mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1417] Feature: Easier alternative to list of syscalls for --seccomp: add pre-defined syscall groups #962
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#962
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @topimiettinen on GitHub (Jul 30, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1417
It's not so easy to use seccomp feature because there are hundreds of system calls to be managed. I'm proposing to add a simpler way to prepare seccomp filters, where the user can construct the filter by
using predefined system call groups or sets. Systemd uses prefix '@' to distinguish system call groups, for example:
@debug: Debugging, performance monitoring and tracing functionality (ptrace(2),perf_event_open(2)and related calls)@obsolete: Unusual, obsolete or unimplemented (create_module(2),gtty(2), ...)@privileged: All system calls which need super-user capabilities@default: built-in default listFor example, a firejail user could simply specify
--seccomp=@privilegedto blacklist all privileged system calls. This is much easier to use than long list of system calls.As a bonus, I think such seccomp lists would also simplify firejail design, now the lists of syscalls are somewhat duplicated across default/32/64 vs. sandboxing for fcopy etc. The lists can specify other lists, so for example
@defaultcould contain both@privilegedand@obsolete.@netblue30 commented on GitHub (Jul 31, 2017):
Go for it! @default list will also close #1366
@topimiettinen commented on GitHub (Aug 7, 2017):
Implemented in
34ee8e03.