aboutsummaryrefslogtreecommitdiffstats
path: root/src/man/firejail-profile.5.in
diff options
context:
space:
mode:
authorLibravatar Kelvin M. Klann <kmk3.code@protonmail.com>2023-11-17 19:57:29 -0300
committerLibravatar Kelvin M. Klann <kmk3.code@protonmail.com>2023-12-11 22:47:11 -0300
commit760f50f78ad13664d7a32b4577381c0341ab2d4a (patch)
tree36a091d2740c624c13bbdcc46ab32e295f74b19a /src/man/firejail-profile.5.in
parentlandlock: avoid landlock syscalls before ll_restrict (diff)
downloadfirejail-760f50f78ad13664d7a32b4577381c0341ab2d4a.tar.gz
firejail-760f50f78ad13664d7a32b4577381c0341ab2d4a.tar.zst
firejail-760f50f78ad13664d7a32b4577381c0341ab2d4a.zip
landlock: move commands into profile and add landlock.enforce
Changes: * Move commands from --landlock and --landlock.proc= into etc/inc/landlock-common.inc * Remove --landlock and --landlock.proc= * Add --landlock.enforce Instead of hard-coding the default commands (and having a separate command just for /proc), move them into a dedicated profile to make it easier for users to interact with the entries (view, copy, add ignore entries, etc). Only enforce the Landlock commands if --landlock.enforce is supplied. This allows safely adding Landlock commands to (upstream) profiles while keeping their enforcement opt-in. It also makes it simpler to effectively disable all Landlock commands, by using `--ignore=landlock.enforce`. Relates to #6078.
Diffstat (limited to 'src/man/firejail-profile.5.in')
-rw-r--r--src/man/firejail-profile.5.in15
1 files changed, 4 insertions, 11 deletions
diff --git a/src/man/firejail-profile.5.in b/src/man/firejail-profile.5.in
index 76f5e4d20..e1d7fde94 100644
--- a/src/man/firejail-profile.5.in
+++ b/src/man/firejail-profile.5.in
@@ -509,17 +509,10 @@ Blacklist all Linux capabilities.
509Whitelist given Linux capabilities. 509Whitelist given Linux capabilities.
510#ifdef HAVE_LANDLOCK 510#ifdef HAVE_LANDLOCK
511.TP 511.TP
512\fBlandlock 512\fBlandlock.enforce
513Create a Landlock ruleset (if it doesn't already exist) and add basic access 513Enforce the Landlock ruleset.
514rules to it. 514.PP
515.TP 515Without it, the other Landlock commands have no effect.
516\fBlandlock.proc no|ro|rw
517Add an access rule for /proc directory (read-only if set to \fBro\fR and
518read-write if set to \fBrw\fR).
519The access rule for /proc is added after this directory is set up in the
520sandbox.
521Access rules for /proc set up with other Landlock-related profile options have
522no effect.
523.TP 516.TP
524\fBlandlock.read path 517\fBlandlock.read path
525Create a Landlock ruleset (if it doesn't already exist) and add a read access 518Create a Landlock ruleset (if it doesn't already exist) and add a read access