LWN: Comments on "Landlock (finally) sets sail" https://lwn.net/Articles/859908/ This is a special feed containing comments posted to the individual LWN article titled "Landlock (finally) sets sail". en-us Mon, 29 Sep 2025 14:50:50 +0000 Mon, 29 Sep 2025 14:50:50 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Landlock (finally) sets sail https://lwn.net/Articles/861163/ https://lwn.net/Articles/861163/ l0kod <div class="FormattedComment"> It is an incremental development; we can&#x27;t push a big chunk of new code, especially for security features, which should also come with exhaustive documentation, tests and reviews. BTW, most Linux access-control mechanisms don&#x27;t handle every possible access-control types. It is also an opportunity to take into account different use cases and wish lists. Anyhow, Landlock is already useful, the current limitations are explicit, and sandboxing can be improved thanks to features such as seccomp.<br> </div> Mon, 28 Jun 2021 11:36:42 +0000 Landlock (finally) sets sail https://lwn.net/Articles/861146/ https://lwn.net/Articles/861146/ aabc <div class="FormattedComment"> <font class="QuotedText">&gt; Landlock is useful in its current form, but ...</font><br> <p> &quot;It is currently not possible to restrict some file-related actions accessible through these syscall families: chdir(2), truncate(2), stat(2), flock(2), chmod(2), chown(2), setxattr(2), utime(2), ioctl(2), fcntl(2), access(2). Future Landlock evolutions will enable to restrict them.&quot;<br> </div> Sun, 27 Jun 2021 23:18:28 +0000 Landlock (finally) sets sail https://lwn.net/Articles/860983/ https://lwn.net/Articles/860983/ l0kod <div class="FormattedComment"> That is a reasonable concern and it was actually addressed by a previous version of Landlock with a dedicated syscall to get the set of available features. However, this approach was drastically simplified with the current version that only deal with a monotonic version, which is enough for the objective.<br> <p> Downstream users (e.g. distros) should not cherry-pick arbitrary features from Linux mainline without measuring the potential consequences. If they do so, they are responsible for the new forked kernel they create. It would also be a risk (and it seems weird, and it may be too cumbersome) for them to only pick partial features instead of the whole new features up to a point. This responsibility also requires to run kernel tests, including Landlock ones. I&#x27;ll do my best to maintain consistent tests, including version checks that are and will be part of the feature tests.<br> </div> Fri, 25 Jun 2021 15:55:40 +0000 Landlock (finally) sets sail https://lwn.net/Articles/860869/ https://lwn.net/Articles/860869/ ecree <div class="FormattedComment"> LANDLOCK_CREATE_RULESET_VERSION sounds like something that will work fine until the first time a distro kernel starts backporting Landlock features. How willing will distros be to only ever take progress monotonically, and how likely are they not to screw it up by mistake?<br> </div> Thu, 24 Jun 2021 20:34:38 +0000 Landlock (finally) sets sail https://lwn.net/Articles/860493/ https://lwn.net/Articles/860493/ l0kod <div class="FormattedComment"> Indeed, I was mostly referring to OpenBSD Unveil (enabling file system access-control), the complement to Pledge (enabling other coarse grained access-control types).<br> </div> Tue, 22 Jun 2021 06:39:13 +0000 Landlock (finally) sets sail https://lwn.net/Articles/860472/ https://lwn.net/Articles/860472/ timrichardson <div class="FormattedComment"> kudos for the heading. <br> </div> Mon, 21 Jun 2021 23:35:08 +0000 Landlock (finally) sets sail https://lwn.net/Articles/860437/ https://lwn.net/Articles/860437/ BruennPatrick <div class="FormattedComment"> Did you mean unveil? To me landlock sounds like a combination of pledge [1] and unveil [2]<br> [1] <a href="https://man.openbsd.org/pledge.2">https://man.openbsd.org/pledge.2</a><br> [2] <a href="https://man.openbsd.org/unveil.2">https://man.openbsd.org/unveil.2</a><br> </div> Mon, 21 Jun 2021 18:43:19 +0000 Landlock (finally) sets sail https://lwn.net/Articles/860367/ https://lwn.net/Articles/860367/ l0kod <div class="FormattedComment"> Landlock and Pledge (and XNU Sandbox, and Capsicum) have the same goal: to sandbox applications. Landlock is a bit more complex than Pledge because of the differences between a Linux distro (i.e. a set of eclectic software, including various kernels) and OpenBSD (i.e. roughly a monolithic set of compatible software, with a specific kernel). One of Pledge&#x27;s strength is its simplicity, which is also a limitation. Landlock has a more flexible (and then more complex) kernel API than Pledge, but the idea is to rely on user space libraries to make the use of Landlock simple (e.g. the Pledge API could eventually be implemented with Landlock). This first release of Landlock targets basic file-system rights, which is the only objective of Pledge, but Landlock is designed to be able to support more fine-grained access-control types over time.<br> </div> Mon, 21 Jun 2021 08:41:05 +0000 Landlock (finally) sets sail https://lwn.net/Articles/860331/ https://lwn.net/Articles/860331/ ashkulz <div class="FormattedComment"> Isn&#x27;t this similar to pledge which was introduced in OpenBSD?<br> </div> Sun, 20 Jun 2021 11:44:18 +0000