[GH-ISSUE #918] seccomp: document logging and audit.d #624

Closed
opened 2026-05-05 06:17:55 -06:00 by gitea-mirror · 6 comments
Owner

Originally created by @vn971 on GitHub (Nov 18, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/918

Consider a program trying to execute a forbidden syscall. According to this guide [1], firejail should generate a syslog/journalctl warning showing the failing syscall.

In practice, I observe the program dying silently.
For example, this command:

firejail --noprofile --shell=none --seccomp=mmap --debug xterm

Will generate a syslog/systemctl entry

Nov 18 13:00:18 vn971think firejail[32664]: firejail --noprofile --shell=none --seccomp=mmap --debug xterm

But no entry for the forbidden syscall.
Thoughts?

Operating system is amd64 ArchLinux.

[1] https://firejail.wordpress.com/documentation-2/seccomp-guide/

Originally created by @vn971 on GitHub (Nov 18, 2016). Original GitHub issue: https://github.com/netblue30/firejail/issues/918 Consider a program trying to execute a forbidden syscall. According to this guide <a href="https://firejail.wordpress.com/documentation-2/seccomp-guide/">[1]</a>, firejail should generate a syslog/journalctl warning showing the failing syscall. In practice, I observe the program dying silently. For example, this command: firejail --noprofile --shell=none --seccomp=mmap --debug xterm Will generate a syslog/systemctl entry Nov 18 13:00:18 vn971think firejail[32664]: firejail --noprofile --shell=none --seccomp=mmap --debug xterm But no entry for the forbidden syscall. Thoughts? Operating system is amd64 ArchLinux. [1] https://firejail.wordpress.com/documentation-2/seccomp-guide/
gitea-mirror 2026-05-05 06:17:55 -06:00
Author
Owner

@reinerh commented on GitHub (Nov 18, 2016):

You need to run auditd.
And depending on its configuration it will log to /var/log/(audit/)audit.log, but you can probably configure it to forward to syslog.

<!-- gh-comment-id:261501850 --> @reinerh commented on GitHub (Nov 18, 2016): You need to run auditd. And depending on its configuration it will log to /var/log/(audit/)audit.log, but you can probably configure it to forward to syslog.
Author
Owner

@vn971 commented on GitHub (Nov 18, 2016):

@reinerh thanks! Indeed.
What makes things works, ArchLinux does not have audit enabled at kernel build time by default (CONFIG_AUDIT). So you have to compile the kernet to enable audit: https://wiki.archlinux.org/index.php/Audit_framework

BTW, it's not just logging, firejail really needs this kernel functionality, right?

<!-- gh-comment-id:261513049 --> @vn971 commented on GitHub (Nov 18, 2016): @reinerh thanks! Indeed. What makes things works, ArchLinux does not have audit enabled at kernel build time by default (CONFIG_AUDIT). So you have to compile the kernet to enable audit: https://wiki.archlinux.org/index.php/Audit_framework BTW, it's not just logging, firejail really _needs_ this kernel functionality, right?
Author
Owner

@vn971 commented on GitHub (Nov 19, 2016):

BTW, I think it would be nice to mention this stuff in seccomp documentation.
But it's on wordpress, so my only option is to.. /Ping @netblue30. Could you please add some info about that on the page?

If it's not convenient, feel free to close this issue for now. Thanks in either case.

<!-- gh-comment-id:261673903 --> @vn971 commented on GitHub (Nov 19, 2016): BTW, I think it would be nice to mention this stuff in seccomp documentation. But it's on wordpress, so my only option is to.. /Ping @netblue30. Could you please add some info about that on the page? If it's not convenient, feel free to close this issue for now. Thanks in either case.
Author
Owner

@netblue30 commented on GitHub (Nov 19, 2016):

I'll add it to the man page.

<!-- gh-comment-id:261723322 --> @netblue30 commented on GitHub (Nov 19, 2016): I'll add it to the man page.
Author
Owner

@vn971 commented on GitHub (Nov 19, 2016):

@netblue30 Should I create a PR?)

<!-- gh-comment-id:261727150 --> @vn971 commented on GitHub (Nov 19, 2016): @netblue30 Should I create a PR?)
Author
Owner

@netblue30 commented on GitHub (Nov 19, 2016):

Yes!

<!-- gh-comment-id:261727605 --> @netblue30 commented on GitHub (Nov 19, 2016): Yes!
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#624
No description provided.