Open
Description
Currently, landlock_restrict_self(2)
applies a ruleset on the calling thread, which makes sense from a kernel point of view, and enables some use cases such as tests. However it might be misleading for users, and it requires additional work to make sure all threads are properly sandboxed.
It would be useful to be able to safely and atomically restrict the entire calling process. The main constraint would be for all sibling threads to have the same credentials. This should work the same way as seccomp(2)
's SECCOMP_FILTER_FLAG_TSYNC
, and the interface would be an additional LANDLOCK_RESTRICT_SELF_PROCESS
flag for landlock_restrict_self(2)
.
Metadata
Metadata
Assignees
Labels
Type
Projects
Status
In review