diff options
author | Азалия Смарагдова <charming.flurry@yandex.ru> | 2022-08-15 12:19:11 +0500 |
---|---|---|
committer | Азалия Смарагдова <charming.flurry@yandex.ru> | 2022-08-15 13:32:24 +0500 |
commit | 61b15442898eeb1db2d23b6b2eb72a705ceb368a (patch) | |
tree | 6d9cb22307941a81f4562dbfd0c00e7b2e96dbcd /src/zsh_completion/_firejail.in | |
parent | more merges (diff) | |
download | firejail-61b15442898eeb1db2d23b6b2eb72a705ceb368a.tar.gz firejail-61b15442898eeb1db2d23b6b2eb72a705ceb368a.tar.zst firejail-61b15442898eeb1db2d23b6b2eb72a705ceb368a.zip |
Landlock support has been added.
Diffstat (limited to 'src/zsh_completion/_firejail.in')
-rw-r--r-- | src/zsh_completion/_firejail.in | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/src/zsh_completion/_firejail.in b/src/zsh_completion/_firejail.in index 2b67c2a00..661929db9 100644 --- a/src/zsh_completion/_firejail.in +++ b/src/zsh_completion/_firejail.in | |||
@@ -105,6 +105,10 @@ _firejail_args=( | |||
105 | '--keep-dev-shm[/dev/shm directory is untouched (even with --private-dev)]' | 105 | '--keep-dev-shm[/dev/shm directory is untouched (even with --private-dev)]' |
106 | '--keep-fd[inherit open file descriptors to sandbox]: :' | 106 | '--keep-fd[inherit open file descriptors to sandbox]: :' |
107 | '--keep-var-tmp[/var/tmp directory is untouched]' | 107 | '--keep-var-tmp[/var/tmp directory is untouched]' |
108 | '--landlock-read=-[Landlock read access rule]: :_files' | ||
109 | '--landlock-write=-[Landlock write access rule]: :_files' | ||
110 | '--landlock-restricted-write=-[Landlock write access rule that doesn't include creation of FIFO pipes, sockets and block devices]: :_files' | ||
111 | '--landlock-execute=-[Landlock execution-permitting rule]: :_files' | ||
108 | '--machine-id[spoof /etc/machine-id with a random id]' | 112 | '--machine-id[spoof /etc/machine-id with a random id]' |
109 | '--memory-deny-write-execute[seccomp filter to block attempts to create memory mappings that are both writable and executable]' | 113 | '--memory-deny-write-execute[seccomp filter to block attempts to create memory mappings that are both writable and executable]' |
110 | '*--mkdir=-[create a directory]:' | 114 | '*--mkdir=-[create a directory]:' |