Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Proposal: add Landlock LSM support #1110

Open
kailun-qin opened this issue Aug 2, 2021 · 0 comments
Open

Proposal: add Landlock LSM support #1110

kailun-qin opened this issue Aug 2, 2021 · 0 comments

Comments

@kailun-qin
Copy link
Contributor

Linux kernel 5.13 adds support for Landlock Linux Security Module (LSM).

This allows unprivileged processes to create safe security sandboxes that can securely restrict the ambient rights (e.g. global filesystem access) for themselves.

Please kindly refer to the landlock userspace-api, kernel doc, website and the feature request in runc for details.

kailun-qin added a commit to kailun-qin/runtime-spec that referenced this issue Aug 2, 2021
Linux kernel 5.13 adds support for Landlock Linux Security Module (LSM).
This allows unprivileged processes to create safe security sandboxes
that can securely restrict the ambient rights (e.g. global filesystem
access) for themselves.

opencontainers#1110

Signed-off-by: Kailun Qin <kailun.qin@intel.com>
kailun-qin added a commit to kailun-qin/runtime-spec that referenced this issue Aug 2, 2021
Linux kernel 5.13 adds support for Landlock Linux Security Module (LSM).
This allows unprivileged processes to create safe security sandboxes
that can securely restrict the ambient rights (e.g. global filesystem
access) for themselves.

opencontainers#1110

Signed-off-by: Kailun Qin <kailun.qin@intel.com>
kailun-qin added a commit to kailun-qin/runtime-spec that referenced this issue Aug 2, 2021
Linux kernel 5.13 adds support for Landlock Linux Security Module (LSM).
This allows unprivileged processes to create safe security sandboxes
that can securely restrict the ambient rights (e.g. global filesystem
access) for themselves.

opencontainers#1110

Signed-off-by: Kailun Qin <kailun.qin@intel.com>
kailun-qin added a commit to kailun-qin/runtime-spec that referenced this issue Sep 2, 2022
Linux kernel 5.13 adds support for Landlock Linux Security Module (LSM).
This allows unprivileged processes to create safe security sandboxes
that can securely restrict the ambient rights (e.g. global filesystem
access) for themselves.

opencontainers#1110

Signed-off-by: Kailun Qin <kailun.qin@intel.com>
Zheaoli added a commit to Zheaoli/runtime-spec that referenced this issue Jan 2, 2024
Linux kernel 5.13 adds support for Landlock Linux Security Module (LSM).
This allows unprivileged processes to create safe security sandboxes
that can securely restrict the ambient rights (e.g. global filesystem
access) for themselves.

opencontainers#1110

Co-authored-by: Zheao Li <me@manjusaka.me>
Signed-off-by: Kailun Qin <kailun.qin@intel.com>
Zheaoli added a commit to Zheaoli/runtime-spec that referenced this issue Jan 2, 2024
Linux kernel 5.13 adds support for Landlock Linux Security Module (LSM).
This allows unprivileged processes to create safe security sandboxes
that can securely restrict the ambient rights (e.g. global filesystem
access) for themselves.

opencontainers#1110

Co-authored-by: Zheao Li <me@manjusaka.me>
Signed-off-by: Kailun Qin <kailun.qin@intel.com>
Zheaoli added a commit to Zheaoli/runtime-spec that referenced this issue Mar 1, 2024
Linux kernel 5.13 adds support for Landlock Linux Security Module (LSM).
This allows unprivileged processes to create safe security sandboxes
that can securely restrict the ambient rights (e.g. global filesystem
access) for themselves.

opencontainers#1110

Co-authored-by: Zheao Li <me@manjusaka.me>
Signed-off-by: Kailun Qin <kailun.qin@intel.com>
Zheaoli added a commit to Zheaoli/runtime-spec that referenced this issue Sep 16, 2024
Linux kernel 5.13 adds support for Landlock Linux Security Module (LSM).
This allows unprivileged processes to create safe security sandboxes
that can securely restrict the ambient rights (e.g. global filesystem
access) for themselves.

opencontainers#1110

Co-authored-by: Zheao Li <me@manjusaka.me>
Signed-off-by: Kailun Qin <kailun.qin@intel.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant