power management on KDE Plasma. 70# Gnome connector, KDE connect and power management on KDE Plasma.
69dbus-user none 71dbus-user none
70dbus-system none 72dbus-system none
73
74#restrict-namespaces
diff --git a/etc/profile-a-l/flameshot.profile b/etc/profile-a-l/flameshot.profile
index d5034ef8e..0984055a3 100644
--- a/etc/profile-a-l/flameshot.profile
+++ b/etc/profile-a-l/flameshot.profile
@@ -65,3 +65,5 @@ dbus-user.talk org.kde.KWin
65?ALLOW_TRAY: dbus-user.talk org.kde.StatusNotifierWatcher 65?ALLOW_TRAY: dbus-user.talk org.kde.StatusNotifierWatcher
66?ALLOW_TRAY: dbus-user.own org.kde.* 66?ALLOW_TRAY: dbus-user.own org.kde.*
67dbus-system none 67dbus-system none
68
69restrict-namespaces
diff --git a/etc/profile-a-l/flowblade.profile b/etc/profile-a-l/flowblade.profile
index 4bb1b2a71..740dc153f 100644
--- a/etc/profile-a-l/flowblade.profile
+++ b/etc/profile-a-l/flowblade.profile
@@ -35,3 +35,4 @@ private-cache
35private-dev 35private-dev
36private-tmp 36private-tmp
37 37
38restrict-namespaces
diff --git a/etc/profile-a-l/fluxbox.profile b/etc/profile-a-l/fluxbox.profile
index 1210f365c..af55ffc89 100644
--- a/etc/profile-a-l/fluxbox.profile
+++ b/etc/profile-a-l/fluxbox.profile
@@ -14,5 +14,6 @@ caps.drop all
14netfilter 14netfilter
15noroot 15noroot
16protocol unix,inet,inet6 16protocol unix,inet,inet6
17seccomp 17seccomp !chroot
18 18
19#restrict-namespaces
diff --git a/etc/profile-a-l/font-manager.profile b/etc/profile-a-l/font-manager.profile
index fcd4afa44..88ae56c82 100644
--- a/etc/profile-a-l/font-manager.profile
+++ b/etc/profile-a-l/font-manager.profile
@@ -54,3 +54,4 @@ private-dev
54private-tmp 54private-tmp
55 55
56#memory-deny-write-execute - breaks on Arch (see issue #1803) 56#memory-deny-write-execute - breaks on Arch (see issue #1803)
57restrict-namespaces
diff --git a/etc/profile-a-l/fontforge.profile b/etc/profile-a-l/fontforge.profile
index f18250fdb..756ca4fae 100644
--- a/etc/profile-a-l/fontforge.profile
+++ b/etc/profile-a-l/fontforge.profile
@@ -38,3 +38,4 @@ private-cache
38private-dev 38private-dev
39private-tmp 39private-tmp
40 40
41restrict-namespaces
diff --git a/etc/profile-a-l/fractal.profile b/etc/profile-a-l/fractal.profile
index 796081ece..a614d7d9f 100644
--- a/etc/profile-a-l/fractal.profile
+++ b/etc/profile-a-l/fractal.profile
@@ -55,3 +55,5 @@ dbus-user.talk ca.desrt.dconf
55dbus-user.talk org.freedesktop.Notifications 55dbus-user.talk org.freedesktop.Notifications
56dbus-user.talk org.freedesktop.secrets 56dbus-user.talk org.freedesktop.secrets
57dbus-system none 57dbus-system none
58
59restrict-namespaces
diff --git a/etc/profile-a-l/franz.profile b/etc/profile-a-l/franz.profile
index 4a2e13d89..e21789d73 100644
--- a/etc/profile-a-l/franz.profile
+++ b/etc/profile-a-l/franz.profile
@@ -44,3 +44,5 @@ seccomp !chroot
44disable-mnt 44disable-mnt
45private-dev 45private-dev
46private-tmp 46private-tmp
47
48# restrict-namespaces
diff --git a/etc/profile-a-l/freecad.profile b/etc/profile-a-l/freecad.profile
index e0330b52a..53315c249 100644
--- a/etc/profile-a-l/freecad.profile
+++ b/etc/profile-a-l/freecad.profile
@@ -42,3 +42,5 @@ private-tmp
42 42
43dbus-user none 43dbus-user none
44dbus-system none 44dbus-system none
45
46restrict-namespaces
diff --git a/etc/profile-a-l/freeciv.profile b/etc/profile-a-l/freeciv.profile
index 1690f6eb9..0788acce1 100644
--- a/etc/profile-a-l/freeciv.profile
+++ b/etc/profile-a-l/freeciv.profile
@@ -44,3 +44,5 @@ private-tmp
44 44
45dbus-user none 45dbus-user none
46dbus-system none 46dbus-system none
47
48restrict-namespaces
diff --git a/etc/profile-a-l/freecol.profile b/etc/profile-a-l/freecol.profile
index 3092e830a..f1b2ffcb7 100644
--- a/etc/profile-a-l/freecol.profile
+++ b/etc/profile-a-l/freecol.profile
@@ -55,3 +55,5 @@ private-tmp
55 55
56dbus-user none 56dbus-user none
57dbus-system none 57dbus-system none
58
59restrict-namespaces
diff --git a/etc/profile-a-l/freemind.profile b/etc/profile-a-l/freemind.profile
index c3f32de03..ae5843f7f 100644
--- a/etc/profile-a-l/freemind.profile
+++ b/etc/profile-a-l/freemind.profile
@@ -50,3 +50,5 @@ private-srv none
50 50
51dbus-user none 51dbus-user none
52dbus-system none 52dbus-system none
53
54restrict-namespaces
diff --git a/etc/profile-a-l/freshclam.profile b/etc/profile-a-l/freshclam.profile
index ab6877de8..133d66f0d 100644
--- a/etc/profile-a-l/freshclam.profile
+++ b/etc/profile-a-l/freshclam.profile
@@ -33,3 +33,4 @@ writable-var
33writable-var-log 33writable-var-log
34 34
35memory-deny-write-execute 35memory-deny-write-execute
36restrict-namespaces
diff --git a/etc/profile-a-l/frogatto.profile b/etc/profile-a-l/frogatto.profile
index 521d50b3b..067fe3caa 100644
--- a/etc/profile-a-l/frogatto.profile
+++ b/etc/profile-a-l/frogatto.profile
@@ -49,3 +49,5 @@ private-tmp
49 49
50dbus-user none 50dbus-user none
51dbus-system none 51dbus-system none
52
53restrict-namespaces
diff --git a/etc/profile-a-l/frozen-bubble.profile b/etc/profile-a-l/frozen-bubble.profile
index bb60d98a5..86a8a8fc6 100644
--- a/etc/profile-a-l/frozen-bubble.profile
+++ b/etc/profile-a-l/frozen-bubble.profile
@@ -46,3 +46,5 @@ private-tmp
46 46
47dbus-user none 47dbus-user none
48dbus-system none 48dbus-system none
49
50restrict-namespaces
diff --git a/etc/profile-a-l/ftp.profile b/etc/profile-a-l/ftp.profile
index 15b68eb08..f448ab932 100644
--- a/etc/profile-a-l/ftp.profile
+++ b/etc/profile-a-l/ftp.profile
@@ -51,3 +51,4 @@ dbus-system none
51 51
52memory-deny-write-execute 52memory-deny-write-execute
53noexec ${HOME} 53noexec ${HOME}
54restrict-namespaces
diff --git a/etc/profile-a-l/funnyboat.profile b/etc/profile-a-l/funnyboat.profile
index ee4226852..8ca349d1c 100644
--- a/etc/profile-a-l/funnyboat.profile
+++ b/etc/profile-a-l/funnyboat.profile
@@ -52,3 +52,4 @@ dbus-user none
52dbus-system none 52dbus-system none
53 53
54memory-deny-write-execute 54memory-deny-write-execute
55restrict-namespaces
diff --git a/etc/profile-a-l/gajim.profile b/etc/profile-a-l/gajim.profile
index 3d4d4b4e7..d4d578dd4 100644
--- a/etc/profile-a-l/gajim.profile
+++ b/etc/profile-a-l/gajim.profile
@@ -75,4 +75,5 @@ dbus-system.talk org.freedesktop.login1
75# Add the next line to your gajim.local to enable location plugin support. 75# Add the next line to your gajim.local to enable location plugin support.
76#dbus-system.talk org.freedesktop.GeoClue2 76#dbus-system.talk org.freedesktop.GeoClue2
77 77
78restrict-namespaces
78join-or-start gajim 79join-or-start gajim
diff --git a/etc/profile-a-l/galculator.profile b/etc/profile-a-l/galculator.profile
index 95afc8020..0fba8ac07 100644
--- a/etc/profile-a-l/galculator.profile
+++ b/etc/profile-a-l/galculator.profile
@@ -50,3 +50,4 @@ dbus-user none
50dbus-system none 50dbus-system none
51 51
52#memory-deny-write-execute - breaks on Arch (see issue #1803) 52#memory-deny-write-execute - breaks on Arch (see issue #1803)
53restrict-namespaces
diff --git a/etc/profile-a-l/gapplication.profile b/etc/profile-a-l/gapplication.profile
index 6fac9affc..106e0eda6 100644
--- a/etc/profile-a-l/gapplication.profile
+++ b/etc/profile-a-l/gapplication.profile
@@ -70,3 +70,4 @@ dbus-system none
70 70
71memory-deny-write-execute 71memory-deny-write-execute
72read-only ${HOME} 72read-only ${HOME}
73restrict-namespaces
diff --git a/etc/profile-a-l/gcloud.profile b/etc/profile-a-l/gcloud.profile
index 60fac668e..313b34a53 100644
--- a/etc/profile-a-l/gcloud.profile
+++ b/etc/profile-a-l/gcloud.profile
@@ -40,3 +40,5 @@ private-tmp
40 40
41dbus-user none 41dbus-user none
42dbus-system none 42dbus-system none
43
44restrict-namespaces
diff --git a/etc/profile-a-l/gconf.profile b/etc/profile-a-l/gconf.profile
index 33441ac0e..5b434342b 100644
--- a/etc/profile-a-l/gconf.profile
+++ b/etc/profile-a-l/gconf.profile
@@ -58,3 +58,4 @@ private-lib GConf,libpython*,python2*
58private-tmp 58private-tmp
59 59
60memory-deny-write-execute 60memory-deny-write-execute
61restrict-namespaces
diff --git a/etc/profile-a-l/gdu.profile b/etc/profile-a-l/gdu.profile
index 783183bea..4eb94edf4 100644
--- a/etc/profile-a-l/gdu.profile
+++ b/etc/profile-a-l/gdu.profile
@@ -37,6 +37,7 @@ dbus-user none
37dbus-system none 37dbus-system none
38 38
39memory-deny-write-execute 39memory-deny-write-execute
40restrict-namespaces
40 41
41# gdu has built-in delete (d), empty (e) dir/file support and shell spawning (b) features. 42# gdu has built-in delete (d), empty (e) dir/file support and shell spawning (b) features.
42# Depending on workflow and use case the sandbox can be hardened by adding the 43# Depending on workflow and use case the sandbox can be hardened by adding the
diff --git a/etc/profile-a-l/geany.profile b/etc/profile-a-l/geany.profile
index 021abefb3..ec1d68e0d 100644
--- a/etc/profile-a-l/geany.profile
+++ b/etc/profile-a-l/geany.profile
@@ -32,3 +32,5 @@ seccomp
32private-cache 32private-cache
33private-dev 33private-dev
34private-tmp 34private-tmp
35
36restrict-namespaces
diff --git a/etc/profile-a-l/geary.profile b/etc/profile-a-l/geary.profile
index cc2119f2a..ad9b45b57 100644
--- a/etc/profile-a-l/geary.profile
+++ b/etc/profile-a-l/geary.profile
@@ -91,3 +91,4 @@ dbus-user.talk org.gnome.evolution.dataserver.Sources5
91dbus-system none 91dbus-system none
92 92
93read-only ${HOME}/.mozilla/firefox/profiles.ini 93read-only ${HOME}/.mozilla/firefox/profiles.ini
94restrict-namespaces
diff --git a/etc/profile-a-l/gedit.profile b/etc/profile-a-l/gedit.profile
index 28a79b646..dbb3ab971 100644
--- a/etc/profile-a-l/gedit.profile
+++ b/etc/profile-a-l/gedit.profile
@@ -49,3 +49,5 @@ private-tmp
49# makes settings immutable 49# makes settings immutable
50# dbus-user none 50# dbus-user none
51# dbus-system none 51# dbus-system none
52
53restrict-namespaces
diff --git a/etc/profile-a-l/geekbench.profile b/etc/profile-a-l/geekbench.profile
index 19ac4e026..cda47a7e9 100644
--- a/etc/profile-a-l/geekbench.profile
+++ b/etc/profile-a-l/geekbench.profile
@@ -55,3 +55,4 @@ dbus-system none
55 55
56read-only ${HOME} 56read-only ${HOME}
57read-write ${HOME}/.geekbench5 57read-write ${HOME}/.geekbench5
58restrict-namespaces
diff --git a/etc/profile-a-l/geeqie.profile b/etc/profile-a-l/geeqie.profile
index 268c3b334..95adc6840 100644
--- a/etc/profile-a-l/geeqie.profile
+++ b/etc/profile-a-l/geeqie.profile
@@ -34,3 +34,5 @@ seccomp
34 34
35# private-bin geeqie 35# private-bin geeqie
36private-dev 36private-dev
37
38restrict-namespaces
diff --git a/etc/profile-a-l/gfeeds.profile b/etc/profile-a-l/gfeeds.profile
index 7b42fadd1..d3d49433b 100644
--- a/etc/profile-a-l/gfeeds.profile
+++ b/etc/profile-a-l/gfeeds.profile
@@ -67,3 +67,5 @@ dbus-user filter
67dbus-user.own org.gabmus.gfeeds 67dbus-user.own org.gabmus.gfeeds
68dbus-user.talk ca.desrt.dconf 68dbus-user.talk ca.desrt.dconf
69dbus-system none 69dbus-system none
70
71restrict-namespaces
diff --git a/etc/profile-a-l/gget.profile b/etc/profile-a-l/gget.profile
index b40c96e5b..02c4f9509 100644
--- a/etc/profile-a-l/gget.profile
+++ b/etc/profile-a-l/gget.profile
@@ -56,3 +56,4 @@ dbus-user none
56dbus-system none 56dbus-system none
57 57
58memory-deny-write-execute 58memory-deny-write-execute
59restrict-namespaces
diff --git a/etc/profile-a-l/ghostwriter.profile b/etc/profile-a-l/ghostwriter.profile
index e908e5cd9..9c719ddb1 100644
--- a/etc/profile-a-l/ghostwriter.profile
+++ b/etc/profile-a-l/ghostwriter.profile
@@ -56,3 +56,5 @@ private-tmp
56 56
57dbus-user filter 57dbus-user filter
58dbus-system none 58dbus-system none
59
60#restrict-namespaces
diff --git a/etc/profile-a-l/gimp.profile b/etc/profile-a-l/gimp.profile
index 400c8c54f..083b85a91 100644
--- a/etc/profile-a-l/gimp.profile
+++ b/etc/profile-a-l/gimp.profile
@@ -63,3 +63,5 @@ private-tmp
63 63
64dbus-user none 64dbus-user none
65dbus-system none 65dbus-system none
66
67restrict-namespaces
diff --git a/etc/profile-a-l/gist.profile b/etc/profile-a-l/gist.profile
index ffd1b1f13..d315619b7 100644
--- a/etc/profile-a-l/gist.profile
+++ b/etc/profile-a-l/gist.profile
@@ -58,3 +58,4 @@ dbus-user none
58dbus-system none 58dbus-system none
59 59
60memory-deny-write-execute 60memory-deny-write-execute
61restrict-namespaces
diff --git a/etc/profile-a-l/git-cola.profile b/etc/profile-a-l/git-cola.profile
index 6c6a0bfd4..2f7068d68 100644
--- a/etc/profile-a-l/git-cola.profile
+++ b/etc/profile-a-l/git-cola.profile
@@ -84,3 +84,5 @@ read-only ${HOME}/.git-credentials
84 84
85# Add 'ignore read-only ${HOME}/.ssh' to your git-cola.local if you need to allow hosts. 85# Add 'ignore read-only ${HOME}/.ssh' to your git-cola.local if you need to allow hosts.
86read-only ${HOME}/.ssh 86read-only ${HOME}/.ssh
87
88restrict-namespaces
diff --git a/etc/profile-a-l/git.profile b/etc/profile-a-l/git.profile
index 76636cc03..78d6cb2a1 100644
--- a/etc/profile-a-l/git.profile
+++ b/etc/profile-a-l/git.profile
@@ -65,3 +65,4 @@ private-cache
65private-dev 65private-dev
66 66
67memory-deny-write-execute 67memory-deny-write-execute
68restrict-namespaces
diff --git a/etc/profile-a-l/gitg.profile b/etc/profile-a-l/gitg.profile
index 4c4ddd2d2..85f08d52e 100644
--- a/etc/profile-a-l/gitg.profile
+++ b/etc/profile-a-l/gitg.profile
@@ -61,3 +61,5 @@ dbus-user.talk ca.desrt.dconf
61# Add the next line to your gitg.local if you need keyring access. 61# Add the next line to your gitg.local if you need keyring access.
62#dbus-user.talk org.freedesktop.secrets 62#dbus-user.talk org.freedesktop.secrets
63dbus-system none 63dbus-system none
64
65restrict-namespaces
diff --git a/etc/profile-a-l/gitter.profile b/etc/profile-a-l/gitter.profile
index 012bc6159..0f9ed9592 100644
--- a/etc/profile-a-l/gitter.profile
+++ b/etc/profile-a-l/gitter.profile
@@ -41,3 +41,4 @@ private-opt Gitter
41private-dev 41private-dev
42private-tmp 42private-tmp
43 43
44restrict-namespaces
diff --git a/etc/profile-a-l/gjs.profile b/etc/profile-a-l/gjs.profile
index 9bdbd0e37..bd332a6d5 100644
--- a/etc/profile-a-l/gjs.profile
+++ b/etc/profile-a-l/gjs.profile
@@ -42,3 +42,5 @@ tracelog
42private-dev 42private-dev
43# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl 43# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl
44private-tmp 44private-tmp
45
46restrict-namespaces
diff --git a/etc/profile-a-l/gl-117.profile b/etc/profile-a-l/gl-117.profile
index 311d7f127..92ba70113 100644
--- a/etc/profile-a-l/gl-117.profile
+++ b/etc/profile-a-l/gl-117.profile
@@ -48,3 +48,5 @@ private-tmp
48 48
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51
52restrict-namespaces
diff --git a/etc/profile-a-l/glaxium.profile b/etc/profile-a-l/glaxium.profile
index 162d292f8..d61b566d8 100644
--- a/etc/profile-a-l/glaxium.profile
+++ b/etc/profile-a-l/glaxium.profile
@@ -48,3 +48,5 @@ private-tmp
48 48
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51
52restrict-namespaces
diff --git a/etc/profile-a-l/globaltime.profile b/etc/profile-a-l/globaltime.profile
index 5e823a5a8..46553d457 100644
--- a/etc/profile-a-l/globaltime.profile
+++ b/etc/profile-a-l/globaltime.profile
@@ -34,3 +34,4 @@ private-cache
34private-dev 34private-dev
35private-tmp 35private-tmp
36 36
37restrict-namespaces
diff --git a/etc/profile-a-l/gmpc.profile b/etc/profile-a-l/gmpc.profile
index edd2cd9ee..d4e4caebe 100644
--- a/etc/profile-a-l/gmpc.profile
+++ b/etc/profile-a-l/gmpc.profile
@@ -51,3 +51,4 @@ writable-run-user
51# dbus-system none 51# dbus-system none
52 52
53# memory-deny-write-execute - breaks on Arch 53# memory-deny-write-execute - breaks on Arch
54restrict-namespaces
diff --git a/etc/profile-a-l/gnome-books.profile b/etc/profile-a-l/gnome-books.profile
index 0c19faab3..812923b2d 100644
--- a/etc/profile-a-l/gnome-books.profile
+++ b/etc/profile-a-l/gnome-books.profile
@@ -43,3 +43,4 @@ tracelog
43private-dev 43private-dev
44private-tmp 44private-tmp
45 45
46restrict-namespaces
diff --git a/etc/profile-a-l/gnome-builder.profile b/etc/profile-a-l/gnome-builder.profile
index fe3a392b4..e171224c0 100644
--- a/etc/profile-a-l/gnome-builder.profile
+++ b/etc/profile-a-l/gnome-builder.profile
@@ -37,3 +37,4 @@ seccomp
37private-dev 37private-dev
38 38
39read-write ${HOME}/.bash_history 39read-write ${HOME}/.bash_history
40restrict-namespaces
diff --git a/etc/profile-a-l/gnome-calculator.profile b/etc/profile-a-l/gnome-calculator.profile
index 11fdb9828..3926146ff 100644
--- a/etc/profile-a-l/gnome-calculator.profile
+++ b/etc/profile-a-l/gnome-calculator.profile
@@ -52,3 +52,5 @@ dbus-user filter
52dbus-user.own org.gnome.Calculator 52dbus-user.own org.gnome.Calculator
53dbus-user.talk ca.desrt.dconf 53dbus-user.talk ca.desrt.dconf
54dbus-system none 54dbus-system none
55
56restrict-namespaces
diff --git a/etc/profile-a-l/gnome-calendar.profile b/etc/profile-a-l/gnome-calendar.profile
index 482992778..b0d3f1d34 100644
--- a/etc/profile-a-l/gnome-calendar.profile
+++ b/etc/profile-a-l/gnome-calendar.profile
@@ -60,3 +60,4 @@ dbus-system filter
60#dbus-system.talk org.freedesktop.GeoClue2 60#dbus-system.talk org.freedesktop.GeoClue2
61 61
62read-only ${HOME} 62read-only ${HOME}
63restrict-namespaces
diff --git a/etc/profile-a-l/gnome-characters.profile b/etc/profile-a-l/gnome-characters.profile
index af5b61fe6..2e11f335b 100644
--- a/etc/profile-a-l/gnome-characters.profile
+++ b/etc/profile-a-l/gnome-characters.profile
@@ -56,3 +56,4 @@ private-tmp
56# dbus-system none 56# dbus-system none
57 57
58read-only ${HOME} 58read-only ${HOME}
59restrict-namespaces
diff --git a/etc/profile-a-l/gnome-chess.profile b/etc/profile-a-l/gnome-chess.profile
index 815ede80b..78bd54b64 100644
--- a/etc/profile-a-l/gnome-chess.profile
+++ b/etc/profile-a-l/gnome-chess.profile
@@ -51,3 +51,5 @@ private-cache
51private-dev 51private-dev
52private-etc alternatives,dconf,fonts,gnome-chess,gtk-3.0,ld.so.cache,ld.so.preload 52private-etc alternatives,dconf,fonts,gnome-chess,gtk-3.0,ld.so.cache,ld.so.preload
53private-tmp 53private-tmp
54
55restrict-namespaces
diff --git a/etc/profile-a-l/gnome-clocks.profile b/etc/profile-a-l/gnome-clocks.profile
index cc8f3fea0..8af9870bf 100644
--- a/etc/profile-a-l/gnome-clocks.profile
+++ b/etc/profile-a-l/gnome-clocks.profile
@@ -44,3 +44,4 @@ private-dev
44private-etc alternatives,ca-certificates,crypto-policies,dconf,fonts,gtk-3.0,hosts,ld.so.cache,ld.so.preload,localtime,machine-id,pkcs11,pki,ssl 44private-etc alternatives,ca-certificates,crypto-policies,dconf,fonts,gtk-3.0,hosts,ld.so.cache,ld.so.preload,localtime,machine-id,pkcs11,pki,ssl
45private-tmp 45private-tmp
46 46
47restrict-namespaces
diff --git a/etc/profile-a-l/gnome-contacts.profile b/etc/profile-a-l/gnome-contacts.profile
index f96f750dd..2326115c3 100644
--- a/etc/profile-a-l/gnome-contacts.profile
+++ b/etc/profile-a-l/gnome-contacts.profile
@@ -38,3 +38,4 @@ disable-mnt
38private-dev 38private-dev
39private-tmp 39private-tmp
40 40
41restrict-namespaces
diff --git a/etc/profile-a-l/gnome-documents.profile b/etc/profile-a-l/gnome-documents.profile
index 24fa9721a..c8af97a61 100644
--- a/etc/profile-a-l/gnome-documents.profile
+++ b/etc/profile-a-l/gnome-documents.profile
@@ -41,3 +41,4 @@ private-cache
41private-dev 41private-dev
42private-tmp 42private-tmp
43 43
44restrict-namespaces
diff --git a/etc/profile-a-l/gnome-font-viewer.profile b/etc/profile-a-l/gnome-font-viewer.profile
index 294729152..17d266537 100644
--- a/etc/profile-a-l/gnome-font-viewer.profile
+++ b/etc/profile-a-l/gnome-font-viewer.profile
@@ -35,3 +35,4 @@ disable-mnt
35private-dev 35private-dev
36private-tmp 36private-tmp
37 37
38restrict-namespaces
diff --git a/etc/profile-a-l/gnome-hexgl.profile b/etc/profile-a-l/gnome-hexgl.profile
index f734f23bd..f0493c645 100644
--- a/etc/profile-a-l/gnome-hexgl.profile
+++ b/etc/profile-a-l/gnome-hexgl.profile
@@ -49,3 +49,4 @@ dbus-system none
49 49
50read-only ${HOME} 50read-only ${HOME}
51read-write ${HOME}/.cache/mesa_shader_cache 51read-write ${HOME}/.cache/mesa_shader_cache
52restrict-namespaces
diff --git a/etc/profile-a-l/gnome-keyring.profile b/etc/profile-a-l/gnome-keyring.profile
index 5f9679cc7..45b6fd880 100644
--- a/etc/profile-a-l/gnome-keyring.profile
+++ b/etc/profile-a-l/gnome-keyring.profile
@@ -59,3 +59,4 @@ private-tmp
59dbus-system none 59dbus-system none
60 60
61memory-deny-write-execute 61memory-deny-write-execute
62restrict-namespaces
diff --git a/etc/profile-a-l/gnome-latex.profile b/etc/profile-a-l/gnome-latex.profile
index 105996b38..43e0a1ec1 100644
--- a/etc/profile-a-l/gnome-latex.profile
+++ b/etc/profile-a-l/gnome-latex.profile
@@ -50,3 +50,5 @@ private-dev
50private-etc alternatives,dconf,fonts,gtk-3.0,latexmk.conf,ld.so.cache,ld.so.preload,login.defs,passwd,texlive 50private-etc alternatives,dconf,fonts,gtk-3.0,latexmk.conf,ld.so.cache,ld.so.preload,login.defs,passwd,texlive
51 51
52dbus-system none 52dbus-system none
53
54restrict-namespaces
diff --git a/etc/profile-a-l/gnome-logs.profile b/etc/profile-a-l/gnome-logs.profile
index f93d9ca24..b619b0f27 100644
--- a/etc/profile-a-l/gnome-logs.profile
+++ b/etc/profile-a-l/gnome-logs.profile
@@ -51,3 +51,4 @@ dbus-system none
51 51
52# Add 'ignore read-only ${HOME}' to your gnome-logs.local if you export logs to a file under your ${HOME}. 52# Add 'ignore read-only ${HOME}' to your gnome-logs.local if you export logs to a file under your ${HOME}.
53read-only ${HOME} 53read-only ${HOME}
54restrict-namespaces
diff --git a/etc/profile-a-l/gnome-maps.profile b/etc/profile-a-l/gnome-maps.profile
index 2f5e033ad..d14b2a5a1 100644
--- a/etc/profile-a-l/gnome-maps.profile
+++ b/etc/profile-a-l/gnome-maps.profile
@@ -73,3 +73,5 @@ dbus-user.own org.gnome.Maps
73dbus-system filter 73dbus-system filter
74#dbus-system.talk org.freedesktop.NetworkManager 74#dbus-system.talk org.freedesktop.NetworkManager
75dbus-system.talk org.freedesktop.GeoClue2 75dbus-system.talk org.freedesktop.GeoClue2
76
77restrict-namespaces
diff --git a/etc/profile-a-l/gnome-mplayer.profile b/etc/profile-a-l/gnome-mplayer.profile
index 444f6ed34..052e9ba9c 100644
--- a/etc/profile-a-l/gnome-mplayer.profile
+++ b/etc/profile-a-l/gnome-mplayer.profile
@@ -31,3 +31,4 @@ private-cache
31private-dev 31private-dev
32private-tmp 32private-tmp
33 33
34restrict-namespaces
diff --git a/etc/profile-a-l/gnome-music.profile b/etc/profile-a-l/gnome-music.profile
index 8c2ff90ea..ec033dbf0 100644
--- a/etc/profile-a-l/gnome-music.profile
+++ b/etc/profile-a-l/gnome-music.profile
@@ -44,3 +44,4 @@ private-dev
44private-etc alternatives,asound.conf,dconf,fonts,fonts,gtk-3.0,ld.so.cache,ld.so.preload,machine-id,pulse,selinux,xdg 44private-etc alternatives,asound.conf,dconf,fonts,fonts,gtk-3.0,ld.so.cache,ld.so.preload,machine-id,pulse,selinux,xdg
45private-tmp 45private-tmp
46 46
47restrict-namespaces
diff --git a/etc/profile-a-l/gnome-nettool.profile b/etc/profile-a-l/gnome-nettool.profile
index abf3dd759..ce4e5edd8 100644
--- a/etc/profile-a-l/gnome-nettool.profile
+++ b/etc/profile-a-l/gnome-nettool.profile
@@ -46,3 +46,5 @@ private-tmp
46 46
47dbus-user none 47dbus-user none
48dbus-system none 48dbus-system none
49
50#restrict-namespaces
diff --git a/etc/profile-a-l/gnome-passwordsafe.profile b/etc/profile-a-l/gnome-passwordsafe.profile
index bd39ab0c9..0d7fb2de8 100644
--- a/etc/profile-a-l/gnome-passwordsafe.profile
+++ b/etc/profile-a-l/gnome-passwordsafe.profile
@@ -59,3 +59,5 @@ dbus-user filter
59dbus-user.own org.gnome.PasswordSafe 59dbus-user.own org.gnome.PasswordSafe
60dbus-user.talk ca.desrt.dconf 60dbus-user.talk ca.desrt.dconf
61dbus-system none 61dbus-system none
62
63restrict-namespaces
diff --git a/etc/profile-a-l/gnome-photos.profile b/etc/profile-a-l/gnome-photos.profile
index 5c848d0af..1d0291aa2 100644
--- a/etc/profile-a-l/gnome-photos.profile
+++ b/etc/profile-a-l/gnome-photos.profile
@@ -40,3 +40,4 @@ tracelog
40private-dev 40private-dev
41private-tmp 41private-tmp
42 42
43restrict-namespaces
diff --git a/etc/profile-a-l/gnome-pie.profile b/etc/profile-a-l/gnome-pie.profile
index 0086edab0..6d90773aa 100644
--- a/etc/profile-a-l/gnome-pie.profile
+++ b/etc/profile-a-l/gnome-pie.profile
@@ -38,3 +38,4 @@ private-lib gdk-pixbuf-2.*,gio,gvfs/libgvfscommon.so,libgconf-2.so.*,librsvg-2.s
38private-tmp 38private-tmp
39 39
40memory-deny-write-execute 40memory-deny-write-execute
41restrict-namespaces
diff --git a/etc/profile-a-l/gnome-pomodoro.profile b/etc/profile-a-l/gnome-pomodoro.profile
index e4120743a..fb019227f 100644
--- a/etc/profile-a-l/gnome-pomodoro.profile
+++ b/etc/profile-a-l/gnome-pomodoro.profile
@@ -56,3 +56,4 @@ dbus-system none
56 56
57read-only ${HOME} 57read-only ${HOME}
58read-write ${HOME}/.local/share/gnome-pomodoro 58read-write ${HOME}/.local/share/gnome-pomodoro
59restrict-namespaces
diff --git a/etc/profile-a-l/gnome-recipes.profile b/etc/profile-a-l/gnome-recipes.profile
index 483783195..75f3199e2 100644
--- a/etc/profile-a-l/gnome-recipes.profile
+++ b/etc/profile-a-l/gnome-recipes.profile
@@ -50,3 +50,4 @@ private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.cache,ld.so
50private-lib gdk-pixbuf-2.0,gio,gvfs/libgvfscommon.so,libgconf-2.so.*,libgnutls.so.*,libjpeg.so.*,libp11-kit.so.*,libproxy.so.*,librsvg-2.so.* 50private-lib gdk-pixbuf-2.0,gio,gvfs/libgvfscommon.so,libgconf-2.so.*,libgnutls.so.*,libjpeg.so.*,libp11-kit.so.*,libproxy.so.*,librsvg-2.so.*
51private-tmp 51private-tmp
52 52
53restrict-namespaces
diff --git a/etc/profile-a-l/gnome-ring.profile b/etc/profile-a-l/gnome-ring.profile
index 44c608e8c..8f2ab7fd6 100644
--- a/etc/profile-a-l/gnome-ring.profile
+++ b/etc/profile-a-l/gnome-ring.profile
@@ -30,3 +30,4 @@ disable-mnt
30# private-dev 30# private-dev
31private-tmp 31private-tmp
32 32
33restrict-namespaces
diff --git a/etc/profile-a-l/gnome-schedule.profile b/etc/profile-a-l/gnome-schedule.profile
index 415d8eb04..b71d77621 100644
--- a/etc/profile-a-l/gnome-schedule.profile
+++ b/etc/profile-a-l/gnome-schedule.profile
@@ -61,4 +61,3 @@ disable-mnt
61private-cache 61private-cache
62private-dev 62private-dev
63writable-var 63writable-var
64
diff --git a/etc/profile-a-l/gnome-screenshot.profile b/etc/profile-a-l/gnome-screenshot.profile
index 95e1309ad..74238a109 100644
--- a/etc/profile-a-l/gnome-screenshot.profile
+++ b/etc/profile-a-l/gnome-screenshot.profile
@@ -48,3 +48,5 @@ dbus-user filter
48dbus-user.own org.gnome.Screenshot 48dbus-user.own org.gnome.Screenshot
49dbus-user.talk org.gnome.Shell.Screenshot 49dbus-user.talk org.gnome.Shell.Screenshot
50dbus-system none 50dbus-system none
51
52restrict-namespaces
diff --git a/etc/profile-a-l/gnome-sound-recorder.profile b/etc/profile-a-l/gnome-sound-recorder.profile
index 0faf17c2f..d07bd80a7 100644
--- a/etc/profile-a-l/gnome-sound-recorder.profile
+++ b/etc/profile-a-l/gnome-sound-recorder.profile
@@ -41,3 +41,5 @@ private-cache
41private-dev 41private-dev
42private-etc alsa,alternatives,asound.conf,dconf,fonts,gtk-2.0,gtk-3.0,ld.so.cache,ld.so.preload,machine-id,openal,pango,pulse,xdg 42private-etc alsa,alternatives,asound.conf,dconf,fonts,gtk-2.0,gtk-3.0,ld.so.cache,ld.so.preload,machine-id,openal,pango,pulse,xdg
43private-tmp 43private-tmp
44
45restrict-namespaces
diff --git a/etc/profile-a-l/gnome-system-log.profile b/etc/profile-a-l/gnome-system-log.profile
index ae2f79e35..4c74c0a61 100644
--- a/etc/profile-a-l/gnome-system-log.profile
+++ b/etc/profile-a-l/gnome-system-log.profile
@@ -53,3 +53,4 @@ writable-var-log
53memory-deny-write-execute 53memory-deny-write-execute
54# Add 'ignore read-only ${HOME}' to your gnome-system-log.local if you export logs to a file under your ${HOME}. 54# Add 'ignore read-only ${HOME}' to your gnome-system-log.local if you export logs to a file under your ${HOME}.
55read-only ${HOME} 55read-only ${HOME}
56restrict-namespaces
diff --git a/etc/profile-a-l/gnome-todo.profile b/etc/profile-a-l/gnome-todo.profile
index 097a4d5aa..ae7ea83d8 100644
--- a/etc/profile-a-l/gnome-todo.profile
+++ b/etc/profile-a-l/gnome-todo.profile
@@ -61,3 +61,4 @@ dbus-system none
61#dbus-system.talk org.freedesktop.login1 61#dbus-system.talk org.freedesktop.login1
62 62
63read-only ${HOME} 63read-only ${HOME}
64restrict-namespaces
diff --git a/etc/profile-a-l/gnome-twitch.profile b/etc/profile-a-l/gnome-twitch.profile
index 3b9e44f66..dfeeff950 100644
--- a/etc/profile-a-l/gnome-twitch.profile
+++ b/etc/profile-a-l/gnome-twitch.profile
@@ -37,3 +37,4 @@ disable-mnt
37private-dev 37private-dev
38private-tmp 38private-tmp
39 39
40restrict-namespaces
diff --git a/etc/profile-a-l/gnome-weather.profile b/etc/profile-a-l/gnome-weather.profile
index ddffb8942..147b84a19 100644
--- a/etc/profile-a-l/gnome-weather.profile
+++ b/etc/profile-a-l/gnome-weather.profile
@@ -46,3 +46,4 @@ private-dev
46# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl 46# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl
47private-tmp 47private-tmp
48 48
49restrict-namespaces
diff --git a/etc/profile-a-l/gnome_games-common.profile b/etc/profile-a-l/gnome_games-common.profile
index bd20bb2bc..c9145d78e 100644
--- a/etc/profile-a-l/gnome_games-common.profile
+++ b/etc/profile-a-l/gnome_games-common.profile
@@ -46,3 +46,5 @@ private-tmp
46dbus-user filter 46dbus-user filter
47dbus-user.talk ca.desrt.dconf 47dbus-user.talk ca.desrt.dconf
48dbus-system none 48dbus-system none
49
50restrict-namespaces
diff --git a/etc/profile-a-l/gnote.profile b/etc/profile-a-l/gnote.profile
index 9df2f06a4..d7944ae24 100644
--- a/etc/profile-a-l/gnote.profile
+++ b/etc/profile-a-l/gnote.profile
@@ -57,3 +57,5 @@ dbus-user filter
57dbus-user.own org.gnome.Gnote 57dbus-user.own org.gnome.Gnote
58dbus-user.talk ca.desrt.dconf 58dbus-user.talk ca.desrt.dconf
59dbus-system none 59dbus-system none
60
61restrict-namespaces
diff --git a/etc/profile-a-l/gnubik.profile b/etc/profile-a-l/gnubik.profile
index bc69f4729..bdbcf9baf 100644
--- a/etc/profile-a-l/gnubik.profile
+++ b/etc/profile-a-l/gnubik.profile
@@ -47,3 +47,5 @@ private-tmp
47 47
48dbus-user none 48dbus-user none
49dbus-system none 49dbus-system none
50
51restrict-namespaces
diff --git a/etc/profile-a-l/godot.profile b/etc/profile-a-l/godot.profile
index 57ad9bedc..36a2cae07 100644
--- a/etc/profile-a-l/godot.profile
+++ b/etc/profile-a-l/godot.profile
@@ -42,3 +42,5 @@ private-tmp
42 42
43dbus-user none 43dbus-user none
44dbus-system none 44dbus-system none
45
46restrict-namespaces
diff --git a/etc/profile-a-l/goldendict.profile b/etc/profile-a-l/goldendict.profile
index c1119dcb0..327648cd1 100644
--- a/etc/profile-a-l/goldendict.profile
+++ b/etc/profile-a-l/goldendict.profile
@@ -55,3 +55,5 @@ private-tmp
55 55
56dbus-user none 56dbus-user none
57dbus-system none 57dbus-system none
58
59restrict-namespaces
diff --git a/etc/profile-a-l/goobox.profile b/etc/profile-a-l/goobox.profile
index 1eaa68c1d..8807a239d 100644
--- a/etc/profile-a-l/goobox.profile
+++ b/etc/profile-a-l/goobox.profile
@@ -32,3 +32,5 @@ tracelog
32private-dev 32private-dev
33# private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,machine-id,pki,pulse,ssl 33# private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,machine-id,pki,pulse,ssl
34# private-tmp 34# private-tmp
35
36restrict-namespaces
diff --git a/etc/profile-a-l/google-earth.profile b/etc/profile-a-l/google-earth.profile
index 71e41b289..4af6ce36b 100644
--- a/etc/profile-a-l/google-earth.profile
+++ b/etc/profile-a-l/google-earth.profile
@@ -39,3 +39,4 @@ private-bin bash,dirname,google-earth,grep,ls,sed,sh
39private-dev 39private-dev
40private-opt google 40private-opt google
41 41
42restrict-namespaces
diff --git a/etc/profile-a-l/google-play-music-desktop-player.profile b/etc/profile-a-l/google-play-music-desktop-player.profile
index b84ae83b7..c2a7d89fd 100644
--- a/etc/profile-a-l/google-play-music-desktop-player.profile
+++ b/etc/profile-a-l/google-play-music-desktop-player.profile
@@ -39,3 +39,5 @@ seccomp
39disable-mnt 39disable-mnt
40private-dev 40private-dev
41private-tmp 41private-tmp
42
43restrict-namespaces
diff --git a/etc/profile-a-l/googler-common.profile b/etc/profile-a-l/googler-common.profile
index 74cfd5b89..da7c24581 100644
--- a/etc/profile-a-l/googler-common.profile
+++ b/etc/profile-a-l/googler-common.profile
@@ -58,3 +58,5 @@ private-tmp
58 58
59dbus-user none 59dbus-user none
60dbus-system none 60dbus-system none
61
62restrict-namespaces
diff --git a/etc/profile-a-l/gpa.profile b/etc/profile-a-l/gpa.profile
index 40c3b434d..e05cdf424 100644
--- a/etc/profile-a-l/gpa.profile
+++ b/etc/profile-a-l/gpa.profile
@@ -30,3 +30,5 @@ tracelog
30 30
31# private-bin gpa,gpg 31# private-bin gpa,gpg
32private-dev 32private-dev
33
34restrict-namespaces
diff --git a/etc/profile-a-l/gpg-agent.profile b/etc/profile-a-l/gpg-agent.profile
index 78546f547..f4cd85e3a 100644
--- a/etc/profile-a-l/gpg-agent.profile
+++ b/etc/profile-a-l/gpg-agent.profile
@@ -46,6 +46,8 @@ protocol unix,inet,inet6
46seccomp 46seccomp
47tracelog 47tracelog
48 48
49# private-bin gpg-agent,gpg 49# private-bin gpg-agent
50private-cache 50private-cache
51private-dev 51private-dev
52
53restrict-namespaces
diff --git a/etc/profile-a-l/gpg.profile b/etc/profile-a-l/gpg.profile
index bc4fb060b..60690852a 100644
--- a/etc/profile-a-l/gpg.profile
+++ b/etc/profile-a-l/gpg.profile
@@ -42,7 +42,7 @@ protocol unix,inet,inet6
42seccomp 42seccomp
43tracelog 43tracelog
44 44
45# private-bin gpg,gpg-agent 45# private-bin gpg
46private-cache 46private-cache
47private-dev 47private-dev
48 48
@@ -51,3 +51,4 @@ private-dev
51# installing/upgrading archlinux-keyring extremely slow. 51# installing/upgrading archlinux-keyring extremely slow.
52read-write /etc/pacman.d/gnupg 52read-write /etc/pacman.d/gnupg
53read-write /usr/share/pacman/keyrings 53read-write /usr/share/pacman/keyrings
54restrict-namespaces
diff --git a/etc/profile-a-l/gpicview.profile b/etc/profile-a-l/gpicview.profile
index 937ef14fe..1012f5774 100644
--- a/etc/profile-a-l/gpicview.profile
+++ b/etc/profile-a-l/gpicview.profile
@@ -48,3 +48,4 @@ dbus-user none
48dbus-system none 48dbus-system none
49 49
50memory-deny-write-execute 50memory-deny-write-execute
51restrict-namespaces
diff --git a/etc/profile-a-l/gpredict.profile b/etc/profile-a-l/gpredict.profile
index 628205015..53a6f94e2 100644
--- a/etc/profile-a-l/gpredict.profile
+++ b/etc/profile-a-l/gpredict.profile
@@ -38,3 +38,4 @@ private-dev
38private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.cache,ld.so.preload,pki,resolv.conf,ssl 38private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.cache,ld.so.preload,pki,resolv.conf,ssl
39private-tmp 39private-tmp
40 40
41restrict-namespaces
diff --git a/etc/profile-a-l/gradio.profile b/etc/profile-a-l/gradio.profile
index 8ff0d92bb..368482fa3 100644
--- a/etc/profile-a-l/gradio.profile
+++ b/etc/profile-a-l/gradio.profile
@@ -52,3 +52,5 @@ dbus-user.own de.haeckerfelix.gradio
52dbus-user.own org.mpris.MediaPlayer2.gradio 52dbus-user.own org.mpris.MediaPlayer2.gradio
53dbus-user.talk ca.desrt.dconf 53dbus-user.talk ca.desrt.dconf
54dbus-system none 54dbus-system none
55
56restrict-namespaces
diff --git a/etc/profile-a-l/gramps.profile b/etc/profile-a-l/gramps.profile
index 6d9c54967..5073e79c9 100644
--- a/etc/profile-a-l/gramps.profile
+++ b/etc/profile-a-l/gramps.profile
@@ -48,3 +48,5 @@ private-tmp
48 48
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51
52restrict-namespaces
diff --git a/etc/profile-a-l/gravity-beams-and-evaporating-stars.profile b/etc/profile-a-l/gravity-beams-and-evaporating-stars.profile
index ab0915cd6..02a49134c 100644
--- a/etc/profile-a-l/gravity-beams-and-evaporating-stars.profile
+++ b/etc/profile-a-l/gravity-beams-and-evaporating-stars.profile
@@ -44,3 +44,5 @@ private-tmp
44 44
45dbus-user none 45dbus-user none
46dbus-system none 46dbus-system none
47
48restrict-namespaces
diff --git a/etc/profile-a-l/gthumb.profile b/etc/profile-a-l/gthumb.profile
index b9e3d8e25..9654f0ffc 100644
--- a/etc/profile-a-l/gthumb.profile
+++ b/etc/profile-a-l/gthumb.profile
@@ -34,3 +34,5 @@ private-bin gthumb
34private-cache 34private-cache
35private-dev 35private-dev
36private-tmp 36private-tmp
37
38restrict-namespaces
diff --git a/etc/profile-a-l/gtk-update-icon-cache.profile b/etc/profile-a-l/gtk-update-icon-cache.profile
index 793fb0440..5fd92fd4f 100644
--- a/etc/profile-a-l/gtk-update-icon-cache.profile
+++ b/etc/profile-a-l/gtk-update-icon-cache.profile
@@ -53,3 +53,4 @@ dbus-user none
53dbus-system none 53dbus-system none
54 54
55memory-deny-write-execute 55memory-deny-write-execute
56restrict-namespaces
diff --git a/etc/profile-a-l/guayadeque.profile b/etc/profile-a-l/guayadeque.profile
index 594c99863..35ce2816b 100644
--- a/etc/profile-a-l/guayadeque.profile
+++ b/etc/profile-a-l/guayadeque.profile
@@ -32,3 +32,4 @@ private-bin guayadeque
32private-dev 32private-dev
33private-tmp 33private-tmp
34 34
35restrict-namespaces
diff --git a/etc/profile-a-l/gucharmap.profile b/etc/profile-a-l/gucharmap.profile
index 774652fd5..68b78ec62 100644
--- a/etc/profile-a-l/gucharmap.profile
+++ b/etc/profile-a-l/gucharmap.profile
@@ -51,3 +51,4 @@ private-tmp
51# dbus-system none 51# dbus-system none
52 52
53read-only ${HOME} 53read-only ${HOME}
54restrict-namespaces
diff --git a/etc/profile-a-l/guvcview.profile b/etc/profile-a-l/guvcview.profile
index e8f64e4e0..db307e940 100644
--- a/etc/profile-a-l/guvcview.profile
+++ b/etc/profile-a-l/guvcview.profile
@@ -52,3 +52,5 @@ private-tmp
52 52
53dbus-user none 53dbus-user none
54dbus-system none 54dbus-system none
55
56restrict-namespaces
diff --git a/etc/profile-a-l/gwenview.profile b/etc/profile-a-l/gwenview.profile
index 93af4d1f8..8f7f74e0d 100644
--- a/etc/profile-a-l/gwenview.profile
+++ b/etc/profile-a-l/gwenview.profile
@@ -52,3 +52,4 @@ private-etc alternatives,fonts,gimp,gtk-2.0,kde4rc,kde5rc,ld.so.cache,ld.so.prel
52# dbus-system none 52# dbus-system none
53 53
54# memory-deny-write-execute 54# memory-deny-write-execute
55restrict-namespaces
diff --git a/etc/profile-a-l/handbrake.profile b/etc/profile-a-l/handbrake.profile
index 1f13232f2..488665154 100644
--- a/etc/profile-a-l/handbrake.profile
+++ b/etc/profile-a-l/handbrake.profile
@@ -36,3 +36,5 @@ private-tmp
36 36
37dbus-user none 37dbus-user none
38dbus-system none 38dbus-system none
39
40restrict-namespaces
diff --git a/etc/profile-a-l/hashcat.profile b/etc/profile-a-l/hashcat.profile
index 8d665ce68..e5b0a06af 100644
--- a/etc/profile-a-l/hashcat.profile
+++ b/etc/profile-a-l/hashcat.profile
@@ -43,3 +43,5 @@ private-tmp
43 43
44dbus-user none 44dbus-user none
45dbus-system none 45dbus-system none
46
47restrict-namespaces
diff --git a/etc/profile-a-l/hasher-common.profile b/etc/profile-a-l/hasher-common.profile
index a1a491ca1..fd8246aae 100644
--- a/etc/profile-a-l/hasher-common.profile
+++ b/etc/profile-a-l/hasher-common.profile
@@ -56,3 +56,4 @@ dbus-system none
56 56
57memory-deny-write-execute 57memory-deny-write-execute
58read-only ${HOME} 58read-only ${HOME}
59restrict-namespaces
diff --git a/etc/profile-a-l/hedgewars.profile b/etc/profile-a-l/hedgewars.profile
index 9c6f162c6..2de09ea93 100644
--- a/etc/profile-a-l/hedgewars.profile
+++ b/etc/profile-a-l/hedgewars.profile
@@ -35,3 +35,5 @@ tracelog
35disable-mnt 35disable-mnt
36private-dev 36private-dev
37private-tmp 37private-tmp
38
39restrict-namespaces
diff --git a/etc/profile-a-l/hexchat.profile b/etc/profile-a-l/hexchat.profile
index c730187a9..df7f8f3a3 100644
--- a/etc/profile-a-l/hexchat.profile
+++ b/etc/profile-a-l/hexchat.profile
@@ -55,3 +55,4 @@ private-dev
55private-tmp 55private-tmp
56 56
57# memory-deny-write-execute - breaks python 57# memory-deny-write-execute - breaks python
58restrict-namespaces
diff --git a/etc/profile-a-l/highlight.profile b/etc/profile-a-l/highlight.profile
index 04a603794..d77f49ce0 100644
--- a/etc/profile-a-l/highlight.profile
+++ b/etc/profile-a-l/highlight.profile
@@ -41,3 +41,5 @@ private-tmp
41 41
42dbus-user none 42dbus-user none
43dbus-system none 43dbus-system none
44
45restrict-namespaces
diff --git a/etc/profile-a-l/homebank.profile b/etc/profile-a-l/homebank.profile
index cf06b397f..91b73e8e9 100644
--- a/etc/profile-a-l/homebank.profile
+++ b/etc/profile-a-l/homebank.profile
@@ -56,3 +56,4 @@ dbus-user none
56dbus-system none 56dbus-system none
57 57
58# memory-deny-write-execute 58# memory-deny-write-execute
59restrict-namespaces
diff --git a/etc/profile-a-l/host.profile b/etc/profile-a-l/host.profile
index 22a3ecf51..09af8f0f5 100644
--- a/etc/profile-a-l/host.profile
+++ b/etc/profile-a-l/host.profile
@@ -49,3 +49,4 @@ dbus-user none
49dbus-system none 49dbus-system none
50 50
51memory-deny-write-execute 51memory-deny-write-execute
52restrict-namespaces
diff --git a/etc/profile-a-l/hugin.profile b/etc/profile-a-l/hugin.profile
index d4587a303..c4085cf9c 100644
--- a/etc/profile-a-l/hugin.profile
+++ b/etc/profile-a-l/hugin.profile
@@ -45,3 +45,5 @@ private-tmp
45 45
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48
49restrict-namespaces
diff --git a/etc/profile-a-l/hyperrogue.profile b/etc/profile-a-l/hyperrogue.profile
index 8fd80564a..13dc06ecc 100644
--- a/etc/profile-a-l/hyperrogue.profile
+++ b/etc/profile-a-l/hyperrogue.profile
@@ -48,3 +48,5 @@ private-tmp
48 48
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51
52restrict-namespaces
diff --git a/etc/profile-a-l/i2prouter.profile b/etc/profile-a-l/i2prouter.profile
index c131381c8..757af67b0 100644
--- a/etc/profile-a-l/i2prouter.profile
+++ b/etc/profile-a-l/i2prouter.profile
@@ -69,3 +69,5 @@ private-cache
69private-dev 69private-dev
70private-etc alternatives,ca-certificates,crypto-policies,dconf,group,hostname,hosts,i2p,java-10-openjdk,java-11-openjdk,java-12-openjdk,java-13-openjdk,java-8-openjdk,java-9-openjdk,java-openjdk,ld.so.cache,ld.so.preload,localtime,machine-id,nsswitch.conf,passwd,pki,resolv.conf,ssl 70private-etc alternatives,ca-certificates,crypto-policies,dconf,group,hostname,hosts,i2p,java-10-openjdk,java-11-openjdk,java-12-openjdk,java-13-openjdk,java-8-openjdk,java-9-openjdk,java-openjdk,ld.so.cache,ld.so.preload,localtime,machine-id,nsswitch.conf,passwd,pki,resolv.conf,ssl
71private-tmp 71private-tmp
72
73restrict-namespaces
diff --git a/etc/profile-a-l/i3.profile b/etc/profile-a-l/i3.profile
index e96b1843c..2268072ef 100644
--- a/etc/profile-a-l/i3.profile
+++ b/etc/profile-a-l/i3.profile
@@ -14,5 +14,6 @@ caps.drop all
14netfilter 14netfilter
15noroot 15noroot
16protocol unix,inet,inet6 16protocol unix,inet,inet6
17seccomp 17seccomp !chroot
18 18
19#restrict-namespaces
diff --git a/etc/profile-a-l/iagno.profile b/etc/profile-a-l/iagno.profile
index 727dabb77..e16f3f1d5 100644
--- a/etc/profile-a-l/iagno.profile
+++ b/etc/profile-a-l/iagno.profile
@@ -37,3 +37,5 @@ private-tmp
37 37
38# dbus-user none 38# dbus-user none
39# dbus-system none 39# dbus-system none
40
41restrict-namespaces
diff --git a/etc/profile-a-l/idea.sh.profile b/etc/profile-a-l/idea.sh.profile
index 0d976222f..31f65962f 100644
--- a/etc/profile-a-l/idea.sh.profile
+++ b/etc/profile-a-l/idea.sh.profile
@@ -39,3 +39,4 @@ private-dev
39# private-tmp 39# private-tmp
40 40
41noexec /tmp 41noexec /tmp
42restrict-namespaces
diff --git a/etc/profile-a-l/imagej.profile b/etc/profile-a-l/imagej.profile
index 29aeb006b..60e97b24c 100644
--- a/etc/profile-a-l/imagej.profile
+++ b/etc/profile-a-l/imagej.profile
@@ -38,3 +38,5 @@ private-tmp
38 38
39dbus-user none 39dbus-user none
40dbus-system none 40dbus-system none
41
42restrict-namespaces
diff --git a/etc/profile-a-l/img2txt.profile b/etc/profile-a-l/img2txt.profile
index 889e4ba65..ee341423a 100644
--- a/etc/profile-a-l/img2txt.profile
+++ b/etc/profile-a-l/img2txt.profile
@@ -50,3 +50,4 @@ dbus-user none
50dbus-system none 50dbus-system none
51 51
52memory-deny-write-execute 52memory-deny-write-execute
53restrict-namespaces
diff --git a/etc/profile-a-l/impressive.profile b/etc/profile-a-l/impressive.profile
index 7306de4b3..d9a256c11 100644
--- a/etc/profile-a-l/impressive.profile
+++ b/etc/profile-a-l/impressive.profile
@@ -54,3 +54,4 @@ dbus-system none
54 54
55read-only ${HOME} 55read-only ${HOME}
56read-write ${HOME}/.cache/mesa_shader_cache 56read-write ${HOME}/.cache/mesa_shader_cache
57restrict-namespaces
diff --git a/etc/profile-a-l/imv.profile b/etc/profile-a-l/imv.profile
index 43085bb9b..94333a610 100644
--- a/etc/profile-a-l/imv.profile
+++ b/etc/profile-a-l/imv.profile
@@ -54,3 +54,4 @@ dbus-user none
54dbus-system none 54dbus-system none
55 55
56read-only ${HOME} 56read-only ${HOME}
57restrict-namespaces
diff --git a/etc/profile-a-l/inkscape.profile b/etc/profile-a-l/inkscape.profile
index d461add95..1034c225f 100644
--- a/etc/profile-a-l/inkscape.profile
+++ b/etc/profile-a-l/inkscape.profile
@@ -60,3 +60,4 @@ dbus-user none
60dbus-system none 60dbus-system none
61 61
62# memory-deny-write-execute 62# memory-deny-write-execute
63restrict-namespaces
diff --git a/etc/profile-a-l/io.github.lainsce.Notejot.profile b/etc/profile-a-l/io.github.lainsce.Notejot.profile
index 483772a1e..cb2f30350 100644
--- a/etc/profile-a-l/io.github.lainsce.Notejot.profile
+++ b/etc/profile-a-l/io.github.lainsce.Notejot.profile
@@ -57,3 +57,5 @@ dbus-user filter
57dbus-user.own io.github.lainsce.Notejot 57dbus-user.own io.github.lainsce.Notejot
58dbus-user.talk ca.desrt.dconf 58dbus-user.talk ca.desrt.dconf
59dbus-system none 59dbus-system none
60
61restrict-namespaces
diff --git a/etc/profile-a-l/ipcalc.profile b/etc/profile-a-l/ipcalc.profile
index cdf78ea94..983c31bcb 100644
--- a/etc/profile-a-l/ipcalc.profile
+++ b/etc/profile-a-l/ipcalc.profile
@@ -59,3 +59,4 @@ dbus-system none
59 59
60# memory-deny-write-execute 60# memory-deny-write-execute
61# read-only ${HOME} 61# read-only ${HOME}
62restrict-namespaces
diff --git a/etc/profile-a-l/itch.profile b/etc/profile-a-l/itch.profile
index 85ea915c7..1c4ddebdb 100644
--- a/etc/profile-a-l/itch.profile
+++ b/etc/profile-a-l/itch.profile
@@ -39,3 +39,4 @@ private-dev
39private-tmp 39private-tmp
40 40
41noexec /tmp 41noexec /tmp
42restrict-namespaces
diff --git a/etc/profile-a-l/jami-gnome.profile b/etc/profile-a-l/jami-gnome.profile
index fc1f7e42c..5fe484029 100644
--- a/etc/profile-a-l/jami-gnome.profile
+++ b/etc/profile-a-l/jami-gnome.profile
@@ -39,3 +39,4 @@ private-dev
39private-tmp 39private-tmp
40 40
41env QT_QPA_PLATFORM=xcb 41env QT_QPA_PLATFORM=xcb
42restrict-namespaces
diff --git a/etc/profile-a-l/jd-gui.profile b/etc/profile-a-l/jd-gui.profile
index 628a646c2..e34b3e676 100644
--- a/etc/profile-a-l/jd-gui.profile
+++ b/etc/profile-a-l/jd-gui.profile
@@ -41,3 +41,5 @@ private-tmp
41 41
42dbus-user none 42dbus-user none
43dbus-system none 43dbus-system none
44
45restrict-namespaces
diff --git a/etc/profile-a-l/jerry.profile b/etc/profile-a-l/jerry.profile
index f55305a08..3136b412e 100644
--- a/etc/profile-a-l/jerry.profile
+++ b/etc/profile-a-l/jerry.profile
@@ -40,3 +40,4 @@ dbus-user none
40dbus-system none 40dbus-system none
41 41
42memory-deny-write-execute 42memory-deny-write-execute
43restrict-namespaces
diff --git a/etc/profile-a-l/jitsi.profile b/etc/profile-a-l/jitsi.profile
index 23f7b720d..c0bda1cbf 100644
--- a/etc/profile-a-l/jitsi.profile
+++ b/etc/profile-a-l/jitsi.profile
@@ -28,3 +28,5 @@ tracelog
28disable-mnt 28disable-mnt
29private-cache 29private-cache
30private-tmp 30private-tmp
31
32restrict-namespaces
diff --git a/etc/profile-a-l/jumpnbump.profile b/etc/profile-a-l/jumpnbump.profile
index dee252281..66d63283a 100644
--- a/etc/profile-a-l/jumpnbump.profile
+++ b/etc/profile-a-l/jumpnbump.profile
@@ -45,3 +45,5 @@ private-tmp
45 45
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48
49restrict-namespaces
diff --git a/etc/profile-a-l/k3b.profile b/etc/profile-a-l/k3b.profile
index a98f09d7d..81d4f3458 100644
--- a/etc/profile-a-l/k3b.profile
+++ b/etc/profile-a-l/k3b.profile
@@ -35,3 +35,5 @@ novideo
35 35
36private-dev 36private-dev
37# private-tmp 37# private-tmp
38
39# restrict-namespaces - breaks privileged helpers
diff --git a/etc/profile-a-l/kaffeine.profile b/etc/profile-a-l/kaffeine.profile
index 8dba3b4e9..73417bf11 100644
--- a/etc/profile-a-l/kaffeine.profile
+++ b/etc/profile-a-l/kaffeine.profile
@@ -40,3 +40,4 @@ seccomp
40private-dev 40private-dev
41private-tmp 41private-tmp
42 42
43restrict-namespaces
diff --git a/etc/profile-a-l/kalgebra.profile b/etc/profile-a-l/kalgebra.profile
index 6331e3990..bde52f30e 100644
--- a/etc/profile-a-l/kalgebra.profile
+++ b/etc/profile-a-l/kalgebra.profile
@@ -46,3 +46,5 @@ private-tmp
46 46
47dbus-user none 47dbus-user none
48dbus-system none 48dbus-system none
49
50# restrict-namespaces
diff --git a/etc/profile-a-l/kate.profile b/etc/profile-a-l/kate.profile
index dc6e58c99..152f73d5d 100644
--- a/etc/profile-a-l/kate.profile
+++ b/etc/profile-a-l/kate.profile
@@ -60,4 +60,5 @@ private-tmp
60# dbus-user none 60# dbus-user none
61# dbus-system none 61# dbus-system none
62 62
63restrict-namespaces
63join-or-start kate 64join-or-start kate
diff --git a/etc/profile-a-l/kazam.profile b/etc/profile-a-l/kazam.profile
index 61802383d..c01000af1 100644
--- a/etc/profile-a-l/kazam.profile
+++ b/etc/profile-a-l/kazam.profile
@@ -52,3 +52,5 @@ private-etc alsa,alternatives,asound.conf,dconf,fonts,gtk-2.0,gtk-3.0,ld.so.cach
52private-tmp 52private-tmp
53 53
54dbus-system none 54dbus-system none
55
56restrict-namespaces
diff --git a/etc/profile-a-l/kcalc.profile b/etc/profile-a-l/kcalc.profile
index 18f1d4516..ea56f2d39 100644
--- a/etc/profile-a-l/kcalc.profile
+++ b/etc/profile-a-l/kcalc.profile
@@ -16,10 +16,14 @@ include disable-programs.inc
16include disable-shell.inc 16include disable-shell.inc
17include disable-xdg.inc 17include disable-xdg.inc
18 18
19# Legacy paths
20#mkdir ${HOME}/.kde/share/config
21#mkdir ${HOME}/.kde4/share/config
22#mkfile ${HOME}/.kde/share/config/kcalcrc
23#mkfile ${HOME}/.kde4/share/config/kcalcrc
24
19mkdir ${HOME}/.local/share/kxmlgui5/kcalc 25mkdir ${HOME}/.local/share/kxmlgui5/kcalc
20mkfile ${HOME}/.config/kcalcrc 26mkfile ${HOME}/.config/kcalcrc
21mkfile ${HOME}/.kde/share/config/kcalcrc
22mkfile ${HOME}/.kde4/share/config/kcalcrc
23whitelist ${HOME}/.config/kcalcrc 27whitelist ${HOME}/.config/kcalcrc
24whitelist ${HOME}/.kde/share/config/kcalcrc 28whitelist ${HOME}/.kde/share/config/kcalcrc
25whitelist ${HOME}/.kde4/share/config/kcalcrc 29whitelist ${HOME}/.kde4/share/config/kcalcrc
@@ -63,3 +67,4 @@ dbus-user none
63dbus-system none 67dbus-system none
64 68
65#memory-deny-write-execute 69#memory-deny-write-execute
70restrict-namespaces
diff --git a/etc/profile-a-l/kdeinit4.profile b/etc/profile-a-l/kdeinit4.profile
index 8b02142c3..2f426e191 100644
--- a/etc/profile-a-l/kdeinit4.profile
+++ b/etc/profile-a-l/kdeinit4.profile
@@ -34,3 +34,4 @@ private-bin kbuildsycoca4,kded4,kdeinit4,knotify4
34private-dev 34private-dev
35private-tmp 35private-tmp
36 36
37restrict-namespaces
diff --git a/etc/profile-a-l/kdenlive.profile b/etc/profile-a-l/kdenlive.profile
index 872e6d9aa..d4933d816 100644
--- a/etc/profile-a-l/kdenlive.profile
+++ b/etc/profile-a-l/kdenlive.profile
@@ -38,3 +38,5 @@ private-dev
38 38
39# dbus-user none 39# dbus-user none
40# dbus-system none 40# dbus-system none
41
42restrict-namespaces
diff --git a/etc/profile-a-l/kdiff3.profile b/etc/profile-a-l/kdiff3.profile
index 947e35750..e0b3eadfd 100644
--- a/etc/profile-a-l/kdiff3.profile
+++ b/etc/profile-a-l/kdiff3.profile
@@ -55,3 +55,5 @@ private-dev
55 55
56dbus-user none 56dbus-user none
57dbus-system none 57dbus-system none
58
59restrict-namespaces
diff --git a/etc/profile-a-l/keepass.profile b/etc/profile-a-l/keepass.profile
index db3bbd76f..648ed95cf 100644
--- a/etc/profile-a-l/keepass.profile
+++ b/etc/profile-a-l/keepass.profile
@@ -43,3 +43,4 @@ private-cache
43private-dev 43private-dev
44private-tmp 44private-tmp
45 45
46restrict-namespaces
diff --git a/etc/profile-a-l/keepassx.profile b/etc/profile-a-l/keepassx.profile
index c8b895fc2..935fe3933 100644
--- a/etc/profile-a-l/keepassx.profile
+++ b/etc/profile-a-l/keepassx.profile
@@ -47,3 +47,4 @@ dbus-user none
47dbus-system none 47dbus-system none
48 48
49memory-deny-write-execute 49memory-deny-write-execute
50restrict-namespaces
diff --git a/etc/profile-a-l/keepassxc.profile b/etc/profile-a-l/keepassxc.profile
index 827951071..80374690c 100644
--- a/etc/profile-a-l/keepassxc.profile
+++ b/etc/profile-a-l/keepassxc.profile
@@ -106,5 +106,7 @@ dbus-user.talk org.xfce.ScreenSaver
106dbus-system filter 106dbus-system filter
107dbus-system.talk org.freedesktop.login1 107dbus-system.talk org.freedesktop.login1
108 108
109restrict-namespaces
110
109# Mutex is stored in /tmp by default, which is broken by private-tmp. 111# Mutex is stored in /tmp by default, which is broken by private-tmp.
110join-or-start keepassxc 112join-or-start keepassxc
diff --git a/etc/profile-a-l/kfind.profile b/etc/profile-a-l/kfind.profile
index dee84482f..c70030a38 100644
--- a/etc/profile-a-l/kfind.profile
+++ b/etc/profile-a-l/kfind.profile
@@ -44,3 +44,5 @@ private-tmp
44 44
45# dbus-user none 45# dbus-user none
46# dbus-system none 46# dbus-system none
47
48restrict-namespaces
diff --git a/etc/profile-a-l/kget.profile b/etc/profile-a-l/kget.profile
index 9b6646725..dd45c1889 100644
--- a/etc/profile-a-l/kget.profile
+++ b/etc/profile-a-l/kget.profile
@@ -41,3 +41,4 @@ private-dev
41private-tmp 41private-tmp
42 42
43# memory-deny-write-execute 43# memory-deny-write-execute
44restrict-namespaces
diff --git a/etc/profile-a-l/kid3.profile b/etc/profile-a-l/kid3.profile
index 637b00c35..424fb006e 100644
--- a/etc/profile-a-l/kid3.profile
+++ b/etc/profile-a-l/kid3.profile
@@ -45,3 +45,4 @@ dbus-user none
45dbus-system none 45dbus-system none
46 46
47memory-deny-write-execute 47memory-deny-write-execute
48restrict-namespaces
diff --git a/etc/profile-a-l/kino.profile b/etc/profile-a-l/kino.profile
index 2df907376..a4c8486e1 100644
--- a/etc/profile-a-l/kino.profile
+++ b/etc/profile-a-l/kino.profile
@@ -34,3 +34,4 @@ private-cache
34private-dev 34private-dev
35private-tmp 35private-tmp
36 36
37restrict-namespaces
diff --git a/etc/profile-a-l/kiwix-desktop.profile b/etc/profile-a-l/kiwix-desktop.profile
index 1c50ad2ea..5a028aeea 100644
--- a/etc/profile-a-l/kiwix-desktop.profile
+++ b/etc/profile-a-l/kiwix-desktop.profile
@@ -48,3 +48,5 @@ private-tmp
48 48
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51
52# restrict-namespaces
diff --git a/etc/profile-a-l/klatexformula.profile b/etc/profile-a-l/klatexformula.profile
index c7b5123d2..0c2d171b9 100644
--- a/etc/profile-a-l/klatexformula.profile
+++ b/etc/profile-a-l/klatexformula.profile
@@ -42,3 +42,5 @@ private-tmp
42 42
43dbus-user none 43dbus-user none
44dbus-system none 44dbus-system none
45
46restrict-namespaces
diff --git a/etc/profile-a-l/klavaro.profile b/etc/profile-a-l/klavaro.profile
index 4b8c9e414..0785b904d 100644
--- a/etc/profile-a-l/klavaro.profile
+++ b/etc/profile-a-l/klavaro.profile
@@ -51,3 +51,5 @@ private-srv none
51 51
52dbus-user none 52dbus-user none
53dbus-system none 53dbus-system none
54
55restrict-namespaces
diff --git a/etc/profile-a-l/kmail.profile b/etc/profile-a-l/kmail.profile
index 1bbc141e8..9724f4963 100644
--- a/etc/profile-a-l/kmail.profile
+++ b/etc/profile-a-l/kmail.profile
@@ -62,3 +62,5 @@ private-dev
62# private-tmp - interrupts connection to akonadi, breaks opening of email attachments 62# private-tmp - interrupts connection to akonadi, breaks opening of email attachments
63# writable-run-user is needed for signing and encrypting emails 63# writable-run-user is needed for signing and encrypting emails
64writable-run-user 64writable-run-user
65
66# restrict-namespaces
diff --git a/etc/profile-a-l/kmplayer.profile b/etc/profile-a-l/kmplayer.profile
index 135e8f3ad..992b312ee 100644
--- a/etc/profile-a-l/kmplayer.profile
+++ b/etc/profile-a-l/kmplayer.profile
@@ -38,3 +38,4 @@ private-cache
38private-dev 38private-dev
39private-tmp 39private-tmp
40 40
41restrict-namespaces
diff --git a/etc/profile-a-l/kodi.profile b/etc/profile-a-l/kodi.profile
index b78d9c474..474a10a31 100644
--- a/etc/profile-a-l/kodi.profile
+++ b/etc/profile-a-l/kodi.profile
@@ -51,3 +51,5 @@ tracelog
51 51
52private-dev 52private-dev
53private-tmp 53private-tmp
54
55restrict-namespaces
diff --git a/etc/profile-a-l/konversation.profile b/etc/profile-a-l/konversation.profile
index 875d0ef76..e4781fea3 100644
--- a/etc/profile-a-l/konversation.profile
+++ b/etc/profile-a-l/konversation.profile
@@ -43,3 +43,4 @@ private-dev
43private-tmp 43private-tmp
44 44
45# memory-deny-write-execute 45# memory-deny-write-execute
46restrict-namespaces
diff --git a/etc/profile-a-l/kopete.profile b/etc/profile-a-l/kopete.profile
index 9e75b03eb..91030f453 100644
--- a/etc/profile-a-l/kopete.profile
+++ b/etc/profile-a-l/kopete.profile
@@ -37,3 +37,4 @@ private-dev
37private-tmp 37private-tmp
38writable-var 38writable-var
39 39
40restrict-namespaces
diff --git a/etc/profile-a-l/krita.profile b/etc/profile-a-l/krita.profile
index 70d721e9f..a04376430 100644
--- a/etc/profile-a-l/krita.profile
+++ b/etc/profile-a-l/krita.profile
@@ -48,3 +48,5 @@ private-tmp
48 48
49# dbus-user none 49# dbus-user none
50# dbus-system none 50# dbus-system none
51
52restrict-namespaces
diff --git a/etc/profile-a-l/krunner.profile b/etc/profile-a-l/krunner.profile
index 96eb6978d..27feccf40 100644
--- a/etc/profile-a-l/krunner.profile
+++ b/etc/profile-a-l/krunner.profile
@@ -35,3 +35,5 @@ protocol unix,inet,inet6
35seccomp 35seccomp
36 36
37# private-cache 37# private-cache
38
39restrict-namespaces
diff --git a/etc/profile-a-l/ktorrent.profile b/etc/profile-a-l/ktorrent.profile
index 949189a1d..da267b962 100644
--- a/etc/profile-a-l/ktorrent.profile
+++ b/etc/profile-a-l/ktorrent.profile
@@ -21,13 +21,17 @@ include disable-interpreters.inc
21include disable-programs.inc 21include disable-programs.inc
22include disable-shell.inc 22include disable-shell.inc
23 23
24mkdir ${HOME}/.kde/share/apps/ktorrent 24# Legacy paths
25mkdir ${HOME}/.kde4/share/apps/ktorrent 25#mkdir ${HOME}/.kde/share/apps/ktorrent
26#mkdir ${HOME}/.kde/share/config
27#mkdir ${HOME}/.kde4/share/apps/ktorrent
28#mkdir ${HOME}/.kde4/share/config
29#mkfile ${HOME}/.kde/share/config/ktorrentrc
30#mkfile ${HOME}/.kde4/share/config/ktorrentrc
31
26mkdir ${HOME}/.local/share/ktorrent 32mkdir ${HOME}/.local/share/ktorrent
27mkdir ${HOME}/.local/share/kxmlgui5/ktorrent 33mkdir ${HOME}/.local/share/kxmlgui5/ktorrent
28mkfile ${HOME}/.config/ktorrentrc 34mkfile ${HOME}/.config/ktorrentrc
29mkfile ${HOME}/.kde/share/config/ktorrentrc
30mkfile ${HOME}/.kde4/share/config/ktorrentrc
31whitelist ${DOWNLOADS} 35whitelist ${DOWNLOADS}
32whitelist ${HOME}/.config/ktorrentrc 36whitelist ${HOME}/.config/ktorrentrc
33whitelist ${HOME}/.kde/share/apps/ktorrent 37whitelist ${HOME}/.kde/share/apps/ktorrent
@@ -56,10 +60,11 @@ novideo
56protocol unix,inet,inet6,netlink 60protocol unix,inet,inet6,netlink
57seccomp 61seccomp
58 62
59private-bin kbuildsycoca4,kdeinit4,ktorrent 63private-bin kbuildsycoca4,kdeinit4,ktmagnetdownloader,ktorrent,ktupnptest
60private-dev 64private-dev
61# private-lib - problems on Arch 65# private-lib - problems on Arch
62private-tmp 66private-tmp
63 67
64deterministic-shutdown 68deterministic-shutdown
65# memory-deny-write-execute 69# memory-deny-write-execute
70restrict-namespaces
diff --git a/etc/profile-a-l/ktouch.profile b/etc/profile-a-l/ktouch.profile
index 086a4500a..68ef6111a 100644
--- a/etc/profile-a-l/ktouch.profile
+++ b/etc/profile-a-l/ktouch.profile
@@ -50,3 +50,5 @@ private-tmp
50 50
51dbus-user none 51dbus-user none
52dbus-system none 52dbus-system none
53
54restrict-namespaces
diff --git a/etc/profile-a-l/kube.profile b/etc/profile-a-l/kube.profile
index 176c78515..0cdfe4f10 100644
--- a/etc/profile-a-l/kube.profile
+++ b/etc/profile-a-l/kube.profile
@@ -78,3 +78,4 @@ dbus-user.talk org.freedesktop.Notifications
78dbus-system none 78dbus-system none
79 79
80read-only ${HOME}/.mozilla/firefox/profiles.ini 80read-only ${HOME}/.mozilla/firefox/profiles.ini
81restrict-namespaces
diff --git a/etc/profile-a-l/kwin_x11.profile b/etc/profile-a-l/kwin_x11.profile
index c3b2a1205..7ecf26d8e 100644
--- a/etc/profile-a-l/kwin_x11.profile
+++ b/etc/profile-a-l/kwin_x11.profile
@@ -44,3 +44,5 @@ private-bin kwin_x11
44private-dev 44private-dev
45private-etc alternatives,drirc,fonts,kde5rc,ld.so.cache,ld.so.preload,machine-id,xdg 45private-etc alternatives,drirc,fonts,kde5rc,ld.so.cache,ld.so.preload,machine-id,xdg
46private-tmp 46private-tmp
47
48restrict-namespaces
diff --git a/etc/profile-a-l/kwrite.profile b/etc/profile-a-l/kwrite.profile
index 1883d7c86..18a024c7e 100644
--- a/etc/profile-a-l/kwrite.profile
+++ b/etc/profile-a-l/kwrite.profile
@@ -52,4 +52,5 @@ private-tmp
52# dbus-user none 52# dbus-user none
53# dbus-system none 53# dbus-system none
54 54
55restrict-namespaces
55join-or-start kwrite 56join-or-start kwrite
diff --git a/etc/profile-a-l/latex-common.profile b/etc/profile-a-l/latex-common.profile
index f6c28fafa..f1e1a897b 100644
--- a/etc/profile-a-l/latex-common.profile
+++ b/etc/profile-a-l/latex-common.profile
@@ -38,3 +38,5 @@ private-tmp
38 38
39dbus-user none 39dbus-user none
40dbus-system none 40dbus-system none
41
42restrict-namespaces
diff --git a/etc/profile-a-l/leafpad.profile b/etc/profile-a-l/leafpad.profile
index ce62b8d5c..27b27a20b 100644
--- a/etc/profile-a-l/leafpad.profile
+++ b/etc/profile-a-l/leafpad.profile
@@ -38,3 +38,4 @@ private-dev
38private-lib 38private-lib
39private-tmp 39private-tmp
40 40
41restrict-namespaces
diff --git a/etc/profile-a-l/less.profile b/etc/profile-a-l/less.profile
index 24d6261fb..6efe23ade 100644
--- a/etc/profile-a-l/less.profile
+++ b/etc/profile-a-l/less.profile
@@ -48,3 +48,4 @@ dbus-system none
48memory-deny-write-execute 48memory-deny-write-execute
49read-only ${HOME} 49read-only ${HOME}
50read-write ${HOME}/.lesshst 50read-write ${HOME}/.lesshst
51restrict-namespaces
diff --git a/etc/profile-a-l/librecad.profile b/etc/profile-a-l/librecad.profile
index 79f18ae15..40ec7b9c6 100644
--- a/etc/profile-a-l/librecad.profile
+++ b/etc/profile-a-l/librecad.profile
@@ -39,7 +39,7 @@ seccomp
39#disable-mnt 39#disable-mnt
40private-bin librecad 40private-bin librecad
41private-dev 41private-dev
42# private-etc cups,drirc,fonts,passwd,xdg 42#private-etc alternatives,cups,drirc,fonts,passwd,xdg
43#private-lib 43#private-lib
44private-tmp 44private-tmp
45 45
@@ -47,3 +47,4 @@ dbus-user none
47dbus-system none 47dbus-system none
48 48
49memory-deny-write-execute 49memory-deny-write-execute
50restrict-namespaces
diff --git a/etc/profile-a-l/libreoffice.profile b/etc/profile-a-l/libreoffice.profile
index e25eaa2e9..518928876 100644
--- a/etc/profile-a-l/libreoffice.profile
+++ b/etc/profile-a-l/libreoffice.profile
@@ -54,4 +54,5 @@ private-tmp
54 54
55dbus-system none 55dbus-system none
56 56
57restrict-namespaces
57join-or-start libreoffice 58join-or-start libreoffice
diff --git a/etc/profile-a-l/lifeograph.profile b/etc/profile-a-l/lifeograph.profile
index 280669b24..025156d2d 100644
--- a/etc/profile-a-l/lifeograph.profile
+++ b/etc/profile-a-l/lifeograph.profile
@@ -54,3 +54,5 @@ private-tmp
54dbus-user filter 54dbus-user filter
55dbus-user.talk ca.desrt.dconf 55dbus-user.talk ca.desrt.dconf
56dbus-system none 56dbus-system none
57
58restrict-namespaces
diff --git a/etc/profile-a-l/liferea.profile b/etc/profile-a-l/liferea.profile
index 75aac74d1..b0e9015ee 100644
--- a/etc/profile-a-l/liferea.profile
+++ b/etc/profile-a-l/liferea.profile
@@ -59,3 +59,5 @@ dbus-user.talk ca.desrt.dconf
59# Add the next line to your liferea.local if you use the 'Libsecret Support' plugin. 59# Add the next line to your liferea.local if you use the 'Libsecret Support' plugin.
60#dbus-user.talk org.freedesktop.secrets 60#dbus-user.talk org.freedesktop.secrets
61dbus-system none 61dbus-system none
62
63restrict-namespaces
diff --git a/etc/profile-a-l/lincity-ng.profile b/etc/profile-a-l/lincity-ng.profile
index 79eca0a6f..d81e21636 100644
--- a/etc/profile-a-l/lincity-ng.profile
+++ b/etc/profile-a-l/lincity-ng.profile
@@ -45,3 +45,5 @@ private-tmp
45 45
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48
49restrict-namespaces
diff --git a/etc/profile-a-l/links-common.profile b/etc/profile-a-l/links-common.profile
index 4eec03855..22a4a2a2a 100644
--- a/etc/profile-a-l/links-common.profile
+++ b/etc/profile-a-l/links-common.profile
@@ -59,3 +59,4 @@ dbus-user none
59dbus-system none 59dbus-system none
60 60
61memory-deny-write-execute 61memory-deny-write-execute
62restrict-namespaces
diff --git a/etc/profile-a-l/linphone.profile b/etc/profile-a-l/linphone.profile
index e375f0c13..2273ed560 100644
--- a/etc/profile-a-l/linphone.profile
+++ b/etc/profile-a-l/linphone.profile
@@ -47,3 +47,4 @@ disable-mnt
47private-dev 47private-dev
48private-tmp 48private-tmp
49 49
50restrict-namespaces
diff --git a/etc/profile-a-l/lmms.profile b/etc/profile-a-l/lmms.profile
index b4582c4f5..35fca733a 100644
--- a/etc/profile-a-l/lmms.profile
+++ b/etc/profile-a-l/lmms.profile
@@ -37,3 +37,5 @@ private-tmp
37 37
38dbus-user none 38dbus-user none
39dbus-system none 39dbus-system none
40
41restrict-namespaces
diff --git a/etc/profile-a-l/lollypop.profile b/etc/profile-a-l/lollypop.profile
index 3108900ef..78b78662b 100644
--- a/etc/profile-a-l/lollypop.profile
+++ b/etc/profile-a-l/lollypop.profile
@@ -39,3 +39,4 @@ private-dev
39private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,machine-id,pki,pulse,resolv.conf,ssl,xdg 39private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,machine-id,pki,pulse,resolv.conf,ssl,xdg
40private-tmp 40private-tmp
41 41
42restrict-namespaces
diff --git a/etc/profile-a-l/lugaru.profile b/etc/profile-a-l/lugaru.profile
index 2b61f4d48..f6436d93d 100644
--- a/etc/profile-a-l/lugaru.profile
+++ b/etc/profile-a-l/lugaru.profile
@@ -49,3 +49,5 @@ private-tmp
49 49
50dbus-user none 50dbus-user none
51dbus-system none 51dbus-system none
52
53restrict-namespaces
diff --git a/etc/profile-a-l/luminance-hdr.profile b/etc/profile-a-l/luminance-hdr.profile
index b7280b61c..4a8352831 100644
--- a/etc/profile-a-l/luminance-hdr.profile
+++ b/etc/profile-a-l/luminance-hdr.profile
@@ -36,3 +36,4 @@ private-cache
36private-dev 36private-dev
37private-tmp 37private-tmp
38 38
39restrict-namespaces
diff --git a/etc/profile-a-l/lutris.profile b/etc/profile-a-l/lutris.profile
index 0562cf430..2658c5373 100644
--- a/etc/profile-a-l/lutris.profile
+++ b/etc/profile-a-l/lutris.profile
@@ -69,7 +69,8 @@ notv
69nou2f 69nou2f
70novideo 70novideo
71protocol unix,inet,inet6,netlink 71protocol unix,inet,inet6,netlink
72seccomp 72seccomp !modify_ldt
73seccomp.32 !modify_ldt
73 74
74# Add the next line to your lutris.local if you do not need controller support. 75# Add the next line to your lutris.local if you do not need controller support.
75#private-dev 76#private-dev
@@ -79,3 +80,5 @@ dbus-user filter
79dbus-user.own net.lutris.Lutris 80dbus-user.own net.lutris.Lutris
80dbus-user.talk com.feralinteractive.GameMode 81dbus-user.talk com.feralinteractive.GameMode
81dbus-system none 82dbus-system none
83
84restrict-namespaces
diff --git a/etc/profile-a-l/lximage-qt.profile b/etc/profile-a-l/lximage-qt.profile
index d8485ba65..589f1cf6b 100644
--- a/etc/profile-a-l/lximage-qt.profile
+++ b/etc/profile-a-l/lximage-qt.profile
@@ -35,3 +35,4 @@ private-cache
35private-dev 35private-dev
36private-tmp 36private-tmp
37 37
38restrict-namespaces
diff --git a/etc/profile-a-l/lxmusic.profile b/etc/profile-a-l/lxmusic.profile
index a5fc967be..1ecf3c9d7 100644
--- a/etc/profile-a-l/lxmusic.profile
+++ b/etc/profile-a-l/lxmusic.profile
@@ -37,3 +37,4 @@ seccomp
37private-dev 37private-dev
38private-tmp 38private-tmp
39 39
40restrict-namespaces
diff --git a/etc/profile-a-l/lynx.profile b/etc/profile-a-l/lynx.profile
index 02a9f8d82..caf8de104 100644
--- a/etc/profile-a-l/lynx.profile
+++ b/etc/profile-a-l/lynx.profile
@@ -39,3 +39,5 @@ private-cache
39private-dev 39private-dev
40# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl 40# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl
41private-tmp 41private-tmp
42
43restrict-namespaces
diff --git a/etc/profile-m-z/Maelstrom.profile b/etc/profile-m-z/Maelstrom.profile
index 930d49db2..23b44dbf5 100644
--- a/etc/profile-m-z/Maelstrom.profile
+++ b/etc/profile-m-z/Maelstrom.profile
@@ -43,3 +43,5 @@ private-tmp
43 43
44dbus-user none 44dbus-user none
45dbus-system none 45dbus-system none
46
47#restrict-namespaces
diff --git a/etc/profile-m-z/Mathematica.profile b/etc/profile-m-z/Mathematica.profile
index 6286f066e..08283bd33 100644
--- a/etc/profile-m-z/Mathematica.profile
+++ b/etc/profile-m-z/Mathematica.profile
@@ -27,3 +27,5 @@ nonewprivs
27noroot 27noroot
28notv 28notv
29seccomp 29seccomp
30
31restrict-namespaces
diff --git a/etc/profile-m-z/PCSX2.profile b/etc/profile-m-z/PCSX2.profile
index cc52f053f..902fc9a6a 100644
--- a/etc/profile-m-z/PCSX2.profile
+++ b/etc/profile-m-z/PCSX2.profile
@@ -53,3 +53,5 @@ private-tmp
53 53
54dbus-user none 54dbus-user none
55dbus-system none 55dbus-system none
56
57#restrict-namespaces
diff --git a/etc/profile-m-z/QMediathekView.profile b/etc/profile-m-z/QMediathekView.profile
index cf597c215..1e9af5769 100644
--- a/etc/profile-m-z/QMediathekView.profile
+++ b/etc/profile-m-z/QMediathekView.profile
@@ -56,3 +56,4 @@ dbus-user none
56dbus-system none 56dbus-system none
57 57
58#memory-deny-write-execute - breaks on Arch (see issue #1803) 58#memory-deny-write-execute - breaks on Arch (see issue #1803)
59restrict-namespaces
diff --git a/etc/profile-m-z/QOwnNotes.profile b/etc/profile-m-z/QOwnNotes.profile
index 6bf69d055..6140de60f 100644
--- a/etc/profile-m-z/QOwnNotes.profile
+++ b/etc/profile-m-z/QOwnNotes.profile
@@ -52,3 +52,4 @@ private-dev
52private-etc alternatives,ca-certificates,crypto-policies,fonts,host.conf,hosts,ld.so.cache,ld.so.preload,machine-id,nsswitch.conf,pki,pulse,resolv.conf,ssl 52private-etc alternatives,ca-certificates,crypto-policies,fonts,host.conf,hosts,ld.so.cache,ld.so.preload,machine-id,nsswitch.conf,pki,pulse,resolv.conf,ssl
53private-tmp 53private-tmp
54 54
55restrict-namespaces
diff --git a/etc/profile-m-z/Viber.profile b/etc/profile-m-z/Viber.profile
index e13337b7c..2ea185ec0 100644
--- a/etc/profile-m-z/Viber.profile
+++ b/etc/profile-m-z/Viber.profile
@@ -34,3 +34,5 @@ disable-mnt
34private-bin awk,bash,dig,sh,Viber 34private-bin awk,bash,dig,sh,Viber
35private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,hosts,ld.so.cache,ld.so.preload,localtime,machine-id,mailcap,nsswitch.conf,pki,proxychains.conf,pulse,resolv.conf,ssl,X11 35private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,hosts,ld.so.cache,ld.so.preload,localtime,machine-id,mailcap,nsswitch.conf,pki,proxychains.conf,pulse,resolv.conf,ssl,X11
36private-tmp 36private-tmp
37
38# restrict-namespaces
diff --git a/etc/profile-m-z/XMind.profile b/etc/profile-m-z/XMind.profile
index 53cecd4b1..97b9d2898 100644
--- a/etc/profile-m-z/XMind.profile
+++ b/etc/profile-m-z/XMind.profile
@@ -35,3 +35,4 @@ private-bin cp,sh,XMind
35private-tmp 35private-tmp
36private-dev 36private-dev
37 37
38restrict-namespaces
diff --git a/etc/profile-m-z/Xephyr.profile b/etc/profile-m-z/Xephyr.profile
index bda639232..2fc1d1b8a 100644
--- a/etc/profile-m-z/Xephyr.profile
+++ b/etc/profile-m-z/Xephyr.profile
@@ -40,3 +40,5 @@ private
40private-dev 40private-dev
41# private-etc alternatives,gai.conf,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,nsswitch.conf,resolv.conf 41# private-etc alternatives,gai.conf,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,nsswitch.conf,resolv.conf
42#private-tmp 42#private-tmp
43
44restrict-namespaces
diff --git a/etc/profile-m-z/Xvfb.profile b/etc/profile-m-z/Xvfb.profile
index 223370f30..8bf79f554 100644
--- a/etc/profile-m-z/Xvfb.profile
+++ b/etc/profile-m-z/Xvfb.profile
@@ -44,3 +44,5 @@ private
44private-dev 44private-dev
45private-etc alternatives,gai.conf,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.preload,nsswitch.conf,resolv.conf 45private-etc alternatives,gai.conf,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.preload,nsswitch.conf,resolv.conf
46private-tmp 46private-tmp
47
48restrict-namespaces
diff --git a/etc/profile-m-z/ZeGrapher.profile b/etc/profile-m-z/ZeGrapher.profile
index 89024f976..6ddc24bf6 100644
--- a/etc/profile-m-z/ZeGrapher.profile
+++ b/etc/profile-m-z/ZeGrapher.profile
@@ -45,3 +45,5 @@ private-tmp
45 45
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48
49restrict-namespaces
diff --git a/etc/profile-m-z/macrofusion.profile b/etc/profile-m-z/macrofusion.profile
index e8fba41c3..24158d062 100644
--- a/etc/profile-m-z/macrofusion.profile
+++ b/etc/profile-m-z/macrofusion.profile
@@ -42,3 +42,5 @@ private-tmp
42 42
43dbus-user none 43dbus-user none
44dbus-system none 44dbus-system none
45
46restrict-namespaces
diff --git a/etc/profile-m-z/magicor.profile b/etc/profile-m-z/magicor.profile
index 76fc6e6da..e5d994b57 100644
--- a/etc/profile-m-z/magicor.profile
+++ b/etc/profile-m-z/magicor.profile
@@ -49,3 +49,5 @@ private-tmp
49 49
50dbus-user none 50dbus-user none
51dbus-system none 51dbus-system none
52
53restrict-namespaces
diff --git a/etc/profile-m-z/makepkg.profile b/etc/profile-m-z/makepkg.profile
index 4ec6ef82e..e9d245a6d 100644
--- a/etc/profile-m-z/makepkg.profile
+++ b/etc/profile-m-z/makepkg.profile
@@ -58,3 +58,4 @@ private-cache
58private-tmp 58private-tmp
59 59
60memory-deny-write-execute 60memory-deny-write-execute
61restrict-namespaces
diff --git a/etc/profile-m-z/man.profile b/etc/profile-m-z/man.profile
index b8d221dc3..0e3f9e6e2 100644
--- a/etc/profile-m-z/man.profile
+++ b/etc/profile-m-z/man.profile
@@ -65,3 +65,4 @@ dbus-system none
65memory-deny-write-execute 65memory-deny-write-execute
66read-only ${HOME} 66read-only ${HOME}
67#read-only /tmp # breaks mandoc (see #4927) 67#read-only /tmp # breaks mandoc (see #4927)
68restrict-namespaces
diff --git a/etc/profile-m-z/manaplus.profile b/etc/profile-m-z/manaplus.profile
index ede669c08..5ee4d0cb5 100644
--- a/etc/profile-m-z/manaplus.profile
+++ b/etc/profile-m-z/manaplus.profile
@@ -48,3 +48,5 @@ private-tmp
48 48
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51
52restrict-namespaces
diff --git a/etc/profile-m-z/marker.profile b/etc/profile-m-z/marker.profile
index fe0077f3d..7066f4229 100644
--- a/etc/profile-m-z/marker.profile
+++ b/etc/profile-m-z/marker.profile
@@ -60,3 +60,5 @@ dbus-user filter
60dbus-user.own com.github.fabiocolacio.marker 60dbus-user.own com.github.fabiocolacio.marker
61dbus-user.talk ca.desrt.dconf 61dbus-user.talk ca.desrt.dconf
62dbus-system none 62dbus-system none
63
64restrict-namespaces
diff --git a/etc/profile-m-z/masterpdfeditor.profile b/etc/profile-m-z/masterpdfeditor.profile
index a78927cc5..176506ff2 100644
--- a/etc/profile-m-z/masterpdfeditor.profile
+++ b/etc/profile-m-z/masterpdfeditor.profile
@@ -38,3 +38,4 @@ private-dev
38private-etc alternatives,fonts,ld.so.cache,ld.so.preload 38private-etc alternatives,fonts,ld.so.cache,ld.so.preload
39private-tmp 39private-tmp
40 40
41restrict-namespaces
diff --git a/etc/profile-m-z/mate-calc.profile b/etc/profile-m-z/mate-calc.profile
index 00f0bd9a3..e3a5c6ab6 100644
--- a/etc/profile-m-z/mate-calc.profile
+++ b/etc/profile-m-z/mate-calc.profile
@@ -50,3 +50,4 @@ dbus-user none
50dbus-system none 50dbus-system none
51 51
52memory-deny-write-execute 52memory-deny-write-execute
53restrict-namespaces
diff --git a/etc/profile-m-z/mate-color-select.profile b/etc/profile-m-z/mate-color-select.profile
index a59f5e139..337c2d6e5 100644
--- a/etc/profile-m-z/mate-color-select.profile
+++ b/etc/profile-m-z/mate-color-select.profile
@@ -38,3 +38,4 @@ private-lib
38private-tmp 38private-tmp
39 39
40memory-deny-write-execute 40memory-deny-write-execute
41restrict-namespaces
diff --git a/etc/profile-m-z/mate-dictionary.profile b/etc/profile-m-z/mate-dictionary.profile
index 3720c824e..e80b220b7 100644
--- a/etc/profile-m-z/mate-dictionary.profile
+++ b/etc/profile-m-z/mate-dictionary.profile
@@ -42,3 +42,4 @@ private-dev
42private-tmp 42private-tmp
43 43
44memory-deny-write-execute 44memory-deny-write-execute
45restrict-namespaces
diff --git a/etc/profile-m-z/mcabber.profile b/etc/profile-m-z/mcabber.profile
index 1df04c117..1ebe9aaba 100644
--- a/etc/profile-m-z/mcabber.profile
+++ b/etc/profile-m-z/mcabber.profile
@@ -31,3 +31,5 @@ seccomp
31private-bin mcabber 31private-bin mcabber
32private-dev 32private-dev
33private-etc alternatives,ca-certificates,crypto-policies,ld.so.cache,ld.so.preload,pki,ssl 33private-etc alternatives,ca-certificates,crypto-policies,ld.so.cache,ld.so.preload,pki,ssl
34
35restrict-namespaces
diff --git a/etc/profile-m-z/mcomix.profile b/etc/profile-m-z/mcomix.profile
index e654cc16e..a3ff768b7 100644
--- a/etc/profile-m-z/mcomix.profile
+++ b/etc/profile-m-z/mcomix.profile
@@ -70,3 +70,4 @@ read-write ${HOME}/.local/share/mcomix
70read-write ${HOME}/.local/share 70read-write ${HOME}/.local/share
71# used by mcomix <= 1.2, tip, make a symbolic link to .cache/thumbnails 71# used by mcomix <= 1.2, tip, make a symbolic link to .cache/thumbnails
72read-write ${HOME}/.thumbnails 72read-write ${HOME}/.thumbnails
73restrict-namespaces
diff --git a/etc/profile-m-z/mdr.profile b/etc/profile-m-z/mdr.profile
index 63b07d474..e1025a1fb 100644
--- a/etc/profile-m-z/mdr.profile
+++ b/etc/profile-m-z/mdr.profile
@@ -52,3 +52,4 @@ dbus-user none
52dbus-system none 52dbus-system none
53 53
54memory-deny-write-execute 54memory-deny-write-execute
55restrict-namespaces
diff --git a/etc/profile-m-z/mediainfo.profile b/etc/profile-m-z/mediainfo.profile
index 35d59d439..12d692b72 100644
--- a/etc/profile-m-z/mediainfo.profile
+++ b/etc/profile-m-z/mediainfo.profile
@@ -49,3 +49,4 @@ dbus-user none
49dbus-system none 49dbus-system none
50 50
51memory-deny-write-execute 51memory-deny-write-execute
52restrict-namespaces
diff --git a/etc/profile-m-z/mediathekview.profile b/etc/profile-m-z/mediathekview.profile
index f0ef7d010..19ce6fcd1 100644
--- a/etc/profile-m-z/mediathekview.profile
+++ b/etc/profile-m-z/mediathekview.profile
@@ -51,3 +51,4 @@ private-cache
51private-dev 51private-dev
52private-tmp 52private-tmp
53 53
54restrict-namespaces
diff --git a/etc/profile-m-z/megaglest.profile b/etc/profile-m-z/megaglest.profile
index a28a66786..73fd65bcd 100644
--- a/etc/profile-m-z/megaglest.profile
+++ b/etc/profile-m-z/megaglest.profile
@@ -53,3 +53,5 @@ private-tmp
53 53
54dbus-user none 54dbus-user none
55dbus-system none 55dbus-system none
56
57restrict-namespaces
diff --git a/etc/profile-m-z/meld.profile b/etc/profile-m-z/meld.profile
index dddc7f977..634694363 100644
--- a/etc/profile-m-z/meld.profile
+++ b/etc/profile-m-z/meld.profile
@@ -78,3 +78,4 @@ private-dev
78private-tmp 78private-tmp
79 79
80read-only ${HOME}/.ssh 80read-only ${HOME}/.ssh
81restrict-namespaces
diff --git a/etc/profile-m-z/mendeleydesktop.profile b/etc/profile-m-z/mendeleydesktop.profile
index 4f9bcea71..f2626b0c1 100644
--- a/etc/profile-m-z/mendeleydesktop.profile
+++ b/etc/profile-m-z/mendeleydesktop.profile
@@ -47,3 +47,5 @@ private-tmp
47 47
48dbus-user none 48dbus-user none
49dbus-system none 49dbus-system none
50
51restrict-namespaces
diff --git a/etc/profile-m-z/menulibre.profile b/etc/profile-m-z/menulibre.profile
index 08b155a27..cd4938ec6 100644
--- a/etc/profile-m-z/menulibre.profile
+++ b/etc/profile-m-z/menulibre.profile
@@ -61,3 +61,4 @@ read-write ${HOME}/.config/menus
61read-write ${HOME}/.gnome/apps 61read-write ${HOME}/.gnome/apps
62read-write ${HOME}/.local/share/applications 62read-write ${HOME}/.local/share/applications
63read-write ${HOME}/.local/share/flatpak/exports 63read-write ${HOME}/.local/share/flatpak/exports
64restrict-namespaces
diff --git a/etc/profile-m-z/meteo-qt.profile b/etc/profile-m-z/meteo-qt.profile
index 47b4cf8c9..db87b21bc 100644
--- a/etc/profile-m-z/meteo-qt.profile
+++ b/etc/profile-m-z/meteo-qt.profile
@@ -51,3 +51,4 @@ dbus-user none
51dbus-system none 51dbus-system none
52 52
53memory-deny-write-execute 53memory-deny-write-execute
54restrict-namespaces
diff --git a/etc/profile-m-z/midori.profile b/etc/profile-m-z/midori.profile
index eb037f51b..d1655fabb 100644
--- a/etc/profile-m-z/midori.profile
+++ b/etc/profile-m-z/midori.profile
@@ -62,3 +62,5 @@ tracelog
62 62
63disable-mnt 63disable-mnt
64private-tmp 64private-tmp
65
66restrict-namespaces
diff --git a/etc/profile-m-z/mindless.profile b/etc/profile-m-z/mindless.profile
index 8f1cd0bc6..a26896b19 100644
--- a/etc/profile-m-z/mindless.profile
+++ b/etc/profile-m-z/mindless.profile
@@ -48,3 +48,4 @@ dbus-user none
48dbus-system none 48dbus-system none
49 49
50memory-deny-write-execute 50memory-deny-write-execute
51restrict-namespaces
diff --git a/etc/profile-m-z/minecraft-launcher.profile b/etc/profile-m-z/minecraft-launcher.profile
index 22684be39..e6bf86802 100644
--- a/etc/profile-m-z/minecraft-launcher.profile
+++ b/etc/profile-m-z/minecraft-launcher.profile
@@ -56,3 +56,5 @@ private-tmp
56 56
57dbus-user none 57dbus-user none
58dbus-system none 58dbus-system none
59
60restrict-namespaces
diff --git a/etc/profile-m-z/minetest.profile b/etc/profile-m-z/minetest.profile
index 3d7ede3dc..15474c96e 100644
--- a/etc/profile-m-z/minetest.profile
+++ b/etc/profile-m-z/minetest.profile
@@ -61,3 +61,5 @@ private-tmp
61 61
62dbus-user none 62dbus-user none
63dbus-system none 63dbus-system none
64
65restrict-namespaces
diff --git a/etc/profile-m-z/minitube.profile b/etc/profile-m-z/minitube.profile
index 385edbd7a..ce938c867 100644
--- a/etc/profile-m-z/minitube.profile
+++ b/etc/profile-m-z/minitube.profile
@@ -58,3 +58,5 @@ private-tmp
58 58
59dbus-user none 59dbus-user none
60dbus-system none 60dbus-system none
61
62restrict-namespaces
diff --git a/etc/profile-m-z/mirage.profile b/etc/profile-m-z/mirage.profile
index 2b05bbfde..d36c0fc81 100644
--- a/etc/profile-m-z/mirage.profile
+++ b/etc/profile-m-z/mirage.profile
@@ -58,3 +58,5 @@ private-tmp
58 58
59dbus-user none 59dbus-user none
60dbus-system none 60dbus-system none
61
62restrict-namespaces
diff --git a/etc/profile-m-z/mirrormagic.profile b/etc/profile-m-z/mirrormagic.profile
index 707ef34e9..34721b4a3 100644
--- a/etc/profile-m-z/mirrormagic.profile
+++ b/etc/profile-m-z/mirrormagic.profile
@@ -48,3 +48,5 @@ private-tmp
48 48
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51
52restrict-namespaces
diff --git a/etc/profile-m-z/mocp.profile b/etc/profile-m-z/mocp.profile
index fdaf885bd..46320f8ea 100644
--- a/etc/profile-m-z/mocp.profile
+++ b/etc/profile-m-z/mocp.profile
@@ -50,3 +50,4 @@ dbus-system none
50memory-deny-write-execute 50memory-deny-write-execute
51read-only ${HOME} 51read-only ${HOME}
52read-write ${HOME}/.moc 52read-write ${HOME}/.moc
53restrict-namespaces
diff --git a/etc/profile-m-z/mousepad.profile b/etc/profile-m-z/mousepad.profile
index e87c82e30..8e597fa99 100644
--- a/etc/profile-m-z/mousepad.profile
+++ b/etc/profile-m-z/mousepad.profile
@@ -37,3 +37,5 @@ private-bin mousepad
37private-dev 37private-dev
38private-lib 38private-lib
39private-tmp 39private-tmp
40
41restrict-namespaces
diff --git a/etc/profile-m-z/mp3splt-gtk.profile b/etc/profile-m-z/mp3splt-gtk.profile
index 0dd9f7b43..89cee657d 100644
--- a/etc/profile-m-z/mp3splt-gtk.profile
+++ b/etc/profile-m-z/mp3splt-gtk.profile
@@ -41,3 +41,5 @@ private-tmp
41 41
42dbus-user none 42dbus-user none
43dbus-system none 43dbus-system none
44
45restrict-namespaces
diff --git a/etc/profile-m-z/mp3splt.profile b/etc/profile-m-z/mp3splt.profile
index e1b26aaf0..77ad30d0c 100644
--- a/etc/profile-m-z/mp3splt.profile
+++ b/etc/profile-m-z/mp3splt.profile
@@ -46,7 +46,8 @@ private-dev
46private-etc alternatives,ld.so.cache,ld.so.preload 46private-etc alternatives,ld.so.cache,ld.so.preload
47private-tmp 47private-tmp
48 48
49memory-deny-write-execute
50
51dbus-user none 49dbus-user none
52dbus-system none 50dbus-system none
51
52memory-deny-write-execute
53restrict-namespaces
diff --git a/etc/profile-m-z/mpDris2.profile b/etc/profile-m-z/mpDris2.profile
index ed8a7eee3..1d875c3c4 100644
--- a/etc/profile-m-z/mpDris2.profile
+++ b/etc/profile-m-z/mpDris2.profile
@@ -55,3 +55,4 @@ private-tmp
55#memory-deny-write-execute - breaks on Arch (see issue #1803) 55#memory-deny-write-execute - breaks on Arch (see issue #1803)
56 56
57read-only ${HOME} 57read-only ${HOME}
58restrict-namespaces
diff --git a/etc/profile-m-z/mpd.profile b/etc/profile-m-z/mpd.profile
index 604db8105..d1c4bd24f 100644
--- a/etc/profile-m-z/mpd.profile
+++ b/etc/profile-m-z/mpd.profile
@@ -41,3 +41,4 @@ private-cache
41private-dev 41private-dev
42private-tmp 42private-tmp
43 43
44restrict-namespaces
diff --git a/etc/profile-m-z/mpg123.profile b/etc/profile-m-z/mpg123.profile
index d03879836..12650dbc9 100644
--- a/etc/profile-m-z/mpg123.profile
+++ b/etc/profile-m-z/mpg123.profile
@@ -42,3 +42,4 @@ dbus-user none
42dbus-system none 42dbus-system none
43 43
44memory-deny-write-execute 44memory-deny-write-execute
45restrict-namespaces
diff --git a/etc/profile-m-z/mplayer.profile b/etc/profile-m-z/mplayer.profile
index ebb4b0e73..7d9ff39ad 100644
--- a/etc/profile-m-z/mplayer.profile
+++ b/etc/profile-m-z/mplayer.profile
@@ -37,3 +37,5 @@ seccomp
37private-bin mplayer 37private-bin mplayer
38private-dev 38private-dev
39private-tmp 39private-tmp
40
41restrict-namespaces
diff --git a/etc/profile-m-z/mpsyt.profile b/etc/profile-m-z/mpsyt.profile
index 9dcdd34a3..e73e3142c 100644
--- a/etc/profile-m-z/mpsyt.profile
+++ b/etc/profile-m-z/mpsyt.profile
@@ -68,3 +68,4 @@ private-tmp
68 68
69dbus-user none 69dbus-user none
70dbus-system none 70dbus-system none
71restrict-namespaces
diff --git a/etc/profile-m-z/mpv.profile b/etc/profile-m-z/mpv.profile
index 4ea5740c2..c9706999a 100644
--- a/etc/profile-m-z/mpv.profile
+++ b/etc/profile-m-z/mpv.profile
@@ -86,3 +86,5 @@ private-dev
86 86
87dbus-user none 87dbus-user none
88dbus-system none 88dbus-system none
89
90restrict-namespaces
diff --git a/etc/profile-m-z/mrrescue.profile b/etc/profile-m-z/mrrescue.profile
index f4d8d7f6a..4f7ae09b9 100644
--- a/etc/profile-m-z/mrrescue.profile
+++ b/etc/profile-m-z/mrrescue.profile
@@ -56,3 +56,5 @@ private-tmp
56 56
57dbus-user none 57dbus-user none
58dbus-system none 58dbus-system none
59
60restrict-namespaces
diff --git a/etc/profile-m-z/ms-office.profile b/etc/profile-m-z/ms-office.profile
index 7eb8efae6..d979e7401 100644
--- a/etc/profile-m-z/ms-office.profile
+++ b/etc/profile-m-z/ms-office.profile
@@ -40,3 +40,5 @@ private-tmp
40 40
41dbus-user none 41dbus-user none
42dbus-system none 42dbus-system none
43
44restrict-namespaces
diff --git a/etc/profile-m-z/mtpaint.profile b/etc/profile-m-z/mtpaint.profile
index 5467718e2..363c6fe4a 100644
--- a/etc/profile-m-z/mtpaint.profile
+++ b/etc/profile-m-z/mtpaint.profile
@@ -46,3 +46,5 @@ private-tmp
46 46
47dbus-user none 47dbus-user none
48dbus-system none 48dbus-system none
49
50restrict-namespaces
diff --git a/etc/profile-m-z/multimc5.profile b/etc/profile-m-z/multimc5.profile
index 283840c17..73107680c 100644
--- a/etc/profile-m-z/multimc5.profile
+++ b/etc/profile-m-z/multimc5.profile
@@ -49,3 +49,4 @@ disable-mnt
49private-dev 49private-dev
50private-tmp 50private-tmp
51 51
52# restrict-namespaces
diff --git a/etc/profile-m-z/mumble.profile b/etc/profile-m-z/mumble.profile
index e2530efc7..ef09e6fca 100644
--- a/etc/profile-m-z/mumble.profile
+++ b/etc/profile-m-z/mumble.profile
@@ -42,3 +42,4 @@ private-bin mumble
42private-tmp 42private-tmp
43 43
44#memory-deny-write-execute - breaks on Arch (see issue #1803) 44#memory-deny-write-execute - breaks on Arch (see issue #1803)
45restrict-namespaces
diff --git a/etc/profile-m-z/mupdf.profile b/etc/profile-m-z/mupdf.profile
index 1876dc5ca..954016c2c 100644
--- a/etc/profile-m-z/mupdf.profile
+++ b/etc/profile-m-z/mupdf.profile
@@ -44,3 +44,4 @@ dbus-system none
44 44
45memory-deny-write-execute 45memory-deny-write-execute
46read-only ${HOME} 46read-only ${HOME}
47restrict-namespaces
diff --git a/etc/profile-m-z/mupen64plus.profile b/etc/profile-m-z/mupen64plus.profile
index 093767c27..f97c6f271 100644
--- a/etc/profile-m-z/mupen64plus.profile
+++ b/etc/profile-m-z/mupen64plus.profile
@@ -31,3 +31,5 @@ seccomp
31 31
32dbus-user none 32dbus-user none
33dbus-system none 33dbus-system none
34
35restrict-namespaces
diff --git a/etc/profile-m-z/musescore.profile b/etc/profile-m-z/musescore.profile
index fa4a37bf8..ca951f70c 100644
--- a/etc/profile-m-z/musescore.profile
+++ b/etc/profile-m-z/musescore.profile
@@ -39,3 +39,5 @@ tracelog
39 39
40# private-bin musescore,mscore 40# private-bin musescore,mscore
41private-tmp 41private-tmp
42
43# restrict-namespaces
diff --git a/etc/profile-m-z/musictube.profile b/etc/profile-m-z/musictube.profile
index 9f83bb428..01b8d20b3 100644
--- a/etc/profile-m-z/musictube.profile
+++ b/etc/profile-m-z/musictube.profile
@@ -54,3 +54,5 @@ private-tmp
54 54
55dbus-user none 55dbus-user none
56dbus-system none 56dbus-system none
57
58restrict-namespaces
diff --git a/etc/profile-m-z/musixmatch.profile b/etc/profile-m-z/musixmatch.profile
index 796d7fbb0..d2032dcf6 100644
--- a/etc/profile-m-z/musixmatch.profile
+++ b/etc/profile-m-z/musixmatch.profile
@@ -35,3 +35,4 @@ disable-mnt
35private-dev 35private-dev
36private-etc alternatives,asound.conf,ca-certificates,crypto-policies,ld.so.cache,ld.so.preload,machine-id,pki,pulse,ssl 36private-etc alternatives,asound.conf,ca-certificates,crypto-policies,ld.so.cache,ld.so.preload,machine-id,pki,pulse,ssl
37 37
38# restrict-namespaces
diff --git a/etc/profile-m-z/mutt.profile b/etc/profile-m-z/mutt.profile
index 6c6341d40..52d30669f 100644
--- a/etc/profile-m-z/mutt.profile
+++ b/etc/profile-m-z/mutt.profile
@@ -146,3 +146,4 @@ read-only ${HOME}/.elinks
146read-only ${HOME}/.nanorc 146read-only ${HOME}/.nanorc
147read-only ${HOME}/.signature 147read-only ${HOME}/.signature
148read-only ${HOME}/.w3m 148read-only ${HOME}/.w3m
149restrict-namespaces
diff --git a/etc/profile-m-z/mypaint.profile b/etc/profile-m-z/mypaint.profile
index 41519bbb1..18117965e 100644
--- a/etc/profile-m-z/mypaint.profile
+++ b/etc/profile-m-z/mypaint.profile
@@ -47,3 +47,5 @@ private-tmp
47 47
48dbus-user none 48dbus-user none
49dbus-system none 49dbus-system none
50
51restrict-namespaces
diff --git a/etc/profile-m-z/nano.profile b/etc/profile-m-z/nano.profile
index e8cee2538..a20eb3828 100644
--- a/etc/profile-m-z/nano.profile
+++ b/etc/profile-m-z/nano.profile
@@ -56,3 +56,4 @@ dbus-user none
56dbus-system none 56dbus-system none
57 57
58memory-deny-write-execute 58memory-deny-write-execute
59restrict-namespaces
diff --git a/etc/profile-m-z/natron.profile b/etc/profile-m-z/natron.profile
index 2c7e36a35..b979e1aee 100644
--- a/etc/profile-m-z/natron.profile
+++ b/etc/profile-m-z/natron.profile
@@ -34,3 +34,5 @@ private-bin natron,Natron,NatronRenderer
34 34
35dbus-user none 35dbus-user none
36dbus-system none 36dbus-system none
37
38restrict-namespaces
diff --git a/etc/profile-m-z/ncdu.profile b/etc/profile-m-z/ncdu.profile
index 010f823d0..09687199b 100644
--- a/etc/profile-m-z/ncdu.profile
+++ b/etc/profile-m-z/ncdu.profile
@@ -35,3 +35,4 @@ dbus-user none
35dbus-system none 35dbus-system none
36 36
37memory-deny-write-execute 37memory-deny-write-execute
38restrict-namespaces
diff --git a/etc/profile-m-z/neochat.profile b/etc/profile-m-z/neochat.profile
index a50fdd072..fde1d4d2c 100644
--- a/etc/profile-m-z/neochat.profile
+++ b/etc/profile-m-z/neochat.profile
@@ -62,3 +62,5 @@ dbus-user.talk org.freedesktop.Notifications
62?ALLOW_TRAY: dbus-user.talk org.kde.StatusNotifierWatcher 62?ALLOW_TRAY: dbus-user.talk org.kde.StatusNotifierWatcher
63dbus-user.talk org.kde.kwalletd5 63dbus-user.talk org.kde.kwalletd5
64dbus-system none 64dbus-system none
65
66restrict-namespaces
diff --git a/etc/profile-m-z/neomutt.profile b/etc/profile-m-z/neomutt.profile
index 9000b7972..c255a85c9 100644
--- a/etc/profile-m-z/neomutt.profile
+++ b/etc/profile-m-z/neomutt.profile
@@ -129,3 +129,4 @@ read-only ${HOME}/.elinks
129read-only ${HOME}/.nanorc 129read-only ${HOME}/.nanorc
130read-only ${HOME}/.signature 130read-only ${HOME}/.signature
131read-only ${HOME}/.w3m 131read-only ${HOME}/.w3m
132restrict-namespaces
diff --git a/etc/profile-m-z/netactview.profile b/etc/profile-m-z/netactview.profile
index 60fc2fa65..4d5265397 100644
--- a/etc/profile-m-z/netactview.profile
+++ b/etc/profile-m-z/netactview.profile
@@ -52,3 +52,4 @@ dbus-user none
52dbus-system none 52dbus-system none
53 53
54memory-deny-write-execute 54memory-deny-write-execute
55restrict-namespaces
diff --git a/etc/profile-m-z/nethack-vultures.profile b/etc/profile-m-z/nethack-vultures.profile
index d130d5b3a..c07bb7107 100644
--- a/etc/profile-m-z/nethack-vultures.profile
+++ b/etc/profile-m-z/nethack-vultures.profile
@@ -42,3 +42,5 @@ writable-var
42 42
43dbus-user none 43dbus-user none
44dbus-system none 44dbus-system none
45
46#restrict-namespaces
diff --git a/etc/profile-m-z/nethack.profile b/etc/profile-m-z/nethack.profile
index 9cb7457e5..a43889349 100644
--- a/etc/profile-m-z/nethack.profile
+++ b/etc/profile-m-z/nethack.profile
@@ -44,3 +44,4 @@ dbus-user none
44dbus-system none 44dbus-system none
45 45
46#memory-deny-write-execute 46#memory-deny-write-execute
47#restrict-namespaces
diff --git a/etc/profile-m-z/netsurf.profile b/etc/profile-m-z/netsurf.profile
index 0ddb7bbbe..467ce5829 100644
--- a/etc/profile-m-z/netsurf.profile
+++ b/etc/profile-m-z/netsurf.profile
@@ -32,3 +32,5 @@ seccomp
32tracelog 32tracelog
33 33
34disable-mnt 34disable-mnt
35
36restrict-namespaces
diff --git a/etc/profile-m-z/neverball.profile b/etc/profile-m-z/neverball.profile
index b9a25b66c..68b0ce2ea 100644
--- a/etc/profile-m-z/neverball.profile
+++ b/etc/profile-m-z/neverball.profile
@@ -48,3 +48,5 @@ private-tmp
48 48
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51
52restrict-namespaces
diff --git a/etc/profile-m-z/newsboat.profile b/etc/profile-m-z/newsboat.profile
index 10f9240b7..b80a0a151 100644
--- a/etc/profile-m-z/newsboat.profile
+++ b/etc/profile-m-z/newsboat.profile
@@ -59,3 +59,4 @@ dbus-user none
59dbus-system none 59dbus-system none
60 60
61memory-deny-write-execute 61memory-deny-write-execute
62restrict-namespaces
diff --git a/etc/profile-m-z/newsflash.profile b/etc/profile-m-z/newsflash.profile
index 4da14beae..59f16bb10 100644
--- a/etc/profile-m-z/newsflash.profile
+++ b/etc/profile-m-z/newsflash.profile
@@ -57,3 +57,5 @@ dbus-user none
57#dbus-user.own com.gitlab.newsflash 57#dbus-user.own com.gitlab.newsflash
58#dbus-user.talk org.freedesktop.Notifications 58#dbus-user.talk org.freedesktop.Notifications
59dbus-system none 59dbus-system none
60
61restrict-namespaces
diff --git a/etc/profile-m-z/nextcloud.profile b/etc/profile-m-z/nextcloud.profile
index 95f9f5d14..c26942c81 100644
--- a/etc/profile-m-z/nextcloud.profile
+++ b/etc/profile-m-z/nextcloud.profile
@@ -69,3 +69,5 @@ dbus-user filter
69dbus-user.talk org.freedesktop.secrets 69dbus-user.talk org.freedesktop.secrets
70?ALLOW_TRAY: dbus-user.talk org.kde.StatusNotifierWatcher 70?ALLOW_TRAY: dbus-user.talk org.kde.StatusNotifierWatcher
71dbus-system none 71dbus-system none
72
73restrict-namespaces
diff --git a/etc/profile-m-z/nheko.profile b/etc/profile-m-z/nheko.profile
index 662584892..4e4c7bfe7 100644
--- a/etc/profile-m-z/nheko.profile
+++ b/etc/profile-m-z/nheko.profile
@@ -56,3 +56,5 @@ dbus-user.talk org.freedesktop.secrets
56# Add the next line to your nheko.local to enable notification support. 56# Add the next line to your nheko.local to enable notification support.
57#dbus-user.talk org.freedesktop.Notifications 57#dbus-user.talk org.freedesktop.Notifications
58dbus-system none 58dbus-system none
59
60restrict-namespaces
diff --git a/etc/profile-m-z/nicotine.profile b/etc/profile-m-z/nicotine.profile
index bb2a41457..568899eea 100644
--- a/etc/profile-m-z/nicotine.profile
+++ b/etc/profile-m-z/nicotine.profile
@@ -8,8 +8,12 @@ include globals.local
8 8
9noblacklist ${HOME}/.nicotine 9noblacklist ${HOME}/.nicotine
10 10
11# Allow /bin/sh (blacklisted by disable-shell.inc)
12include allow-bin-sh.inc
13
11# Allow python (blacklisted by disable-interpreters.inc) 14# Allow python (blacklisted by disable-interpreters.inc)
12include allow-python2.inc 15include allow-python2.inc
16include allow-python3.inc
13 17
14include disable-common.inc 18include disable-common.inc
15include disable-devel.inc 19include disable-devel.inc
@@ -37,6 +41,7 @@ nodvd
37nogroups 41nogroups
38noinput 42noinput
39nonewprivs 43nonewprivs
44noprinters
40noroot 45noroot
41nosound 46nosound
42notv 47notv
@@ -47,10 +52,12 @@ seccomp
47tracelog 52tracelog
48 53
49disable-mnt 54disable-mnt
50private-bin nicotine,python2* 55#private-bin nicotine,python2*
51private-cache 56private-cache
52private-dev 57private-dev
53private-tmp 58private-tmp
54 59
55dbus-user none 60dbus-user none
56dbus-system none 61dbus-system none
62
63restrict-namespaces
diff --git a/etc/profile-m-z/nitroshare.profile b/etc/profile-m-z/nitroshare.profile
index b4da229c4..cefe9fa79 100644
--- a/etc/profile-m-z/nitroshare.profile
+++ b/etc/profile-m-z/nitroshare.profile
@@ -49,3 +49,4 @@ private-tmp
49# dbus-system none 49# dbus-system none
50 50
51# memory-deny-write-execute 51# memory-deny-write-execute
52restrict-namespaces
diff --git a/etc/profile-m-z/nodejs-common.profile b/etc/profile-m-z/nodejs-common.profile
index 2ba125a02..f185a04ee 100644
--- a/etc/profile-m-z/nodejs-common.profile
+++ b/etc/profile-m-z/nodejs-common.profile
@@ -100,3 +100,4 @@ dbus-system none
100 100
101# Add the next line to your nodejs-common.local if you prefer to disable gatsby telemetry. 101# Add the next line to your nodejs-common.local if you prefer to disable gatsby telemetry.
102#env GATSBY_TELEMETRY_DISABLED=1 102#env GATSBY_TELEMETRY_DISABLED=1
103restrict-namespaces
diff --git a/etc/profile-m-z/nomacs.profile b/etc/profile-m-z/nomacs.profile
index 733de1096..ac8336331 100644
--- a/etc/profile-m-z/nomacs.profile
+++ b/etc/profile-m-z/nomacs.profile
@@ -42,3 +42,5 @@ private-cache
42private-dev 42private-dev
43private-etc alternatives,ca-certificates,crypto-policies,dconf,drirc,fonts,gtk-3.0,hosts,ld.so.cache,ld.so.preload,login.defs,machine-id,pki,resolv.conf,ssl 43private-etc alternatives,ca-certificates,crypto-policies,dconf,drirc,fonts,gtk-3.0,hosts,ld.so.cache,ld.so.preload,login.defs,machine-id,pki,resolv.conf,ssl
44private-tmp 44private-tmp
45
46restrict-namespaces
diff --git a/etc/profile-m-z/notify-send.profile b/etc/profile-m-z/notify-send.profile
index 7e9290513..11d6bd795 100644
--- a/etc/profile-m-z/notify-send.profile
+++ b/etc/profile-m-z/notify-send.profile
@@ -57,3 +57,4 @@ dbus-system none
57 57
58memory-deny-write-execute 58memory-deny-write-execute
59read-only ${HOME} 59read-only ${HOME}
60restrict-namespaces
diff --git a/etc/profile-m-z/nslookup.profile b/etc/profile-m-z/nslookup.profile
index 160385d70..37d9f593c 100644
--- a/etc/profile-m-z/nslookup.profile
+++ b/etc/profile-m-z/nslookup.profile
@@ -52,3 +52,4 @@ dbus-user none
52dbus-system none 52dbus-system none
53 53
54memory-deny-write-execute 54memory-deny-write-execute
55restrict-namespaces
diff --git a/etc/profile-m-z/nvim.profile b/etc/profile-m-z/nvim.profile
index 1f8334d08..6f415d60a 100644
--- a/etc/profile-m-z/nvim.profile
+++ b/etc/profile-m-z/nvim.profile
@@ -51,3 +51,4 @@ read-write ${HOME}/.local/share/nvim
51read-write ${HOME}/.local/state/nvim 51read-write ${HOME}/.local/state/nvim
52read-write ${HOME}/.vim 52read-write ${HOME}/.vim
53read-write ${HOME}/.vimrc 53read-write ${HOME}/.vimrc
54restrict-namespaces
diff --git a/etc/profile-m-z/nylas.profile b/etc/profile-m-z/nylas.profile
index a86ef478a..8acf09e90 100644
--- a/etc/profile-m-z/nylas.profile
+++ b/etc/profile-m-z/nylas.profile
@@ -35,3 +35,5 @@ protocol unix,inet,inet6,netlink
35seccomp 35seccomp
36 36
37private-dev 37private-dev
38
39restrict-namespaces
diff --git a/etc/profile-m-z/nyx.profile b/etc/profile-m-z/nyx.profile
index f58f4fd1c..4f767f046 100644
--- a/etc/profile-m-z/nyx.profile
+++ b/etc/profile-m-z/nyx.profile
@@ -51,3 +51,5 @@ private-tmp
51 51
52dbus-user none 52dbus-user none
53dbus-system none 53dbus-system none
54
55restrict-namespaces
diff --git a/etc/profile-m-z/obs.profile b/etc/profile-m-z/obs.profile
index 91abdc032..82e7a4137 100644
--- a/etc/profile-m-z/obs.profile
+++ b/etc/profile-m-z/obs.profile
@@ -40,3 +40,4 @@ private-cache
40private-dev 40private-dev
41private-tmp 41private-tmp
42 42
43restrict-namespaces
diff --git a/etc/profile-m-z/ocenaudio.profile b/etc/profile-m-z/ocenaudio.profile
index 0ce3aa088..87c665cba 100644
--- a/etc/profile-m-z/ocenaudio.profile
+++ b/etc/profile-m-z/ocenaudio.profile
@@ -59,3 +59,5 @@ private-tmp
59 59
60dbus-user none 60dbus-user none
61dbus-system none 61dbus-system none
62
63restrict-namespaces
diff --git a/etc/profile-m-z/odt2txt.profile b/etc/profile-m-z/odt2txt.profile
index 38751aa25..25da2139f 100644
--- a/etc/profile-m-z/odt2txt.profile
+++ b/etc/profile-m-z/odt2txt.profile
@@ -44,3 +44,4 @@ dbus-user none
44dbus-system none 44dbus-system none
45 45
46read-only ${HOME} 46read-only ${HOME}
47restrict-namespaces
diff --git a/etc/profile-m-z/okular.profile b/etc/profile-m-z/okular.profile
index 265ed1490..568b6566e 100644
--- a/etc/profile-m-z/okular.profile
+++ b/etc/profile-m-z/okular.profile
@@ -69,4 +69,5 @@ private-etc alternatives,cups,fonts,kde4rc,kde5rc,ld.so.cache,ld.so.preload,mach
69 69
70# memory-deny-write-execute 70# memory-deny-write-execute
71 71
72restrict-namespaces
72join-or-start okular 73join-or-start okular
diff --git a/etc/profile-m-z/onboard.profile b/etc/profile-m-z/onboard.profile
index e9d6ac028..913b499d3 100644
--- a/etc/profile-m-z/onboard.profile
+++ b/etc/profile-m-z/onboard.profile
@@ -53,3 +53,5 @@ private-etc alternatives,dbus-1,dconf,fonts,gtk-2.0,gtk-3.0,ld.so.cache,ld.so.pr
53private-tmp 53private-tmp
54 54
55dbus-system none 55dbus-system none
56
57restrict-namespaces
diff --git a/etc/profile-m-z/onionshare-gui.profile b/etc/profile-m-z/onionshare-gui.profile
index db923056a..47ac9fc05 100644
--- a/etc/profile-m-z/onionshare-gui.profile
+++ b/etc/profile-m-z/onionshare-gui.profile
@@ -65,3 +65,4 @@ dbus-user.talk org.freedesktop.secrets
65dbus-system none 65dbus-system none
66 66
67memory-deny-write-execute 67memory-deny-write-execute
68restrict-namespaces
diff --git a/etc/profile-m-z/open-invaders.profile b/etc/profile-m-z/open-invaders.profile
index 730ed271d..f6b070ab3 100644
--- a/etc/profile-m-z/open-invaders.profile
+++ b/etc/profile-m-z/open-invaders.profile
@@ -39,3 +39,5 @@ private-tmp
39 39
40dbus-user none 40dbus-user none
41dbus-system none 41dbus-system none
42
43restrict-namespaces
diff --git a/etc/profile-m-z/openarena.profile b/etc/profile-m-z/openarena.profile
index 87366547f..053f54b48 100644
--- a/etc/profile-m-z/openarena.profile
+++ b/etc/profile-m-z/openarena.profile
@@ -47,3 +47,5 @@ private-tmp
47 47
48dbus-user none 48dbus-user none
49dbus-system none 49dbus-system none
50
51restrict-namespaces
diff --git a/etc/profile-m-z/openbox.profile b/etc/profile-m-z/openbox.profile
index b49fd9932..2da867dec 100644
--- a/etc/profile-m-z/openbox.profile
+++ b/etc/profile-m-z/openbox.profile
@@ -14,7 +14,8 @@ caps.drop all
14netfilter 14netfilter
15noroot 15noroot
16protocol unix,inet,inet6 16protocol unix,inet,inet6
17seccomp 17seccomp !chroot
18 18
19read-only ${HOME}/.config/openbox/autostart 19read-only ${HOME}/.config/openbox/autostart
20read-only ${HOME}/.config/openbox/environment 20read-only ${HOME}/.config/openbox/environment
21#restrict-namespaces
diff --git a/etc/profile-m-z/opencity.profile b/etc/profile-m-z/opencity.profile
index 3001a355d..a7d147ec9 100644
--- a/etc/profile-m-z/opencity.profile
+++ b/etc/profile-m-z/opencity.profile
@@ -45,3 +45,5 @@ private-tmp
45 45
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48
49restrict-namespaces
diff --git a/etc/profile-m-z/openclonk.profile b/etc/profile-m-z/openclonk.profile
index 5f05480d8..3449ac686 100644
--- a/etc/profile-m-z/openclonk.profile
+++ b/etc/profile-m-z/openclonk.profile
@@ -45,3 +45,5 @@ private-tmp
45 45
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48
49restrict-namespaces
diff --git a/etc/profile-m-z/openmw.profile b/etc/profile-m-z/openmw.profile
index 8fe18f12b..be97552ab 100644
--- a/etc/profile-m-z/openmw.profile
+++ b/etc/profile-m-z/openmw.profile
@@ -58,3 +58,5 @@ private-tmp
58 58
59dbus-user none 59dbus-user none
60dbus-system none 60dbus-system none
61
62restrict-namespaces
diff --git a/etc/profile-m-z/openshot.profile b/etc/profile-m-z/openshot.profile
index e867eccc3..0082be581 100644
--- a/etc/profile-m-z/openshot.profile
+++ b/etc/profile-m-z/openshot.profile
@@ -46,3 +46,5 @@ private-tmp
46 46
47dbus-user filter 47dbus-user filter
48dbus-system none 48dbus-system none
49
50restrict-namespaces
diff --git a/etc/profile-m-z/openstego.profile b/etc/profile-m-z/openstego.profile
index 05b1d222d..fd8f70531 100644
--- a/etc/profile-m-z/openstego.profile
+++ b/etc/profile-m-z/openstego.profile
@@ -55,3 +55,5 @@ private-tmp
55 55
56dbus-user none 56dbus-user none
57dbus-system none 57dbus-system none
58
59restrict-namespaces
diff --git a/etc/profile-m-z/openttd.profile b/etc/profile-m-z/openttd.profile
index 19ba69b14..6e5c09eda 100644
--- a/etc/profile-m-z/openttd.profile
+++ b/etc/profile-m-z/openttd.profile
@@ -45,3 +45,5 @@ private-tmp
45 45
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48
49restrict-namespaces
diff --git a/etc/profile-m-z/orage.profile b/etc/profile-m-z/orage.profile
index 250e07004..fa16c05e2 100644
--- a/etc/profile-m-z/orage.profile
+++ b/etc/profile-m-z/orage.profile
@@ -36,3 +36,4 @@ private-cache
36private-dev 36private-dev
37private-tmp 37private-tmp
38 38
39restrict-namespaces
diff --git a/etc/profile-m-z/ostrichriders.profile b/etc/profile-m-z/ostrichriders.profile
index a2c3e7d1d..f12838b72 100644
--- a/etc/profile-m-z/ostrichriders.profile
+++ b/etc/profile-m-z/ostrichriders.profile
@@ -47,3 +47,5 @@ private-tmp
47 47
48dbus-user none 48dbus-user none
49dbus-system none 49dbus-system none
50
51restrict-namespaces
diff --git a/etc/profile-m-z/otter-browser.profile b/etc/profile-m-z/otter-browser.profile
index 7af611cc4..028c6fe90 100644
--- a/etc/profile-m-z/otter-browser.profile
+++ b/etc/profile-m-z/otter-browser.profile
@@ -56,3 +56,5 @@ private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts
56private-tmp 56private-tmp
57 57
58dbus-system none 58dbus-system none
59
60# restrict-namespaces
diff --git a/etc/profile-m-z/palemoon.profile b/etc/profile-m-z/palemoon.profile
index acb2ce176..24701b657 100644
--- a/etc/profile-m-z/palemoon.profile
+++ b/etc/profile-m-z/palemoon.profile
@@ -22,5 +22,8 @@ ignore seccomp
22#private-etc palemoon 22#private-etc palemoon
23#private-opt palemoon 23#private-opt palemoon
24 24
25restrict-namespaces
26ignore restrict-namespaces
27
25# Redirect 28# Redirect
26include firefox-common.profile 29include firefox-common.profile
diff --git a/etc/profile-m-z/pandoc.profile b/etc/profile-m-z/pandoc.profile
index aac1fc5b6..2610ae67a 100644
--- a/etc/profile-m-z/pandoc.profile
+++ b/etc/profile-m-z/pandoc.profile
@@ -56,3 +56,4 @@ dbus-user none
56dbus-system none 56dbus-system none
57 57
58memory-deny-write-execute 58memory-deny-write-execute
59restrict-namespaces
diff --git a/etc/profile-m-z/parole.profile b/etc/profile-m-z/parole.profile
index ca54d7ad4..fb629669a 100644
--- a/etc/profile-m-z/parole.profile
+++ b/etc/profile-m-z/parole.profile
@@ -27,3 +27,5 @@ seccomp
27private-bin dbus-launch,parole 27private-bin dbus-launch,parole
28private-cache 28private-cache
29private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,group,ld.so.cache,ld.so.preload,machine-id,passwd,pki,pulse,ssl 29private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,group,ld.so.cache,ld.so.preload,machine-id,passwd,pki,pulse,ssl
30
31restrict-namespaces
diff --git a/etc/profile-m-z/patch.profile b/etc/profile-m-z/patch.profile
index 573410630..5a0f69f79 100644
--- a/etc/profile-m-z/patch.profile
+++ b/etc/profile-m-z/patch.profile
@@ -48,3 +48,4 @@ dbus-user none
48dbus-system none 48dbus-system none
49 49
50memory-deny-write-execute 50memory-deny-write-execute
51restrict-namespaces
diff --git a/etc/profile-m-z/pavucontrol.profile b/etc/profile-m-z/pavucontrol.profile
index d21157325..88cfd3352 100644
--- a/etc/profile-m-z/pavucontrol.profile
+++ b/etc/profile-m-z/pavucontrol.profile
@@ -53,3 +53,4 @@ dbus-system none
53 53
54# mdwe is broken under Wayland, but works under Xorg. 54# mdwe is broken under Wayland, but works under Xorg.
55#memory-deny-write-execute 55#memory-deny-write-execute
56restrict-namespaces
diff --git a/etc/profile-m-z/pcsxr.profile b/etc/profile-m-z/pcsxr.profile
index 9a1e7d420..784d82736 100644
--- a/etc/profile-m-z/pcsxr.profile
+++ b/etc/profile-m-z/pcsxr.profile
@@ -53,3 +53,5 @@ private-tmp
53 53
54dbus-user none 54dbus-user none
55dbus-system none 55dbus-system none
56
57restrict-namespaces
diff --git a/etc/profile-m-z/pdfchain.profile b/etc/profile-m-z/pdfchain.profile
index 0441c9e04..2e38dde3b 100644
--- a/etc/profile-m-z/pdfchain.profile
+++ b/etc/profile-m-z/pdfchain.profile
@@ -40,3 +40,4 @@ dbus-user none
40dbus-system none 40dbus-system none
41 41
42memory-deny-write-execute 42memory-deny-write-execute
43restrict-namespaces
diff --git a/etc/profile-m-z/pdfmod.profile b/etc/profile-m-z/pdfmod.profile
index 463deca4c..81115b2e3 100644
--- a/etc/profile-m-z/pdfmod.profile
+++ b/etc/profile-m-z/pdfmod.profile
@@ -41,3 +41,5 @@ private-tmp
41 41
42dbus-user none 42dbus-user none
43dbus-system none 43dbus-system none
44
45restrict-namespaces
diff --git a/etc/profile-m-z/pdfsam.profile b/etc/profile-m-z/pdfsam.profile
index 3e56a9c1d..34f8387af 100644
--- a/etc/profile-m-z/pdfsam.profile
+++ b/etc/profile-m-z/pdfsam.profile
@@ -41,3 +41,5 @@ private-tmp
41 41
42dbus-user none 42dbus-user none
43dbus-system none 43dbus-system none
44
45restrict-namespaces
diff --git a/etc/profile-m-z/pdftotext.profile b/etc/profile-m-z/pdftotext.profile
index 482181c86..7ece10835 100644
--- a/etc/profile-m-z/pdftotext.profile
+++ b/etc/profile-m-z/pdftotext.profile
@@ -53,3 +53,5 @@ private-tmp
53 53
54dbus-user none 54dbus-user none
55dbus-system none 55dbus-system none
56
57restrict-namespaces
diff --git a/etc/profile-m-z/peek.profile b/etc/profile-m-z/peek.profile
index 9809a488f..24a1bc979 100644
--- a/etc/profile-m-z/peek.profile
+++ b/etc/profile-m-z/peek.profile
@@ -59,3 +59,4 @@ dbus-user.talk org.gnome.Shell.Screencast
59dbus-system none 59dbus-system none
60 60
61memory-deny-write-execute 61memory-deny-write-execute
62restrict-namespaces
diff --git a/etc/profile-m-z/penguin-command.profile b/etc/profile-m-z/penguin-command.profile
index e79e5cbc8..c740f5576 100644
--- a/etc/profile-m-z/penguin-command.profile
+++ b/etc/profile-m-z/penguin-command.profile
@@ -39,3 +39,5 @@ private-tmp
39 39
40dbus-user none 40dbus-user none
41dbus-system none 41dbus-system none
42
43restrict-namespaces
diff --git a/etc/profile-m-z/photoflare.profile b/etc/profile-m-z/photoflare.profile
index 9f8e094fb..dcb52c846 100644
--- a/etc/profile-m-z/photoflare.profile
+++ b/etc/profile-m-z/photoflare.profile
@@ -47,3 +47,5 @@ private-tmp
47 47
48dbus-user none 48dbus-user none
49dbus-system none 49dbus-system none
50
51restrict-namespaces
diff --git a/etc/profile-m-z/picard.profile b/etc/profile-m-z/picard.profile
index 2350f83a2..b007e3ca9 100644
--- a/etc/profile-m-z/picard.profile
+++ b/etc/profile-m-z/picard.profile
@@ -40,3 +40,4 @@ seccomp
40private-dev 40private-dev
41private-tmp 41private-tmp
42 42
43restrict-namespaces
diff --git a/etc/profile-m-z/pidgin.profile b/etc/profile-m-z/pidgin.profile
index 904c17e09..2dc49a28d 100644
--- a/etc/profile-m-z/pidgin.profile
+++ b/etc/profile-m-z/pidgin.profile
@@ -45,3 +45,5 @@ tracelog
45private-cache 45private-cache
46private-dev 46private-dev
47private-tmp 47private-tmp
48
49restrict-namespaces
diff --git a/etc/profile-m-z/pinball.profile b/etc/profile-m-z/pinball.profile
index 440ee7800..3664e1469 100644
--- a/etc/profile-m-z/pinball.profile
+++ b/etc/profile-m-z/pinball.profile
@@ -52,3 +52,5 @@ private-tmp
52 52
53dbus-user none 53dbus-user none
54dbus-system none 54dbus-system none
55
56restrict-namespaces
diff --git a/etc/profile-m-z/ping-hardened.inc.profile b/etc/profile-m-z/ping-hardened.inc.profile
index eda53654a..e3288d2b1 100644
--- a/etc/profile-m-z/ping-hardened.inc.profile
+++ b/etc/profile-m-z/ping-hardened.inc.profile
@@ -9,3 +9,4 @@ protocol unix,inet,inet6
9seccomp 9seccomp
10 10
11memory-deny-write-execute 11memory-deny-write-execute
12restrict-namespaces
diff --git a/etc/profile-m-z/ping.profile b/etc/profile-m-z/ping.profile
index 07675650e..2a7967de7 100644
--- a/etc/profile-m-z/ping.profile
+++ b/etc/profile-m-z/ping.profile
@@ -57,7 +57,7 @@ private
57private-cache 57private-cache
58private-dev 58private-dev
59# /etc/hosts is required in private-etc; however, just adding it to the list doesn't solve the problem! 59# /etc/hosts is required in private-etc; however, just adding it to the list doesn't solve the problem!
60#private-etc ca-certificates,crypto-policies,hosts,pki,resolv.conf,ssl 60#private-etc alternatives,ca-certificates,crypto-policies,hosts,pki,resolv.conf,ssl
61private-lib 61private-lib
62private-tmp 62private-tmp
63 63
@@ -68,3 +68,4 @@ dbus-user none
68dbus-system none 68dbus-system none
69 69
70read-only ${HOME} 70read-only ${HOME}
71#restrict-namespaces
diff --git a/etc/profile-m-z/pingus.profile b/etc/profile-m-z/pingus.profile
index 14ac487ab..419dd5d1a 100644
--- a/etc/profile-m-z/pingus.profile
+++ b/etc/profile-m-z/pingus.profile
@@ -54,3 +54,5 @@ private-tmp
54 54
55dbus-user none 55dbus-user none
56dbus-system none 56dbus-system none
57
58restrict-namespaces
diff --git a/etc/profile-m-z/pinta.profile b/etc/profile-m-z/pinta.profile
index d5a1b1141..e084a7933 100644
--- a/etc/profile-m-z/pinta.profile
+++ b/etc/profile-m-z/pinta.profile
@@ -38,3 +38,5 @@ private-tmp
38 38
39dbus-user none 39dbus-user none
40dbus-system none 40dbus-system none
41
42restrict-namespaces
diff --git a/etc/profile-m-z/pioneer.profile b/etc/profile-m-z/pioneer.profile
index cf79adc6f..dc447def2 100644
--- a/etc/profile-m-z/pioneer.profile
+++ b/etc/profile-m-z/pioneer.profile
@@ -44,3 +44,5 @@ private-tmp
44 44
45dbus-user none 45dbus-user none
46dbus-system none 46dbus-system none
47
48restrict-namespaces
diff --git a/etc/profile-m-z/pithos.profile b/etc/profile-m-z/pithos.profile
index 9db4459e1..714ebd86d 100644
--- a/etc/profile-m-z/pithos.profile
+++ b/etc/profile-m-z/pithos.profile
@@ -40,3 +40,4 @@ private-bin env,pithos,python*
40private-dev 40private-dev
41private-tmp 41private-tmp
42 42
43restrict-namespaces
diff --git a/etc/profile-m-z/pitivi.profile b/etc/profile-m-z/pitivi.profile
index 773454c53..5ad20aafc 100644
--- a/etc/profile-m-z/pitivi.profile
+++ b/etc/profile-m-z/pitivi.profile
@@ -39,3 +39,4 @@ seccomp
39private-dev 39private-dev
40private-tmp 40private-tmp
41 41
42restrict-namespaces
diff --git a/etc/profile-m-z/pix.profile b/etc/profile-m-z/pix.profile
index fb426681e..49bd8c318 100644
--- a/etc/profile-m-z/pix.profile
+++ b/etc/profile-m-z/pix.profile
@@ -34,3 +34,5 @@ private-bin pix
34private-cache 34private-cache
35private-dev 35private-dev
36private-tmp 36private-tmp
37
38restrict-namespaces
diff --git a/etc/profile-m-z/pkglog.profile b/etc/profile-m-z/pkglog.profile
index 2af311269..88173edca 100644
--- a/etc/profile-m-z/pkglog.profile
+++ b/etc/profile-m-z/pkglog.profile
@@ -56,3 +56,4 @@ read-only ${HOME}
56read-only /var/log/apt/history.log 56read-only /var/log/apt/history.log
57read-only /var/log/dnf.rpm.log 57read-only /var/log/dnf.rpm.log
58read-only /var/log/pacman.log 58read-only /var/log/pacman.log
59restrict-namespaces
diff --git a/etc/profile-m-z/pluma.profile b/etc/profile-m-z/pluma.profile
index 0e4a06b44..efcdaa661 100644
--- a/etc/profile-m-z/pluma.profile
+++ b/etc/profile-m-z/pluma.profile
@@ -48,4 +48,5 @@ private-tmp
48# dbus-user none 48# dbus-user none
49# dbus-system none 49# dbus-system none
50 50
51restrict-namespaces
51join-or-start pluma 52join-or-start pluma
diff --git a/etc/profile-m-z/plv.profile b/etc/profile-m-z/plv.profile
index 2140d1a21..62927f9f7 100644
--- a/etc/profile-m-z/plv.profile
+++ b/etc/profile-m-z/plv.profile
@@ -57,3 +57,4 @@ dbus-system none
57read-only ${HOME} 57read-only ${HOME}
58read-write ${HOME}/.config/PacmanLogViewer 58read-write ${HOME}/.config/PacmanLogViewer
59read-only /var/log/pacman.log 59read-only /var/log/pacman.log
60restrict-namespaces
diff --git a/etc/profile-m-z/pngquant.profile b/etc/profile-m-z/pngquant.profile
index ad30c5703..8e2c39b83 100644
--- a/etc/profile-m-z/pngquant.profile
+++ b/etc/profile-m-z/pngquant.profile
@@ -53,3 +53,4 @@ dbus-user none
53dbus-system none 53dbus-system none
54 54
55memory-deny-write-execute 55memory-deny-write-execute
56restrict-namespaces
diff --git a/etc/profile-m-z/polari.profile b/etc/profile-m-z/polari.profile
index 068fd3412..dd730bf76 100644
--- a/etc/profile-m-z/polari.profile
+++ b/etc/profile-m-z/polari.profile
@@ -49,3 +49,4 @@ disable-mnt
49private-dev 49private-dev
50private-tmp 50private-tmp
51 51
52restrict-namespaces
diff --git a/etc/profile-m-z/ppsspp.profile b/etc/profile-m-z/ppsspp.profile
index bf5d9a9c3..58528c372 100644
--- a/etc/profile-m-z/ppsspp.profile
+++ b/etc/profile-m-z/ppsspp.profile
@@ -48,3 +48,5 @@ private-tmp
48 48
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51
52restrict-namespaces
diff --git a/etc/profile-m-z/pragha.profile b/etc/profile-m-z/pragha.profile
index 9faa1fcd6..73b377712 100644
--- a/etc/profile-m-z/pragha.profile
+++ b/etc/profile-m-z/pragha.profile
@@ -35,3 +35,4 @@ private-dev
35private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,machine-id,pki,pulse,resolv.conf,ssl,xdg 35private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,machine-id,pki,pulse,resolv.conf,ssl,xdg
36private-tmp 36private-tmp
37 37
38restrict-namespaces
diff --git a/etc/profile-m-z/profanity.profile b/etc/profile-m-z/profanity.profile
index 13f48b048..ddc6524a5 100644
--- a/etc/profile-m-z/profanity.profile
+++ b/etc/profile-m-z/profanity.profile
@@ -50,3 +50,4 @@ dbus-user none
50dbus-system none 50dbus-system none
51 51
52memory-deny-write-execute 52memory-deny-write-execute
53restrict-namespaces
diff --git a/etc/profile-m-z/psi-plus.profile b/etc/profile-m-z/psi-plus.profile
index 8f8b2fff4..af117c3b5 100644
--- a/etc/profile-m-z/psi-plus.profile
+++ b/etc/profile-m-z/psi-plus.profile
@@ -42,3 +42,5 @@ seccomp !chroot
42disable-mnt 42disable-mnt
43private-dev 43private-dev
44private-tmp 44private-tmp
45
46# restrict-namespaces
diff --git a/etc/profile-m-z/psi.profile b/etc/profile-m-z/psi.profile
index 943b8d3ac..be06c5d89 100644
--- a/etc/profile-m-z/psi.profile
+++ b/etc/profile-m-z/psi.profile
@@ -75,3 +75,5 @@ private-tmp
75 75
76dbus-user none 76dbus-user none
77dbus-system none 77dbus-system none
78
79#restrict-namespaces
diff --git a/etc/profile-m-z/pybitmessage.profile b/etc/profile-m-z/pybitmessage.profile
index 358cc36da..ba71ab29d 100644
--- a/etc/profile-m-z/pybitmessage.profile
+++ b/etc/profile-m-z/pybitmessage.profile
@@ -43,3 +43,4 @@ private-dev
43private-etc alternatives,ca-certificates,crypto-policies,fonts,gtk-2.0,hosts,ld.so.cache,ld.so.preload,localtime,pki,pki,PyBitmessage,PyBitmessage.conf,resolv.conf,selinux,sni-qt.conf,ssl,system-fips,Trolltech.conf,xdg 43private-etc alternatives,ca-certificates,crypto-policies,fonts,gtk-2.0,hosts,ld.so.cache,ld.so.preload,localtime,pki,pki,PyBitmessage,PyBitmessage.conf,resolv.conf,selinux,sni-qt.conf,ssl,system-fips,Trolltech.conf,xdg
44private-tmp 44private-tmp
45 45
46restrict-namespaces
diff --git a/etc/profile-m-z/pycharm-community.profile b/etc/profile-m-z/pycharm-community.profile
index 629396aaa..875b83e8e 100644
--- a/etc/profile-m-z/pycharm-community.profile
+++ b/etc/profile-m-z/pycharm-community.profile
@@ -5,7 +5,13 @@ include pycharm-community.local
5# Persistent global definitions 5# Persistent global definitions
6include globals.local 6include globals.local
7 7
8noblacklist ${HOME}/.PyCharmCE* 8noblacklist ${HOME}/.PyCharm*
9# Persistent cache is needed for spell and grammar checkers, etc.
10noblacklist ${HOME}/.cache/JetBrains/PyCharm*
11noblacklist ${HOME}/.config/JetBrains/PyCharm*
12# Not `PyCharm*`, because the state about of "anonymous data sent" is shared
13# between JetBrains IDEs.
14noblacklist ${HOME}/.local/share/JetBrains
9 15
10# Allow java (blacklisted by disable-devel.inc) 16# Allow java (blacklisted by disable-devel.inc)
11include allow-java.inc 17include allow-java.inc
@@ -30,7 +36,6 @@ tracelog
30 36
31# private-etc alternatives,fonts,passwd - minimal required to run but will probably break 37# private-etc alternatives,fonts,passwd - minimal required to run but will probably break
32# program! 38# program!
33private-cache
34private-dev 39private-dev
35private-tmp 40private-tmp
36 41
diff --git a/etc/profile-m-z/pycharm-professional.profile b/etc/profile-m-z/pycharm-professional.profile
index b754a18c9..126f5cec8 100644
--- a/etc/profile-m-z/pycharm-professional.profile
+++ b/etc/profile-m-z/pycharm-professional.profile
@@ -6,7 +6,5 @@ include pyucharm-professional.local
6# added by included profile 6# added by included profile
7#include globals.local 7#include globals.local
8 8
9noblacklist ${HOME}/.PyCharm*
10
11# Redirect 9# Redirect
12include pycharm-community.profile 10include pycharm-community.profile
diff --git a/etc/profile-m-z/qbittorrent.profile b/etc/profile-m-z/qbittorrent.profile
index e064c7023..9605da3ac 100644
--- a/etc/profile-m-z/qbittorrent.profile
+++ b/etc/profile-m-z/qbittorrent.profile
@@ -1,5 +1,5 @@
1# Firejail profile for qbittorrent 1# Firejail profile for qbittorrent
2# Description: BitTorrent client based on libtorrent-rasterbar with a Qt5 GUI 2# Description: An advanced BitTorrent client programmed in C++, based on Qt toolkit and libtorrent-rasterbar
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include qbittorrent.local 5include qbittorrent.local
@@ -63,3 +63,4 @@ dbus-user none
63dbus-system none 63dbus-system none
64 64
65# memory-deny-write-execute - problems on Arch, see #1690 on GitHub repo 65# memory-deny-write-execute - problems on Arch, see #1690 on GitHub repo
66restrict-namespaces
diff --git a/etc/profile-m-z/qcomicbook.profile b/etc/profile-m-z/qcomicbook.profile
index f24916630..71374a8c8 100644
--- a/etc/profile-m-z/qcomicbook.profile
+++ b/etc/profile-m-z/qcomicbook.profile
@@ -64,3 +64,4 @@ read-write ${HOME}/.config/PawelStolowski
64read-write ${HOME}/.local/share/PawelStolowski 64read-write ${HOME}/.local/share/PawelStolowski
65#to allow ${HOME}/.local/share/recently-used.xbel 65#to allow ${HOME}/.local/share/recently-used.xbel
66read-write ${HOME}/.local/share 66read-write ${HOME}/.local/share
67restrict-namespaces
diff --git a/etc/profile-m-z/qemu-launcher.profile b/etc/profile-m-z/qemu-launcher.profile
index 034a2b7c1..8484d3705 100644
--- a/etc/profile-m-z/qemu-launcher.profile
+++ b/etc/profile-m-z/qemu-launcher.profile
@@ -25,3 +25,4 @@ private-cache
25private-tmp 25private-tmp
26 26
27noexec /tmp 27noexec /tmp
28restrict-namespaces
diff --git a/etc/profile-m-z/qemu-system-x86_64.profile b/etc/profile-m-z/qemu-system-x86_64.profile
index e565e0165..495c469f7 100644
--- a/etc/profile-m-z/qemu-system-x86_64.profile
+++ b/etc/profile-m-z/qemu-system-x86_64.profile
@@ -24,3 +24,4 @@ private-cache
24private-tmp 24private-tmp
25 25
26noexec /tmp 26noexec /tmp
27restrict-namespaces
diff --git a/etc/profile-m-z/qgis.profile b/etc/profile-m-z/qgis.profile
index 2f8c42548..d4b71f972 100644
--- a/etc/profile-m-z/qgis.profile
+++ b/etc/profile-m-z/qgis.profile
@@ -56,3 +56,5 @@ private-tmp
56 56
57dbus-user none 57dbus-user none
58dbus-system none 58dbus-system none
59
60restrict-namespaces
diff --git a/etc/profile-m-z/qlipper.profile b/etc/profile-m-z/qlipper.profile
index d0a14b079..f183f6e0e 100644
--- a/etc/profile-m-z/qlipper.profile
+++ b/etc/profile-m-z/qlipper.profile
@@ -35,3 +35,4 @@ private-cache
35private-dev 35private-dev
36private-tmp 36private-tmp
37 37
38restrict-namespaces
diff --git a/etc/profile-m-z/qmmp.profile b/etc/profile-m-z/qmmp.profile
index a3fd56186..ecd62a7d1 100644
--- a/etc/profile-m-z/qmmp.profile
+++ b/etc/profile-m-z/qmmp.profile
@@ -36,3 +36,5 @@ private-tmp
36 36
37dbus-user none 37dbus-user none
38dbus-system none 38dbus-system none
39
40restrict-namespaces
diff --git a/etc/profile-m-z/qnapi.profile b/etc/profile-m-z/qnapi.profile
index f6576ae2f..037cc96ec 100644
--- a/etc/profile-m-z/qnapi.profile
+++ b/etc/profile-m-z/qnapi.profile
@@ -52,3 +52,5 @@ private-tmp
52 52
53dbus-user none 53dbus-user none
54dbus-system none 54dbus-system none
55
56restrict-namespaces
diff --git a/etc/profile-m-z/qpdfview.profile b/etc/profile-m-z/qpdfview.profile
index 17142a47f..4caa0917f 100644
--- a/etc/profile-m-z/qpdfview.profile
+++ b/etc/profile-m-z/qpdfview.profile
@@ -43,3 +43,5 @@ private-tmp
43# needs D-Bus when started from a file manager 43# needs D-Bus when started from a file manager
44# dbus-user none 44# dbus-user none
45# dbus-system none 45# dbus-system none
46
47restrict-namespaces
diff --git a/etc/profile-m-z/qrencode.profile b/etc/profile-m-z/qrencode.profile
index e7566cbe4..09b70756b 100644
--- a/etc/profile-m-z/qrencode.profile
+++ b/etc/profile-m-z/qrencode.profile
@@ -54,3 +54,4 @@ dbus-user none
54dbus-system none 54dbus-system none
55 55
56memory-deny-write-execute 56memory-deny-write-execute
57restrict-namespaces
diff --git a/etc/profile-m-z/qtox.profile b/etc/profile-m-z/qtox.profile
index c0d737f00..f95720d71 100644
--- a/etc/profile-m-z/qtox.profile
+++ b/etc/profile-m-z/qtox.profile
@@ -49,3 +49,4 @@ dbus-user none
49dbus-system none 49dbus-system none
50 50
51#memory-deny-write-execute - breaks on Arch (see issue #1803) 51#memory-deny-write-execute - breaks on Arch (see issue #1803)
52restrict-namespaces
diff --git a/etc/profile-m-z/quassel.profile b/etc/profile-m-z/quassel.profile
index c65089e20..4589c9e4a 100644
--- a/etc/profile-m-z/quassel.profile
+++ b/etc/profile-m-z/quassel.profile
@@ -24,3 +24,5 @@ seccomp !chroot
24 24
25private-cache 25private-cache
26private-tmp 26private-tmp
27
28# restrict-namespaces
diff --git a/etc/profile-m-z/quaternion.profile b/etc/profile-m-z/quaternion.profile
index 686562646..ad45a26d5 100644
--- a/etc/profile-m-z/quaternion.profile
+++ b/etc/profile-m-z/quaternion.profile
@@ -51,3 +51,5 @@ private-tmp
51 51
52dbus-user none 52dbus-user none
53dbus-system none 53dbus-system none
54
55restrict-namespaces
diff --git a/etc/profile-m-z/quiterss.profile b/etc/profile-m-z/quiterss.profile
index 761eb7215..a59f01f85 100644
--- a/etc/profile-m-z/quiterss.profile
+++ b/etc/profile-m-z/quiterss.profile
@@ -52,3 +52,4 @@ private-bin quiterss
52private-dev 52private-dev
53# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl,X11 53# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl,X11
54 54
55restrict-namespaces
diff --git a/etc/profile-m-z/quodlibet.profile b/etc/profile-m-z/quodlibet.profile
index 345e85cdf..ea49684e3 100644
--- a/etc/profile-m-z/quodlibet.profile
+++ b/etc/profile-m-z/quodlibet.profile
@@ -63,3 +63,5 @@ private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,dconf,
63private-tmp 63private-tmp
64 64
65dbus-system none 65dbus-system none
66
67restrict-namespaces
diff --git a/etc/profile-m-z/qutebrowser.profile b/etc/profile-m-z/qutebrowser.profile
index ae62c0b89..b83a0ce2d 100644
--- a/etc/profile-m-z/qutebrowser.profile
+++ b/etc/profile-m-z/qutebrowser.profile
@@ -31,7 +31,7 @@ whitelist ${DOWNLOADS}
31whitelist ${HOME}/.cache/qutebrowser 31whitelist ${HOME}/.cache/qutebrowser
32whitelist ${HOME}/.config/qutebrowser 32whitelist ${HOME}/.config/qutebrowser
33whitelist ${HOME}/.local/share/qutebrowser 33whitelist ${HOME}/.local/share/qutebrowser
34whitelist /usr/share/qtbrowser 34whitelist /usr/share/qutebrowser
35include whitelist-common.inc 35include whitelist-common.inc
36include whitelist-run-common.inc 36include whitelist-run-common.inc
37include whitelist-runuser-common.inc 37include whitelist-runuser-common.inc
@@ -48,7 +48,7 @@ notv
48protocol unix,inet,inet6,netlink 48protocol unix,inet,inet6,netlink
49# blacklisting of chroot system calls breaks qt webengine 49# blacklisting of chroot system calls breaks qt webengine
50seccomp !chroot,!name_to_handle_at 50seccomp !chroot,!name_to_handle_at
51# tracelog 51#tracelog
52 52
53disable-mnt 53disable-mnt
54private-cache 54private-cache
@@ -65,3 +65,5 @@ dbus-user.talk org.freedesktop.Notifications
65# with the above lines (might depend on the portal implementation). 65# with the above lines (might depend on the portal implementation).
66#ignore noroot 66#ignore noroot
67dbus-system none 67dbus-system none
68
69#restrict-namespaces
diff --git a/etc/profile-m-z/raincat.profile b/etc/profile-m-z/raincat.profile
index 3042d5e3f..e320d82f7 100644
--- a/etc/profile-m-z/raincat.profile
+++ b/etc/profile-m-z/raincat.profile
@@ -46,3 +46,4 @@ private-tmp
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48 48
49restrict-namespaces
diff --git a/etc/profile-m-z/rambox.profile b/etc/profile-m-z/rambox.profile
index a14d7862b..38a093337 100644
--- a/etc/profile-m-z/rambox.profile
+++ b/etc/profile-m-z/rambox.profile
@@ -35,4 +35,6 @@ protocol unix,inet,inet6,netlink
35# electron-based application, needing chroot 35# electron-based application, needing chroot
36#seccomp 36#seccomp
37seccomp !chroot 37seccomp !chroot
38# tracelog 38#tracelog
39
40#restrict-namespaces
diff --git a/etc/profile-m-z/redeclipse.profile b/etc/profile-m-z/redeclipse.profile
index e738d8cb3..774b46b28 100644
--- a/etc/profile-m-z/redeclipse.profile
+++ b/etc/profile-m-z/redeclipse.profile
@@ -45,3 +45,5 @@ private-tmp
45 45
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48
49restrict-namespaces
diff --git a/etc/profile-m-z/rednotebook.profile b/etc/profile-m-z/rednotebook.profile
index 7ee79d4c5..1295ce00d 100644
--- a/etc/profile-m-z/rednotebook.profile
+++ b/etc/profile-m-z/rednotebook.profile
@@ -63,3 +63,5 @@ private-tmp
63 63
64dbus-user none 64dbus-user none
65dbus-system none 65dbus-system none
66
67restrict-namespaces
diff --git a/etc/profile-m-z/redshift.profile b/etc/profile-m-z/redshift.profile
index e5564a532..cfc68a697 100644
--- a/etc/profile-m-z/redshift.profile
+++ b/etc/profile-m-z/redshift.profile
@@ -50,3 +50,4 @@ dbus-user none
50dbus-system none 50dbus-system none
51 51
52memory-deny-write-execute 52memory-deny-write-execute
53restrict-namespaces
diff --git a/etc/profile-m-z/regextester.profile b/etc/profile-m-z/regextester.profile
index 82653c209..571381f57 100644
--- a/etc/profile-m-z/regextester.profile
+++ b/etc/profile-m-z/regextester.profile
@@ -52,3 +52,4 @@ dbus-system none
52 52
53# never write anything 53# never write anything
54read-only ${HOME} 54read-only ${HOME}
55restrict-namespaces
diff --git a/etc/profile-m-z/remmina.profile b/etc/profile-m-z/remmina.profile
index 79630f09c..208f57710 100644
--- a/etc/profile-m-z/remmina.profile
+++ b/etc/profile-m-z/remmina.profile
@@ -42,3 +42,4 @@ private-cache
42private-dev 42private-dev
43private-tmp 43private-tmp
44 44
45restrict-namespaces
diff --git a/etc/profile-m-z/retroarch.profile b/etc/profile-m-z/retroarch.profile
index cb5544f5f..91486dc23 100644
--- a/etc/profile-m-z/retroarch.profile
+++ b/etc/profile-m-z/retroarch.profile
@@ -51,3 +51,5 @@ private-tmp
51 51
52dbus-user none 52dbus-user none
53dbus-system none 53dbus-system none
54
55restrict-namespaces
diff --git a/etc/profile-m-z/rhythmbox.profile b/etc/profile-m-z/rhythmbox.profile
index b4eabf7ee..dccd93429 100644
--- a/etc/profile-m-z/rhythmbox.profile
+++ b/etc/profile-m-z/rhythmbox.profile
@@ -63,3 +63,5 @@ dbus-user.talk org.freedesktop.Notifications
63dbus-user.talk org.gnome.SettingsDaemon.MediaKeys 63dbus-user.talk org.gnome.SettingsDaemon.MediaKeys
64dbus-system filter 64dbus-system filter
65dbus-system.talk org.freedesktop.Avahi 65dbus-system.talk org.freedesktop.Avahi
66
67restrict-namespaces
diff --git a/etc/profile-m-z/ricochet.profile b/etc/profile-m-z/ricochet.profile
index a05c1f310..d5cb77fff 100644
--- a/etc/profile-m-z/ricochet.profile
+++ b/etc/profile-m-z/ricochet.profile
@@ -39,3 +39,4 @@ private-bin ricochet,tor
39private-dev 39private-dev
40#private-etc alternatives,alternatives,ca-certificates,crypto-policies,fonts,pki,ssl,tor,X11 40#private-etc alternatives,alternatives,ca-certificates,crypto-policies,fonts,pki,ssl,tor,X11
41 41
42restrict-namespaces
diff --git a/etc/profile-m-z/ripperx.profile b/etc/profile-m-z/ripperx.profile
index 5740fcfc4..33878e999 100644
--- a/etc/profile-m-z/ripperx.profile
+++ b/etc/profile-m-z/ripperx.profile
@@ -40,3 +40,5 @@ private-tmp
40 40
41dbus-user none 41dbus-user none
42dbus-system none 42dbus-system none
43
44restrict-namespaces
diff --git a/etc/profile-m-z/ristretto.profile b/etc/profile-m-z/ristretto.profile
index 6dcf2121b..4562616d2 100644
--- a/etc/profile-m-z/ristretto.profile
+++ b/etc/profile-m-z/ristretto.profile
@@ -39,3 +39,4 @@ private-cache
39private-dev 39private-dev
40private-tmp 40private-tmp
41 41
42restrict-namespaces
diff --git a/etc/profile-m-z/rpcs3.profile b/etc/profile-m-z/rpcs3.profile
index 8d0b4e470..186e31b46 100644
--- a/etc/profile-m-z/rpcs3.profile
+++ b/etc/profile-m-z/rpcs3.profile
@@ -54,8 +54,10 @@ tracelog
54 54
55disable-mnt 55disable-mnt
56#private-cache 56#private-cache
57#private-etc ca-certificates,crypto-policies,machine-id,pki,resolv.conf,ssl # seems to need awk 57#private-etc alternatives,ca-certificates,crypto-policies,machine-id,pki,resolv.conf,ssl # seems to need awk
58private-tmp 58private-tmp
59 59
60dbus-user none 60dbus-user none
61dbus-system none 61dbus-system none
62
63restrict-namespaces
diff --git a/etc/profile-m-z/rsync-download_only.profile b/etc/profile-m-z/rsync-download_only.profile
index a3cb0122c..91b18678f 100644
--- a/etc/profile-m-z/rsync-download_only.profile
+++ b/etc/profile-m-z/rsync-download_only.profile
@@ -55,3 +55,4 @@ dbus-user none
55dbus-system none 55dbus-system none
56 56
57memory-deny-write-execute 57memory-deny-write-execute
58restrict-namespaces
diff --git a/etc/profile-m-z/rtin.profile b/etc/profile-m-z/rtin.profile
index cd84ce05e..87aa69bcb 100644
--- a/etc/profile-m-z/rtin.profile
+++ b/etc/profile-m-z/rtin.profile
@@ -5,4 +5,5 @@
5# Persistent local customizations 5# Persistent local customizations
6include rtin.local 6include rtin.local
7 7
8# Redirect
8include tin.profile 9include tin.profile
diff --git a/etc/profile-m-z/rtorrent.profile b/etc/profile-m-z/rtorrent.profile
index 8c52e3161..a1c735645 100644
--- a/etc/profile-m-z/rtorrent.profile
+++ b/etc/profile-m-z/rtorrent.profile
@@ -31,3 +31,5 @@ private-bin rtorrent
31private-cache 31private-cache
32private-dev 32private-dev
33private-tmp 33private-tmp
34
35restrict-namespaces
diff --git a/etc/profile-m-z/rtv.profile b/etc/profile-m-z/rtv.profile
index c4047ebd4..565925e7a 100644
--- a/etc/profile-m-z/rtv.profile
+++ b/etc/profile-m-z/rtv.profile
@@ -62,3 +62,5 @@ private-etc alternatives,ca-certificates,crypto-policies,host.conf,hostname,host
62 62
63dbus-user none 63dbus-user none
64dbus-system none 64dbus-system none
65
66restrict-namespaces
diff --git a/etc/profile-m-z/sayonara.profile b/etc/profile-m-z/sayonara.profile
index c299dd13a..f7ef54f5c 100644
--- a/etc/profile-m-z/sayonara.profile
+++ b/etc/profile-m-z/sayonara.profile
@@ -33,3 +33,4 @@ private-bin sayonara
33private-dev 33private-dev
34private-tmp 34private-tmp
35 35
36restrict-namespaces
diff --git a/etc/profile-m-z/scallion.profile b/etc/profile-m-z/scallion.profile
index f8f9c681c..8f5c00f4a 100644
--- a/etc/profile-m-z/scallion.profile
+++ b/etc/profile-m-z/scallion.profile
@@ -41,3 +41,5 @@ private-tmp
41 41
42dbus-user none 42dbus-user none
43dbus-system none 43dbus-system none
44
45restrict-namespaces
diff --git a/etc/profile-m-z/scorched3d.profile b/etc/profile-m-z/scorched3d.profile
index 838286665..a1a0176b9 100644
--- a/etc/profile-m-z/scorched3d.profile
+++ b/etc/profile-m-z/scorched3d.profile
@@ -47,3 +47,5 @@ private-tmp
47 47
48dbus-user none 48dbus-user none
49dbus-system none 49dbus-system none
50
51restrict-namespaces
diff --git a/etc/profile-m-z/scorchwentbonkers.profile b/etc/profile-m-z/scorchwentbonkers.profile
index 316bad98a..6dfb50c5a 100644
--- a/etc/profile-m-z/scorchwentbonkers.profile
+++ b/etc/profile-m-z/scorchwentbonkers.profile
@@ -47,3 +47,5 @@ private-tmp
47 47
48dbus-user none 48dbus-user none
49dbus-system none 49dbus-system none
50
51restrict-namespaces
diff --git a/etc/profile-m-z/scribus.profile b/etc/profile-m-z/scribus.profile
index b9d1e59aa..34cf783fe 100644
--- a/etc/profile-m-z/scribus.profile
+++ b/etc/profile-m-z/scribus.profile
@@ -61,3 +61,5 @@ private-tmp
61 61
62dbus-user none 62dbus-user none
63dbus-system none 63dbus-system none
64
65restrict-namespaces
diff --git a/etc/profile-m-z/sdat2img.profile b/etc/profile-m-z/sdat2img.profile
index a353bc495..c0f9e8aa5 100644
--- a/etc/profile-m-z/sdat2img.profile
+++ b/etc/profile-m-z/sdat2img.profile
@@ -41,3 +41,5 @@ private-dev
41 41
42dbus-user none 42dbus-user none
43dbus-system none 43dbus-system none
44
45restrict-namespaces
diff --git a/etc/profile-m-z/seafile-applet.profile b/etc/profile-m-z/seafile-applet.profile
index 00ae021fd..184a06958 100644
--- a/etc/profile-m-z/seafile-applet.profile
+++ b/etc/profile-m-z/seafile-applet.profile
@@ -59,3 +59,5 @@ private-tmp
59 59
60dbus-user none 60dbus-user none
61dbus-system none 61dbus-system none
62
63restrict-namespaces
diff --git a/etc/profile-m-z/seahorse-adventures.profile b/etc/profile-m-z/seahorse-adventures.profile
index 45b12f2c8..7ff252ec7 100644
--- a/etc/profile-m-z/seahorse-adventures.profile
+++ b/etc/profile-m-z/seahorse-adventures.profile
@@ -52,3 +52,5 @@ private-tmp
52 52
53dbus-user none 53dbus-user none
54dbus-system none 54dbus-system none
55
56restrict-namespaces
diff --git a/etc/profile-m-z/seahorse-daemon.profile b/etc/profile-m-z/seahorse-daemon.profile
index 6410da4d8..b3ead7191 100644
--- a/etc/profile-m-z/seahorse-daemon.profile
+++ b/etc/profile-m-z/seahorse-daemon.profile
@@ -8,6 +8,9 @@ include seahorse-daemon.local
8# added by included profile 8# added by included profile
9#include globals.local 9#include globals.local
10 10
11blacklist ${RUNUSER}/wayland-*
12include disable-X11.inc
13
11memory-deny-write-execute 14memory-deny-write-execute
12 15
13# Redirect 16# Redirect
diff --git a/etc/profile-m-z/seahorse-tool.profile b/etc/profile-m-z/seahorse-tool.profile
index 9ef174606..e5c9e6b10 100644
--- a/etc/profile-m-z/seahorse-tool.profile
+++ b/etc/profile-m-z/seahorse-tool.profile
@@ -7,9 +7,5 @@ include seahorse-tool.local
7# added by included profile 7# added by included profile
8#include globals.local 8#include globals.local
9 9
10# private-etc workaround for: #2877
11private-etc alternatives,firejail,ld.so.cache,ld.so.preload,login.defs,passwd
12private-tmp
13
14# Redirect 10# Redirect
15include seahorse.profile 11include seahorse.profile
diff --git a/etc/profile-m-z/seahorse.profile b/etc/profile-m-z/seahorse.profile
index af7abc1d9..e6f51bff9 100644
--- a/etc/profile-m-z/seahorse.profile
+++ b/etc/profile-m-z/seahorse.profile
@@ -6,8 +6,6 @@ include seahorse.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist /tmp/.X11-unix
10
11noblacklist ${HOME}/.gnupg 9noblacklist ${HOME}/.gnupg
12 10
13# Allow ssh (blacklisted by disable-common.inc) 11# Allow ssh (blacklisted by disable-common.inc)
@@ -59,11 +57,15 @@ tracelog
59disable-mnt 57disable-mnt
60private-cache 58private-cache
61private-dev 59private-dev
62private-etc alternatives,ca-certificates,crypto-policies,dconf,fonts,gconf,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,nsswitch.conf,pango,pki,protocols,resolv.conf,rpc,services,ssh,ssl,X11 60private-etc alternatives,ca-certificates,crypto-policies,dconf,fonts,gconf,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,login.defs,nsswitch.conf,pango,passwd,pkcs11,pki,protocols,resolv.conf,rpc,services,ssh,ssl,xdg
61private-tmp
63writable-run-user 62writable-run-user
64 63
65dbus-user filter 64dbus-user filter
66dbus-user.own org.gnome.seahorse 65dbus-user.own org.gnome.seahorse
67dbus-user.own org.gnome.seahorse.Application 66dbus-user.own org.gnome.seahorse.Application
67dbus-user.talk ca.desrt.dconf
68dbus-user.talk org.freedesktop.secrets 68dbus-user.talk org.freedesktop.secrets
69dbus-system none 69dbus-system none
70
71restrict-namespaces
diff --git a/etc/profile-m-z/seamonkey.profile b/etc/profile-m-z/seamonkey.profile
index 5210a594c..c2dbbc2c6 100644
--- a/etc/profile-m-z/seamonkey.profile
+++ b/etc/profile-m-z/seamonkey.profile
@@ -57,3 +57,5 @@ tracelog
57disable-mnt 57disable-mnt
58# private-etc adobe,alternatives,asound.conf,ca-certificates,crypto-policies,firefox,fonts,group,gtk-2.0,hostname,hosts,iceweasel,localtime,machine-id,mailcap,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,ssl 58# private-etc adobe,alternatives,asound.conf,ca-certificates,crypto-policies,firefox,fonts,group,gtk-2.0,hostname,hosts,iceweasel,localtime,machine-id,mailcap,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,ssl
59writable-run-user 59writable-run-user
60
61restrict-namespaces
diff --git a/etc/profile-m-z/server.profile b/etc/profile-m-z/server.profile
index 8d8a1dac6..5b71fe6c3 100644
--- a/etc/profile-m-z/server.profile
+++ b/etc/profile-m-z/server.profile
@@ -83,6 +83,9 @@ private-dev
83# private-lib 83# private-lib
84# private-opt none 84# private-opt none
85private-tmp 85private-tmp
86# writable-run-user
87# writable-var
88# writable-var-log
86 89
87dbus-user none 90dbus-user none
88# dbus-system none 91# dbus-system none
@@ -90,7 +93,4 @@ dbus-user none
90# deterministic-shutdown 93# deterministic-shutdown
91# memory-deny-write-execute 94# memory-deny-write-execute
92# read-only ${HOME} 95# read-only ${HOME}
93# restrict-namespaces 96restrict-namespaces
94# writable-run-user
95# writable-var
96# writable-var-log
diff --git a/etc/profile-m-z/servo.profile b/etc/profile-m-z/servo.profile
index 6eeba9eb6..65fef339e 100644
--- a/etc/profile-m-z/servo.profile
+++ b/etc/profile-m-z/servo.profile
@@ -46,3 +46,5 @@ private-tmp
46 46
47dbus-user none 47dbus-user none
48dbus-system none 48dbus-system none
49
50restrict-namespaces
diff --git a/etc/profile-m-z/shellcheck.profile b/etc/profile-m-z/shellcheck.profile
index 49c4646ed..cf6b37db6 100644
--- a/etc/profile-m-z/shellcheck.profile
+++ b/etc/profile-m-z/shellcheck.profile
@@ -49,3 +49,5 @@ private-tmp
49 49
50dbus-user none 50dbus-user none
51dbus-system none 51dbus-system none
52
53restrict-namespaces
diff --git a/etc/profile-m-z/shortwave.profile b/etc/profile-m-z/shortwave.profile
index 22cb272c5..cd2a9f13e 100644
--- a/etc/profile-m-z/shortwave.profile
+++ b/etc/profile-m-z/shortwave.profile
@@ -47,3 +47,5 @@ private-cache
47private-dev 47private-dev
48private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,gconf,group,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,machine-id,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,ssl,X11,xdg 48private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,gconf,group,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,machine-id,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,ssl,X11,xdg
49private-tmp 49private-tmp
50
51restrict-namespaces
diff --git a/etc/profile-m-z/shotcut.profile b/etc/profile-m-z/shotcut.profile
index e2cbce2f5..ec0380ce7 100644
--- a/etc/profile-m-z/shotcut.profile
+++ b/etc/profile-m-z/shotcut.profile
@@ -35,3 +35,5 @@ private-dev
35 35
36dbus-user none 36dbus-user none
37dbus-system none 37dbus-system none
38
39restrict-namespaces
diff --git a/etc/profile-m-z/shotwell.profile b/etc/profile-m-z/shotwell.profile
index 44898a2e9..d33a97ffc 100644
--- a/etc/profile-m-z/shotwell.profile
+++ b/etc/profile-m-z/shotwell.profile
@@ -57,3 +57,5 @@ dbus-user.own org.gnome.Shotwell
57dbus-user.talk ca.desrt.dconf 57dbus-user.talk ca.desrt.dconf
58dbus-user.talk org.gtk.vfs.UDisks2VolumeMonitor 58dbus-user.talk org.gtk.vfs.UDisks2VolumeMonitor
59dbus-system none 59dbus-system none
60
61restrict-namespaces
diff --git a/etc/profile-m-z/signal-cli.profile b/etc/profile-m-z/signal-cli.profile
index b70275d0d..d2b604df5 100644
--- a/etc/profile-m-z/signal-cli.profile
+++ b/etc/profile-m-z/signal-cli.profile
@@ -48,3 +48,5 @@ private-dev
48# Does not work with all Java configurations. You will notice immediately, so you might want to give it a try 48# Does not work with all Java configurations. You will notice immediately, so you might want to give it a try
49#private-etc alternatives,ca-certificates,crypto-policies,dbus-1,host.conf,hostname,hosts,java-10-openjdk,java-7-openjdk,java-8-openjdk,java-9-openjdk,java.conf,machine-id,nsswitch.conf,passwd,pki,protocols,resolv.conf,rpc,services,ssl 49#private-etc alternatives,ca-certificates,crypto-policies,dbus-1,host.conf,hostname,hosts,java-10-openjdk,java-7-openjdk,java-8-openjdk,java-9-openjdk,java.conf,machine-id,nsswitch.conf,passwd,pki,protocols,resolv.conf,rpc,services,ssl
50private-tmp 50private-tmp
51
52restrict-namespaces
diff --git a/etc/profile-m-z/silentarmy.profile b/etc/profile-m-z/silentarmy.profile
index 74a51208c..96e4cf283 100644
--- a/etc/profile-m-z/silentarmy.profile
+++ b/etc/profile-m-z/silentarmy.profile
@@ -37,3 +37,4 @@ private-dev
37private-opt none 37private-opt none
38private-tmp 38private-tmp
39 39
40restrict-namespaces
diff --git a/etc/profile-m-z/simple-scan.profile b/etc/profile-m-z/simple-scan.profile
index 4d13a3ad3..14846cf58 100644
--- a/etc/profile-m-z/simple-scan.profile
+++ b/etc/profile-m-z/simple-scan.profile
@@ -38,3 +38,5 @@ tracelog
38# private-dev 38# private-dev
39# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl 39# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl
40# private-tmp 40# private-tmp
41
42restrict-namespaces
diff --git a/etc/profile-m-z/simplescreenrecorder.profile b/etc/profile-m-z/simplescreenrecorder.profile
index a68de8f40..6ee9ea6ba 100644
--- a/etc/profile-m-z/simplescreenrecorder.profile
+++ b/etc/profile-m-z/simplescreenrecorder.profile
@@ -36,3 +36,5 @@ tracelog
36private-cache 36private-cache
37private-dev 37private-dev
38private-tmp 38private-tmp
39
40restrict-namespaces
diff --git a/etc/profile-m-z/simutrans.profile b/etc/profile-m-z/simutrans.profile
index 733ea6413..6ba735556 100644
--- a/etc/profile-m-z/simutrans.profile
+++ b/etc/profile-m-z/simutrans.profile
@@ -39,3 +39,5 @@ private-tmp
39 39
40dbus-user none 40dbus-user none
41dbus-system none 41dbus-system none
42
43restrict-namespaces
diff --git a/etc/profile-m-z/skanlite.profile b/etc/profile-m-z/skanlite.profile
index 1e60fb083..6b73b2289 100644
--- a/etc/profile-m-z/skanlite.profile
+++ b/etc/profile-m-z/skanlite.profile
@@ -33,3 +33,5 @@ seccomp !ioperm
33 33
34# dbus-user none 34# dbus-user none
35# dbus-system none 35# dbus-system none
36
37restrict-namespaces
diff --git a/etc/profile-m-z/slashem.profile b/etc/profile-m-z/slashem.profile
index 8ec692657..3ad182b9e 100644
--- a/etc/profile-m-z/slashem.profile
+++ b/etc/profile-m-z/slashem.profile
@@ -44,3 +44,4 @@ dbus-user none
44dbus-system none 44dbus-system none
45 45
46#memory-deny-write-execute 46#memory-deny-write-execute
47#restrict-namespaces
diff --git a/etc/profile-m-z/smplayer.profile b/etc/profile-m-z/smplayer.profile
index 00770798e..0ab398ebd 100644
--- a/etc/profile-m-z/smplayer.profile
+++ b/etc/profile-m-z/smplayer.profile
@@ -52,3 +52,5 @@ private-tmp
52# problems with KDE 52# problems with KDE
53# dbus-user none 53# dbus-user none
54# dbus-system none 54# dbus-system none
55
56restrict-namespaces
diff --git a/etc/profile-m-z/smtube.profile b/etc/profile-m-z/smtube.profile
index a3a519511..b617444af 100644
--- a/etc/profile-m-z/smtube.profile
+++ b/etc/profile-m-z/smtube.profile
@@ -45,3 +45,4 @@ seccomp
45private-dev 45private-dev
46private-tmp 46private-tmp
47 47
48restrict-namespaces
diff --git a/etc/profile-m-z/smuxi-frontend-gnome.profile b/etc/profile-m-z/smuxi-frontend-gnome.profile
index 9c93845f5..ffed9d44c 100644
--- a/etc/profile-m-z/smuxi-frontend-gnome.profile
+++ b/etc/profile-m-z/smuxi-frontend-gnome.profile
@@ -52,3 +52,5 @@ private-tmp
52 52
53dbus-user none 53dbus-user none
54dbus-system none 54dbus-system none
55
56restrict-namespaces
diff --git a/etc/profile-m-z/softmaker-common.profile b/etc/profile-m-z/softmaker-common.profile
index ff8ba38b4..b4658b7af 100644
--- a/etc/profile-m-z/softmaker-common.profile
+++ b/etc/profile-m-z/softmaker-common.profile
@@ -47,3 +47,5 @@ private-tmp
47 47
48dbus-user none 48dbus-user none
49dbus-system none 49dbus-system none
50
51restrict-namespaces
diff --git a/etc/profile-m-z/sol.profile b/etc/profile-m-z/sol.profile
index 833b905fe..e2be4e9e0 100644
--- a/etc/profile-m-z/sol.profile
+++ b/etc/profile-m-z/sol.profile
@@ -44,3 +44,4 @@ dbus-user none
44dbus-system none 44dbus-system none
45 45
46# memory-deny-write-execute 46# memory-deny-write-execute
47restrict-namespaces
diff --git a/etc/profile-m-z/songrec.profile b/etc/profile-m-z/songrec.profile
index 2e26fbb52..9261c1e3f 100644
--- a/etc/profile-m-z/songrec.profile
+++ b/etc/profile-m-z/songrec.profile
@@ -51,3 +51,5 @@ private-tmp
51 51
52dbus-user none 52dbus-user none
53dbus-system none 53dbus-system none
54
55restrict-namespaces
diff --git a/etc/profile-m-z/sound-juicer.profile b/etc/profile-m-z/sound-juicer.profile
index f8b87065b..f5ac6c739 100644
--- a/etc/profile-m-z/sound-juicer.profile
+++ b/etc/profile-m-z/sound-juicer.profile
@@ -40,3 +40,5 @@ private-tmp
40 40
41# dbus-user none 41# dbus-user none
42# dbus-system none 42# dbus-system none
43
44restrict-namespaces
diff --git a/etc/profile-m-z/soundconverter.profile b/etc/profile-m-z/soundconverter.profile
index d32ba87fc..843080cc8 100644
--- a/etc/profile-m-z/soundconverter.profile
+++ b/etc/profile-m-z/soundconverter.profile
@@ -47,3 +47,4 @@ private-cache
47private-dev 47private-dev
48private-tmp 48private-tmp
49 49
50restrict-namespaces
diff --git a/etc/profile-m-z/spectacle.profile b/etc/profile-m-z/spectacle.profile
index 7637eb868..5a1314315 100644
--- a/etc/profile-m-z/spectacle.profile
+++ b/etc/profile-m-z/spectacle.profile
@@ -65,3 +65,5 @@ dbus-user.talk org.freedesktop.FileManager1
65#dbus-user.talk org.kde.JobViewServer 65#dbus-user.talk org.kde.JobViewServer
66#dbus-user.talk org.kde.kglobalaccel 66#dbus-user.talk org.kde.kglobalaccel
67dbus-system none 67dbus-system none
68
69restrict-namespaces
diff --git a/etc/profile-m-z/spectral.profile b/etc/profile-m-z/spectral.profile
index f83fe9a17..4bc23fc04 100644
--- a/etc/profile-m-z/spectral.profile
+++ b/etc/profile-m-z/spectral.profile
@@ -53,3 +53,5 @@ dbus-user filter
53# Add the next line to your spectral.local to enable notification support. 53# Add the next line to your spectral.local to enable notification support.
54#dbus-user.talk org.freedesktop.Notifications 54#dbus-user.talk org.freedesktop.Notifications
55dbus-system none 55dbus-system none
56
57restrict-namespaces
diff --git a/etc/profile-m-z/spectre-meltdown-checker.profile b/etc/profile-m-z/spectre-meltdown-checker.profile
index 8c089a5af..d2566040e 100644
--- a/etc/profile-m-z/spectre-meltdown-checker.profile
+++ b/etc/profile-m-z/spectre-meltdown-checker.profile
@@ -10,6 +10,7 @@ blacklist ${RUNUSER}/wayland-*
10 10
11noblacklist ${PATH}/mount 11noblacklist ${PATH}/mount
12noblacklist ${PATH}/umount 12noblacklist ${PATH}/umount
13noblacklist /proc/config.gz
13 14
14# Allow perl (blacklisted by disable-interpreters.inc) 15# Allow perl (blacklisted by disable-interpreters.inc)
15include allow-perl.inc 16include allow-perl.inc
@@ -41,7 +42,7 @@ x11 none
41 42
42disable-mnt 43disable-mnt
43private 44private
44private-bin awk,bzip2,cat,coreos-install,cpucontrol,cut,dd,dirname,dmesg,dnf,echo,grep,gunzip,gz,gzip,head,id,kldload,kldstat,liblz4-tool,lzop,mktemp,modinfo,modprobe,mount,nm,objdump,od,perl,printf,readelf,rm,sed,seq,sh,sort,spectre-meltdown-checker,spectre-meltdown-checker.sh,stat,strings,sysctl,tail,test,toolbox,tr,uname,which,xz-utils 45private-bin awk,basename,bzip2,cat,coreos-install,cpucontrol,cut,dd,dirname,dmesg,dnf,echo,grep,gunzip,gz,gzip,head,id,kldload,kldstat,liblz4-tool,lzop,mktemp,modinfo,modprobe,mount,nm,objdump,od,perl,printf,ps,readelf,rm,sed,seq,sh,sort,spectre-meltdown-checker,spectre-meltdown-checker.sh,stat,strings,sysctl,tail,test,toolbox,tr,uname,unzstd,which,xz-utils
45private-cache 46private-cache
46private-tmp 47private-tmp
47 48
@@ -49,3 +50,4 @@ dbus-user none
49dbus-system none 50dbus-system none
50 51
51memory-deny-write-execute 52memory-deny-write-execute
53restrict-namespaces
diff --git a/etc/profile-m-z/spotify.profile b/etc/profile-m-z/spotify.profile
index 146cb5ed1..721e39cd4 100644
--- a/etc/profile-m-z/spotify.profile
+++ b/etc/profile-m-z/spotify.profile
@@ -7,6 +7,7 @@ include globals.local
7 7
8noblacklist ${HOME}/.cache/spotify 8noblacklist ${HOME}/.cache/spotify
9noblacklist ${HOME}/.config/spotify 9noblacklist ${HOME}/.config/spotify
10noblacklist ${HOME}/.config/spotify-adblock
10noblacklist ${HOME}/.local/share/spotify 11noblacklist ${HOME}/.local/share/spotify
11 12
12blacklist ${HOME}/.bashrc 13blacklist ${HOME}/.bashrc
@@ -22,6 +23,7 @@ mkdir ${HOME}/.config/spotify
22mkdir ${HOME}/.local/share/spotify 23mkdir ${HOME}/.local/share/spotify
23whitelist ${HOME}/.cache/spotify 24whitelist ${HOME}/.cache/spotify
24whitelist ${HOME}/.config/spotify 25whitelist ${HOME}/.config/spotify
26whitelist ${HOME}/.config/spotify-adblock
25whitelist ${HOME}/.local/share/spotify 27whitelist ${HOME}/.local/share/spotify
26include whitelist-common.inc 28include whitelist-common.inc
27include whitelist-var-common.inc 29include whitelist-var-common.inc
@@ -43,7 +45,7 @@ disable-mnt
43private-bin bash,cat,dirname,find,grep,head,rm,sh,spotify,tclsh,touch,zenity 45private-bin bash,cat,dirname,find,grep,head,rm,sh,spotify,tclsh,touch,zenity
44private-dev 46private-dev
45# If you want to see album covers or want to use the radio, add 'ignore private-etc' to your spotify.local. 47# If you want to see album covers or want to use the radio, add 'ignore private-etc' to your spotify.local.
46private-etc alternatives,ca-certificates,crypto-policies,fonts,group,host.conf,hosts,ld.so.cache,ld.so.preload,machine-id,nsswitch.conf,pki,pulse,resolv.conf,ssl 48private-etc alternatives,ca-certificates,crypto-policies,fonts,group,host.conf,hosts,ld.so.cache,ld.so.preload,machine-id,nsswitch.conf,pki,pulse,resolv.conf,spotify-adblock,ssl
47private-opt spotify 49private-opt spotify
48private-srv none 50private-srv none
49private-tmp 51private-tmp
@@ -51,3 +53,5 @@ private-tmp
51# dbus needed for MPRIS 53# dbus needed for MPRIS
52# dbus-user none 54# dbus-user none
53# dbus-system none 55# dbus-system none
56
57restrict-namespaces
diff --git a/etc/profile-m-z/sqlitebrowser.profile b/etc/profile-m-z/sqlitebrowser.profile
index 0808685d1..b6eee5293 100644
--- a/etc/profile-m-z/sqlitebrowser.profile
+++ b/etc/profile-m-z/sqlitebrowser.profile
@@ -49,3 +49,4 @@ private-tmp
49# dbus-system none 49# dbus-system none
50 50
51#memory-deny-write-execute - breaks on Arch (see issue #1803) 51#memory-deny-write-execute - breaks on Arch (see issue #1803)
52restrict-namespaces
diff --git a/etc/profile-m-z/ssh-agent.profile b/etc/profile-m-z/ssh-agent.profile
index 35bcdca7c..76755def4 100644
--- a/etc/profile-m-z/ssh-agent.profile
+++ b/etc/profile-m-z/ssh-agent.profile
@@ -33,3 +33,5 @@ writable-run-user
33 33
34dbus-user none 34dbus-user none
35dbus-system none 35dbus-system none
36
37restrict-namespaces
diff --git a/etc/profile-m-z/ssh.profile b/etc/profile-m-z/ssh.profile
index c68b82b54..a7956a76e 100644
--- a/etc/profile-m-z/ssh.profile
+++ b/etc/profile-m-z/ssh.profile
@@ -51,3 +51,4 @@ dbus-system none
51 51
52deterministic-shutdown 52deterministic-shutdown
53memory-deny-write-execute 53memory-deny-write-execute
54restrict-namespaces
diff --git a/etc/profile-m-z/ssmtp.profile b/etc/profile-m-z/ssmtp.profile
new file mode 100644
index 000000000..1a224e7b0
--- /dev/null
+++ b/etc/profile-m-z/ssmtp.profile
@@ -0,0 +1,75 @@
1# Firejail profile for ssmtp
2# Description: Extremely simple MTA to get mail off the system to a mailhub
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include ssmtp.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}
11blacklist /usr/libexec
12
13noblacklist /etc/logcheck
14noblacklist /etc/ssmtp
15noblacklist /sbin
16noblacklist /usr/sbin
17
18noblacklist ${DOCUMENTS}
19include disable-common.inc
20include disable-devel.inc
21include disable-exec.inc
22include disable-interpreters.inc
23include disable-proc.inc
24include disable-programs.inc
25include disable-shell.inc
26include disable-xdg.inc
27include disable-X11.inc
28
29mkfile ${HOME}/dead.letter
30whitelist ${HOME}/dead.letter
31whitelist ${DOCUMENTS}
32whitelist ${DOWNLOADS}
33include whitelist-common.inc
34include whitelist-run-common.inc
35include whitelist-runuser-common.inc
36include whitelist-usr-share-common.inc
37include whitelist-var-common.inc
38
39apparmor
40caps.drop all
41ipc-namespace
42machine-id
43netfilter
44no3d
45nodvd
46#nogroups breaks app
47noinput
48nonewprivs
49noprinters
50#noroot breaks app
51nosound
52notv
53nou2f
54novideo
55protocol unix,inet,inet6
56seccomp
57seccomp.block-secondary
58tracelog
59
60disable-mnt
61# private works but then we lose ${HOME}/dead.letter
62# which is useful to get notified on mail issues
63#private
64private-bin mailq,newaliases,sendmail,ssmtp
65private-cache
66private-dev
67private-tmp
68
69dbus-user none
70dbus-system none
71
72memory-deny-write-execute
73restrict-namespaces
74read-only ${HOME}
75read-write ${HOME}/dead.letter
diff --git a/etc/profile-m-z/standardnotes-desktop.profile b/etc/profile-m-z/standardnotes-desktop.profile
index 7a59274bf..868c724d2 100644
--- a/etc/profile-m-z/standardnotes-desktop.profile
+++ b/etc/profile-m-z/standardnotes-desktop.profile
@@ -42,3 +42,5 @@ private-etc alternatives,ca-certificates,crypto-policies,fonts,host.conf,hostnam
42 42
43dbus-user none 43dbus-user none
44dbus-system none 44dbus-system none
45
46# restrict-namespaces
diff --git a/etc/profile-m-z/steam.profile b/etc/profile-m-z/steam.profile
index 5e5a8e9bb..f807afdc7 100644
--- a/etc/profile-m-z/steam.profile
+++ b/etc/profile-m-z/steam.profile
@@ -178,7 +178,8 @@ private-dev
178private-etc alsa,alternatives,asound.conf,bumblebee,ca-certificates,crypto-policies,dbus-1,drirc,fonts,group,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,localtime,lsb-release,machine-id,mime.types,nvidia,os-release,passwd,pki,pulse,resolv.conf,services,ssl,vulkan 178private-etc alsa,alternatives,asound.conf,bumblebee,ca-certificates,crypto-policies,dbus-1,drirc,fonts,group,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,localtime,lsb-release,machine-id,mime.types,nvidia,os-release,passwd,pki,pulse,resolv.conf,services,ssl,vulkan
179private-tmp 179private-tmp
180 180
181# dbus-user none 181#dbus-user none
182# dbus-system none 182#dbus-system none
183 183
184read-only ${HOME}/.config/MangoHud 184read-only ${HOME}/.config/MangoHud
185#restrict-namespaces
diff --git a/etc/profile-m-z/stellarium.profile b/etc/profile-m-z/stellarium.profile
index ecb5201e0..c83ff40f8 100644
--- a/etc/profile-m-z/stellarium.profile
+++ b/etc/profile-m-z/stellarium.profile
@@ -43,3 +43,4 @@ private-bin stellarium
43private-dev 43private-dev
44private-tmp 44private-tmp
45 45
46restrict-namespaces
diff --git a/etc/profile-m-z/strawberry.profile b/etc/profile-m-z/strawberry.profile
index a6723e9de..e9d2ca430 100644
--- a/etc/profile-m-z/strawberry.profile
+++ b/etc/profile-m-z/strawberry.profile
@@ -46,3 +46,5 @@ private-etc alternatives,ca-certificates,crypto-policies,fonts,host.conf,hostnam
46private-tmp 46private-tmp
47 47
48dbus-system none 48dbus-system none
49
50restrict-namespaces
diff --git a/etc/profile-m-z/strings.profile b/etc/profile-m-z/strings.profile
index 506a38145..8c14ca51f 100644
--- a/etc/profile-m-z/strings.profile
+++ b/etc/profile-m-z/strings.profile
@@ -54,3 +54,4 @@ dbus-system none
54 54
55memory-deny-write-execute 55memory-deny-write-execute
56read-only ${HOME} 56read-only ${HOME}
57restrict-namespaces
diff --git a/etc/profile-m-z/subdownloader.profile b/etc/profile-m-z/subdownloader.profile
index b222b5be2..896d4bc3e 100644
--- a/etc/profile-m-z/subdownloader.profile
+++ b/etc/profile-m-z/subdownloader.profile
@@ -50,3 +50,4 @@ dbus-user none
50dbus-system none 50dbus-system none
51 51
52#memory-deny-write-execute - breaks on Arch (see issue #1803) 52#memory-deny-write-execute - breaks on Arch (see issue #1803)
53restrict-namespaces
diff --git a/etc/profile-m-z/supertux2.profile b/etc/profile-m-z/supertux2.profile
index b082cc761..1f532d76c 100644
--- a/etc/profile-m-z/supertux2.profile
+++ b/etc/profile-m-z/supertux2.profile
@@ -49,3 +49,5 @@ private-tmp
49 49
50dbus-user none 50dbus-user none
51dbus-system none 51dbus-system none
52
53restrict-namespaces
diff --git a/etc/profile-m-z/supertuxkart.profile b/etc/profile-m-z/supertuxkart.profile
index 7616217ff..b4eb70fcb 100644
--- a/etc/profile-m-z/supertuxkart.profile
+++ b/etc/profile-m-z/supertuxkart.profile
@@ -60,3 +60,5 @@ private-srv none
60 60
61dbus-user none 61dbus-user none
62dbus-system none 62dbus-system none
63
64restrict-namespaces
diff --git a/etc/profile-m-z/surf.profile b/etc/profile-m-z/surf.profile
index 78432bf43..3508e11b0 100644
--- a/etc/profile-m-z/surf.profile
+++ b/etc/profile-m-z/surf.profile
@@ -36,3 +36,4 @@ private-dev
36private-etc alternatives,ca-certificates,crypto-policies,fonts,group,hosts,ld.so.cache,ld.so.preload,machine-id,passwd,pki,resolv.conf,ssl 36private-etc alternatives,ca-certificates,crypto-policies,fonts,group,hosts,ld.so.cache,ld.so.preload,machine-id,passwd,pki,resolv.conf,ssl
37private-tmp 37private-tmp
38 38
39restrict-namespaces
diff --git a/etc/profile-m-z/sushi.profile b/etc/profile-m-z/sushi.profile
index 46f5348fd..7b6a87b31 100644
--- a/etc/profile-m-z/sushi.profile
+++ b/etc/profile-m-z/sushi.profile
@@ -45,3 +45,4 @@ read-only /media
45read-only /run/mount 45read-only /run/mount
46read-only /run/media 46read-only /run/media
47read-only ${HOME} 47read-only ${HOME}
48restrict-namespaces
diff --git a/etc/profile-m-z/sway.profile b/etc/profile-m-z/sway.profile
index 046d1b4be..f71905150 100644
--- a/etc/profile-m-z/sway.profile
+++ b/etc/profile-m-z/sway.profile
@@ -17,3 +17,5 @@ netfilter
17noroot 17noroot
18protocol unix,inet,inet6 18protocol unix,inet,inet6
19seccomp 19seccomp
20
21restrict-namespaces
diff --git a/etc/profile-m-z/synfigstudio.profile b/etc/profile-m-z/synfigstudio.profile
index 4c290aa01..a2bb7d8e5 100644
--- a/etc/profile-m-z/synfigstudio.profile
+++ b/etc/profile-m-z/synfigstudio.profile
@@ -36,3 +36,5 @@ private-tmp
36 36
37dbus-user none 37dbus-user none
38dbus-system none 38dbus-system none
39
40restrict-namespaces
diff --git a/etc/profile-m-z/sysprof.profile b/etc/profile-m-z/sysprof.profile
index a0a2ec7bc..cef029401 100644
--- a/etc/profile-m-z/sysprof.profile
+++ b/etc/profile-m-z/sysprof.profile
@@ -74,3 +74,4 @@ dbus-user.own org.gnome.Sysprof3
74dbus-user.talk ca.desrt.dconf 74dbus-user.talk ca.desrt.dconf
75 75
76# memory-deny-write-execute - breaks on Arch 76# memory-deny-write-execute - breaks on Arch
77restrict-namespaces
diff --git a/etc/profile-m-z/tcpdump.profile b/etc/profile-m-z/tcpdump.profile
index 57301a54d..bc8444efd 100644
--- a/etc/profile-m-z/tcpdump.profile
+++ b/etc/profile-m-z/tcpdump.profile
@@ -44,3 +44,4 @@ private-dev
44private-tmp 44private-tmp
45 45
46memory-deny-write-execute 46memory-deny-write-execute
47restrict-namespaces
diff --git a/etc/profile-m-z/teamspeak3.profile b/etc/profile-m-z/teamspeak3.profile
index 31df5b97c..41da4ee13 100644
--- a/etc/profile-m-z/teamspeak3.profile
+++ b/etc/profile-m-z/teamspeak3.profile
@@ -39,3 +39,4 @@ disable-mnt
39private-dev 39private-dev
40private-tmp 40private-tmp
41 41
42# restrict-namespaces
diff --git a/etc/profile-m-z/teeworlds.profile b/etc/profile-m-z/teeworlds.profile
index a253f9a76..f01cc1c74 100644
--- a/etc/profile-m-z/teeworlds.profile
+++ b/etc/profile-m-z/teeworlds.profile
@@ -43,3 +43,5 @@ private-tmp
43 43
44dbus-user none 44dbus-user none
45dbus-system none 45dbus-system none
46
47restrict-namespaces
diff --git a/etc/profile-m-z/telegram.profile b/etc/profile-m-z/telegram.profile
index bdae44ad0..886d303c8 100644
--- a/etc/profile-m-z/telegram.profile
+++ b/etc/profile-m-z/telegram.profile
@@ -56,3 +56,5 @@ dbus-user.talk org.freedesktop.Notifications
56dbus-user.talk org.gnome.Mutter.IdleMonitor 56dbus-user.talk org.gnome.Mutter.IdleMonitor
57dbus-user.talk org.freedesktop.ScreenSaver 57dbus-user.talk org.freedesktop.ScreenSaver
58dbus-system none 58dbus-system none
59
60restrict-namespaces
diff --git a/etc/profile-m-z/telnet.profile b/etc/profile-m-z/telnet.profile
index 527c3c99f..13a47c958 100644
--- a/etc/profile-m-z/telnet.profile
+++ b/etc/profile-m-z/telnet.profile
@@ -51,3 +51,4 @@ dbus-system none
51 51
52memory-deny-write-execute 52memory-deny-write-execute
53noexec ${HOME} 53noexec ${HOME}
54restrict-namespaces
diff --git a/etc/profile-m-z/terasology.profile b/etc/profile-m-z/terasology.profile
index 4af30acc0..9249e33c8 100644
--- a/etc/profile-m-z/terasology.profile
+++ b/etc/profile-m-z/terasology.profile
@@ -45,3 +45,5 @@ private-tmp
45 45
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48
49restrict-namespaces
diff --git a/etc/profile-m-z/tesseract.profile b/etc/profile-m-z/tesseract.profile
new file mode 100644
index 000000000..11a21c471
--- /dev/null
+++ b/etc/profile-m-z/tesseract.profile
@@ -0,0 +1,65 @@
1# Firejail profile for tesseract
2# Description: An OCR program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include tesseract.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}
10
11noblacklist ${DOCUMENTS}
12noblacklist ${PICTURES}
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-proc.inc
18include disable-programs.inc
19include disable-shell.inc
20include disable-xdg.inc
21
22whitelist ${DOCUMENTS}
23whitelist ${DOWNLOADS}
24whitelist ${PICTURES}
25include whitelist-common.inc
26include whitelist-run-common.inc
27include whitelist-runuser-common.inc
28whitelist /usr/share/tessdata
29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc
31
32apparmor
33caps.drop all
34hostname tesseract
35ipc-namespace
36machine-id
37net none
38no3d
39nodvd
40nogroups
41noinput
42nonewprivs
43noprinters
44noroot
45nosound
46notv
47nou2f
48novideo
49seccomp
50tracelog
51x11 none
52
53#disable-mnt
54private-bin ambiguous_words,classifier_tester,cntraining,combine_lang_model,combine_tessdata,dawg2wordlist,lstmeval,lstmtraining,merge_unicharsets,mftraining,set_unicharset_properties,shapeclustering,tesseract,text2image,unicharset_extractor,wordlist2dawg
55private-cache
56private-dev
57private-etc alternatives,fonts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload
58#private-lib libtesseract.so.*
59private-tmp
60
61dbus-user none
62dbus-system none
63
64memory-deny-write-execute
65restrict-namespaces
diff --git a/etc/profile-m-z/tilp.profile b/etc/profile-m-z/tilp.profile
index 3dad84480..f49738f2b 100644
--- a/etc/profile-m-z/tilp.profile
+++ b/etc/profile-m-z/tilp.profile
@@ -32,3 +32,4 @@ private-cache
32private-etc alternatives,fonts,ld.so.cache,ld.so.preload 32private-etc alternatives,fonts,ld.so.cache,ld.so.preload
33private-tmp 33private-tmp
34 34
35restrict-namespaces
diff --git a/etc/profile-m-z/tin.profile b/etc/profile-m-z/tin.profile
index 0ca9cc1ce..3cbf90660 100644
--- a/etc/profile-m-z/tin.profile
+++ b/etc/profile-m-z/tin.profile
@@ -65,3 +65,4 @@ dbus-user none
65dbus-system none 65dbus-system none
66 66
67memory-deny-write-execute 67memory-deny-write-execute
68restrict-namespaces
diff --git a/etc/profile-m-z/tmux.profile b/etc/profile-m-z/tmux.profile
index bb710edc3..a855ff839 100644
--- a/etc/profile-m-z/tmux.profile
+++ b/etc/profile-m-z/tmux.profile
@@ -42,3 +42,5 @@ private-dev
42 42
43dbus-user none 43dbus-user none
44dbus-system none 44dbus-system none
45
46restrict-namespaces
diff --git a/etc/profile-m-z/tor.profile b/etc/profile-m-z/tor.profile
index ba7672068..275b170ff 100644
--- a/etc/profile-m-z/tor.profile
+++ b/etc/profile-m-z/tor.profile
@@ -48,3 +48,5 @@ private-dev
48private-etc alternatives,ca-certificates,crypto-policies,ld.so.cache,ld.so.preload,passwd,pki,ssl,tor 48private-etc alternatives,ca-certificates,crypto-policies,ld.so.cache,ld.so.preload,passwd,pki,ssl,tor
49private-tmp 49private-tmp
50writable-var 50writable-var
51
52restrict-namespaces
diff --git a/etc/profile-m-z/torbrowser-launcher.profile b/etc/profile-m-z/torbrowser-launcher.profile
index 9d66c5fa4..fab792826 100644
--- a/etc/profile-m-z/torbrowser-launcher.profile
+++ b/etc/profile-m-z/torbrowser-launcher.profile
@@ -63,3 +63,5 @@ private-tmp
63 63
64dbus-user none 64dbus-user none
65dbus-system none 65dbus-system none
66
67#restrict-namespaces
diff --git a/etc/profile-m-z/torcs.profile b/etc/profile-m-z/torcs.profile
index dfc20fc00..f83a74e9c 100644
--- a/etc/profile-m-z/torcs.profile
+++ b/etc/profile-m-z/torcs.profile
@@ -45,3 +45,5 @@ private-tmp
45 45
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48
49restrict-namespaces
diff --git a/etc/profile-m-z/totem.profile b/etc/profile-m-z/totem.profile
index 9ecc1e5ea..e21d37040 100644
--- a/etc/profile-m-z/totem.profile
+++ b/etc/profile-m-z/totem.profile
@@ -57,3 +57,5 @@ private-tmp
57# makes settings immutable 57# makes settings immutable
58# dbus-user none 58# dbus-user none
59dbus-system none 59dbus-system none
60
61restrict-namespaces
diff --git a/etc/profile-m-z/tracker.profile b/etc/profile-m-z/tracker.profile
index 6d7751953..f30b0aef6 100644
--- a/etc/profile-m-z/tracker.profile
+++ b/etc/profile-m-z/tracker.profile
@@ -36,3 +36,5 @@ tracelog
36# private-bin tracker 36# private-bin tracker
37# private-dev 37# private-dev
38# private-tmp 38# private-tmp
39
40restrict-namespaces
diff --git a/etc/profile-m-z/transgui.profile b/etc/profile-m-z/transgui.profile
index 6dcdf64b6..9937b7c11 100644
--- a/etc/profile-m-z/transgui.profile
+++ b/etc/profile-m-z/transgui.profile
@@ -52,3 +52,4 @@ dbus-user none
52dbus-system none 52dbus-system none
53 53
54memory-deny-write-execute 54memory-deny-write-execute
55restrict-namespaces
diff --git a/etc/profile-m-z/transmission-common.profile b/etc/profile-m-z/transmission-common.profile
index 78df412d7..0a9029c97 100644
--- a/etc/profile-m-z/transmission-common.profile
+++ b/etc/profile-m-z/transmission-common.profile
@@ -50,3 +50,4 @@ dbus-user none
50dbus-system none 50dbus-system none
51 51
52memory-deny-write-execute 52memory-deny-write-execute
53restrict-namespaces
diff --git a/etc/profile-m-z/tremulous.profile b/etc/profile-m-z/tremulous.profile
index 4bcc0affe..21c09067e 100644
--- a/etc/profile-m-z/tremulous.profile
+++ b/etc/profile-m-z/tremulous.profile
@@ -50,3 +50,5 @@ private-tmp
50 50
51dbus-user none 51dbus-user none
52dbus-system none 52dbus-system none
53
54restrict-namespaces
diff --git a/etc/profile-m-z/trojita.profile b/etc/profile-m-z/trojita.profile
index eb3ae356a..63e964355 100644
--- a/etc/profile-m-z/trojita.profile
+++ b/etc/profile-m-z/trojita.profile
@@ -61,3 +61,4 @@ dbus-user.talk org.freedesktop.secrets
61dbus-system none 61dbus-system none
62 62
63read-only ${HOME}/.mozilla/firefox/profiles.ini 63read-only ${HOME}/.mozilla/firefox/profiles.ini
64restrict-namespaces
diff --git a/etc/profile-m-z/truecraft.profile b/etc/profile-m-z/truecraft.profile
index 58f600259..f02532936 100644
--- a/etc/profile-m-z/truecraft.profile
+++ b/etc/profile-m-z/truecraft.profile
@@ -36,3 +36,4 @@ disable-mnt
36private-dev 36private-dev
37private-tmp 37private-tmp
38 38
39restrict-namespaces
diff --git a/etc/profile-m-z/tuxguitar.profile b/etc/profile-m-z/tuxguitar.profile
index 807d43281..ab2b359e4 100644
--- a/etc/profile-m-z/tuxguitar.profile
+++ b/etc/profile-m-z/tuxguitar.profile
@@ -43,3 +43,5 @@ tracelog
43 43
44private-dev 44private-dev
45private-tmp 45private-tmp
46
47restrict-namespaces
diff --git a/etc/profile-m-z/tvbrowser.profile b/etc/profile-m-z/tvbrowser.profile
index 6c1dcc603..518dc95c7 100644
--- a/etc/profile-m-z/tvbrowser.profile
+++ b/etc/profile-m-z/tvbrowser.profile
@@ -50,3 +50,5 @@ private-tmp
50 50
51dbus-user none 51dbus-user none
52dbus-system none 52dbus-system none
53
54restrict-namespaces
diff --git a/etc/profile-m-z/udiskie.profile b/etc/profile-m-z/udiskie.profile
index e9a2745bf..7e3c7ac5a 100644
--- a/etc/profile-m-z/udiskie.profile
+++ b/etc/profile-m-z/udiskie.profile
@@ -42,3 +42,5 @@ private-cache
42private-dev 42private-dev
43private-etc alternatives,fonts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,mime.types,xdg 43private-etc alternatives,fonts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,mime.types,xdg
44private-tmp 44private-tmp
45
46restrict-namespaces
diff --git a/etc/profile-m-z/uefitool.profile b/etc/profile-m-z/uefitool.profile
index 3629f66f8..3d8f59df6 100644
--- a/etc/profile-m-z/uefitool.profile
+++ b/etc/profile-m-z/uefitool.profile
@@ -36,3 +36,5 @@ private-tmp
36 36
37dbus-user none 37dbus-user none
38dbus-system none 38dbus-system none
39
40restrict-namespaces
diff --git a/etc/profile-m-z/uget-gtk.profile b/etc/profile-m-z/uget-gtk.profile
index 948f61801..d8840fad3 100644
--- a/etc/profile-m-z/uget-gtk.profile
+++ b/etc/profile-m-z/uget-gtk.profile
@@ -36,3 +36,5 @@ seccomp
36private-bin uget-gtk 36private-bin uget-gtk
37private-dev 37private-dev
38private-tmp 38private-tmp
39
40restrict-namespaces
diff --git a/etc/profile-m-z/unbound.profile b/etc/profile-m-z/unbound.profile
index d18c9fe94..63d84688c 100644
--- a/etc/profile-m-z/unbound.profile
+++ b/etc/profile-m-z/unbound.profile
@@ -52,3 +52,4 @@ dbus-user none
52dbus-system none 52dbus-system none
53 53
54memory-deny-write-execute 54memory-deny-write-execute
55restrict-namespaces
diff --git a/etc/profile-m-z/unf.profile b/etc/profile-m-z/unf.profile
index 70c54a6bd..6ec6ea609 100644
--- a/etc/profile-m-z/unf.profile
+++ b/etc/profile-m-z/unf.profile
@@ -56,3 +56,4 @@ dbus-user none
56dbus-system none 56dbus-system none
57 57
58memory-deny-write-execute 58memory-deny-write-execute
59restrict-namespaces
diff --git a/etc/profile-m-z/unknown-horizons.profile b/etc/profile-m-z/unknown-horizons.profile
index 755d087ea..3e2b28dec 100644
--- a/etc/profile-m-z/unknown-horizons.profile
+++ b/etc/profile-m-z/unknown-horizons.profile
@@ -41,3 +41,4 @@ private-tmp
41 41
42# doesn't work - maybe all Tcl/Tk programs have this problem 42# doesn't work - maybe all Tcl/Tk programs have this problem
43# memory-deny-write-execute 43# memory-deny-write-execute
44restrict-namespaces
diff --git a/etc/profile-m-z/utox.profile b/etc/profile-m-z/utox.profile
index bb53917cf..f85e52273 100644
--- a/etc/profile-m-z/utox.profile
+++ b/etc/profile-m-z/utox.profile
@@ -46,3 +46,4 @@ private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.cache,ld.so
46private-tmp 46private-tmp
47 47
48memory-deny-write-execute 48memory-deny-write-execute
49restrict-namespaces
diff --git a/etc/profile-m-z/uudeview.profile b/etc/profile-m-z/uudeview.profile
index 7ac23bcb9..29d88832c 100644
--- a/etc/profile-m-z/uudeview.profile
+++ b/etc/profile-m-z/uudeview.profile
@@ -44,3 +44,5 @@ private-etc alternatives,ld.so.cache,ld.so.preload
44 44
45dbus-user none 45dbus-user none
46dbus-system none 46dbus-system none
47
48restrict-namespaces
diff --git a/etc/profile-m-z/uzbl-browser.profile b/etc/profile-m-z/uzbl-browser.profile
index dcdae279f..dfda684e3 100644
--- a/etc/profile-m-z/uzbl-browser.profile
+++ b/etc/profile-m-z/uzbl-browser.profile
@@ -39,3 +39,5 @@ notv
39protocol unix,inet,inet6 39protocol unix,inet,inet6
40seccomp 40seccomp
41tracelog 41tracelog
42
43restrict-namespaces
diff --git a/etc/profile-m-z/viewnior.profile b/etc/profile-m-z/viewnior.profile
index 6d7fa94e7..cdf615a02 100644
--- a/etc/profile-m-z/viewnior.profile
+++ b/etc/profile-m-z/viewnior.profile
@@ -50,3 +50,4 @@ dbus-user none
50dbus-system none 50dbus-system none
51 51
52#memory-deny-write-execute - breaks on Arch (see issues #1803 and #1808) 52#memory-deny-write-execute - breaks on Arch (see issues #1803 and #1808)
53restrict-namespaces
diff --git a/etc/profile-m-z/viking.profile b/etc/profile-m-z/viking.profile
index 65f1e2619..6ec74edd8 100644
--- a/etc/profile-m-z/viking.profile
+++ b/etc/profile-m-z/viking.profile
@@ -34,3 +34,4 @@ seccomp
34private-dev 34private-dev
35private-tmp 35private-tmp
36 36
37restrict-namespaces
diff --git a/etc/profile-m-z/vim.profile b/etc/profile-m-z/vim.profile
index a6e05a32a..6847f1f5e 100644
--- a/etc/profile-m-z/vim.profile
+++ b/etc/profile-m-z/vim.profile
@@ -32,3 +32,5 @@ protocol unix,inet,inet6
32seccomp 32seccomp
33 33
34private-dev 34private-dev
35
36restrict-namespaces
diff --git a/etc/profile-m-z/vlc.profile b/etc/profile-m-z/vlc.profile
index b9b40e348..34e580085 100644
--- a/etc/profile-m-z/vlc.profile
+++ b/etc/profile-m-z/vlc.profile
@@ -53,3 +53,5 @@ dbus-user.talk org.freedesktop.ScreenSaver
53?ALLOW_TRAY: dbus-user.talk org.kde.StatusNotifierWatcher 53?ALLOW_TRAY: dbus-user.talk org.kde.StatusNotifierWatcher
54dbus-user.talk org.mpris.MediaPlayer2.Player 54dbus-user.talk org.mpris.MediaPlayer2.Player
55dbus-system none 55dbus-system none
56
57restrict-namespaces
diff --git a/etc/profile-m-z/vmware-view.profile b/etc/profile-m-z/vmware-view.profile
index 1703c95e1..ba4136413 100644
--- a/etc/profile-m-z/vmware-view.profile
+++ b/etc/profile-m-z/vmware-view.profile
@@ -54,3 +54,5 @@ private-tmp
54 54
55dbus-user none 55dbus-user none
56dbus-system none 56dbus-system none
57
58restrict-namespaces
diff --git a/etc/profile-m-z/vym.profile b/etc/profile-m-z/vym.profile
index dbfbcca8a..be1ef153b 100644
--- a/etc/profile-m-z/vym.profile
+++ b/etc/profile-m-z/vym.profile
@@ -33,3 +33,4 @@ disable-mnt
33private-dev 33private-dev
34private-tmp 34private-tmp
35 35
36restrict-namespaces
diff --git a/etc/profile-m-z/w3m.profile b/etc/profile-m-z/w3m.profile
index f5744e52c..fab5315aa 100644
--- a/etc/profile-m-z/w3m.profile
+++ b/etc/profile-m-z/w3m.profile
@@ -68,3 +68,4 @@ dbus-user none
68dbus-system none 68dbus-system none
69 69
70memory-deny-write-execute 70memory-deny-write-execute
71restrict-namespaces
diff --git a/etc/profile-m-z/warmux.profile b/etc/profile-m-z/warmux.profile
index 6b32a1613..37a8f78bb 100644
--- a/etc/profile-m-z/warmux.profile
+++ b/etc/profile-m-z/warmux.profile
@@ -53,3 +53,5 @@ private-tmp
53 53
54dbus-user none 54dbus-user none
55dbus-system none 55dbus-system none
56
57restrict-namespaces
diff --git a/etc/profile-m-z/warsow.profile b/etc/profile-m-z/warsow.profile
index 0e3b88a02..c7f1d4c50 100644
--- a/etc/profile-m-z/warsow.profile
+++ b/etc/profile-m-z/warsow.profile
@@ -54,3 +54,5 @@ private-tmp
54 54
55dbus-user none 55dbus-user none
56dbus-system none 56dbus-system none
57
58restrict-namespaces
diff --git a/etc/profile-m-z/warzone2100.profile b/etc/profile-m-z/warzone2100.profile
index 3e2c9b929..50c776412 100644
--- a/etc/profile-m-z/warzone2100.profile
+++ b/etc/profile-m-z/warzone2100.profile
@@ -47,3 +47,5 @@ disable-mnt
47private-bin bash,dash,sh,warzone2100,which 47private-bin bash,dash,sh,warzone2100,which
48private-dev 48private-dev
49private-tmp 49private-tmp
50
51restrict-namespaces
diff --git a/etc/profile-m-z/webstorm.profile b/etc/profile-m-z/webstorm.profile
index ec6a0d7ab..6e5a63911 100644
--- a/etc/profile-m-z/webstorm.profile
+++ b/etc/profile-m-z/webstorm.profile
@@ -42,3 +42,5 @@ seccomp
42private-cache 42private-cache
43private-dev 43private-dev
44private-tmp 44private-tmp
45
46restrict-namespaces
diff --git a/etc/profile-m-z/webui-aria2.profile b/etc/profile-m-z/webui-aria2.profile
index 057e75372..b42d4c380 100644
--- a/etc/profile-m-z/webui-aria2.profile
+++ b/etc/profile-m-z/webui-aria2.profile
@@ -36,3 +36,5 @@ private-tmp
36 36
37dbus-user none 37dbus-user none
38dbus-system none 38dbus-system none
39
40restrict-namespaces
diff --git a/etc/profile-m-z/weechat.profile b/etc/profile-m-z/weechat.profile
index 07babd502..b190bf5ff 100644
--- a/etc/profile-m-z/weechat.profile
+++ b/etc/profile-m-z/weechat.profile
@@ -28,3 +28,5 @@ seccomp
28# no private-bin support for various reasons: 28# no private-bin support for various reasons:
29# Plugins loaded: alias, aspell, charset, exec, fifo, guile, irc, 29# Plugins loaded: alias, aspell, charset, exec, fifo, guile, irc,
30# logger, lua, perl, python, relay, ruby, script, tcl, trigger, xferloading plugins 30# logger, lua, perl, python, relay, ruby, script, tcl, trigger, xferloading plugins
31
32restrict-namespaces
diff --git a/etc/profile-m-z/wesnoth.profile b/etc/profile-m-z/wesnoth.profile
index 345b26a2c..b6f29cfbf 100644
--- a/etc/profile-m-z/wesnoth.profile
+++ b/etc/profile-m-z/wesnoth.profile
@@ -36,3 +36,5 @@ seccomp
36 36
37private-dev 37private-dev
38private-tmp 38private-tmp
39
40restrict-namespaces
diff --git a/etc/profile-m-z/wget.profile b/etc/profile-m-z/wget.profile
index 1258b6fce..5e1823593 100644
--- a/etc/profile-m-z/wget.profile
+++ b/etc/profile-m-z/wget.profile
@@ -61,3 +61,4 @@ dbus-user none
61dbus-system none 61dbus-system none
62 62
63memory-deny-write-execute 63memory-deny-write-execute
64restrict-namespaces
diff --git a/etc/profile-m-z/whalebird.profile b/etc/profile-m-z/whalebird.profile
index 92ebebdae..8a9614fb0 100644
--- a/etc/profile-m-z/whalebird.profile
+++ b/etc/profile-m-z/whalebird.profile
@@ -10,6 +10,7 @@ include globals.local
10ignore include whitelist-runuser-common.inc 10ignore include whitelist-runuser-common.inc
11ignore include whitelist-usr-share-common.inc 11ignore include whitelist-usr-share-common.inc
12 12
13ignore apparmor
13ignore dbus-user none 14ignore dbus-user none
14ignore dbus-system none 15ignore dbus-system none
15 16
@@ -21,7 +22,7 @@ whitelist ${HOME}/.config/Whalebird
21no3d 22no3d
22 23
23private-bin electron,electron[0-9],electron[0-9][0-9],whalebird 24private-bin electron,electron[0-9],electron[0-9][0-9],whalebird
24private-etc alternatives,fonts,ld.so.cache,ld.so.preload,machine-id 25private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.cache,ld.so.preload,machine-id,nsswitch.conf,pki,resolv.conf,ssl
25 26
26# Redirect 27# Redirect
27include electron.profile 28include electron.profile
diff --git a/etc/profile-m-z/whois.profile b/etc/profile-m-z/whois.profile
index 4891af458..d8c72ac8b 100644
--- a/etc/profile-m-z/whois.profile
+++ b/etc/profile-m-z/whois.profile
@@ -54,3 +54,4 @@ dbus-user none
54dbus-system none 54dbus-system none
55 55
56memory-deny-write-execute 56memory-deny-write-execute
57restrict-namespaces
diff --git a/etc/profile-m-z/widelands.profile b/etc/profile-m-z/widelands.profile
index 99a3fae8c..30a471fac 100644
--- a/etc/profile-m-z/widelands.profile
+++ b/etc/profile-m-z/widelands.profile
@@ -45,3 +45,5 @@ private-tmp
45 45
46dbus-user none 46dbus-user none
47dbus-system none 47dbus-system none
48
49restrict-namespaces
diff --git a/etc/profile-m-z/wine.profile b/etc/profile-m-z/wine.profile
index f30fc971f..1e2b164b9 100644
--- a/etc/profile-m-z/wine.profile
+++ b/etc/profile-m-z/wine.profile
@@ -40,3 +40,5 @@ notv
40seccomp 40seccomp
41 41
42private-dev 42private-dev
43
44restrict-namespaces
diff --git a/etc/profile-m-z/wireshark.profile b/etc/profile-m-z/wireshark.profile
index 0a13c25aa..5823a2ad7 100644
--- a/etc/profile-m-z/wireshark.profile
+++ b/etc/profile-m-z/wireshark.profile
@@ -52,3 +52,5 @@ private-tmp
52 52
53dbus-user none 53dbus-user none
54dbus-system none 54dbus-system none
55
56#restrict-namespaces
diff --git a/etc/profile-m-z/wordwarvi.profile b/etc/profile-m-z/wordwarvi.profile
index 8f9c44d7d..ccc2e8dd0 100644
--- a/etc/profile-m-z/wordwarvi.profile
+++ b/etc/profile-m-z/wordwarvi.profile
@@ -49,3 +49,5 @@ private-tmp
49 49
50dbus-user none 50dbus-user none
51dbus-system none 51dbus-system none
52
53restrict-namespaces
diff --git a/etc/profile-m-z/wps.profile b/etc/profile-m-z/wps.profile
index 1287faa2c..7f85e1ede 100644
--- a/etc/profile-m-z/wps.profile
+++ b/etc/profile-m-z/wps.profile
@@ -46,3 +46,5 @@ private-tmp
46 46
47dbus-user none 47dbus-user none
48dbus-system none 48dbus-system none
49
50#restrict-namespaces
diff --git a/etc/profile-m-z/x-terminal-emulator.profile b/etc/profile-m-z/x-terminal-emulator.profile
index 141d167a8..4b88e8118 100644
--- a/etc/profile-m-z/x-terminal-emulator.profile
+++ b/etc/profile-m-z/x-terminal-emulator.profile
@@ -21,3 +21,4 @@ dbus-user none
21dbus-system none 21dbus-system none
22 22
23noexec /tmp 23noexec /tmp
24restrict-namespaces
diff --git a/etc/profile-m-z/x2goclient.profile b/etc/profile-m-z/x2goclient.profile
index b8bbba072..6dd374aac 100644
--- a/etc/profile-m-z/x2goclient.profile
+++ b/etc/profile-m-z/x2goclient.profile
@@ -48,3 +48,4 @@ dbus-user none
48dbus-system none 48dbus-system none
49 49
50#memory-deny-write-execute 50#memory-deny-write-execute
51restrict-namespaces
diff --git a/etc/profile-m-z/xbill.profile b/etc/profile-m-z/xbill.profile
index 72e6d04a0..1b44b63e0 100644
--- a/etc/profile-m-z/xbill.profile
+++ b/etc/profile-m-z/xbill.profile
@@ -51,3 +51,4 @@ dbus-system none
51 51
52memory-deny-write-execute 52memory-deny-write-execute
53read-only ${HOME} 53read-only ${HOME}
54restrict-namespaces
diff --git a/etc/profile-m-z/xcalc.profile b/etc/profile-m-z/xcalc.profile
index fef5613ad..3d808ce1f 100644
--- a/etc/profile-m-z/xcalc.profile
+++ b/etc/profile-m-z/xcalc.profile
@@ -40,3 +40,5 @@ private-tmp
40 40
41dbus-user none 41dbus-user none
42dbus-system none 42dbus-system none
43
44restrict-namespaces
diff --git a/etc/profile-m-z/xchat.profile b/etc/profile-m-z/xchat.profile
index a94444aab..4061e26a4 100644
--- a/etc/profile-m-z/xchat.profile
+++ b/etc/profile-m-z/xchat.profile
@@ -21,3 +21,5 @@ protocol unix,inet,inet6
21seccomp 21seccomp
22 22
23# private-bin requires perl, python*, etc. 23# private-bin requires perl, python*, etc.
24
25restrict-namespaces
diff --git a/etc/profile-m-z/xed.profile b/etc/profile-m-z/xed.profile
index f117e96ab..dda803bd5 100644
--- a/etc/profile-m-z/xed.profile
+++ b/etc/profile-m-z/xed.profile
@@ -51,3 +51,4 @@ private-tmp
51 51
52# xed uses python plugins, memory-deny-write-execute breaks python 52# xed uses python plugins, memory-deny-write-execute breaks python
53# memory-deny-write-execute 53# memory-deny-write-execute
54restrict-namespaces
diff --git a/etc/profile-m-z/xfburn.profile b/etc/profile-m-z/xfburn.profile
index 930d2755b..141fda909 100644
--- a/etc/profile-m-z/xfburn.profile
+++ b/etc/profile-m-z/xfburn.profile
@@ -28,3 +28,5 @@ tracelog
28# private-bin xfburn 28# private-bin xfburn
29# private-dev 29# private-dev
30# private-tmp 30# private-tmp
31
32restrict-namespaces
diff --git a/etc/profile-m-z/xfce4-dict.profile b/etc/profile-m-z/xfce4-dict.profile
index 7afe69814..633a9967c 100644
--- a/etc/profile-m-z/xfce4-dict.profile
+++ b/etc/profile-m-z/xfce4-dict.profile
@@ -37,3 +37,4 @@ private-cache
37private-dev 37private-dev
38private-tmp 38private-tmp
39 39
40restrict-namespaces
diff --git a/etc/profile-m-z/xfce4-mixer.profile b/etc/profile-m-z/xfce4-mixer.profile
index 006e1859b..95eb2046e 100644
--- a/etc/profile-m-z/xfce4-mixer.profile
+++ b/etc/profile-m-z/xfce4-mixer.profile
@@ -54,3 +54,4 @@ dbus-user.talk org.xfce.Xfconf
54dbus-system none 54dbus-system none
55 55
56# memory-deny-write-execute - breaks on Arch 56# memory-deny-write-execute - breaks on Arch
57restrict-namespaces
diff --git a/etc/profile-m-z/xfce4-notes.profile b/etc/profile-m-z/xfce4-notes.profile
index 4ab8f34f4..f7d890eef 100644
--- a/etc/profile-m-z/xfce4-notes.profile
+++ b/etc/profile-m-z/xfce4-notes.profile
@@ -39,3 +39,4 @@ private-cache
39private-dev 39private-dev
40private-tmp 40private-tmp
41 41
42restrict-namespaces
diff --git a/etc/profile-m-z/xfce4-screenshooter.profile b/etc/profile-m-z/xfce4-screenshooter.profile
index ca4d77d73..575acc9b2 100644
--- a/etc/profile-m-z/xfce4-screenshooter.profile
+++ b/etc/profile-m-z/xfce4-screenshooter.profile
@@ -48,3 +48,4 @@ dbus-user none
48dbus-system none 48dbus-system none
49 49
50# memory-deny-write-execute -- see #3790 50# memory-deny-write-execute -- see #3790
51restrict-namespaces
diff --git a/etc/profile-m-z/xiphos.profile b/etc/profile-m-z/xiphos.profile
index c755632ca..371db722c 100644
--- a/etc/profile-m-z/xiphos.profile
+++ b/etc/profile-m-z/xiphos.profile
@@ -48,3 +48,5 @@ private-cache
48private-dev 48private-dev
49private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.cache,ld.so.preload,pki,resolv.conf,ssli,sword,sword.conf 49private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.cache,ld.so.preload,pki,resolv.conf,ssli,sword,sword.conf
50private-tmp 50private-tmp
51
52restrict-namespaces
diff --git a/etc/profile-m-z/xlinks2 b/etc/profile-m-z/xlinks2.profile
index d7edd3543..d7edd3543 100644
--- a/etc/profile-m-z/xlinks2
+++ b/etc/profile-m-z/xlinks2.profile
diff --git a/etc/profile-m-z/xmms.profile b/etc/profile-m-z/xmms.profile
index e255ad927..ef8fd1d7f 100644
--- a/etc/profile-m-z/xmms.profile
+++ b/etc/profile-m-z/xmms.profile
@@ -29,3 +29,5 @@ seccomp
29 29
30private-bin xmms 30private-bin xmms
31private-dev 31private-dev
32
33restrict-namespaces
diff --git a/etc/profile-m-z/xmr-stak.profile b/etc/profile-m-z/xmr-stak.profile
index 64b6bcaeb..ad1ba8ca3 100644
--- a/etc/profile-m-z/xmr-stak.profile
+++ b/etc/profile-m-z/xmr-stak.profile
@@ -43,3 +43,4 @@ private-opt cuda
43private-tmp 43private-tmp
44 44
45memory-deny-write-execute 45memory-deny-write-execute
46restrict-namespaces
diff --git a/etc/profile-m-z/xonotic.profile b/etc/profile-m-z/xonotic.profile
index 3c5ef1ac0..9128c330b 100644
--- a/etc/profile-m-z/xonotic.profile
+++ b/etc/profile-m-z/xonotic.profile
@@ -53,3 +53,4 @@ dbus-system none
53 53
54read-only ${HOME} 54read-only ${HOME}
55read-write ${HOME}/.xonotic 55read-write ${HOME}/.xonotic
56restrict-namespaces
diff --git a/etc/profile-m-z/xournal.profile b/etc/profile-m-z/xournal.profile
index 71942edab..a17464a2a 100644
--- a/etc/profile-m-z/xournal.profile
+++ b/etc/profile-m-z/xournal.profile
@@ -48,3 +48,5 @@ private-tmp
48 48
49dbus-user none 49dbus-user none
50dbus-system none 50dbus-system none
51
52restrict-namespaces
diff --git a/etc/profile-m-z/xpdf.profile b/etc/profile-m-z/xpdf.profile
index 33803a741..fdfb3bf59 100644
--- a/etc/profile-m-z/xpdf.profile
+++ b/etc/profile-m-z/xpdf.profile
@@ -42,3 +42,4 @@ dbus-user none
42dbus-system none 42dbus-system none
43 43
44memory-deny-write-execute 44memory-deny-write-execute
45restrict-namespaces
diff --git a/etc/profile-m-z/xplayer.profile b/etc/profile-m-z/xplayer.profile
index 1087d7cd0..a673d6aa3 100644
--- a/etc/profile-m-z/xplayer.profile
+++ b/etc/profile-m-z/xplayer.profile
@@ -47,3 +47,5 @@ private-tmp
47# makes settings immutable 47# makes settings immutable
48# dbus-user none 48# dbus-user none
49# dbus-system none 49# dbus-system none
50
51restrict-namespaces
diff --git a/etc/profile-m-z/xpra.profile b/etc/profile-m-z/xpra.profile
index c10ea4a63..05c12b9a2 100644
--- a/etc/profile-m-z/xpra.profile
+++ b/etc/profile-m-z/xpra.profile
@@ -51,3 +51,5 @@ disable-mnt
51private-dev 51private-dev
52# private-etc alternatives,gai.conf,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,machine-id,nsswitch.conf,resolv.conf,X11,xpra 52# private-etc alternatives,gai.conf,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,machine-id,nsswitch.conf,resolv.conf,X11,xpra
53private-tmp 53private-tmp
54
55restrict-namespaces
diff --git a/etc/profile-m-z/xreader.profile b/etc/profile-m-z/xreader.profile
index ec966fc5c..ff5dc619b 100644
--- a/etc/profile-m-z/xreader.profile
+++ b/etc/profile-m-z/xreader.profile
@@ -42,3 +42,4 @@ private-etc alternatives,fonts,ld.so.cache,ld.so.preload
42private-tmp 42private-tmp
43 43
44memory-deny-write-execute 44memory-deny-write-execute
45restrict-namespaces
diff --git a/etc/profile-m-z/xviewer.profile b/etc/profile-m-z/xviewer.profile
index e7fa7051e..6c31df4a9 100644
--- a/etc/profile-m-z/xviewer.profile
+++ b/etc/profile-m-z/xviewer.profile
@@ -46,3 +46,4 @@ private-tmp
46# dbus-system none 46# dbus-system none
47 47
48memory-deny-write-execute 48memory-deny-write-execute
49restrict-namespaces
diff --git a/etc/profile-m-z/yelp.profile b/etc/profile-m-z/yelp.profile
index ae0ccced6..6ea7fdfbd 100644
--- a/etc/profile-m-z/yelp.profile
+++ b/etc/profile-m-z/yelp.profile
@@ -74,3 +74,5 @@ read-write ${HOME}/.cache
74# your yelp.local if you need PDF printing support. 74# your yelp.local if you need PDF printing support.
75#noblacklist ${DOCUMENTS} 75#noblacklist ${DOCUMENTS}
76#whitelist ${DOCUMENTS} 76#whitelist ${DOCUMENTS}
77
78restrict-namespaces
diff --git a/etc/profile-m-z/youtube-dl-gui.profile b/etc/profile-m-z/youtube-dl-gui.profile
index 48e18060f..c846893ef 100644
--- a/etc/profile-m-z/youtube-dl-gui.profile
+++ b/etc/profile-m-z/youtube-dl-gui.profile
@@ -53,3 +53,5 @@ private-tmp
53 53
54dbus-user none 54dbus-user none
55dbus-system none 55dbus-system none
56
57restrict-namespaces
diff --git a/etc/profile-m-z/youtube-dl.profile b/etc/profile-m-z/youtube-dl.profile
index 19e176877..4f2cc9523 100644
--- a/etc/profile-m-z/youtube-dl.profile
+++ b/etc/profile-m-z/youtube-dl.profile
@@ -64,3 +64,4 @@ dbus-user none
64dbus-system none 64dbus-system none
65 65
66#memory-deny-write-execute - breaks on Arch (see issue #1803) 66#memory-deny-write-execute - breaks on Arch (see issue #1803)
67restrict-namespaces
diff --git a/etc/profile-m-z/youtube-viewers-common.profile b/etc/profile-m-z/youtube-viewers-common.profile
index 8582e2462..f66e2938b 100644
--- a/etc/profile-m-z/youtube-viewers-common.profile
+++ b/etc/profile-m-z/youtube-viewers-common.profile
@@ -19,6 +19,13 @@ include allow-perl.inc
19include allow-python2.inc 19include allow-python2.inc
20include allow-python3.inc 20include allow-python3.inc
21 21
22# The lines below are needed to find the default Firefox profile name, to allow
23# opening links in an existing instance of Firefox (note that it still fails if
24# there isn't a Firefox instance running with the default profile; see #5352)
25noblacklist ${HOME}/.mozilla
26whitelist ${HOME}/.mozilla/firefox/profiles.ini
27read-only ${HOME}/.mozilla/firefox/profiles.ini
28
22include disable-common.inc 29include disable-common.inc
23include disable-devel.inc 30include disable-devel.inc
24include disable-exec.inc 31include disable-exec.inc
@@ -55,5 +62,10 @@ private-dev
55private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,machine-id,mime.types,nsswitch.conf,passwd,pki,pulse,resolv.conf,ssl,X11,xdg 62private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,machine-id,mime.types,nsswitch.conf,passwd,pki,pulse,resolv.conf,ssl,X11,xdg
56private-tmp 63private-tmp
57 64
58dbus-user none 65dbus-user filter
66# allow D-Bus communication with firefox for opening links
67dbus-user.talk org.mozilla.*
68
59dbus-system none 69dbus-system none
70
71restrict-namespaces
diff --git a/etc/profile-m-z/ytmdesktop.profile b/etc/profile-m-z/ytmdesktop.profile
index 59b6e2543..aa466871c 100644
--- a/etc/profile-m-z/ytmdesktop.profile
+++ b/etc/profile-m-z/ytmdesktop.profile
@@ -1,5 +1,5 @@
1# Firejail profile for ytmdesktop 1# Firejail profile for ytmdesktop
2# Description: Unofficial electron based desktop warpper for YouTube Music 2# Description: Unofficial electron based desktop wrapper for YouTube Music
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include youtube.local 5include youtube.local
diff --git a/etc/profile-m-z/zaproxy.profile b/etc/profile-m-z/zaproxy.profile
index 0caca9792..96324ebda 100644
--- a/etc/profile-m-z/zaproxy.profile
+++ b/etc/profile-m-z/zaproxy.profile
@@ -44,3 +44,4 @@ disable-mnt
44private-dev 44private-dev
45private-tmp 45private-tmp
46 46
47restrict-namespaces
diff --git a/etc/profile-m-z/zart.profile b/etc/profile-m-z/zart.profile
index cd94a3fbd..5816ea5e3 100644
--- a/etc/profile-m-z/zart.profile
+++ b/etc/profile-m-z/zart.profile
@@ -35,3 +35,5 @@ private-dev
35 35
36dbus-user none 36dbus-user none
37dbus-system none 37dbus-system none
38
39restrict-namespaces
diff --git a/etc/profile-m-z/zathura.profile b/etc/profile-m-z/zathura.profile
index 12b090d35..1daf89c84 100644
--- a/etc/profile-m-z/zathura.profile
+++ b/etc/profile-m-z/zathura.profile
@@ -59,3 +59,4 @@ dbus-system none
59read-only ${HOME} 59read-only ${HOME}
60read-write ${HOME}/.config/zathura 60read-write ${HOME}/.config/zathura
61read-write ${HOME}/.local/share/zathura 61read-write ${HOME}/.local/share/zathura
62restrict-namespaces
diff --git a/etc/profile-m-z/zeal.profile b/etc/profile-m-z/zeal.profile
index 84f6d52dd..453f40e73 100644
--- a/etc/profile-m-z/zeal.profile
+++ b/etc/profile-m-z/zeal.profile
@@ -69,3 +69,4 @@ dbus-user.talk org.mozilla.*
69dbus-system none 69dbus-system none
70 70
71# memory-deny-write-execute - breaks on Arch 71# memory-deny-write-execute - breaks on Arch
72restrict-namespaces
diff --git a/etc/profile-m-z/zim.profile b/etc/profile-m-z/zim.profile
index 7350ed5a6..a9e5aa5c3 100644
--- a/etc/profile-m-z/zim.profile
+++ b/etc/profile-m-z/zim.profile
@@ -68,3 +68,5 @@ private-tmp
68 68
69dbus-user none 69dbus-user none
70dbus-system none 70dbus-system none
71
72restrict-namespaces
diff --git a/etc/profile-m-z/zulip.profile b/etc/profile-m-z/zulip.profile
index 5f7d83a7c..b69de3be1 100644
--- a/etc/profile-m-z/zulip.profile
+++ b/etc/profile-m-z/zulip.profile
@@ -45,3 +45,5 @@ private-cache
45private-dev 45private-dev
46private-etc alternatives,asound.conf,fonts,ld.so.cache,ld.so.preload,machine-id 46private-etc alternatives,asound.conf,fonts,ld.so.cache,ld.so.preload,machine-id
47private-tmp 47private-tmp
48
49restrict-namespaces
diff --git a/etc/templates/profile.template b/etc/templates/profile.template
index 59083f660..fd328f36c 100644
--- a/etc/templates/profile.template
+++ b/etc/templates/profile.template
@@ -214,7 +214,7 @@ include globals.local
214# - In order to make dconf work (when used by the app) you need to allow 214# - In order to make dconf work (when used by the app) you need to allow
215# 'ca.desrt.dconf' even when not allowed by flatpak. 215# 'ca.desrt.dconf' even when not allowed by flatpak.
216# Notes and policies about addresses can be found at 216# Notes and policies about addresses can be found at
217# <https://github.com/netblue30/firejail/wiki/Restrict-D-Bus> 217# <https://github.com/netblue30/firejail/wiki/Restrict-DBus>
218#dbus-user filter 218#dbus-user filter
219#dbus-user.own com.github.netblue30.firejail 219#dbus-user.own com.github.netblue30.firejail
220#dbus-user.talk ca.desrt.dconf 220#dbus-user.talk ca.desrt.dconf
diff --git a/src/common.mk b/src/common.mk
deleted file mode 100644
index 07b5e373d..000000000
--- a/src/common.mk
+++ /dev/null
@@ -1,16 +0,0 @@
1# Common definitions for building C programs and non-shared objects.
2#
3# Note: "ROOT" must be defined before including this file.
4
5-include $(ROOT)/config.mk
6
7H_FILE_LIST = $(sort $(wildcard *.h))
8C_FILE_LIST = $(sort $(wildcard *.c))
9OBJS = $(C_FILE_LIST:.c=.o)
10BINOBJS = $(foreach file, $(OBJS), $file)
11
12CFLAGS += -ggdb $(HAVE_FATAL_WARNINGS) -O2 -DVERSION='"$(VERSION)"' $(HAVE_GCOV)
13CFLAGS += -DPREFIX='"$(prefix)"' -DSYSCONFDIR='"$(sysconfdir)/firejail"' -DLIBDIR='"$(libdir)"' -DBINDIR='"$(bindir)"' -DVARDIR='"/var/lib/firejail"'
14CFLAGS += $(MANFLAGS)
15CFLAGS += -fstack-protector-all -D_FORTIFY_SOURCE=2 -fPIE -Wformat -Wformat-security
16LDFLAGS += -pie -fPIE -Wl,-z,relro -Wl,-z,now
diff --git a/src/fbuilder/Makefile b/src/fbuilder/Makefile
index da0403c6e..ad73e8960 100644
--- a/src/fbuilder/Makefile
+++ b/src/fbuilder/Makefile
@@ -1,17 +1,9 @@
1.PHONY: all
2all: fbuilder
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) ../include/common.h ../include/syscall.h $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 3
10fbuilder: $(OBJS) $(ROOT)/config.mk 4PROG = fbuilder
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) $(LIBS) $(EXTRA_LDFLAGS) 5TARGET = $(PROG)
12 6
13.PHONY: clean 7MOD_HDRS = ../include/common.h ../include/syscall.h
14clean:; rm -fr *.o fbuilder *.gcov *.gcda *.gcno *.plist
15 8
16.PHONY: distclean 9include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/fcopy/Makefile b/src/fcopy/Makefile
index ae128df9b..27054627c 100644
--- a/src/fcopy/Makefile
+++ b/src/fcopy/Makefile
@@ -1,17 +1,10 @@
1.PHONY: all
2all: fcopy
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) ../include/common.h ../include/syscall.h $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 3
10fcopy: $(OBJS) ../lib/common.o $(ROOT)/config.mk 4PROG = fcopy
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) ../lib/common.o $(LIBS) $(EXTRA_LDFLAGS) 5TARGET = $(PROG)
12 6
13.PHONY: clean 7MOD_HDRS = ../include/common.h ../include/syscall.h
14clean:; rm -fr *.o fcopy *.gcov *.gcda *.gcno *.plist 8MOD_OBJS = ../lib/common.o
15 9
16.PHONY: distclean 10include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/fids/Makefile b/src/fids/Makefile
index e57c56b5b..44ea396d7 100644
--- a/src/fids/Makefile
+++ b/src/fids/Makefile
@@ -1,18 +1,9 @@
1.PHONY: all
2all: fids
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) ../include/common.h $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 3
10#fseccomp: $(OBJS) ../lib/common.o ../lib/errno.o ../lib/syscall.o 4PROG = fids
11fids: $(OBJS) $(ROOT)/config.mk 5TARGET = $(PROG)
12 $(CC) $(LDFLAGS) -o $@ $(OBJS) $(LIBS) $(EXTRA_LDFLAGS)
13 6
14.PHONY: clean 7MOD_HDRS = ../include/common.h
15clean:; rm -fr *.o fids *.gcov *.gcda *.gcno *.plist
16 8
17.PHONY: distclean 9include $(ROOT)/src/prog.mk
18distclean: clean
diff --git a/src/firecfg/Makefile b/src/firecfg/Makefile
index 3b0daed71..05cc088f4 100644
--- a/src/firecfg/Makefile
+++ b/src/firecfg/Makefile
@@ -1,17 +1,16 @@
1.PHONY: all
2all: firecfg
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6 3
7%.o : %.c $(H_FILE_LIST) ../include/common.h ../include/euid_common.h ../include/libnetlink.h ../include/firejail_user.h ../include/pid.h $(ROOT)/config.mk 4PROG = firecfg
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@ 5TARGET = $(PROG)
9 6
10firecfg: $(OBJS) ../lib/common.o ../lib/firejail_user.o $(ROOT)/config.mk 7MOD_HDRS = \
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) ../lib/common.o ../lib/firejail_user.o $(LIBS) $(EXTRA_LDFLAGS) 8../include/common.h \
9../include/euid_common.h \
10../include/libnetlink.h \
11../include/firejail_user.h \
12../include/pid.h
12 13
13.PHONY: clean 14MOD_OBJS = ../lib/common.o ../lib/firejail_user.o
14clean:; rm -fr *.o firecfg *.gcov *.gcda *.gcno *.plist
15 15
16.PHONY: distclean 16include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/firecfg/firecfg.config b/src/firecfg/firecfg.config
index 17563cde3..15169f983 100644
--- a/src/firecfg/firecfg.config
+++ b/src/firecfg/firecfg.config
@@ -74,6 +74,8 @@ autokey-gtk
74autokey-qt 74autokey-qt
75autokey-run 75autokey-run
76autokey-shell 76autokey-shell
77avidemux3_cli
78avidemux3_jobs_qt5
77avidemux3_qt5 79avidemux3_qt5
78aweather 80aweather
79ballbuster 81ballbuster
@@ -128,6 +130,7 @@ catfish
128cawbird 130cawbird
129celluloid 131celluloid
130chafa 132chafa
133chatterino
131checkbashisms 134checkbashisms
132cheese 135cheese
133cherrytree 136cherrytree
@@ -788,6 +791,7 @@ telegram
788telegram-desktop 791telegram-desktop
789telnet 792telnet
790terasology 793terasology
794tesseract
791textmaker18 795textmaker18
792textmaker18free 796textmaker18free
793thunderbird 797thunderbird
diff --git a/src/firejail/Makefile b/src/firejail/Makefile
index 23444107f..4e241af7e 100644
--- a/src/firejail/Makefile
+++ b/src/firejail/Makefile
@@ -1,17 +1,25 @@
1.PHONY: all
2all: firejail
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6 3
7%.o : %.c $(H_FILE_LIST) ../include/rundefs.h ../include/common.h ../include/ldd_utils.h ../include/euid_common.h ../include/pid.h ../include/seccomp.h ../include/syscall_i386.h ../include/syscall_x86_64.h ../include/firejail_user.h $(ROOT)/config.mk 4PROG = firejail
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@ 5TARGET = $(PROG)
9 6
10firejail: $(OBJS) ../lib/libnetlink.o ../lib/common.o ../lib/ldd_utils.o ../lib/firejail_user.o ../lib/errno.o ../lib/syscall.o $(ROOT)/config.mk 7MOD_HDRS = \
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) ../lib/common.o ../lib/ldd_utils.o ../lib/firejail_user.o ../lib/errno.o ../lib/syscall.o $(LIBS) $(EXTRA_LDFLAGS) 8../include/rundefs.h \
9../include/common.h \
10../include/ldd_utils.h \
11../include/euid_common.h \
12../include/pid.h \
13../include/seccomp.h \
14../include/syscall_i386.h \
15../include/syscall_x86_64.h \
16../include/firejail_user.h
12 17
13.PHONY: clean 18MOD_OBJS = \
14clean:; rm -fr *.o firejail *.gcov *.gcda *.gcno *.plist 19../lib/common.o \
20../lib/ldd_utils.o \
21../lib/firejail_user.o \
22../lib/errno.o \
23../lib/syscall.o
15 24
16.PHONY: distclean 25include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/firejail/chroot.c b/src/firejail/chroot.c
index 6f484e59a..72322221c 100644
--- a/src/firejail/chroot.c
+++ b/src/firejail/chroot.c
@@ -119,6 +119,11 @@ void fs_chroot(const char *rootdir) {
119 int parentfd = safer_openat(-1, rootdir, O_PATH|O_DIRECTORY|O_NOFOLLOW|O_CLOEXEC); 119 int parentfd = safer_openat(-1, rootdir, O_PATH|O_DIRECTORY|O_NOFOLLOW|O_CLOEXEC);
120 if (parentfd == -1) 120 if (parentfd == -1)
121 errExit("safer_openat"); 121 errExit("safer_openat");
122
123 if (faccessat(parentfd, ".", X_OK, 0) != 0) {
124 fprintf(stderr, "Error: no search permission on chroot directory\n");
125 exit(1);
126 }
122 // rootdir has to be owned by root and is not allowed to be generally writable, 127 // rootdir has to be owned by root and is not allowed to be generally writable,
123 // this also excludes /tmp and friends 128 // this also excludes /tmp and friends
124 struct stat s; 129 struct stat s;
diff --git a/src/firejail/firejail.h b/src/firejail/firejail.h
index 65f93d9d1..4fe3a5974 100644
--- a/src/firejail/firejail.h
+++ b/src/firejail/firejail.h
@@ -355,6 +355,7 @@ extern int arg_noinput; // --noinput
355extern int arg_deterministic_exit_code; // always exit with first child's exit status 355extern int arg_deterministic_exit_code; // always exit with first child's exit status
356extern int arg_deterministic_shutdown; // shut down the sandbox if first child dies 356extern int arg_deterministic_shutdown; // shut down the sandbox if first child dies
357extern int arg_keep_fd_all; // inherit all file descriptors to sandbox 357extern int arg_keep_fd_all; // inherit all file descriptors to sandbox
358extern int arg_netlock; // netlocker
358 359
359typedef enum { 360typedef enum {
360 DBUS_POLICY_ALLOW, // Allow unrestricted access to the bus 361 DBUS_POLICY_ALLOW, // Allow unrestricted access to the bus
diff --git a/src/firejail/main.c b/src/firejail/main.c
index 54479dc0c..18e9ae651 100644
--- a/src/firejail/main.c
+++ b/src/firejail/main.c
@@ -159,6 +159,7 @@ int arg_dbus_log_system = 0;
159int arg_tab = 0; 159int arg_tab = 0;
160int login_shell = 0; 160int login_shell = 0;
161int just_run_the_shell = 0; 161int just_run_the_shell = 0;
162int arg_netlock = 0;
162 163
163int parent_to_child_fds[2]; 164int parent_to_child_fds[2];
164int child_to_parent_fds[2]; 165int child_to_parent_fds[2];
@@ -1053,7 +1054,6 @@ int main(int argc, char **argv, char **envp) {
1053 int lockfd_directory = -1; 1054 int lockfd_directory = -1;
1054 int custom_profile = 0; // custom profile loaded 1055 int custom_profile = 0; // custom profile loaded
1055 int arg_caps_cmdline = 0; // caps requested on command line (used to break out of --chroot) 1056 int arg_caps_cmdline = 0; // caps requested on command line (used to break out of --chroot)
1056 int arg_netlock = 0;
1057 char **ptr; 1057 char **ptr;
1058 1058
1059 1059
diff --git a/src/firejail/profile.c b/src/firejail/profile.c
index 15e833288..acf206da6 100644
--- a/src/firejail/profile.c
+++ b/src/firejail/profile.c
@@ -655,6 +655,16 @@ int profile_check_line(char *ptr, int lineno, const char *fname) {
655#endif 655#endif
656 return 0; 656 return 0;
657 } 657 }
658 else if (strcmp(ptr, "netlock") == 0) {
659#ifdef HAVE_NETWORK
660 if (checkcfg(CFG_NETWORK)) {
661 arg_netlock = 1;
662 }
663 else
664 warning_feature_disabled("networking");
665#endif
666 return 0;
667 }
658 else if (strncmp(ptr, "netns ", 6) == 0) { 668 else if (strncmp(ptr, "netns ", 6) == 0) {
659#ifdef HAVE_NETWORK 669#ifdef HAVE_NETWORK
660 if (checkcfg(CFG_NETWORK)) { 670 if (checkcfg(CFG_NETWORK)) {
diff --git a/src/firejail/sandbox.c b/src/firejail/sandbox.c
index 3295362e1..77fe73174 100644
--- a/src/firejail/sandbox.c
+++ b/src/firejail/sandbox.c
@@ -1134,8 +1134,10 @@ int sandbox(void* sandbox_arg) {
1134 struct stat s; 1134 struct stat s;
1135 if (stat(cfg.homedir, &s) == 0) { 1135 if (stat(cfg.homedir, &s) == 0) {
1136 /* coverity[toctou] */ 1136 /* coverity[toctou] */
1137 if (chdir(cfg.homedir) < 0) 1137 if (chdir(cfg.homedir) < 0) {
1138 errExit("chdir"); 1138 fprintf(stderr, "Error: unable to enter home directory: %s: %s\n", cfg.homedir, strerror(errno));
1139 exit(1);
1140 }
1139 } 1141 }
1140 } 1142 }
1141 } 1143 }
diff --git a/src/firejail/usage.c b/src/firejail/usage.c
index 17f5af434..04c586f79 100644
--- a/src/firejail/usage.c
+++ b/src/firejail/usage.c
@@ -91,6 +91,9 @@ static char *usage_str =
91 " --deterministic-shutdown - terminate orphan processes.\n" 91 " --deterministic-shutdown - terminate orphan processes.\n"
92 " --dns=address - set DNS server.\n" 92 " --dns=address - set DNS server.\n"
93 " --dns.print=name|pid - print DNS configuration.\n" 93 " --dns.print=name|pid - print DNS configuration.\n"
94#ifdef HAVE_NETWORK
95 " --dnstrace - monitor DNS queries.\n"
96#endif
94 " --env=name=value - set environment variable.\n" 97 " --env=name=value - set environment variable.\n"
95 " --fs.print=name|pid - print the filesystem log.\n" 98 " --fs.print=name|pid - print the filesystem log.\n"
96#ifdef HAVE_FILE_TRANSFER 99#ifdef HAVE_FILE_TRANSFER
@@ -99,6 +102,9 @@ static char *usage_str =
99 " --help, -? - this help screen.\n" 102 " --help, -? - this help screen.\n"
100 " --hostname=name - set sandbox hostname.\n" 103 " --hostname=name - set sandbox hostname.\n"
101 " --hosts-file=file - use file as /etc/hosts.\n" 104 " --hosts-file=file - use file as /etc/hosts.\n"
105#ifdef HAVE_NETWORK
106 " --icmptrace - monitor Server Name Indiication (TLS/SNI).\n"
107#endif
102 " --ids-check - verify file system.\n" 108 " --ids-check - verify file system.\n"
103 " --ids-init - initialize IDS database.\n" 109 " --ids-init - initialize IDS database.\n"
104 " --ignore=command - ignore command in profile files.\n" 110 " --ignore=command - ignore command in profile files.\n"
@@ -154,8 +160,6 @@ static char *usage_str =
154 " --netns=name - Run the program in a named, persistent network namespace.\n" 160 " --netns=name - Run the program in a named, persistent network namespace.\n"
155 " --netstats - monitor network statistics.\n" 161 " --netstats - monitor network statistics.\n"
156 " --nettrace - monitor received TCP, UDP and ICMP traffic.\n" 162 " --nettrace - monitor received TCP, UDP and ICMP traffic.\n"
157 " --nettrace - monitor DNS queries.\n"
158 " --nettrace - monitor Server Name Indiication (TLS/SNI).\n"
159#endif 163#endif
160 " --nice=value - set nice value.\n" 164 " --nice=value - set nice value.\n"
161 " --no3d - disable 3D hardware acceleration.\n" 165 " --no3d - disable 3D hardware acceleration.\n"
diff --git a/src/firemon/Makefile b/src/firemon/Makefile
index b2d2f4d14..433e4267d 100644
--- a/src/firemon/Makefile
+++ b/src/firemon/Makefile
@@ -1,17 +1,10 @@
1.PHONY: all
2all: firemon
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) ../include/common.h ../include/pid.h $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 3
10firemon: $(OBJS) ../lib/common.o ../lib/pid.o $(ROOT)/config.mk 4PROG = firemon
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) ../lib/common.o ../lib/pid.o $(LIBS) $(EXTRA_LDFLAGS) 5TARGET = $(PROG)
12 6
13.PHONY: clean 7MOD_HDRS = ../include/common.h ../include/pid.h
14clean:; rm -fr *.o firemon *.gcov *.gcda *.gcno *.plist 8MOD_OBJS = ../lib/common.o ../lib/pid.o
15 9
16.PHONY: distclean 10include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/fldd/Makefile b/src/fldd/Makefile
index d9a70529b..0c127af55 100644
--- a/src/fldd/Makefile
+++ b/src/fldd/Makefile
@@ -1,17 +1,10 @@
1.PHONY: all
2all: fldd
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) ../include/common.h ../include/syscall.h ../include/ldd_utils.h $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 3
10fldd: $(OBJS) ../lib/common.o ../lib/ldd_utils.o $(ROOT)/config.mk 4PROG = fldd
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) ../lib/common.o ../lib/ldd_utils.o $(LIBS) $(EXTRA_LDFLAGS) 5TARGET = $(PROG)
12 6
13.PHONY: clean 7MOD_HDRS = ../include/common.h ../include/syscall.h ../include/ldd_utils.h
14clean:; rm -fr *.o fldd *.gcov *.gcda *.gcno *.plist 8MOD_OBJS = ../lib/common.o ../lib/ldd_utils.o
15 9
16.PHONY: distclean 10include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/fnet/Makefile b/src/fnet/Makefile
index 36e95522f..91de109fa 100644
--- a/src/fnet/Makefile
+++ b/src/fnet/Makefile
@@ -1,17 +1,10 @@
1.PHONY: all
2all: fnet
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) ../include/common.h ../include/libnetlink.h $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 3
10fnet: $(OBJS) ../lib/common.o ../lib/libnetlink.o $(ROOT)/config.mk 4PROG = fnet
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) ../lib/common.o ../lib/libnetlink.o $(LIBS) $(EXTRA_LDFLAGS) 5TARGET = $(PROG)
12 6
13.PHONY: clean 7MOD_HDRS = ../include/common.h ../include/libnetlink.h
14clean:; rm -fr *.o fnet *.gcov *.gcda *.gcno *.plist 8MOD_OBJS = ../lib/common.o ../lib/libnetlink.o
15 9
16.PHONY: distclean 10include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/fnetfilter/Makefile b/src/fnetfilter/Makefile
index 758561b9e..506d287ab 100644
--- a/src/fnetfilter/Makefile
+++ b/src/fnetfilter/Makefile
@@ -1,17 +1,10 @@
1.PHONY: all
2all: fnetfilter
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) ../include/common.h ../include/syscall.h $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 3
10fnetfilter: $(OBJS) ../lib/common.o $(ROOT)/config.mk 4PROG = fnetfilter
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) ../lib/common.o $(LIBS) $(EXTRA_LDFLAGS) 5TARGET = $(PROG)
12 6
13.PHONY: clean 7MOD_HDRS = ../include/common.h ../include/syscall.h
14clean:; rm -fr *.o fnetfilter *.gcov *.gcda *.gcno *.plist 8MOD_OBJS = ../lib/common.o
15 9
16.PHONY: distclean 10include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/fnettrace-dns/Makefile b/src/fnettrace-dns/Makefile
index 101abd4d4..36542f567 100644
--- a/src/fnettrace-dns/Makefile
+++ b/src/fnettrace-dns/Makefile
@@ -1,17 +1,7 @@
1.PHONY: all
2all: fnettrace-dns
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9
10fnettrace-dns: $(OBJS) $(ROOT)/config.mk
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) $(LIBS) $(EXTRA_LDFLAGS)
12 3
13.PHONY: clean 4PROG = fnettrace-dns
14clean:; rm -fr *.o fnettrace-dns *.gcov *.gcda *.gcno *.plist 5TARGET = $(PROG)
15 6
16.PHONY: distclean 7include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/fnettrace-dns/main.c b/src/fnettrace-dns/main.c
index 32122754f..48bf14710 100644
--- a/src/fnettrace-dns/main.c
+++ b/src/fnettrace-dns/main.c
@@ -70,6 +70,7 @@ void print_dns(uint32_t ip_src, unsigned char *pkt) {
70 type, (nxdomain)? " NXDOMAIN": ""); 70 type, (nxdomain)? " NXDOMAIN": "");
71 if (strcmp(tmp, last)) { 71 if (strcmp(tmp, last)) {
72 printf("%s\n", tmp); 72 printf("%s\n", tmp);
73 fflush(0);
73 strcpy(last, tmp); 74 strcpy(last, tmp);
74 } 75 }
75 76
@@ -77,6 +78,7 @@ void print_dns(uint32_t ip_src, unsigned char *pkt) {
77 78
78errout: 79errout:
79 printf("%02d:%02d:%02d %15s Error: invalid DNS packet\n", t->tm_hour, t->tm_min, t->tm_sec, ip); 80 printf("%02d:%02d:%02d %15s Error: invalid DNS packet\n", t->tm_hour, t->tm_min, t->tm_sec, ip);
81 fflush(0);
80} 82}
81 83
82// https://www.kernel.org/doc/html/latest/networking/filter.html 84// https://www.kernel.org/doc/html/latest/networking/filter.html
diff --git a/src/fnettrace-icmp/Makefile b/src/fnettrace-icmp/Makefile
index 4dfdc891a..12ae42e9a 100644
--- a/src/fnettrace-icmp/Makefile
+++ b/src/fnettrace-icmp/Makefile
@@ -1,17 +1,7 @@
1.PHONY: all
2all: fnettrace-icmp
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9
10fnettrace-icmp: $(OBJS) $(ROOT)/config.mk
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) $(LIBS) $(EXTRA_LDFLAGS)
12 3
13.PHONY: clean 4PROG = fnettrace-icmp
14clean:; rm -fr *.o fnettrace-icmp *.gcov *.gcda *.gcno *.plist 5TARGET = $(PROG)
15 6
16.PHONY: distclean 7include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/fnettrace-icmp/main.c b/src/fnettrace-icmp/main.c
index 986091bb4..bb857c922 100644
--- a/src/fnettrace-icmp/main.c
+++ b/src/fnettrace-icmp/main.c
@@ -64,19 +64,19 @@ char *code_dest_unreachable[16] = {
64 "Host unreachable for ToS", 64 "Host unreachable for ToS",
65 "Communication administratively prohibited", 65 "Communication administratively prohibited",
66 "Host Precedence Violation", 66 "Host Precedence Violation",
67 "Precedence cutoff in effect " 67 "Precedence cutoff in effect"
68}; 68};
69 69
70char *code_redirect_message[4] = { 70char *code_redirect_message[4] = {
71 "Datagram for the Network", 71 "Datagram for the Network",
72 "Datagram for the Host", 72 "Datagram for the Host",
73 "Datagram for the ToS & network", 73 "Datagram for the ToS & network",
74 "Datagram for the ToS & host " 74 "Datagram for the ToS & host"
75}; 75};
76 76
77char *code_time_exceeded[2] = { 77char *code_time_exceeded[2] = {
78 "TTL expired in transit", 78 "TTL expired in transit",
79 "Fragment reassembly time exceeded " 79 "Fragment reassembly time exceeded"
80}; 80};
81 81
82char *code_bad_ip_header[3] = { 82char *code_bad_ip_header[3] = {
@@ -115,6 +115,7 @@ static void print_icmp(uint32_t ip_dest, uint32_t ip_src, uint8_t type, uint8_t
115 icmp_bytes, 115 icmp_bytes,
116 type_ptr, 116 type_ptr,
117 code_ptr); 117 code_ptr);
118 fflush(0);
118} 119}
119 120
120// https://www.kernel.org/doc/html/latest/networking/filter.html 121// https://www.kernel.org/doc/html/latest/networking/filter.html
diff --git a/src/fnettrace-sni/Makefile b/src/fnettrace-sni/Makefile
index da7c1ca4e..8d9a437d5 100644
--- a/src/fnettrace-sni/Makefile
+++ b/src/fnettrace-sni/Makefile
@@ -1,17 +1,7 @@
1.PHONY: all
2all: fnettrace-sni
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9
10fnettrace-sni: $(OBJS) $(ROOT)/config.mk
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) $(LIBS) $(EXTRA_LDFLAGS)
12 3
13.PHONY: clean 4PROG = fnettrace-sni
14clean:; rm -fr *.o fnettrace-sni *.gcov *.gcda *.gcno *.plist 5TARGET = $(PROG)
15 6
16.PHONY: distclean 7include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/fnettrace-sni/main.c b/src/fnettrace-sni/main.c
index 71793a560..d0f75dac9 100644
--- a/src/fnettrace-sni/main.c
+++ b/src/fnettrace-sni/main.c
@@ -77,6 +77,7 @@ static void print_tls(uint32_t ip_dest, unsigned char *pkt, unsigned len) {
77 snprintf(tmp, sizeof(last), "%02d:%02d:%02d %-15s %s", t->tm_hour, t->tm_min, t->tm_sec, ip, name); 77 snprintf(tmp, sizeof(last), "%02d:%02d:%02d %-15s %s", t->tm_hour, t->tm_min, t->tm_sec, ip, name);
78 if (strcmp(tmp, last)) { 78 if (strcmp(tmp, last)) {
79 printf("%s\n", tmp); 79 printf("%s\n", tmp);
80 fflush(0);
80 strcpy(last, tmp); 81 strcpy(last, tmp);
81 } 82 }
82 } 83 }
@@ -86,6 +87,7 @@ static void print_tls(uint32_t ip_dest, unsigned char *pkt, unsigned len) {
86 87
87errout: 88errout:
88 printf("%02d:%02d:%02d %-15s Error: invalid TLS packet\n", t->tm_hour, t->tm_min, t->tm_sec, ip); 89 printf("%02d:%02d:%02d %-15s Error: invalid TLS packet\n", t->tm_hour, t->tm_min, t->tm_sec, ip);
90 fflush(0);
89 return; 91 return;
90 92
91nosni: 93nosni:
diff --git a/src/fnettrace/Makefile b/src/fnettrace/Makefile
index f41a4d36d..952036ad3 100644
--- a/src/fnettrace/Makefile
+++ b/src/fnettrace/Makefile
@@ -1,17 +1,7 @@
1.PHONY: all
2all: fnettrace
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9
10fnettrace: $(OBJS) $(ROOT)/config.mk
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) $(LIBS) $(EXTRA_LDFLAGS)
12 3
13.PHONY: clean 4PROG = fnettrace
14clean:; rm -fr *.o fnettrace *.gcov *.gcda *.gcno *.plist 5TARGET = $(PROG)
15 6
16.PHONY: distclean 7include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/fnettrace/static-ip-map b/src/fnettrace/static-ip-map
index d3d234f5a..c630b6688 100644
--- a/src/fnettrace/static-ip-map
+++ b/src/fnettrace/static-ip-map
@@ -48,6 +48,7 @@
484.0.0.0/9 Level 3 484.0.0.0/9 Level 3
496.0.0.0/8 US Army 496.0.0.0/8 US Army
507.0.0.0/8 US Army 507.0.0.0/8 US Army
518.0.0.0/9 Level 3
519.0.0.0/8 IBM 529.0.0.0/8 IBM
5211.0.0.0/8 US Army 5311.0.0.0/8 US Army
5317.0.0.0/8 Apple 5417.0.0.0/8 Apple
@@ -199,7 +200,103 @@
199151.139.0.0/16 StackPath 200151.139.0.0/16 StackPath
200 201
201# Linode 202# Linode
203103.29.68.0/22 Linode
204104.200.16.0/21 Linode
205104.200.24.0/22 Linode
206104.200.25.0/24 Linode
207104.200.26.0/24 Linode
208104.200.27.0/24 Linode
209104.200.28.0/22 Linode
210104.237.128.0/21 Linode
211104.237.136.0/21 Linode
212104.237.144.0/21 Linode
213104.237.152.0/21 Linode
214104.237.152.0/24 Linode
215104.237.153.0/24 Linode
216104.237.154.0/24 Linode
217104.237.155.0/24 Linode
218104.237.156.0/24 Linode
219104.237.157.0/24 Linode
220104.237.158.0/24 Linode
221104.237.159.0/24 Linode
222109.237.24.0/22 Linode
223109.74.192.0/20 Linode
224139.144.0.0/20 Linode
225139.144.104.0/21 Linode
226139.144.112.0/20 Linode
227139.144.128.0/21 Linode
228139.144.136.0/21 Linode
229139.144.144.0/20 Linode
230139.144.160.0/22 Linode
231139.144.16.0/20 Linode
232139.144.164.0/22 Linode
233139.144.168.0/21 Linode
234139.144.176.0/21 Linode
235139.144.184.0/21 Linode
236139.144.192.0/19 Linode
237139.144.224.0/21 Linode
238139.144.232.0/21 Linode
239139.144.240.0/22 Linode
240139.144.32.0/21 Linode
241139.144.40.0/21 Linode
242139.144.48.0/20 Linode
243139.144.64.0/20 Linode
244139.144.80.0/21 Linode
245139.144.88.0/21 Linode
246139.144.96.0/21 Linode
247139.162.0.0/19 Linode
248139.162.128.0/19 Linode
249139.162.160.0/19 Linode
250139.162.192.0/19 Linode
251139.162.224.0/19 Linode
252139.162.32.0/19 Linode
253139.162.64.0/19 Linode
254139.162.96.0/19 Linode
255139.177.176.0/21 Linode
256139.177.184.0/21 Linode
257139.177.192.0/21 Linode
258139.177.200.0/21 Linode
259151.236.216.0/21 Linode
260162.216.16.0/22 Linode
261170.187.128.0/24 Linode
262170.187.129.0/24 Linode
263170.187.131.0/24 Linode
264170.187.132.0/24 Linode
265170.187.134.0/23 Linode
266170.187.136.0/21 Linode
267170.187.144.0/20 Linode
268170.187.160.0/21 Linode
269170.187.168.0/21 Linode
270170.187.176.0/21 Linode
271170.187.184.0/21 Linode
272170.187.192.0/22 Linode
273170.187.196.0/22 Linode
274170.187.200.0/21 Linode
275170.187.208.0/20 Linode
276170.187.224.0/21 Linode
277170.187.232.0/21 Linode
278170.187.240.0/21 Linode
279170.187.248.0/21 Linode
202172.104.0.0/15 Linode 280172.104.0.0/15 Linode
281172.104.128.0/19 Linode
282172.104.160.0/19 Linode
283172.104.192.0/21 Linode
284172.104.200.0/23 Linode
285172.104.202.0/23 Linode
286172.104.205.0/24 Linode
287172.104.206.0/24 Linode
288172.104.207.0/24 Linode
289172.104.208.0/20 Linode
290172.104.220.0/24 Linode
291172.104.224.0/19 Linode
292172.104.32.0/19 Linode
293172.104.4.0/22 Linode
294172.104.64.0/19 Linode
295172.104.8.0/21 Linode
296172.104.96.0/19 Linode
297172.105.0.0/19 Linode
298172.105.112.0/20 Linode
299172.105.128.0/23 Linode
203 300
204# Akamai 301# Akamai
20523.0.0.0/12 Akamai 30223.0.0.0/12 Akamai
diff --git a/src/fsec-optimize/Makefile b/src/fsec-optimize/Makefile
index 1aa49d34b..ce65f4719 100644
--- a/src/fsec-optimize/Makefile
+++ b/src/fsec-optimize/Makefile
@@ -1,17 +1,10 @@
1.PHONY: all
2all: fsec-optimize
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) ../include/common.h ../include/seccomp.h ../include/syscall.h $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 3
10fsec-optimize: $(OBJS) ../lib/common.o ../lib/libnetlink.o $(ROOT)/config.mk 4PROG = fsec-optimize
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) ../lib/common.o ../lib/errno.o $(LIBS) $(EXTRA_LDFLAGS) 5TARGET = $(PROG)
12 6
13.PHONY: clean 7MOD_HDRS = ../include/common.h ../include/seccomp.h ../include/syscall.h
14clean:; rm -fr *.o fsec-optimize *.gcov *.gcda *.gcno *.plist 8MOD_OBJS = ../lib/common.o ../lib/errno.o
15 9
16.PHONY: distclean 10include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/fsec-print/Makefile b/src/fsec-print/Makefile
index b076c0588..cbe061d45 100644
--- a/src/fsec-print/Makefile
+++ b/src/fsec-print/Makefile
@@ -1,17 +1,10 @@
1.PHONY: all
2all: fsec-print
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) ../include/common.h ../include/seccomp.h ../include/syscall.h $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 3
10fsec-print: $(OBJS) ../lib/common.o ../lib/libnetlink.o ../lib/errno.o ../lib/syscall.o $(ROOT)/config.mk 4PROG = fsec-print
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) ../lib/common.o ../lib/errno.o ../lib/syscall.o $(LIBS) $(EXTRA_LDFLAGS) 5TARGET = $(PROG)
12 6
13.PHONY: clean 7MOD_HDRS = ../include/common.h ../include/seccomp.h ../include/syscall.h
14clean:; rm -fr *.o fsec-print *.gcov *.gcda *.gcno *.plist 8MOD_OBJS = ../lib/common.o ../lib/errno.o ../lib/syscall.o
15 9
16.PHONY: distclean 10include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/fseccomp/Makefile b/src/fseccomp/Makefile
index 9bf4c050b..1b8d0bb48 100644
--- a/src/fseccomp/Makefile
+++ b/src/fseccomp/Makefile
@@ -1,17 +1,10 @@
1.PHONY: all
2all: fseccomp
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) ../include/common.h ../include/syscall.h $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 3
10fseccomp: $(OBJS) ../lib/common.o ../lib/errno.o ../lib/syscall.o $(ROOT)/config.mk 4PROG = fseccomp
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) ../lib/common.o ../lib/errno.o ../lib/syscall.o $(LIBS) $(EXTRA_LDFLAGS) 5TARGET = $(PROG)
12 6
13.PHONY: clean 7MOD_HDRS = ../include/common.h ../include/syscall.h
14clean:; rm -fr *.o fseccomp *.gcov *.gcda *.gcno *.plist 8MOD_OBJS = ../lib/common.o ../lib/errno.o ../lib/syscall.o
15 9
16.PHONY: distclean 10include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/ftee/Makefile b/src/ftee/Makefile
index 535d7ff63..2f26ab900 100644
--- a/src/ftee/Makefile
+++ b/src/ftee/Makefile
@@ -1,17 +1,7 @@
1.PHONY: all
2all: ftee
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9
10ftee: $(OBJS) $(ROOT)/config.mk
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) $(LIBS) $(EXTRA_LDFLAGS)
12 3
13.PHONY: clean 4PROG = ftee
14clean:; rm -fr *.o ftee *.gcov *.gcda *.gcno *.plist 5TARGET = $(PROG)
15 6
16.PHONY: distclean 7include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/fzenity/Makefile b/src/fzenity/Makefile
index 0358dd3e9..aeb862d9b 100644
--- a/src/fzenity/Makefile
+++ b/src/fzenity/Makefile
@@ -1,17 +1,9 @@
1.PHONY: all
2all: fzenity
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) ../include/common.h $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 3
10fzenity: $(OBJS) $(ROOT)/config.mk 4PROG = fzenity
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) $(LIBS) $(EXTRA_LDFLAGS) 5TARGET = $(PROG)
12 6
13.PHONY: clean 7MOD_HDRS = ../include/common.h
14clean:; rm -fr *.o fzenity *.gcov *.gcda *.gcno *.plist
15 8
16.PHONY: distclean 9include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/jailcheck/Makefile b/src/jailcheck/Makefile
index 52feb86e6..e3b84fbf3 100644
--- a/src/jailcheck/Makefile
+++ b/src/jailcheck/Makefile
@@ -1,17 +1,10 @@
1.PHONY: all
2all: jailcheck
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) ../include/common.h ../include/pid.h $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 3
10jailcheck: $(OBJS) $(ROOT)/config.mk 4PROG = jailcheck
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) ../lib/common.o ../lib/pid.o $(LIBS) $(EXTRA_LDFLAGS) 5TARGET = $(PROG)
12 6
13.PHONY: clean 7MOD_HDRS = ../include/common.h ../include/pid.h
14clean:; rm -fr *.o jailcheck *.gcov *.gcda *.gcno *.plist 8MOD_OBJS = ../lib/common.o ../lib/pid.o
15 9
16.PHONY: distclean 10include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/lib/Makefile b/src/lib/Makefile
index d9bc63ef7..f5b92e389 100644
--- a/src/lib/Makefile
+++ b/src/lib/Makefile
@@ -1,14 +1,9 @@
1ROOT = ../.. 1ROOT = ../..
2include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
3 3
4.PHONY: all 4TARGET = lib
5all: $(OBJS)
6 5
7%.o : %.c $(H_FILE_LIST) $(ROOT)/config.mk 6include $(ROOT)/src/prog.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 7
10.PHONY: clean 8.PHONY: lib
11clean:; rm -fr $(OBJS) *.gcov *.gcda *.gcno *.plist 9lib: $(OBJS)
12
13.PHONY: distclean
14distclean: clean
diff --git a/src/libpostexecseccomp/Makefile b/src/libpostexecseccomp/Makefile
index 5386af58b..62e167b73 100644
--- a/src/libpostexecseccomp/Makefile
+++ b/src/libpostexecseccomp/Makefile
@@ -1,24 +1,9 @@
1ROOT = ../.. 1ROOT = ../..
2-include $(ROOT)/config.mk 2-include $(ROOT)/config.mk
3 3
4H_FILE_LIST = $(sort $(wildcard *.h)) 4SO = libpostexecseccomp.so
5C_FILE_LIST = $(sort $(wildcard *.c)) 5TARGET = $(SO)
6OBJS = $(C_FILE_LIST:.c=.o)
7BINOBJS = $(foreach file, $(OBJS), $file)
8CFLAGS += -ggdb $(HAVE_FATAL_WARNINGS) -O2 -DVERSION='"$(VERSION)"' -fstack-protector-all -D_FORTIFY_SOURCE=2 -fPIC -Wformat -Wformat-security
9LDFLAGS += -pie -fPIE -Wl,-z,relro -Wl,-z,now
10 6
11.PHONY: all 7MOD_HDRS = ../include/seccomp.h ../include/rundefs.h
12all: libpostexecseccomp.so
13 8
14%.o : %.c $(H_FILE_LIST) ../include/seccomp.h ../include/rundefs.h $(ROOT)/config.mk 9include $(ROOT)/src/so.mk
15 $(CC) $(CFLAGS) $(INCLUDE) -c $< -o $@
16
17libpostexecseccomp.so: $(OBJS) $(ROOT)/config.mk
18 $(CC) $(LDFLAGS) -shared -fPIC -z relro -o $@ $(OBJS) -ldl
19
20.PHONY: clean
21clean:; rm -fr $(OBJS) libpostexecseccomp.so *.plist
22
23.PHONY: distclean
24distclean: clean
diff --git a/src/libtrace/Makefile b/src/libtrace/Makefile
index 6f28b3442..d45b3e2f6 100644
--- a/src/libtrace/Makefile
+++ b/src/libtrace/Makefile
@@ -1,24 +1,7 @@
1ROOT = ../.. 1ROOT = ../..
2-include $(ROOT)/config.mk 2-include $(ROOT)/config.mk
3 3
4H_FILE_LIST = $(sort $(wildcard *.h)) 4SO = libtrace.so
5C_FILE_LIST = $(sort $(wildcard *.c)) 5TARGET = $(SO)
6OBJS = $(C_FILE_LIST:.c=.o)
7BINOBJS = $(foreach file, $(OBJS), $file)
8CFLAGS += -ggdb $(HAVE_FATAL_WARNINGS) -O2 -DVERSION='"$(VERSION)"' -fstack-protector-all -D_FORTIFY_SOURCE=2 -fPIC -Wformat -Wformat-security
9LDFLAGS += -pie -fPIE -Wl,-z,relro -Wl,-z,now
10 6
11.PHONY: all 7include $(ROOT)/src/so.mk
12all: libtrace.so
13
14%.o : %.c $(H_FILE_LIST) $(ROOT)/config.mk
15 $(CC) $(CFLAGS) $(INCLUDE) -c $< -o $@
16
17libtrace.so: $(OBJS) $(ROOT)/config.mk
18 $(CC) $(LDFLAGS) -shared -fPIC -z relro -o $@ $(OBJS) -ldl
19
20.PHONY: clean
21clean:; rm -fr $(OBJS) libtrace.so *.plist
22
23.PHONY: distclean
24distclean: clean
diff --git a/src/libtracelog/Makefile b/src/libtracelog/Makefile
index c5d9c131d..bfc5adddc 100644
--- a/src/libtracelog/Makefile
+++ b/src/libtracelog/Makefile
@@ -1,24 +1,9 @@
1ROOT = ../.. 1ROOT = ../..
2-include $(ROOT)/config.mk 2-include $(ROOT)/config.mk
3 3
4H_FILE_LIST = $(sort $(wildcard *.h)) 4SO = libtracelog.so
5C_FILE_LIST = $(sort $(wildcard *.c)) 5TARGET = $(SO)
6OBJS = $(C_FILE_LIST:.c=.o)
7BINOBJS = $(foreach file, $(OBJS), $file)
8CFLAGS += -ggdb $(HAVE_FATAL_WARNINGS) -O2 -DVERSION='"$(VERSION)"' -fstack-protector-all -D_FORTIFY_SOURCE=2 -fPIC -Wformat -Wformat-security
9LDFLAGS += -pie -fPIE -Wl,-z,relro -Wl,-z,now
10 6
11.PHONY: all 7MOD_HDRS = ../include/rundefs.h
12all: libtracelog.so
13 8
14%.o : %.c $(H_FILE_LIST) ../include/rundefs.h $(ROOT)/config.mk 9include $(ROOT)/src/so.mk
15 $(CC) $(CFLAGS) $(INCLUDE) -c $< -o $@
16
17libtracelog.so: $(OBJS) $(ROOT)/config.mk
18 $(CC) $(LDFLAGS) -shared -fPIC -z relro -o $@ $(OBJS) -ldl
19
20.PHONY: clean
21clean:; rm -fr $(OBJS) libtracelog.so *.plist
22
23.PHONY: distclean
24distclean: clean
diff --git a/src/man/firejail-profile.txt b/src/man/firejail-profile.txt
index 138aae8af..5b16179ac 100644
--- a/src/man/firejail-profile.txt
+++ b/src/man/firejail-profile.txt
@@ -14,7 +14,7 @@ Using a specific profile:
14.br 14.br
15Example: 15Example:
16.br 16.br
17$ firejail --profile=/etc/firejail/kdenlive.profile --appimage kdenlive.appimage 17$ firejail --appimage --profile=/etc/firejail/kdenlive.profile kdenlive.appimage
18.br 18.br
19 19
20.br 20.br
@@ -25,7 +25,7 @@ $ firejail --profile=/etc/firejail/kdenlive.profile --appimage kdenlive.appimage
25.br 25.br
26Example: 26Example:
27.br 27.br
28$ firejail --profile=kdenlive --appimage kdenlive.appimage 28$ firejail --appimage --profile=kdenlive kdenlive.appimage
29.br 29.br
30 30
31.br 31.br
@@ -179,6 +179,11 @@ can be enabled or disabled globally in Firejail's configuration file.
179 179
180The profile line may be any profile line that you would normally use in a profile \fBexcept\fR for "quiet" and "include" lines. 180The profile line may be any profile line that you would normally use in a profile \fBexcept\fR for "quiet" and "include" lines.
181 181
182Note: When using one or more conditionals and \fB--profile\fR, it is
183recommended that the relevant option(s) (such as \fB--appimage\fR) be specified
184before \fB--profile\fR, so that their respective conditional(s) (such as
185\fB?HAS_APPIMAGE\fR) inside of the profile evaluate to true.
186
182.TP 187.TP
183\fBinclude other.profile 188\fBinclude other.profile
184Include other.profile file. 189Include other.profile file.
@@ -972,6 +977,10 @@ If a new network namespace is created, enabled default network filter.
972\fBnetfilter filename 977\fBnetfilter filename
973If a new network namespace is created, enabled the network filter in filename. 978If a new network namespace is created, enabled the network filter in filename.
974 979
980.TP
981\fBnetlock
982Generate a custom network filter and enable it.
983
975 984
976.TP 985.TP
977\fBnetmask address 986\fBnetmask address
diff --git a/src/man/firejail.txt b/src/man/firejail.txt
index b4be1cd62..39c81312c 100644
--- a/src/man/firejail.txt
+++ b/src/man/firejail.txt
@@ -11,7 +11,7 @@ firejail [OPTIONS] [program and arguments]
11Start an AppImage program: 11Start an AppImage program:
12.PP 12.PP
13.RS 13.RS
14firejail [OPTIONS] --appimage [appimage-file and arguments] 14firejail [OPTIONS] --appimage [OPTIONS] [appimage-file and arguments]
15.RE 15.RE
16.PP 16.PP
17#ifdef HAVE_FILE_TRANSFER 17#ifdef HAVE_FILE_TRANSFER
@@ -164,15 +164,22 @@ private-bin and private-lib are disabled by default when running appimages.
164.br 164.br
165Example: 165Example:
166.br 166.br
167$ firejail --profile=krita --appimage krita-3.0-x86_64.appimage 167$ firejail --appimage --profile=krita krita-3.0-x86_64.appimage
168.br 168.br
169$ firejail --private --profile=krita --appimage krita-3.0-x86_64.appimage 169$ firejail --quiet --appimage --private --profile=krita krita-3.0-x86_64.appimage
170.br 170.br
171#ifdef HAVE_X11 171#ifdef HAVE_X11
172$ firejail --net=none --x11 --profile=krita --appimage krita-3.0-x86_64.appimage 172$ firejail --appimage --net=none --x11 --profile=krita krita-3.0-x86_64.appimage
173#endif 173#endif
174.TP 174.br
175
176.br
177Note: When using both \fB--appimage\fR and \fB--profile\fR, it is recommended
178to always specify the former before the latter, so that any \fB?HAS_APPIMAGE\fR
179conditionals inside of the profile evaluate to true (see \fB?CONDITIONAL\fR in
180firejail-profile(5)).
175#ifdef HAVE_NETWORK 181#ifdef HAVE_NETWORK
182.TP
176\fB\-\-bandwidth=name|pid 183\fB\-\-bandwidth=name|pid
177Set bandwidth limits for the sandbox identified by name or PID, see \fBTRAFFIC SHAPING\fR section for more details. 184Set bandwidth limits for the sandbox identified by name or PID, see \fBTRAFFIC SHAPING\fR section for more details.
178#endif 185#endif
diff --git a/src/profstats/Makefile b/src/profstats/Makefile
index 0274aead2..47b39e76c 100644
--- a/src/profstats/Makefile
+++ b/src/profstats/Makefile
@@ -1,17 +1,9 @@
1.PHONY: all
2all: profstats
3
4ROOT = ../.. 1ROOT = ../..
5include $(ROOT)/src/common.mk 2-include $(ROOT)/config.mk
6
7%.o : %.c $(H_FILE_LIST) ../include/common.h $(ROOT)/config.mk
8 $(CC) $(CFLAGS) $(EXTRA_CFLAGS) $(INCLUDE) -c $< -o $@
9 3
10profstats: $(OBJS) $(ROOT)/config.mk 4PROG = profstats
11 $(CC) $(LDFLAGS) -o $@ $(OBJS) $(LIBS) $(EXTRA_LDFLAGS) 5TARGET = $(PROG)
12 6
13.PHONY: clean 7MOD_HDRS = ../include/common.h
14clean:; rm -fr *.o profstats *.gcov *.gcda *.gcno *.plist
15 8
16.PHONY: distclean 9include $(ROOT)/src/prog.mk
17distclean: clean
diff --git a/src/profstats/main.c b/src/profstats/main.c
index 9deb72f7e..310319c69 100644
--- a/src/profstats/main.c
+++ b/src/profstats/main.c
@@ -25,6 +25,7 @@
25static int cnt_profiles = 0; 25static int cnt_profiles = 0;
26static int cnt_apparmor = 0; 26static int cnt_apparmor = 0;
27static int cnt_seccomp = 0; 27static int cnt_seccomp = 0;
28static int cnt_restrict_namespaces = 0;
28static int cnt_caps = 0; 29static int cnt_caps = 0;
29static int cnt_dbus_system_none = 0; 30static int cnt_dbus_system_none = 0;
30static int cnt_dbus_user_none = 0; 31static int cnt_dbus_user_none = 0;
@@ -69,6 +70,7 @@ static int arg_whitelisthome = 0;
69static int arg_noroot = 0; 70static int arg_noroot = 0;
70static int arg_print_blacklist = 0; 71static int arg_print_blacklist = 0;
71static int arg_print_whitelist = 0; 72static int arg_print_whitelist = 0;
73static int arg_restrict_namespaces = 0;
72 74
73static char *profile = NULL; 75static char *profile = NULL;
74 76
@@ -91,6 +93,7 @@ static void usage(void) {
91 printf(" --print-whitelist - print all --private and --whitelist for a profile\n"); 93 printf(" --print-whitelist - print all --private and --whitelist for a profile\n");
92 printf(" --seccomp - print profiles without seccomp\n"); 94 printf(" --seccomp - print profiles without seccomp\n");
93 printf(" --memory-deny-write-execute - print profiles without \"memory-deny-write-execute\"\n"); 95 printf(" --memory-deny-write-execute - print profiles without \"memory-deny-write-execute\"\n");
96 printf(" --restrict-namespaces - print profiles without \"restrict-namespaces\"\n");
94 printf(" --whitelist-home - print profiles whitelisting home directory\n"); 97 printf(" --whitelist-home - print profiles whitelisting home directory\n");
95 printf(" --whitelist-var - print profiles without \"include whitelist-var-common.inc\"\n"); 98 printf(" --whitelist-var - print profiles without \"include whitelist-var-common.inc\"\n");
96 printf(" --whitelist-runuser - print profiles without \"include whitelist-runuser-common.inc\" or \"blacklist ${RUNUSER}\"\n"); 99 printf(" --whitelist-runuser - print profiles without \"include whitelist-runuser-common.inc\" or \"blacklist ${RUNUSER}\"\n");
@@ -152,6 +155,8 @@ static void process_file(char *fname) {
152 155
153 if (strncmp(ptr, "seccomp", 7) == 0) 156 if (strncmp(ptr, "seccomp", 7) == 0)
154 cnt_seccomp++; 157 cnt_seccomp++;
158 if (strncmp(ptr, "restrict-namespaces", 19) == 0)
159 cnt_restrict_namespaces++;
155 else if (strncmp(ptr, "caps", 4) == 0) 160 else if (strncmp(ptr, "caps", 4) == 0)
156 cnt_caps++; 161 cnt_caps++;
157 else if (strncmp(ptr, "include disable-exec.inc", 24) == 0) 162 else if (strncmp(ptr, "include disable-exec.inc", 24) == 0)
@@ -242,6 +247,8 @@ int main(int argc, char **argv) {
242 arg_caps = 1; 247 arg_caps = 1;
243 else if (strcmp(argv[i], "--seccomp") == 0) 248 else if (strcmp(argv[i], "--seccomp") == 0)
244 arg_seccomp = 1; 249 arg_seccomp = 1;
250 else if (strcmp(argv[i], "--restrict-namespaces") == 0)
251 arg_restrict_namespaces = 1;
245 else if (strcmp(argv[i], "--memory-deny-write-execute") == 0) 252 else if (strcmp(argv[i], "--memory-deny-write-execute") == 0)
246 arg_mdwx = 1; 253 arg_mdwx = 1;
247 else if (strcmp(argv[i], "--noexec") == 0) 254 else if (strcmp(argv[i], "--noexec") == 0)
@@ -291,7 +298,7 @@ int main(int argc, char **argv) {
291 for (i = start; i < argc; i++) { 298 for (i = start; i < argc; i++) {
292 cnt_profiles++; 299 cnt_profiles++;
293 300
294 // watch seccomp 301 int restrict_namespaces = cnt_restrict_namespaces;
295 int seccomp = cnt_seccomp; 302 int seccomp = cnt_seccomp;
296 int caps = cnt_caps; 303 int caps = cnt_caps;
297 int apparmor = cnt_apparmor; 304 int apparmor = cnt_apparmor;
@@ -334,6 +341,8 @@ int main(int argc, char **argv) {
334 cnt_whitelistrunuser = whitelistrunuser + 1; 341 cnt_whitelistrunuser = whitelistrunuser + 1;
335 if (cnt_seccomp > (seccomp + 1)) 342 if (cnt_seccomp > (seccomp + 1))
336 cnt_seccomp = seccomp + 1; 343 cnt_seccomp = seccomp + 1;
344 if (cnt_restrict_namespaces > (restrict_namespaces + 1))
345 cnt_seccomp = restrict_namespaces + 1;
337 if (cnt_dbus_user_none > (dbususernone + 1)) 346 if (cnt_dbus_user_none > (dbususernone + 1))
338 cnt_dbus_user_none = dbususernone + 1; 347 cnt_dbus_user_none = dbususernone + 1;
339 if (cnt_dbus_user_filter > (dbususerfilter + 1)) 348 if (cnt_dbus_user_filter > (dbususerfilter + 1))
@@ -353,6 +362,8 @@ int main(int argc, char **argv) {
353 printf("No caps found in %s\n", argv[i]); 362 printf("No caps found in %s\n", argv[i]);
354 if (arg_seccomp && seccomp == cnt_seccomp) 363 if (arg_seccomp && seccomp == cnt_seccomp)
355 printf("No seccomp found in %s\n", argv[i]); 364 printf("No seccomp found in %s\n", argv[i]);
365 if (arg_restrict_namespaces && restrict_namespaces == cnt_restrict_namespaces)
366 printf("No restrict-namespaces found in %s\n", argv[i]);
356 if (arg_noexec && noexec == cnt_noexec) 367 if (arg_noexec && noexec == cnt_noexec)
357 printf("No include disable-exec.inc found in %s\n", argv[i]); 368 printf("No include disable-exec.inc found in %s\n", argv[i]);
358 if (arg_noroot && noroot == cnt_noroot) 369 if (arg_noroot && noroot == cnt_noroot)
@@ -397,6 +408,7 @@ int main(int argc, char **argv) {
397 printf(" noexec\t\t\t%d (include disable-exec.inc)\n", cnt_noexec); 408 printf(" noexec\t\t\t%d (include disable-exec.inc)\n", cnt_noexec);
398 printf(" noroot\t\t\t%d\n", cnt_noroot); 409 printf(" noroot\t\t\t%d\n", cnt_noroot);
399 printf(" memory-deny-write-execute\t%d\n", cnt_mdwx); 410 printf(" memory-deny-write-execute\t%d\n", cnt_mdwx);
411 printf(" restrict-namespaces\t\t%d\n", cnt_restrict_namespaces);
400 printf(" apparmor\t\t\t%d\n", cnt_apparmor); 412 printf(" apparmor\t\t\t%d\n", cnt_apparmor);
401 printf(" private-bin\t\t\t%d\n", cnt_privatebin); 413 printf(" private-bin\t\t\t%d\n", cnt_privatebin);
402 printf(" private-dev\t\t\t%d\n", cnt_privatedev); 414 printf(" private-dev\t\t\t%d\n", cnt_privatedev);
diff --git a/src/prog.mk b/src/prog.mk
new file mode 100644
index 000000000..b2ccf6147
--- /dev/null
+++ b/src/prog.mk
@@ -0,0 +1,37 @@
1# Common definitions for building C programs and non-shared objects.
2#
3# Note: $(ROOT)/config.mk must be included before this file.
4#
5# The includer should probably define PROG and TARGET and may also want to
6# define MOD_HDRS, MOD_SRCS, MOD_OBJS, TOCLEAN and TODISTCLEAN.
7
8HDRS := $(sort $(wildcard *.h)) $(MOD_HDRS)
9SRCS := $(sort $(wildcard *.c)) $(MOD_SRCS)
10OBJS := $(SRCS:.c=.o) $(MOD_OBJS)
11
12PROG_CFLAGS = \
13 -ggdb $(HAVE_FATAL_WARNINGS) -O2 -DVERSION='"$(VERSION)"' \
14 -fstack-protector-all -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security \
15 -fPIE \
16 -DPREFIX='"$(prefix)"' -DSYSCONFDIR='"$(sysconfdir)/firejail"' \
17 -DLIBDIR='"$(libdir)"' -DBINDIR='"$(bindir)"' \
18 -DVARDIR='"/var/lib/firejail"' \
19 $(HAVE_GCOV) $(MANFLAGS) \
20 $(EXTRA_CFLAGS)
21
22PROG_LDFLAGS = -pie -fPIE -Wl,-z,relro -Wl,-z,now $(EXTRA_LDFLAGS)
23
24.PHONY: all
25all: $(TARGET)
26
27%.o : %.c $(HDRS) $(ROOT)/config.mk
28 $(CC) $(PROG_CFLAGS) $(CFLAGS) $(INCLUDE) -c $< -o $@
29
30$(PROG): $(OBJS) $(ROOT)/config.mk
31 $(CC) $(PROG_LDFLAGS) $(LDFLAGS) -o $@ $(OBJS) $(LIBS)
32
33.PHONY: clean
34clean:; rm -fr *.o $(PROG) *.gcov *.gcda *.gcno *.plist $(TOCLEAN)
35
36.PHONY: distclean
37distclean: clean; rm -fr $(TODISTCLEAN)
diff --git a/src/so.mk b/src/so.mk
new file mode 100644
index 000000000..28bd229e5
--- /dev/null
+++ b/src/so.mk
@@ -0,0 +1,32 @@
1# Common definitions for making shared objects.
2#
3# Note: $(ROOT)/config.mk must be included before this file.
4#
5# The includer should probably define SO and TARGET and may also want to define
6# MOD_HDRS, MOD_SRCS, MOD_OBJS, TOCLEAN and TODISTCLEAN.
7
8HDRS := $(sort $(wildcard *.h)) $(MOD_HDRS)
9SRCS := $(sort $(wildcard *.c)) $(MOD_SRCS)
10OBJS := $(SRCS:.c=.o) $(MOD_OBJS)
11
12SO_CFLAGS = \
13 -ggdb $(HAVE_FATAL_WARNINGS) -O2 -DVERSION='"$(VERSION)"' \
14 -fstack-protector-all -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security \
15 -fPIC
16
17SO_LDFLAGS = -pie -fPIE -Wl,-z,relro -Wl,-z,now
18
19.PHONY: all
20all: $(TARGET)
21
22%.o : %.c $(HDRS) $(ROOT)/config.mk
23 $(CC) $(SO_CFLAGS) $(CFLAGS) $(INCLUDE) -c $< -o $@
24
25$(SO): $(OBJS) $(ROOT)/config.mk
26 $(CC) $(SO_LDFLAGS) -shared -fPIC -z relro $(LDFLAGS) -o $@ $(OBJS) -ldl
27
28.PHONY: clean
29clean:; rm -fr $(OBJS) $(SO) *.plist $(TOCLEAN)
30
31.PHONY: distclean
32distclean: clean; rm -fr $(TODISTCLEAN)
diff --git a/test/filters/filters.sh b/test/filters/filters.sh
index 3b4a6b492..c313b80ed 100755
--- a/test/filters/filters.sh
+++ b/test/filters/filters.sh
@@ -30,6 +30,16 @@ else
30 echo "TESTING SKIP: memwrexe binary only running on x86_64 and i686." 30 echo "TESTING SKIP: memwrexe binary only running on x86_64 and i686."
31fi 31fi
32 32
33if [[ $(uname -m) == "x86_64" ]]; then
34 echo "TESTING: restrict-namespaces (test/filters/namespaces.exp)"
35 ./namespaces.exp
36elif [[ $(uname -m) == "i686" ]]; then
37 echo "TESTING: restrict-namespaces (test/filters/namespaces-32.exp)"
38 ./namespaces-32.exp
39else
40 echo "TESTING SKIP: namespaces binary only running on x86_64 and i686."
41fi
42
33echo "TESTING: debug options (test/filters/debug.exp)" 43echo "TESTING: debug options (test/filters/debug.exp)"
34./debug.exp 44./debug.exp
35 45
diff --git a/test/filters/namespaces b/test/filters/namespaces
new file mode 100755
index 000000000..721ba092e
--- /dev/null
+++ b/test/filters/namespaces
Binary files differ
diff --git a/test/filters/namespaces-32 b/test/filters/namespaces-32
new file mode 100755
index 000000000..4df674d1b
--- /dev/null
+++ b/test/filters/namespaces-32
Binary files differ
diff --git a/test/filters/namespaces-32.exp b/test/filters/namespaces-32.exp
new file mode 100755
index 000000000..b643a28d3
--- /dev/null
+++ b/test/filters/namespaces-32.exp
@@ -0,0 +1,173 @@
1#!/usr/bin/expect -f
2# This file is part of Firejail project
3# Copyright (C) 2014-2022 Firejail Authors
4# License GPL v2
5
6set timeout 10
7spawn $env(SHELL)
8match_max 100000
9
10#
11# clone
12#
13
14send -- "firejail --noprofile ./namespaces-32 clone cgroup,ipc,mnt,net,pid,user,uts\r"
15expect {
16 timeout {puts "TESTING ERROR 0\n";exit}
17 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
18}
19expect {
20 timeout {puts "TESTING ERROR 1\n";exit}
21 "clone successful"
22}
23after 100
24
25send -- "firejail --noprofile --restrict-namespaces ./namespaces-32 clone user\r"
26expect {
27 timeout {puts "TESTING ERROR 2\n";exit}
28 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
29}
30expect {
31 timeout {puts "TESTING ERROR 3\n";exit}
32 "Error: clone: Operation not permitted"
33}
34after 100
35
36send -- "firejail --noprofile --restrict-namespaces=user ./namespaces-32 clone user\r"
37expect {
38 timeout {puts "TESTING ERROR 4\n";exit}
39 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
40}
41expect {
42 timeout {puts "TESTING ERROR 5\n";exit}
43 "Error: clone: Operation not permitted"
44}
45after 100
46
47send -- "firejail --noprofile --restrict-namespaces=user ./namespaces-32 clone cgroup,ipc,mnt,net,pid,user,uts\r"
48expect {
49 timeout {puts "TESTING ERROR 6\n";exit}
50 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
51}
52expect {
53 timeout {puts "TESTING ERROR 7\n";exit}
54 "Error: clone: Operation not permitted"
55}
56after 100
57
58send -- "firejail --noprofile --restrict-namespaces=cgroup,ipc ./namespaces-32 clone cgroup\r"
59expect {
60 timeout {puts "TESTING ERROR 8\n";exit}
61 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
62}
63expect {
64 timeout {puts "TESTING ERROR 9\n";exit}
65 "Error: clone: Operation not permitted"
66}
67after 100
68
69send -- "firejail --noprofile --restrict-namespaces=cgroup,ipc ./namespaces-32 clone ipc\r"
70expect {
71 timeout {puts "TESTING ERROR 10\n";exit}
72 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
73}
74expect {
75 timeout {puts "TESTING ERROR 11\n";exit}
76 "Error: clone: Operation not permitted"
77}
78after 100
79
80send -- "firejail --noprofile --restrict-namespaces=cgroup,ipc ./namespaces-32 clone mnt,net,pid,uts\r"
81expect {
82 timeout {puts "TESTING ERROR 12\n";exit}
83 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
84}
85expect {
86 timeout {puts "TESTING ERROR 13\n";exit}
87 "clone successful"
88}
89after 100
90
91#
92# unshare
93#
94
95send -- "firejail --noprofile ./namespaces-32 unshare cgroup,ipc,mnt,net,pid,user,uts\r"
96expect {
97 timeout {puts "TESTING ERROR 14\n";exit}
98 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
99}
100expect {
101 timeout {puts "TESTING ERROR 15\n";exit}
102 "unshare successful"
103}
104after 100
105
106send -- "firejail --noprofile --restrict-namespaces ./namespaces-32 unshare user\r"
107expect {
108 timeout {puts "TESTING ERROR 16\n";exit}
109 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
110}
111expect {
112 timeout {puts "TESTING ERROR 17\n";exit}
113 "Error: unshare: Operation not permitted"
114}
115after 100
116
117send -- "firejail --noprofile --restrict-namespaces=user ./namespaces-32 unshare user\r"
118expect {
119 timeout {puts "TESTING ERROR 18\n";exit}
120 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
121}
122expect {
123 timeout {puts "TESTING ERROR 19\n";exit}
124 "Error: unshare: Operation not permitted"
125}
126after 100
127
128send -- "firejail --noprofile --restrict-namespaces=user ./namespaces-32 unshare cgroup,ipc,mnt,net,pid,user,uts\r"
129expect {
130 timeout {puts "TESTING ERROR 20\n";exit}
131 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
132}
133expect {
134 timeout {puts "TESTING ERROR 21\n";exit}
135 "Error: unshare: Operation not permitted"
136}
137after 100
138
139send -- "firejail --noprofile --restrict-namespaces=cgroup,ipc ./namespaces-32 unshare cgroup\r"
140expect {
141 timeout {puts "TESTING ERROR 22\n";exit}
142 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
143}
144expect {
145 timeout {puts "TESTING ERROR 23\n";exit}
146 "Error: unshare: Operation not permitted"
147}
148after 100
149
150send -- "firejail --noprofile --restrict-namespaces=cgroup,ipc ./namespaces-32 unshare ipc\r"
151expect {
152 timeout {puts "TESTING ERROR 24\n";exit}
153 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
154}
155expect {
156 timeout {puts "TESTING ERROR 25\n";exit}
157 "Error: unshare: Operation not permitted"
158}
159after 100
160
161send -- "firejail --noprofile --restrict-namespaces=cgroup,ipc ./namespaces-32 unshare mnt,net,pid,uts\r"
162expect {
163 timeout {puts "TESTING ERROR 26\n";exit}
164 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
165}
166expect {
167 timeout {puts "TESTING ERROR 27\n";exit}
168 "unshare successful"
169}
170
171
172after 100
173puts "\nall done\n"
diff --git a/test/filters/namespaces.c b/test/filters/namespaces.c
new file mode 100644
index 000000000..06dfa4edf
--- /dev/null
+++ b/test/filters/namespaces.c
@@ -0,0 +1,96 @@
1#define _GNU_SOURCE
2#include <errno.h>
3#include <sched.h>
4#include <signal.h>
5#include <stdio.h>
6#include <stdlib.h>
7#include <string.h>
8#include <sys/mman.h>
9#include <unistd.h>
10
11#ifndef CLONE_NEWTIME
12#define CLONE_NEWTIME 0x00000080
13#endif
14
15#define STACK_SIZE 1024 * 1024
16
17static int usage() {
18 fprintf(stderr, "Usage: namespaces <system call>[clone,unshare] <list of namespaces>[cgroup,ipc,mnt,net,pid,time,user,uts]\n");
19 exit(1);
20}
21
22static void die(const char *msg) {
23 fprintf(stderr, "Error: %s: %s\n", msg, strerror(errno));
24 exit(1);
25}
26
27static int ns_flags(const char *list) {
28 int flags = 0;
29
30 char *dup = strdup(list);
31 if (!dup)
32 die("cannot allocate memory");
33
34 char *token = strtok(dup, ",");
35 while (token) {
36 if (strcmp(token, "cgroup") == 0)
37 flags |= CLONE_NEWCGROUP;
38 else if (strcmp(token, "ipc") == 0)
39 flags |= CLONE_NEWIPC;
40 else if (strcmp(token, "net") == 0)
41 flags |= CLONE_NEWNET;
42 else if (strcmp(token, "mnt") == 0)
43 flags |= CLONE_NEWNS;
44 else if (strcmp(token, "pid") == 0)
45 flags |= CLONE_NEWPID;
46 else if (strcmp(token, "time") == 0)
47 flags |= CLONE_NEWTIME;
48 else if (strcmp(token, "user") == 0)
49 flags |= CLONE_NEWUSER;
50 else if (strcmp(token, "uts") == 0)
51 flags |= CLONE_NEWUTS;
52 else
53 usage();
54
55 token = strtok(NULL, ",");
56 }
57
58 free(dup);
59 return flags;
60}
61
62static int child(void *arg) {
63 (void) arg;
64
65 fprintf(stderr, "clone successful\n");
66 return 0;
67}
68
69int main (int argc, char **argv) {
70 if (argc != 3)
71 usage();
72
73 int flags = ns_flags(argv[2]);
74 if (getuid() != 0)
75 flags |= CLONE_NEWUSER;
76
77 if (strcmp(argv[1], "clone") == 0) {
78 void *stack = mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE,
79 MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
80 if (stack == MAP_FAILED)
81 die("mmap");
82
83 if (clone(child, stack + STACK_SIZE, flags | SIGCHLD, NULL) < 0)
84 die("clone");
85 }
86 else if (strcmp(argv[1], "unshare") == 0) {
87 if (unshare(flags))
88 die("unshare");
89
90 fprintf(stderr, "unshare successful\n");
91 }
92 else
93 usage();
94
95 return 0;
96}
diff --git a/test/filters/namespaces.exp b/test/filters/namespaces.exp
new file mode 100755
index 000000000..cfa92f0ba
--- /dev/null
+++ b/test/filters/namespaces.exp
@@ -0,0 +1,173 @@
1#!/usr/bin/expect -f
2# This file is part of Firejail project
3# Copyright (C) 2014-2022 Firejail Authors
4# License GPL v2
5
6set timeout 10
7spawn $env(SHELL)
8match_max 100000
9
10#
11# clone
12#
13
14send -- "firejail --noprofile ./namespaces clone cgroup,ipc,mnt,net,pid,user,uts\r"
15expect {
16 timeout {puts "TESTING ERROR 0\n";exit}
17 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
18}
19expect {
20 timeout {puts "TESTING ERROR 1\n";exit}
21 "clone successful"
22}
23after 100
24
25send -- "firejail --noprofile --restrict-namespaces ./namespaces clone user\r"
26expect {
27 timeout {puts "TESTING ERROR 2\n";exit}
28 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
29}
30expect {
31 timeout {puts "TESTING ERROR 3\n";exit}
32 "Error: clone: Operation not permitted"
33}
34after 100
35
36send -- "firejail --noprofile --restrict-namespaces=user ./namespaces clone user\r"
37expect {
38 timeout {puts "TESTING ERROR 4\n";exit}
39 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
40}
41expect {
42 timeout {puts "TESTING ERROR 5\n";exit}
43 "Error: clone: Operation not permitted"
44}
45after 100
46
47send -- "firejail --noprofile --restrict-namespaces=user ./namespaces clone cgroup,ipc,mnt,net,pid,user,uts\r"
48expect {
49 timeout {puts "TESTING ERROR 6\n";exit}
50 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
51}
52expect {
53 timeout {puts "TESTING ERROR 7\n";exit}
54 "Error: clone: Operation not permitted"
55}
56after 100
57
58send -- "firejail --noprofile --restrict-namespaces=cgroup,ipc ./namespaces clone cgroup\r"
59expect {
60 timeout {puts "TESTING ERROR 8\n";exit}
61 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
62}
63expect {
64 timeout {puts "TESTING ERROR 9\n";exit}
65 "Error: clone: Operation not permitted"
66}
67after 100
68
69send -- "firejail --noprofile --restrict-namespaces=cgroup,ipc ./namespaces clone ipc\r"
70expect {
71 timeout {puts "TESTING ERROR 10\n";exit}
72 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
73}
74expect {
75 timeout {puts "TESTING ERROR 11\n";exit}
76 "Error: clone: Operation not permitted"
77}
78after 100
79
80send -- "firejail --noprofile --restrict-namespaces=cgroup,ipc ./namespaces clone mnt,net,pid,uts\r"
81expect {
82 timeout {puts "TESTING ERROR 12\n";exit}
83 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
84}
85expect {
86 timeout {puts "TESTING ERROR 13\n";exit}
87 "clone successful"
88}
89after 100
90
91#
92# unshare
93#
94
95send -- "firejail --noprofile ./namespaces unshare cgroup,ipc,mnt,net,pid,user,uts\r"
96expect {
97 timeout {puts "TESTING ERROR 14\n";exit}
98 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
99}
100expect {
101 timeout {puts "TESTING ERROR 15\n";exit}
102 "unshare successful"
103}
104after 100
105
106send -- "firejail --noprofile --restrict-namespaces ./namespaces unshare user\r"
107expect {
108 timeout {puts "TESTING ERROR 16\n";exit}
109 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
110}
111expect {
112 timeout {puts "TESTING ERROR 17\n";exit}
113 "Error: unshare: Operation not permitted"
114}
115after 100
116
117send -- "firejail --noprofile --restrict-namespaces=user ./namespaces unshare user\r"
118expect {
119 timeout {puts "TESTING ERROR 18\n";exit}
120 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
121}
122expect {
123 timeout {puts "TESTING ERROR 19\n";exit}
124 "Error: unshare: Operation not permitted"
125}
126after 100
127
128send -- "firejail --noprofile --restrict-namespaces=user ./namespaces unshare cgroup,ipc,mnt,net,pid,user,uts\r"
129expect {
130 timeout {puts "TESTING ERROR 20\n";exit}
131 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
132}
133expect {
134 timeout {puts "TESTING ERROR 21\n";exit}
135 "Error: unshare: Operation not permitted"
136}
137after 100
138
139send -- "firejail --noprofile --restrict-namespaces=cgroup,ipc ./namespaces unshare cgroup\r"
140expect {
141 timeout {puts "TESTING ERROR 22\n";exit}
142 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
143}
144expect {
145 timeout {puts "TESTING ERROR 23\n";exit}
146 "Error: unshare: Operation not permitted"
147}
148after 100
149
150send -- "firejail --noprofile --restrict-namespaces=cgroup,ipc ./namespaces unshare ipc\r"
151expect {
152 timeout {puts "TESTING ERROR 24\n";exit}
153 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
154}
155expect {
156 timeout {puts "TESTING ERROR 25\n";exit}
157 "Error: unshare: Operation not permitted"
158}
159after 100
160
161send -- "firejail --noprofile --restrict-namespaces=cgroup,ipc ./namespaces unshare mnt,net,pid,uts\r"
162expect {
163 timeout {puts "TESTING ERROR 26\n";exit}
164 -re "Child process initialized in \[0-9\]+.\[0-9\]+ ms"
165}
166expect {
167 timeout {puts "TESTING ERROR 27\n";exit}
168 "unshare successful"
169}
170
171
172after 100
173puts "\nall done\n"