linuxkit/projects/landlock
Avi Deitcher 14c29db5c2
Containerd v2.0.3 (#4112)
* containerd to semver v2.0.3

Signed-off-by: Avi Deitcher <avi@deitcher.net>

* containerd v2.0.3 plus commits to fix blkdiscard

Signed-off-by: Avi Deitcher <avi@deitcher.net>

* update containerd-dev dependencies

Signed-off-by: Avi Deitcher <avi@deitcher.net>

* updated pkg/init and pkg/containerd deps

Signed-off-by: Avi Deitcher <avi@deitcher.net>

---------

Signed-off-by: Avi Deitcher <avi@deitcher.net>
2025-03-06 17:12:07 +02:00
..
kernel-landlock kernel: Use linuxkit images for compilingi/packaging the kernel 2017-04-12 21:28:17 +01:00
landlock.yml Containerd v2.0.3 (#4112) 2025-03-06 17:12:07 +02:00
README.md Change Moby to LinuxKit 2017-06-12 11:51:15 +02:00

Landlock LSM

Landlock is a Linux Security Module currently under development by Mickaël Salaün (@l0kod). Landlock is based on eBPF, extended Berkeley Packet filters (see ebpf project), to attach small programs to hooks in the kernel.

These eBPF programs provide context that can allow for very robust decision-making when integrated with LSM hooks. In particular, this lends itself very nicely to container-based environments. One such example is that Landlock could be used to write policies to restrict containers from accessing file descriptors they do not own, acting as a last line of defense to restrict container escapes,

Landlock is stackable on top of other LSMs, like SELinux and Apparmor.

Roadmap

Near-term:

  • We will carry the Landlock patches in a kernel-landlock image for people to test, and update them continuously
  • Draft and include a simple Landlock policy that can be demonstrated with the current patch-set, to show an example
  • Offer design and code review help on Landlock, using Moby as a test-bed

Long-term:

  • Develop a robust container-minded Landlock policy, and include it in LinuxKit by default