-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Restrict executing on memfd
#37
Comments
The initial goal of Landlock is to control access to data, but yes, it makes sense to have more control over an execution environment. We could leverage the |
See chromeOS's memfd restriction: |
A more generic approach would be to deny any memory from being mapped as executable, except when |
That is more generic and powerful, indeed. |
Such an implementation would also change Landlock's |
We can run executable files that are only given read but not execute access by copying them into a
memfd
and then callfexecve
on the file descriptor. Should we restrict this?The text was updated successfully, but these errors were encountered: