aboutsummaryrefslogtreecommitdiffstats
path: root/src/man/firejail-profile.5.in
diff options
context:
space:
mode:
authorLibravatar Kelvin M. Klann <kmk3.code@protonmail.com>2024-02-01 23:21:26 -0300
committerLibravatar Kelvin M. Klann <kmk3.code@protonmail.com>2024-02-02 19:37:06 -0300
commitf70ffbe76cd06c03442132f06d503846a415f24c (patch)
treef48b2cf278c3b60717ca9ff3b9c3dd26ab2c7ef2 /src/man/firejail-profile.5.in
parentcrawl.profile: allow lua (#6182) (diff)
downloadfirejail-f70ffbe76cd06c03442132f06d503846a415f24c.tar.gz
firejail-f70ffbe76cd06c03442132f06d503846a415f24c.tar.zst
firejail-f70ffbe76cd06c03442132f06d503846a415f24c.zip
landlock: split .special into .makeipc and .makedev
As discussed with @topimiettinen[1], it is unlikely that an unprivileged process would need to directly create block or character devices. Also, `landlock.special` is not very descriptive of what it allows. So split `landlock.special` into: * `landlock.makeipc`: allow creating named pipes and sockets (which are usually used for inter-process communication) * `landlock.makedev`: allow creating block and character devices Misc: The `makedev` name is based on `nodev` from mount(8), which makes mount not interpret block and character devices. `ipc` was suggested by @rusty-snake[2]. Relates to #6078. [1] https://github.com/netblue30/firejail/pull/6078#pullrequestreview-1740569786 [2] https://github.com/netblue30/firejail/pull/6187#issuecomment-1924107294
Diffstat (limited to 'src/man/firejail-profile.5.in')
-rw-r--r--src/man/firejail-profile.5.in11
1 files changed, 8 insertions, 3 deletions
diff --git a/src/man/firejail-profile.5.in b/src/man/firejail-profile.5.in
index e1d7fde94..b6672c16b 100644
--- a/src/man/firejail-profile.5.in
+++ b/src/man/firejail-profile.5.in
@@ -522,10 +522,15 @@ rule for path.
522Create a Landlock ruleset (if it doesn't already exist) and add a write access 522Create a Landlock ruleset (if it doesn't already exist) and add a write access
523rule for path. 523rule for path.
524.TP 524.TP
525\fBlandlock.special path 525\fBlandlock.makeipc path
526Create a Landlock ruleset (if it doesn't already exist) and add a rule that 526Create a Landlock ruleset (if it doesn't already exist) and add a rule that
527allows the creation of block devices, character devices, named pipes (FIFOs) 527allows the creation of named pipes (FIFOs) and Unix domain sockets beneath
528and Unix domain sockets beneath given path. 528the given path.
529.TP
530\fBlandlock.makedev path
531Create a Landlock ruleset (if it doesn't already exist) and add a rule that
532allows the creation of block devices and character devices beneath the given
533path.
529.TP 534.TP
530\fBlandlock.execute path 535\fBlandlock.execute path
531Create a Landlock ruleset (if it doesn't already exist) and add an execution 536Create a Landlock ruleset (if it doesn't already exist) and add an execution