landlock: Minor typo and grammar fixes in IPC scoping documentation

* Fix some whitespace, punctuation and minor grammar.
* Add a missing sentence about the minimum ABI version,
  to stay in line with the section next to it.

Cc: Tahera Fahimi <fahimitahera@gmail.com>
Cc: Tanya Agarwal <tanyaagarwal25699@gmail.com>
Signed-off-by: Günther Noack <gnoack@google.com>
Link: https://lore.kernel.org/r/20250124154445.162841-1-gnoack@google.com
[mic: Add newlines, update doc date]
Signed-off-by: Mickaël Salaün <mic@digikod.net>
This commit is contained in:
Günther Noack 2025-01-24 15:44:44 +00:00 committed by Mickaël Salaün
parent 143c9aae04
commit 192b7ff29b
No known key found for this signature in database
GPG key ID: E5E3D0E88C82F6D2
2 changed files with 9 additions and 5 deletions

View file

@ -8,7 +8,7 @@ Landlock: unprivileged access control
===================================== =====================================
:Author: Mickaël Salaün :Author: Mickaël Salaün
:Date: October 2024 :Date: January 2025
The goal of Landlock is to enable restriction of ambient rights (e.g. global The goal of Landlock is to enable restriction of ambient rights (e.g. global
filesystem or network access) for a set of processes. Because Landlock filesystem or network access) for a set of processes. Because Landlock
@ -329,11 +329,11 @@ non-sandboxed process, we can specify this restriction with
A sandboxed process can connect to a non-sandboxed process when its domain is A sandboxed process can connect to a non-sandboxed process when its domain is
not scoped. If a process's domain is scoped, it can only connect to sockets not scoped. If a process's domain is scoped, it can only connect to sockets
created by processes in the same scope. created by processes in the same scope.
Moreover, If a process is scoped to send signal to a non-scoped process, it can Moreover, if a process is scoped to send signal to a non-scoped process, it can
only send signals to processes in the same scope. only send signals to processes in the same scope.
A connected datagram socket behaves like a stream socket when its domain is A connected datagram socket behaves like a stream socket when its domain is
scoped, meaning if the domain is scoped after the socket is connected , it can scoped, meaning if the domain is scoped after the socket is connected, it can
still :manpage:`send(2)` data just like a stream socket. However, in the same still :manpage:`send(2)` data just like a stream socket. However, in the same
scenario, a non-connected datagram socket cannot send data (with scenario, a non-connected datagram socket cannot send data (with
:manpage:`sendto(2)`) outside its scope. :manpage:`sendto(2)`) outside its scope.

View file

@ -268,7 +268,9 @@ struct landlock_net_port_attr {
* ~~~~~~~~~~~~~~~~ * ~~~~~~~~~~~~~~~~
* *
* These flags enable to restrict a sandboxed process to a set of network * These flags enable to restrict a sandboxed process to a set of network
* actions. This is supported since the Landlock ABI version 4. * actions.
*
* This is supported since Landlock ABI version 4.
* *
* The following access rights apply to TCP port numbers: * The following access rights apply to TCP port numbers:
* *
@ -291,11 +293,13 @@ struct landlock_net_port_attr {
* Setting a flag for a ruleset will isolate the Landlock domain to forbid * Setting a flag for a ruleset will isolate the Landlock domain to forbid
* connections to resources outside the domain. * connections to resources outside the domain.
* *
* This is supported since Landlock ABI version 6.
*
* Scopes: * Scopes:
* *
* - %LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET: Restrict a sandboxed process from * - %LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET: Restrict a sandboxed process from
* connecting to an abstract UNIX socket created by a process outside the * connecting to an abstract UNIX socket created by a process outside the
* related Landlock domain (e.g. a parent domain or a non-sandboxed process). * related Landlock domain (e.g., a parent domain or a non-sandboxed process).
* - %LANDLOCK_SCOPE_SIGNAL: Restrict a sandboxed process from sending a signal * - %LANDLOCK_SCOPE_SIGNAL: Restrict a sandboxed process from sending a signal
* to another process outside the domain. * to another process outside the domain.
*/ */