[RFC PATCH 0/9] Landlock supervise: a mechanism for interactive permission requests
Tetsuo Handa
penguin-kernel at I-love.SAKURA.ne.jp
Wed Mar 12 06:20:25 UTC 2025
On 2025/03/04 10:12, Tingmao Wang wrote:
> bash # env LL_FS_RO=/usr:/lib:/bin:/etc:/dev:/proc LL_FS_RW= LL_SUPERVISE=1 ./sandboxer bash -i
> bash # echo "Hi, $(whoami)!"
> Hi, root!
> bash # ls /
> ------------- Sandboxer access request -------------
> Process ls[166] (/usr/bin/ls) wants to read
> /
> (y)es/(a)lways/(n)o > y
> ----------------------------------------------------
> bin
> boot
> dev
> ...
> usr
> var
> bash # echo 'evil' >> /etc/profile
> (a spurious create request due to current issue with dcache miss is omitted)
> ------------- Sandboxer access request -------------
> Process bash[163] (/usr/bin/bash) wants to read/write
> /etc/profile
> (y)es/(a)lways/(n)o > n
> ----------------------------------------------------
> bash: /etc/profile: Permission denied
> bash #
Please check TOMOYO, for TOMOYO is already doing it.
https://tomoyo.sourceforge.net/2.6/chapter-7.html#7.3
More information about the Linux-security-module-archive
mailing list