aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--README2
-rw-r--r--README.md2
-rw-r--r--RELNOTES3
-rw-r--r--etc/android-studio.profile37
-rw-r--r--etc/arduino.profile1
-rw-r--r--etc/disable-programs.inc8
-rw-r--r--etc/exiftool.profile1
-rw-r--r--etc/idea.sh.profile37
-rw-r--r--etc/jd-gui.profile1
-rw-r--r--etc/libreoffice.profile1
-rw-r--r--etc/multimc5.profile1
-rw-r--r--etc/pdfsam.profile1
-rw-r--r--etc/silentarmy.profile33
-rw-r--r--etc/steam.profile5
-rw-r--r--platform/debian/conffiles4
-rw-r--r--src/firecfg/firecfg.config4
-rw-r--r--src/firejail/profile.c8
-rw-r--r--src/firejail/seccomp.c56
-rw-r--r--src/firejail/x11.c2
19 files changed, 175 insertions, 32 deletions
diff --git a/README b/README
index 25d1d728f..c685c500c 100644
--- a/README
+++ b/README
@@ -387,6 +387,8 @@ SpotComms (https://github.com/SpotComms)
387 - fixed wget profile 387 - fixed wget profile
388 - fixed firecfg.config file 388 - fixed firecfg.config file
389 - added novideo and disable-mnt support in all profile files 389 - added novideo and disable-mnt support in all profile files
390 - added Peek and silent profiles
391 - added IntelliJ IDEA and Android Studio profiles
390SYN-cook (https://github.com/SYN-cook) 392SYN-cook (https://github.com/SYN-cook)
391 - keepass/keepassx browser fixes 393 - keepass/keepassx browser fixes
392 - disable-common.inc fixes 394 - disable-common.inc fixes
diff --git a/README.md b/README.md
index 517aee81d..05e45d573 100644
--- a/README.md
+++ b/README.md
@@ -107,5 +107,5 @@ Use this issue to request new profiles: [#1139](https://github.com/netblue30/fir
107 107
108## New profiles: 108## New profiles:
109 109
110curl, mplayer2, SMPlayer, Calibre, ebook-viewer, KWrite, Geary, Liferea 110curl, mplayer2, SMPlayer, Calibre, ebook-viewer, KWrite, Geary, Liferea, peek, silentarmy, IntelliJ IDEA, Android Studio
111 111
diff --git a/RELNOTES b/RELNOTES
index 5310b0ae5..d9f18906f 100644
--- a/RELNOTES
+++ b/RELNOTES
@@ -2,7 +2,8 @@ firejail (0.9.49) baseline; urgency=low
2 * work in progress! 2 * work in progress!
3 * feature: per-profile disable-mnt 3 * feature: per-profile disable-mnt
4 * new profiles: curl, mplayer2, SMPlayer, Calibre, ebook-viewer, KWrite, 4 * new profiles: curl, mplayer2, SMPlayer, Calibre, ebook-viewer, KWrite,
5 * new profiles: Geary, Liferea 5 * new profiles: Geary, Liferea, peek, silentarmy, IntelliJ IDEA,
6 * new profiles: Android Studio
6 * bugfixes 7 * bugfixes
7 -- netblue30 <netblue30@yahoo.com> Mon, 12 Jun 2017 20:00:00 -0500 8 -- netblue30 <netblue30@yahoo.com> Mon, 12 Jun 2017 20:00:00 -0500
8 9
diff --git a/etc/android-studio.profile b/etc/android-studio.profile
new file mode 100644
index 000000000..68a3cdc85
--- /dev/null
+++ b/etc/android-studio.profile
@@ -0,0 +1,37 @@
1# Persistent global definitions go here
2include /etc/firejail/globals.local
3
4# This file is overwritten during software install.
5# Persistent customizations should go in a .local file.
6include /etc/firejail/android-studio.local
7
8# Firejail profile for Android Studio
9
10noblacklist ${HOME}/.AndroidStudio*
11noblacklist ${HOME}/.android
12noblacklist ${HOME}/.gitconfig
13noblacklist ${HOME}/.gradle
14noblacklist ${HOME}/.java
15noblacklist ${HOME}/.local/share/JetBrains
16noblacklist ${HOME}/.ssh
17noblacklist ${HOME}/.tooling
18
19include /etc/firejail/disable-common.inc
20include /etc/firejail/disable-passwdmgr.inc
21include /etc/firejail/disable-programs.inc
22
23caps.drop all
24netfilter
25nogroups
26nonewprivs
27noroot
28#nosound
29novideo
30protocol unix,inet,inet6
31seccomp
32shell none
33
34private-dev
35#private-tmp
36
37noexec /tmp
diff --git a/etc/arduino.profile b/etc/arduino.profile
index 60c071c01..ff605501d 100644
--- a/etc/arduino.profile
+++ b/etc/arduino.profile
@@ -8,6 +8,7 @@ include /etc/firejail/arduino.local
8# Firejail profile for arduino 8# Firejail profile for arduino
9noblacklist ${HOME}/.arduino15 9noblacklist ${HOME}/.arduino15
10noblacklist ${HOME}/Arduino 10noblacklist ${HOME}/Arduino
11noblacklist ${HOME}/.java
11 12
12include /etc/firejail/disable-common.inc 13include /etc/firejail/disable-common.inc
13include /etc/firejail/disable-programs.inc 14include /etc/firejail/disable-programs.inc
diff --git a/etc/disable-programs.inc b/etc/disable-programs.inc
index 655a44a04..3c98b8ac3 100644
--- a/etc/disable-programs.inc
+++ b/etc/disable-programs.inc
@@ -4,8 +4,10 @@ include /etc/firejail/disable-programs.local
4 4
5blacklist ${HOME}/.*coin 5blacklist ${HOME}/.*coin
6blacklist ${HOME}/.8pecxstudios 6blacklist ${HOME}/.8pecxstudios
7blacklist ${HOME}/.AndroidStudio*
7blacklist ${HOME}/.Atom 8blacklist ${HOME}/.Atom
8blacklist ${HOME}/.FBReader 9blacklist ${HOME}/.FBReader
10blacklist ${HOME}/.IdeaIC*
9blacklist ${HOME}/.LuminanceHDR 11blacklist ${HOME}/.LuminanceHDR
10blacklist ${HOME}/.Mathematica 12blacklist ${HOME}/.Mathematica
11blacklist ${HOME}/.Natron 13blacklist ${HOME}/.Natron
@@ -16,6 +18,7 @@ blacklist ${HOME}/.Steampid
16blacklist ${HOME}/.TelegramDesktop 18blacklist ${HOME}/.TelegramDesktop
17blacklist ${HOME}/.VirtualBox 19blacklist ${HOME}/.VirtualBox
18blacklist ${HOME}/.Wolfram Research 20blacklist ${HOME}/.Wolfram Research
21blacklist ${HOME}/.android
19blacklist ${HOME}/.arduino15 22blacklist ${HOME}/.arduino15
20blacklist ${HOME}/.atom 23blacklist ${HOME}/.atom
21blacklist ${HOME}/.attic 24blacklist ${HOME}/.attic
@@ -192,11 +195,13 @@ blacklist ${HOME}/.googleearth/Cache/
192blacklist ${HOME}/.googleearth/Temp/ 195blacklist ${HOME}/.googleearth/Temp/
193blacklist ${HOME}/.googleearth/myplaces.backup.kml 196blacklist ${HOME}/.googleearth/myplaces.backup.kml
194blacklist ${HOME}/.googleearth/myplaces.kml 197blacklist ${HOME}/.googleearth/myplaces.kml
198blacklist ${HOME}/.gradle
195blacklist ${HOME}/.guayadeque 199blacklist ${HOME}/.guayadeque
196blacklist ${HOME}/.hedgewars 200blacklist ${HOME}/.hedgewars
197blacklist ${HOME}/.hugin 201blacklist ${HOME}/.hugin
198blacklist ${HOME}/.icedove 202blacklist ${HOME}/.icedove
199blacklist ${HOME}/.inkscape 203blacklist ${HOME}/.inkscape
204blacklist ${HOME}/.java
200blacklist ${HOME}/.jitsi 205blacklist ${HOME}/.jitsi
201blacklist ${HOME}/.kde4/share/apps/gwenview 206blacklist ${HOME}/.kde4/share/apps/gwenview
202blacklist ${HOME}/.kde4/share/apps/kcookiejar 207blacklist ${HOME}/.kde4/share/apps/kcookiejar
@@ -249,6 +254,7 @@ blacklist ${HOME}/.local/share/0ad
249blacklist ${HOME}/.local/share/3909/PapersPlease 254blacklist ${HOME}/.local/share/3909/PapersPlease
250blacklist ${HOME}/.local/share/akregator 255blacklist ${HOME}/.local/share/akregator
251blacklist ${HOME}/.local/share/Empathy 256blacklist ${HOME}/.local/share/Empathy
257blacklist ${HOME}/.local/share/JetBrains
252blacklist ${HOME}/.local/share/Mumble 258blacklist ${HOME}/.local/share/Mumble
253blacklist ${HOME}/.local/share/QuiteRss 259blacklist ${HOME}/.local/share/QuiteRss
254blacklist ${HOME}/.local/share/Ricochet 260blacklist ${HOME}/.local/share/Ricochet
@@ -338,6 +344,7 @@ blacklist ${HOME}/.sylpheed-2.0
338blacklist ${HOME}/.synfig 344blacklist ${HOME}/.synfig
339blacklist ${HOME}/.tconn 345blacklist ${HOME}/.tconn
340blacklist ${HOME}/.thunderbird 346blacklist ${HOME}/.thunderbird
347blacklist ${HOME}/.tooling
341blacklist ${HOME}/.ts3client 348blacklist ${HOME}/.ts3client
342blacklist ${HOME}/.viking 349blacklist ${HOME}/.viking
343blacklist ${HOME}/.viking-maps 350blacklist ${HOME}/.viking-maps
@@ -387,6 +394,7 @@ blacklist ${HOME}/.cache/netsurf
387blacklist ${HOME}/.cache/opera 394blacklist ${HOME}/.cache/opera
388blacklist ${HOME}/.cache/opera-beta 395blacklist ${HOME}/.cache/opera-beta
389blacklist ${HOME}/.cache/org.gnome.Books 396blacklist ${HOME}/.cache/org.gnome.Books
397blacklist ${HOME}/.cache/peek
390blacklist ${HOME}/.cache/qBittorrent 398blacklist ${HOME}/.cache/qBittorrent
391blacklist ${HOME}/.cache/qutebrowser 399blacklist ${HOME}/.cache/qutebrowser
392blacklist ${HOME}/.cache/simple-scan 400blacklist ${HOME}/.cache/simple-scan
diff --git a/etc/exiftool.profile b/etc/exiftool.profile
index 729dabeb7..aba484718 100644
--- a/etc/exiftool.profile
+++ b/etc/exiftool.profile
@@ -1,3 +1,4 @@
1quiet
1# Persistent global definitions go here 2# Persistent global definitions go here
2include /etc/firejail/globals.local 3include /etc/firejail/globals.local
3 4
diff --git a/etc/idea.sh.profile b/etc/idea.sh.profile
new file mode 100644
index 000000000..771131262
--- /dev/null
+++ b/etc/idea.sh.profile
@@ -0,0 +1,37 @@
1# Persistent global definitions go here
2include /etc/firejail/globals.local
3
4# This file is overwritten during software install.
5# Persistent customizations should go in a .local file.
6include /etc/firejail/idea.sh.local
7
8# Firejail profile for IntelliJ IDEA Community Edition
9
10noblacklist ${HOME}/.android
11noblacklist ${HOME}/.gitconfig
12noblacklist ${HOME}/.gradle
13noblacklist ${HOME}/.IdeaIC*
14noblacklist ${HOME}/.java
15noblacklist ${HOME}/.local/share/JetBrains
16noblacklist ${HOME}/.ssh
17noblacklist ${HOME}/.tooling
18
19include /etc/firejail/disable-common.inc
20include /etc/firejail/disable-passwdmgr.inc
21include /etc/firejail/disable-programs.inc
22
23caps.drop all
24netfilter
25nogroups
26nonewprivs
27noroot
28#nosound
29novideo
30protocol unix,inet,inet6
31seccomp
32shell none
33
34private-dev
35#private-tmp
36
37noexec /tmp
diff --git a/etc/jd-gui.profile b/etc/jd-gui.profile
index a96eedee6..32b43cdf1 100644
--- a/etc/jd-gui.profile
+++ b/etc/jd-gui.profile
@@ -10,6 +10,7 @@ include /etc/firejail/jd-gui.local
10# 10#
11 11
12noblacklist ${HOME}/.config/jd-gui.cfg 12noblacklist ${HOME}/.config/jd-gui.cfg
13noblacklist ${HOME}/.java
13 14
14#Blacklist Paths 15#Blacklist Paths
15include /etc/firejail/disable-common.inc 16include /etc/firejail/disable-common.inc
diff --git a/etc/libreoffice.profile b/etc/libreoffice.profile
index 90d87df2f..fe5861e4a 100644
--- a/etc/libreoffice.profile
+++ b/etc/libreoffice.profile
@@ -7,6 +7,7 @@ include /etc/firejail/libreoffice.local
7 7
8# Firejail profile for LibreOffice 8# Firejail profile for LibreOffice
9noblacklist ~/.config/libreoffice 9noblacklist ~/.config/libreoffice
10noblacklist ${HOME}/.java
10noblacklist /usr/local/sbin 11noblacklist /usr/local/sbin
11include /etc/firejail/disable-common.inc 12include /etc/firejail/disable-common.inc
12include /etc/firejail/disable-programs.inc 13include /etc/firejail/disable-programs.inc
diff --git a/etc/multimc5.profile b/etc/multimc5.profile
index e45ab9cba..6b0696064 100644
--- a/etc/multimc5.profile
+++ b/etc/multimc5.profile
@@ -10,6 +10,7 @@ include /etc/firejail/multimc5.local
10# 10#
11 11
12#No Blacklist Paths 12#No Blacklist Paths
13noblacklist ${HOME}/.java
13noblacklist ${HOME}/.local/share/multimc5 14noblacklist ${HOME}/.local/share/multimc5
14noblacklist ${HOME}/.multimc5 15noblacklist ${HOME}/.multimc5
15 16
diff --git a/etc/pdfsam.profile b/etc/pdfsam.profile
index 611ca3775..b46ac9294 100644
--- a/etc/pdfsam.profile
+++ b/etc/pdfsam.profile
@@ -8,6 +8,7 @@ include /etc/firejail/pdfsam.local
8# 8#
9#Profile for pdfsam 9#Profile for pdfsam
10# 10#
11noblacklist ${HOME}/.java
11 12
12#Blacklist Paths 13#Blacklist Paths
13include /etc/firejail/disable-common.inc 14include /etc/firejail/disable-common.inc
diff --git a/etc/silentarmy.profile b/etc/silentarmy.profile
new file mode 100644
index 000000000..bcad82b5d
--- /dev/null
+++ b/etc/silentarmy.profile
@@ -0,0 +1,33 @@
1# Persistent global definitions go here
2include /etc/firejail/globals.local
3
4# This file is overwritten during software install.
5# Persistent customizations should go in a .local file.
6include /etc/firejail/silentarmy.local
7
8# Firejail profile for SILENTARMY
9
10include /etc/firejail/disable-common.inc
11#include /etc/firejail/disable-devel.inc
12include /etc/firejail/disable-passwdmgr.inc
13include /etc/firejail/disable-programs.inc
14
15caps.drop all
16netfilter
17nogroups
18nonewprivs
19noroot
20nosound
21novideo
22protocol unix,inet,inet6
23seccomp
24shell none
25
26disable-mnt
27private
28#private-bin silentarmy,sa-solver,python3
29private-dev
30private-tmp
31
32noexec ${HOME}
33noexec /tmp
diff --git a/etc/steam.profile b/etc/steam.profile
index e2dc6216b..9eaa6a83b 100644
--- a/etc/steam.profile
+++ b/etc/steam.profile
@@ -6,6 +6,7 @@ include /etc/firejail/globals.local
6include /etc/firejail/steam.local 6include /etc/firejail/steam.local
7 7
8# Steam profile (applies to games/apps launched from Steam as well) 8# Steam profile (applies to games/apps launched from Steam as well)
9noblacklist ${HOME}/.java
9noblacklist ${HOME}/.Steam 10noblacklist ${HOME}/.Steam
10noblacklist ${HOME}/.steam 11noblacklist ${HOME}/.steam
11noblacklist ${HOME}/.Steampath 12noblacklist ${HOME}/.Steampath
@@ -29,7 +30,9 @@ noroot
29protocol unix,inet,inet6,netlink 30protocol unix,inet,inet6,netlink
30seccomp 31seccomp
31shell none 32shell none
32tracelog 33
34# tracelog disabled as it breaks integrated browser
35#tracelog
33 36
34private-dev 37private-dev
35private-tmp 38private-tmp
diff --git a/platform/debian/conffiles b/platform/debian/conffiles
index 214f4f885..852d54c0e 100644
--- a/platform/debian/conffiles
+++ b/platform/debian/conffiles
@@ -14,6 +14,7 @@
14/etc/firejail/abrowser.profile 14/etc/firejail/abrowser.profile
15/etc/firejail/akregator.profile 15/etc/firejail/akregator.profile
16/etc/firejail/amarok.profile 16/etc/firejail/amarok.profile
17/etc/firejail/android-studio.profile
17/etc/firejail/arduino.profile 18/etc/firejail/arduino.profile
18/etc/firejail/ark.profile 19/etc/firejail/ark.profile
19/etc/firejail/atom-beta.profile 20/etc/firejail/atom-beta.profile
@@ -136,6 +137,7 @@
136/etc/firejail/icecat.profile 137/etc/firejail/icecat.profile
137/etc/firejail/icedove.profile 138/etc/firejail/icedove.profile
138/etc/firejail/iceweasel.profile 139/etc/firejail/iceweasel.profile
140/etc/firejail/idea.sh.profile
139/etc/firejail/img2txt.profile 141/etc/firejail/img2txt.profile
140/etc/firejail/inkscape.profile 142/etc/firejail/inkscape.profile
141/etc/firejail/inox.profile 143/etc/firejail/inox.profile
@@ -209,6 +211,7 @@
209/etc/firejail/pcmanfm.profile 211/etc/firejail/pcmanfm.profile
210/etc/firejail/pdfsam.profile 212/etc/firejail/pdfsam.profile
211/etc/firejail/pdftotext.profile 213/etc/firejail/pdftotext.profile
214/etc/firejail/peek.profile
212/etc/firejail/pidgin.profile 215/etc/firejail/pidgin.profile
213/etc/firejail/pithos.profile 216/etc/firejail/pithos.profile
214/etc/firejail/pix.profile 217/etc/firejail/pix.profile
@@ -233,6 +236,7 @@
233/etc/firejail/seamonkey-bin.profile 236/etc/firejail/seamonkey-bin.profile
234/etc/firejail/seamonkey.profile 237/etc/firejail/seamonkey.profile
235/etc/firejail/server.profile 238/etc/firejail/server.profile
239/etc/firejail/silentarmy.profile
236/etc/firejail/simple-scan.profile 240/etc/firejail/simple-scan.profile
237/etc/firejail/skanlite.profile 241/etc/firejail/skanlite.profile
238/etc/firejail/skype.profile 242/etc/firejail/skype.profile
diff --git a/src/firecfg/firecfg.config b/src/firecfg/firecfg.config
index c616f040c..025f239ba 100644
--- a/src/firecfg/firecfg.config
+++ b/src/firecfg/firecfg.config
@@ -6,6 +6,7 @@
6abrowser 6abrowser
7akregator 7akregator
8amarok 8amarok
9android-studio
9arduino 10arduino
10ark 11ark
11atom 12atom
@@ -118,6 +119,7 @@ hugin
118icecat 119icecat
119icedove 120icedove
120iceweasel 121iceweasel
122idea.sh
121img2txt 123img2txt
122inkscape 124inkscape
123inox 125inox
@@ -188,6 +190,7 @@ palemoon
188parole 190parole
189pdfsam 191pdfsam
190pdftotext 192pdftotext
193peek
191pidgin 194pidgin
192pithos 195pithos
193pix 196pix
@@ -212,6 +215,7 @@ scribus
212seamonkey 215seamonkey
213seamonkey-bin 216seamonkey-bin
214simple-scan 217simple-scan
218silentarmy
215skanlite 219skanlite
216skype 220skype
217skypeforlinux 221skypeforlinux
diff --git a/src/firejail/profile.c b/src/firejail/profile.c
index af943581e..88f04f47f 100644
--- a/src/firejail/profile.c
+++ b/src/firejail/profile.c
@@ -81,8 +81,12 @@ int profile_check_line(char *ptr, int lineno, const char *fname) {
81 if (cfg.profile_ignore[i] == NULL) 81 if (cfg.profile_ignore[i] == NULL)
82 break; 82 break;
83 83
84 if (strncmp(ptr, cfg.profile_ignore[i], strlen(cfg.profile_ignore[i])) == 0) 84 int len = strlen(cfg.profile_ignore[i]);
85 return 0; // ignore line 85 if (strncmp(ptr, cfg.profile_ignore[i], len) == 0) {
86 // full word match
87 if (*(ptr + len) == '\0' || *(ptr + len) == ' ')
88 return 0; // ignore line
89 }
86 } 90 }
87 91
88 if (strncmp(ptr, "ignore ", 7) == 0) { 92 if (strncmp(ptr, "ignore ", 7) == 0) {
diff --git a/src/firejail/seccomp.c b/src/firejail/seccomp.c
index 15379215c..29f928ee7 100644
--- a/src/firejail/seccomp.c
+++ b/src/firejail/seccomp.c
@@ -123,40 +123,47 @@ void seccomp_filter_64(void) {
123 123
124// drop filter for seccomp option 124// drop filter for seccomp option
125int seccomp_filter_drop(int enforce_seccomp) { 125int seccomp_filter_drop(int enforce_seccomp) {
126 // default seccomp 126 // if we have multiple seccomp commands, only one of them is executed
127 if (cfg.seccomp_list_drop == NULL && cfg.seccomp_list == NULL) { 127 // in the following order:
128 // - seccomp.drop list
129 // - seccomp list
130 // - seccomp
131 if (cfg.seccomp_list_drop == NULL) {
132 // default seccomp
133 if (cfg.seccomp_list == NULL) {
128#if defined(__x86_64__) 134#if defined(__x86_64__)
129 seccomp_filter_32(); 135 seccomp_filter_32();
130#endif 136#endif
131#if defined(__i386__) 137#if defined(__i386__)
132 seccomp_filter_64(); 138 seccomp_filter_64();
133#endif 139#endif
134 } 140 }
135 // default seccomp filter with additional drop list 141 // default seccomp filter with additional drop list
136 else if (cfg.seccomp_list && cfg.seccomp_list_drop == NULL) { 142 else { // cfg.seccomp_list != NULL
137#if defined(__x86_64__) 143#if defined(__x86_64__)
138 seccomp_filter_32(); 144 seccomp_filter_32();
139#endif 145#endif
140#if defined(__i386__) 146#if defined(__i386__)
141 seccomp_filter_64(); 147 seccomp_filter_64();
142#endif 148#endif
143 if (arg_debug) 149 if (arg_debug)
144 printf("Build default+drop seccomp filter\n"); 150 printf("Build default+drop seccomp filter\n");
145 151
146 // build the seccomp filter as a regular user 152 // build the seccomp filter as a regular user
147 int rv; 153 int rv;
148 if (arg_allow_debuggers) 154 if (arg_allow_debuggers)
149 rv = sbox_run(SBOX_USER | SBOX_CAPS_NONE | SBOX_SECCOMP, 6, 155 rv = sbox_run(SBOX_USER | SBOX_CAPS_NONE | SBOX_SECCOMP, 6,
150 PATH_FSECCOMP, "default", "drop", RUN_SECCOMP_CFG, cfg.seccomp_list, "allow-debuggers"); 156 PATH_FSECCOMP, "default", "drop", RUN_SECCOMP_CFG, cfg.seccomp_list, "allow-debuggers");
151 else 157 else
152 rv = sbox_run(SBOX_USER | SBOX_CAPS_NONE | SBOX_SECCOMP, 5, 158 rv = sbox_run(SBOX_USER | SBOX_CAPS_NONE | SBOX_SECCOMP, 5,
153 PATH_FSECCOMP, "default", "drop", RUN_SECCOMP_CFG, cfg.seccomp_list); 159 PATH_FSECCOMP, "default", "drop", RUN_SECCOMP_CFG, cfg.seccomp_list);
154 if (rv) 160 if (rv)
155 exit(rv); 161 exit(rv);
162 }
156 } 163 }
157 164
158 // drop list without defaults - secondary filters are not installed 165 // drop list without defaults - secondary filters are not installed
159 else if (cfg.seccomp_list == NULL && cfg.seccomp_list_drop) { 166 else { // cfg.seccomp_list_drop != NULL
160 if (arg_debug) 167 if (arg_debug)
161 printf("Build drop seccomp filter\n"); 168 printf("Build drop seccomp filter\n");
162 169
@@ -172,9 +179,6 @@ int seccomp_filter_drop(int enforce_seccomp) {
172 if (rv) 179 if (rv)
173 exit(rv); 180 exit(rv);
174 } 181 }
175 else {
176 assert(0);
177 }
178 182
179 // load the filter 183 // load the filter
180 if (seccomp_load(RUN_SECCOMP_CFG) == 0) { 184 if (seccomp_load(RUN_SECCOMP_CFG) == 0) {
diff --git a/src/firejail/x11.c b/src/firejail/x11.c
index 79ebc3b1b..77bf7749f 100644
--- a/src/firejail/x11.c
+++ b/src/firejail/x11.c
@@ -639,7 +639,7 @@ void x11_start_xpra(int argc, char **argv) {
639 639
640 // build the start command 640 // build the start command
641 char *server_argv[256] = { // rest initialyzed to NULL 641 char *server_argv[256] = { // rest initialyzed to NULL
642 "xpra", "start", display_str, "--no-daemon", "--use-display", 642 "xpra", "start", display_str, "--no-daemon",
643 }; 643 };
644 unsigned pos = 0; 644 unsigned pos = 0;
645 while (server_argv[pos] != NULL) pos++; 645 while (server_argv[pos] != NULL) pos++;