aboutsummaryrefslogtreecommitdiffstats
path: root/src/man/firejail-profile.5.in
diff options
context:
space:
mode:
authorLibravatar Kelvin M. Klann <kmk3.code@protonmail.com>2024-02-10 04:47:11 -0300
committerLibravatar Kelvin M. Klann <kmk3.code@protonmail.com>2024-02-27 22:27:46 -0300
commit9cfeb485eb158217e644955bddc42e3bcf42ccbb (patch)
treef15092bed9d126ea3e651726e7215c8b7ee4c4ae /src/man/firejail-profile.5.in
parentlandlock: add _fs prefix to filesystem functions (diff)
downloadfirejail-9cfeb485eb158217e644955bddc42e3bcf42ccbb.tar.gz
firejail-9cfeb485eb158217e644955bddc42e3bcf42ccbb.tar.zst
firejail-9cfeb485eb158217e644955bddc42e3bcf42ccbb.zip
landlock: use "landlock.fs." prefix in filesystem commands
Since Landlock ABI v4 it is possible to restrict actions related to the network and potentially more areas will be added in the future. So use `landlock.fs.` as the prefix in the current filesystem-related commands (and later `landlock.net.` for the network-related commands) to keep them organized and to match what is used in the kernel. Examples of filesystem and network access flags: * `LANDLOCK_ACCESS_FS_EXECUTE`: Execute a file. * `LANDLOCK_ACCESS_FS_READ_DIR`: Open a directory or list its content. * `LANDLOCK_ACCESS_NET_BIND_TCP`: Bind a TCP socket to a local port. * `LANDLOCK_ACCESS_NET_CONNECT_TCP`: Connect an active TCP socket to a remote port. Relates to #6078.
Diffstat (limited to 'src/man/firejail-profile.5.in')
-rw-r--r--src/man/firejail-profile.5.in10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/man/firejail-profile.5.in b/src/man/firejail-profile.5.in
index b6672c16b..e274a91d1 100644
--- a/src/man/firejail-profile.5.in
+++ b/src/man/firejail-profile.5.in
@@ -514,25 +514,25 @@ Enforce the Landlock ruleset.
514.PP 514.PP
515Without it, the other Landlock commands have no effect. 515Without it, the other Landlock commands have no effect.
516.TP 516.TP
517\fBlandlock.read path 517\fBlandlock.fs.read path
518Create a Landlock ruleset (if it doesn't already exist) and add a read access 518Create a Landlock ruleset (if it doesn't already exist) and add a read access
519rule for path. 519rule for path.
520.TP 520.TP
521\fBlandlock.write path 521\fBlandlock.fs.write path
522Create a Landlock ruleset (if it doesn't already exist) and add a write access 522Create a Landlock ruleset (if it doesn't already exist) and add a write access
523rule for path. 523rule for path.
524.TP 524.TP
525\fBlandlock.makeipc path 525\fBlandlock.fs.makeipc path
526Create a Landlock ruleset (if it doesn't already exist) and add a rule that 526Create a Landlock ruleset (if it doesn't already exist) and add a rule that
527allows the creation of named pipes (FIFOs) and Unix domain sockets beneath 527allows the creation of named pipes (FIFOs) and Unix domain sockets beneath
528the given path. 528the given path.
529.TP 529.TP
530\fBlandlock.makedev path 530\fBlandlock.fs.makedev path
531Create a Landlock ruleset (if it doesn't already exist) and add a rule that 531Create a Landlock ruleset (if it doesn't already exist) and add a rule that
532allows the creation of block devices and character devices beneath the given 532allows the creation of block devices and character devices beneath the given
533path. 533path.
534.TP 534.TP
535\fBlandlock.execute path 535\fBlandlock.fs.execute path
536Create a Landlock ruleset (if it doesn't already exist) and add an execution 536Create a Landlock ruleset (if it doesn't already exist) and add an execution
537permission rule for path. 537permission rule for path.
538#endif 538#endif