mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[PR #3301] [MERGED] Changeable seccomp error action #4715
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#4715
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/netblue30/firejail/pull/3301
Author: @topimiettinen
Created: 3/27/2020
Status: ✅ Merged
Merged: 4/6/2020
Merged by: @topimiettinen
Base:
master← Head:changeable-seccomp-error-action📝 Commits (1)
48112d8Allow changing error action in seccomp filters📊 Changes
20 files changed (+266 additions, -61 deletions)
View changed files
📝
RELNOTES(+5 -0)📝
etc/firejail.config(+3 -0)📝
src/firejail/checkcfg.c(+22 -0)📝
src/firejail/firejail.h(+5 -0)📝
src/firejail/main.c(+32 -0)📝
src/firejail/profile.c(+29 -0)📝
src/firejail/sandbox.c(+5 -0)📝
src/firejail/sbox.c(+29 -26)📝
src/firejail/seccomp.c(+33 -2)📝
src/firejail/usage.c(+1 -0)📝
src/fsec-print/main.c(+8 -0)📝
src/fseccomp/main.c(+13 -0)📝
src/fseccomp/seccomp.c(+10 -10)📝
src/fseccomp/seccomp_file.c(+14 -1)📝
src/fseccomp/seccomp_secondary.c(+1 -1)📝
src/include/seccomp.h(+5 -4)📝
src/include/syscall.h(+1 -0)📝
src/lib/syscall.c(+20 -11)📝
src/man/firejail-profile.txt(+3 -0)📝
src/man/firejail.txt(+27 -6)📄 Description
Let user specify the action when seccomp filters trigger:
Not killing the process weakens Firejail slightly when trying to
contain intrusion, but it may also allow tighter filters if the
alternative is to always allow a system call. It's still possible to
use errno return per syscall.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.