

This enables to minimize this patch series and ease review. In this current form, Landlock misses some access-control features. Landlock also takes inspiration from other OS sandbox mechanisms: XNU Sandbox, FreeBSD Capsicum or OpenBSD Pledge/Unveil. Landlock is inspired by seccomp-bpf but instead of filtering syscalls and their raw arguments, a Landlock rule can restrict the use of kernel objects like file hierarchies, according to the kernel semantic. Landlock empowers any process, including unprivileged ones, to securely restrict themselves. This kind of sandbox is expected to help mitigate the security impact of bugs or unexpected/malicious behaviors in user-space applications.

Because Landlock is a stackable LSM, it makes possible to create safe security sandboxes as new security layers in addition to the existing system-wide access-controls. global filesystem access) for a set of processes. The goal of Landlock is to enable to restrict ambient rights (e.g. Landlock is a new Linux security module that allows to sandbox applications.
