{
    "componentChunkName": "component---src-templates-issues-tsx",
    "path": "/issues/346",
    "result": {"data":{"issuesJson":{"id":"8c71a8e0-e3df-5b2e-846e-d52082c1edf4","title":"Zouuup/landrun: 使用Landlock在一个安全的、非特权的沙盒中运行任何Linux进程。","number":346,"bodyHTML":"<div align=\"center\" dir=\"auto\">\n<p dir=\"auto\"><a target=\"_blank\" rel=\"noopener noreferrer nofollow\" href=\"https://camo.githubusercontent.com/a15b413168923d02e21292705ceaf86b92675f98e250c5c896a02ba7504a6eae/68747470733a2f2f63646e2e6a7364656c6976722e6e65742f67682f657279616a662f7475406d61696e2f696d672f696d6167655f32303234303432305f3231343430382e676966\"><img src=\"https://camo.githubusercontent.com/a15b413168923d02e21292705ceaf86b92675f98e250c5c896a02ba7504a6eae/68747470733a2f2f63646e2e6a7364656c6976722e6e65742f67682f657279616a662f7475406d61696e2f696d672f696d6167655f32303234303432305f3231343430382e676966\" width=\"100%\" height=\"3\" data-animated-image=\"\" data-canonical-src=\"https://cdn.jsdelivr.net/gh/eryajf/tu@main/img/image_20240420_214408.gif\" style=\"max-width: 100%; height: auto; max-height: 3px;\"></a><br><br></p>\n<markdown-accessiblity-table><table role=\"table\">\n<thead>\n<tr>\n<th align=\"right\">Repos</th>\n<th align=\"left\"><a href=\"https://github.com/Zouuup/landrun\">Zouuup/landrun</a></th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td align=\"right\"><strong>Views</strong></td>\n<td align=\"left\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.com/eb78b347c0b9f2039b8c9f33ff9dc61d26fcafa1d8bc9208607a2d2ff7b3065d/68747470733a2f2f76696577732e77686174696c656172656e65642e746f6461792f76696577732f6769746875622f5a6f757575702f6c616e6472756e2e737667\" alt=\"views\" data-canonical-src=\"https://views.whatilearened.today/views/github/Zouuup/landrun.svg\" style=\"max-width: 100%;\"></a></td>\n</tr>\n<tr>\n<td align=\"right\"><strong>Stars</strong></td>\n<td align=\"left\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.com/9388482bf97ed9fb90c88fcd7c8affb05b13371b6ef5b7c769d595d525fb4098/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f73746172732f5a6f757575702f6c616e6472756e3f636f6c6f723d663266303864266c6f676f3d556e64657274616c65266c6f676f436f6c6f723d656234363330\" alt=\"stars\" data-canonical-src=\"https://img.shields.io/github/stars/Zouuup/landrun?color=f2f08d&amp;logo=Undertale&amp;logoColor=eb4630\" style=\"max-width: 100%;\"></a></td>\n</tr>\n<tr>\n<td align=\"right\"><strong>Forks</strong></td>\n<td align=\"left\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.com/51057a128bfbf2ef06b127ff67157403f9b36766d443183b3ca0e568abf680ec/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f666f726b732f5a6f757575702f6c616e6472756e3f636f6c6f723d626138366562266c6f676f3d48616e647368616b65266c6f676f436f6c6f723d656136616136\" alt=\"forks\" data-canonical-src=\"https://img.shields.io/github/forks/Zouuup/landrun?color=ba86eb&amp;logo=Handshake&amp;logoColor=ea6aa6\" style=\"max-width: 100%;\"></a></td>\n</tr>\n<tr>\n<td align=\"right\"><strong>License</strong></td>\n<td align=\"left\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.com/489123b7a30f519562215c2b8c8facc810b7e1495a66be4ee52ba9ee40424ff4/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f5a6f757575702f6c616e6472756e3f6c6f676f3d64617461253341696d616765253246706e672533426261736536342532436956424f5277304b47676f414141414e53556845556741414144414141414177434159414141425841766d48414141414358424957584d41414173544141414c457745416d70775941414144336b6c45515652346e4f335953557a5555426748384a726f57567255474a66456d3773584e63534446784d544c327069347348456778654e526f77586770455742445552522532424e414e4f4b4f4b36366f6f4b4a4742586545475263574163455646475152484677516d483525324630774861655748493944554455354c356b6e6568644f62377a66652532423139636e434a47495243516945596c514237594a4979474c38616f73756c565a36695246516a69474b6b7564576735614c6c704f70704e586e665071773555304459524a6d56786a4367464633424c755a476d416f5655694b4541726d583744375553677351706f72674761336748664b34483663754262435644334771683141352532424c6745253242467749656e514d306a6f446f66714c6f48564e7742796d384370546e416d327a51713073676478624964515a556c416b7150415a3664676a303541446f59526f6f66792532466f5869726f376b3551586a4c6f70677a4b69514e6c4c4461716f4967754577426a7a7150355066446a45394479495879493633464d547751464d43567271774e61763451666f52673538514625324266724d485172454b3844546f434d714e4179574e4866786d54526f4c4f726d5352566747744466714345715a4f4851727a6f34706243557341333431365169364551394b476a6345465267484f724f4b6e5536574162396247455459656b4b7843766a546167394534706a653534446b3551503862624d4859762532464333756541654a6b50304f4778422532424a70426e4172595238455951516e6f4e31414e4661426e5050356c385372736559514c303641646b30464a5938484f5761424d6c6541486a683068506f73497a6c6f3876304125324633345a694f6548726130714b52504d5653493774762532423932747725324676687855654252713456454c674d376642714b354770526d6f514c584e7075625475367a6f4e52706754386e5051627138347764253246494375767978694b4871694e41664933774d367549684271476b4c696977414f734b44714f68743749747239567938536a52424557667941627225324668523142667056514664484a42253246423268683778376a36517077435665655951326b72554235436c636a3641326d3067576a25324244306d4c34397a573563517943484c4e37726a6c6d6d6174457958582532464372547a412532466f51785a6b576c39474a5443566f25324279546a3837253242346769504b6376307149486f344156344430565a727251493334706e70524d36357875652532467a417265453425324654253246536f676c664542794d7369517441546c4c3352414a355948725378365a44665337307337754d486842705225324659423573305057366f455270316236253246667252684b3353444c35546965364f515548516c5133735644752532427a50636b397657453973747225324236496a533967486d5750616861444a25324277434b364e494242587348423948796b587378774470686c436d416476706c6162554a4e6e5a504239342532464e7436784f6538587a4562503257684d335741673147756236744825324233513150673337365239713475716c6e6f36676448476a444f5139306562303141484d3672596975554a314f713472344656756a35765239427a4d3957674e764f7977446869495951467667626366774166774d764863615067425041253246447948476a50624e394138616d6562636477416444354e6633373574787165774e5552656f797677424958594c645170576c6877465771745061435044334173467541535636717171496c62304a766b564331464c39576b4c55556c55574b337a585a4c46432532423125324642726f46746f364f7358497545594a5034447a7a5732594656316f4a614141414141456c46546b5375516d4343\" alt=\"license\" data-canonical-src=\"https://img.shields.io/github/license/Zouuup/landrun?logo=data%3Aimage%2Fpng%3Bbase64%2CiVBORw0KGgoAAAANSUhEUgAAADAAAAAwCAYAAABXAvmHAAAACXBIWXMAAAsTAAALEwEAmpwYAAAD3klEQVR4nO3YSUzUUBgH8JroWVrUGJfEm7sXNcSDFxMTL2pi4sHEgxeNRowXgpEWBDURR%2BNANOKOK66ooKJGBXeEGRcWAcEVFGQRHFwQmH5%2F0wHaeWHI9DUDU5L5knehdOb7zfe%2B19cnCJGIRCQiEYlQB7YJIyGL8aosulVZ6iRFQjiGKkudWg5aLlpOppNXnfPqw5U0DYRJmVxjCgFF3BLuZGmAoVUiKEArmX7D7USgsQporgGa3gHfK4H6cuBbCVD3Gqh1A5%2BLgE%2BFwIenQM0joDofqLoHVNwBym8CpTnAm2zQq0sgdxbIdQZUlAkqPAZ6dgj05ADoYRoofy%2FoXiro7k5QXjLopgzKiQNlLDaqoIguEwBjzqP5PfDjE9DyIXyI63FMTwQFMCVrqwNav4QfoRg58QF%2BfrMHQrEK8DToCMqNAyWNHfxmTRoLOrmSRVgGtDfqCEqZOHQrzo4pbCUsA3416Qi6EQ9KGjcEFRgHOrOKnU6WAb9bGETYekKxCvjTag9E4pje54Dk5QP8bbMHYv%2FC3ueAeJkP0OGxB%2BJpBnArYR8EYQQnoN1ANFaBnPP5l8SrseYQL06Adk0FJY8HOWaBMleAHjh0hPosIzlo8v0A%2F34ZiOeHra0qKRPMVSI7tv%2B92tw%2FvhxUeBRq4VELgM7fBqK5GpRmoQLXNpubTu6zoNRpgT8nPQbq84wd%2FICuvyxiKHqiNAfI3wM6uIhBqGkLiiwAOsKDqOht7Itr9Vy8SjRBEWfyAbr%2FhR1BfpVQFdHJB%2FB2hh7x7j6QpwCVeeYQ2krUB5Clcj6A2m0gWj%2BD0mL49zW5cQyCHLN7rjlmmatEyXX%2FCrTzA%2FoQxZkWl9GJTCVo%2ByTj87%2B4giPKcv0qIHo4AV4D0VZrrQI34pnpRM65xue%2FzAreE4%2FT%2FSoglfEByMsiQtATlL3RAJ5YHrSx6ZDfS70s7uMHhBpR%2FYB5s0PW6oERp1b6%2FfrRhK3SDL5Tie6OQUHQlQ3sVDu%2BzPck9vWE9str%2B6IjS9gHmWPahaDJ%2BwCK6NIBBXsHB9HykXsxwDphlCmAdvplabUJNnZPB94%2FNt6xOe8XzEbP2WhM3WAg1Gub6tH%2B3Q1Pg376R9q4uqlno6gdHGjDOQ90eb01AHM6rYiuUJ1Oq4r4FVuj5vR9BzM9WgNvOywDhiIYQFvgbcfwAfwMvHcaPgBPA%2FDyHGjPbN9A8amebcdwAdD5Nf375txqewNUReoyvwBIXYLdQpWlhwFWqtPaCPD3AsFuASV6qqqIlb0JvkVC1FL9WkLUUlUWK3zXZLFC%2B1%2FBroFto6OsXIuEYJP4DzzW2YFV1oJaAAAAAElFTkSuQmCC\" style=\"max-width: 100%;\"></a></td>\n</tr>\n<tr>\n<td align=\"right\"><strong>UpdatedAt</strong></td>\n<td align=\"left\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.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\" alt=\"last-commit\" data-canonical-src=\"https://img.shields.io/github/last-commit/Zouuup/landrun?display_timestamp=committer&amp;logo=data%3Aimage%2Fpng%3Bbase64%2CiVBORw0KGgoAAAANSUhEUgAAAB4AAAAeCAYAAAA7MK6iAAAACXBIWXMAAAsTAAALEwEAmpwYAAAFHUlEQVR4nLVX7U9aVxwm26dlX%2Fdhbx%2B2%2FQnbkvUbrdUAQgJJIfUDNWDTTmOv1FQUFaPJ4kusrV01Jt1sNpctS2u3botZtmxd9tJSFSoqKqIF5bYDFLCovClefstzJ8wXRLDZLznkcO4557n3d3%2FneZ4rEOQZt1WqF%2B8XFr4%2BfOLEe2joY0zwf8ToyZPvjEgkLY%2Bk0mmrXO6dKinxzGk0fjT0x%2BRyr0UqncYczM1rc4tQ%2BIrp2LGXdo4NC4VvWqTS72wqlc%2Br13ORri6KdXdnbOHLlwlzJpRKn6W4%2BK6poOCNnIAfHj%2F%2BwahIZB4vKnqZf0qJpNIql%2Fv8TU0cNl5rbyc3w0QnTp3y2LTaJ7M1NaxDr2fRn1SpPG6Gia21tfE34TcaOay1iMUVOQFbFYqIWSo1W8TiAVanC0evXOEB7Wp14HFb22zE5fqLOC5ERLQWidNaNI4uEcc9i7hcJldHh2NWrQ5gDdbOlpaumIuLb2atAQDPnz0b8NbWcmxVVRJ3HmxpScwwzOJmKDRGe8LlCZDLG9g7TInV1Ql7dbXbV1e3gT0WKirCFomkPyvwXFlZGJOjV6%2BSt64uudDZOU5EUcox%2FMEQDVvt6MbcN27Y3Ayzhv3spaUrB6Z9qrJSO19ezj8p2pLBkJy%2BcCHJxWI5gW5tcfRRz1dU19GfGkou9PZO4smR9jGFwpex4Dy3bvnmKypotbU13VidjqYZhrj49rvMEt%2F%2FYqLz9d00NjW%2Fczgyo9O51zs6aNlo5FDtu0DZgQFhlGXJ0dBADoNhd6uvp6Whoayg7N9LVGH8mD4b%2FHnftUQoNG4vLQ0gixMqlW%2B4qOjtNHDg3r1f6YiRSGxRy7UvqLb9U4qkqnxPONva5lDpHr1%2ByyKRNKWBZy5edMUHB2m5ry%2B%2BEQw%2Bzgf4zo9%2F0ocN3WRzLBw4J%2BJyPWCrqmIgGYtUOsWD4oxZFQoPUjGpVHqI4%2FafkQPC6fZQeeM1%2BvLuIQnjuBWQDDCscrmHP9eoNPAtBqfOnXuaK%2Bh6JEbGrs%2BpvvMmxeIbh863abVPeYySEo9FJHpNMFJY%2BP5cWZkfg7O1tSwYCeSQLTY3E8Q09%2FBVPJUlxQjshT1BscCY02r9UDUBfvCHB66pcfPA3lyAe3ngr3%2F47XDgaJzsly7xwA6NZtlUUPCuAHqaSjUIP%2Bsue8BRWAC%2FNfQ7JZPZ59s0Gj7VtpISz4hQ%2BCpfXGMKhZcvLpUKxfWM8ohvf7p%2FODjHBfcVF8Isk82g1FHykcVFE%2BUZAAX47aE%2FMl4PO50Pnuh0%2Fx4nmcyWPsdwDhBx6CmkLV%2FgFDjYKxOJOFtb0wQyIhL9RyCwK3AOfIGp1YFEBhnMJcLRWEbKdKQoU6ncTZkIEDicAy%2F81dVuEM5RwPfey4xOx0Ik%2FI2NnFki%2BWafOoFIYFcgYZCyxd7eCUjbc4AmF65ft%2FkMhk3o%2B5hc7sMJyqjJEGvYFaQFIr7Y0wPw8BFAY%2B6%2Bvmk3w6zzRuDMmZVRsfh8RtA0uETSD7uCBT6DYQN6iveU0fpkYLjE6qrVrtOxeNKU9THLZJ9kBU2JBsBhV5AivB%2FoKaQNKgPCBwDYaIfZC4adThOqF4WENViLJwVoXobfLBKVw67AOaTsLc65TaVK21vQ4La99eKcYg5vbxsbObzTQ9N7UKDgUO1wDjiDIIBshh5ztg39nQMLSZBH4OzBOUDEQXm206d3fcLgswbXQA4PhcK3nhswU1Bz8wvQ09RHG%2FoYy3ejfwBNmtoYqLA0XgAAAABJRU5ErkJggg%3D%3D&amp;label=UpdatedAt\" style=\"max-width: 100%;\"></a></td>\n</tr>\n<tr>\n<td align=\"right\"><strong>CreatedAt</strong></td>\n<td align=\"left\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.com/09d7c417f13f7a8afa0c6dc28046e5c36a7519b8c8099a22f0583179204fca66/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f637265617465642d61742f5a6f757575702f6c616e6472756e3f6c6f676f3d64617461253341696d616765253246706e672533426261736536342532436956424f5277304b47676f414141414e5355684555674141414234414141416543415941414141374d4b3669414141414358424957584d41414173544141414c457745416d7077594141414648556c45515652346e4c5658375539615678776d3236646c582532466468627825324232253246516e626b7655627264554151674a4a496655444e574454546d4f76314651554661504a346b7573725630314a7431734e70637453327533626f745a746d786439744a5346536f714b71494635625944464c436f76436c656673747a4a387758524c445a4c7a6e6b634f343535376e3364332532466e655a3472454f515a74315771462532423858467234253242664f4c4565326a6f59307a776638546f795a50766a45676b4c592532426b306d6d72584f36644b696e787a476b30666a5430782532425279723055716e6359637a4d317263347451253242497270324c4758646f344e4334567657715453373277716c632532427231334f527269364b6458646e624f484c6c776c7a4a70524b6e3657342532424b36706f4f434e6e494166486a253246253242776168495a4234764b6e715a6630714a704e49716c2532467638545530634e6c3572627963337730516e54703379324c54614a374d314e617844723266526e315370504736476961323174664533345463614f617931694d55564f5146624659714957536f31573854694156616e43306576584f4542375770313448466232327a453566714c4f433545524c515769644e614e49347545636339693768634a6c644868324e57725135674464624f6c7061756d49754c62326174415144506e7a3062384e6257636d785656524a33486d7870536377777a4f4a6d4b44524765384c6c435a444c4739673754496e5631516c376462586256316533675430574b697243466f6d6b5079767758466c5a474a4f6a563625324253743634757564445a4f55354555636f782532464d455144567674364d62634e3237593341797a687633737061557242365a3971724a534f3139657a6a387032704c426b4a792532426343484a7857493567573574636652527a31645531394766476b6f7539505a4f34736d52396a4746777065783444793362766e6d4b79706f74625531335669646a71595a68726a343972764d457425324625324659714c7a396430304e6a57253246637a67796f394f35317a7336614e6c6f354644747530445a675146686c47584a30644241446f4e6864367576703657686f617967374e394c564748386d443462253246486e667455516f4e4734764c51306769784d716c5725324234714f6a744e48446733723166365969525347785279375576714c62395534716b716e78504f4e7661356c447048723125324279794b524e4b57425a793565644d554842326d3572792532422532424551772532427a6766347a6f39253246306f634e3357527a4c4277344a2532424a7950574372716d4967475974554f735744346f785a46516f50556a4770564871493425324661666b51504336665a5165654d31253242764c7549516e6a754257514444437363726d485039656f4e5041744271664f6e5875614b25324268364a45624772732532427076764d6d78654962683836336162565065597953456f39464a48704e4d464a59253242503563575a6b6667374f3174537759436553514c54593345385130392532464256504a556c78516a7368543142736343593032723955445542667643484236367063665041336c794165336e6772332532463437584467614a7a736c7937787741364e5a746c555550437541487161536a5549502532427375653842525741432532464e6651374a5a505a35397330476a3756747049537a34685125324243706658474d4b685a63764c70554b7866574d386f68766637702532464f446a4842666356463849736b383267314648796b63564645253242555a414158343761452532464d6c34504f3530506e75683025324678346e6d637957507364774468427836436d6b4c562532466746446a594b784f4a4f4674623077517949684c39527943774b33414f664947703159464542686e4d4a634c525745624b644b516f55366e63545a6b494544696341792532463831645675454d3552775066657934784f7830496b25324649324e6e466b692532425761664f6f464959466367595a43797864376543556a626334416d46363566742532466b4d686b336f25324235686337734d4a79716a4a45477659466151464972375930775077384246415925324236253242766d6b3377367a7a5275444d6d5a5652736668385274413075455453443775434254364459514e36697665553066706b594c6a453671725672744f78654e4b553954484c5a4a396b4255324a427342685635416976422532466f4b61514e4b675043427744596149665a4334616454684f71463457454e56694c4a77566f586f62664c424b56773637414f6154734c6336355461564b32317651344c613939654b6359673576627873624f627a5451394e37554b4467554f3177446a6944494942736868357a746733396e514d4c535a4248344f7a424f55444551586d323036643366634c67737762585141345068634b336e6873775531427a3877765130395248472532466f597933656a6677424e6d746f59714c4130586741414141424a52553545726b4a676767253344253344266c6162656c3d437265617465644174\" alt=\"create-at\" data-canonical-src=\"https://img.shields.io/github/created-at/Zouuup/landrun?logo=data%3Aimage%2Fpng%3Bbase64%2CiVBORw0KGgoAAAANSUhEUgAAAB4AAAAeCAYAAAA7MK6iAAAACXBIWXMAAAsTAAALEwEAmpwYAAAFHUlEQVR4nLVX7U9aVxwm26dlX%2Fdhbx%2B2%2FQnbkvUbrdUAQgJJIfUDNWDTTmOv1FQUFaPJ4kusrV01Jt1sNpctS2u3botZtmxd9tJSFSoqKqIF5bYDFLCovClefstzJ8wXRLDZLznkcO4557n3d3%2FneZ4rEOQZt1WqF%2B8XFr4%2BfOLEe2joY0zwf8ToyZPvjEgkLY%2Bk0mmrXO6dKinxzGk0fjT0x%2BRyr0UqncYczM1rc4tQ%2BIrp2LGXdo4NC4VvWqTS72wqlc%2Br13ORri6KdXdnbOHLlwlzJpRKn6W4%2BK6poOCNnIAfHj%2F%2BwahIZB4vKnqZf0qJpNIql%2Fv8TU0cNl5rbyc3w0QnTp3y2LTaJ7M1NaxDr2fRn1SpPG6Gia21tfE34TcaOay1iMUVOQFbFYqIWSo1W8TiAVanC0evXOEB7Wp14HFb22zE5fqLOC5ERLQWidNaNI4uEcc9i7hcJldHh2NWrQ5gDdbOlpaumIuLb2atAQDPnz0b8NbWcmxVVRJ3HmxpScwwzOJmKDRGe8LlCZDLG9g7TInV1Ql7dbXbV1e3gT0WKirCFomkPyvwXFlZGJOjV6%2BSt64uudDZOU5EUcox%2FMEQDVvt6MbcN27Y3Ayzhv3spaUrB6Z9qrJSO19ezj8p2pLBkJy%2BcCHJxWI5gW5tcfRRz1dU19GfGkou9PZO4smR9jGFwpex4Dy3bvnmKypotbU13VidjqYZhrj49rvMEt%2F%2FYqLz9d00NjW%2Fczgyo9O51zs6aNlo5FDtu0DZgQFhlGXJ0dBADoNhd6uvp6Whoayg7N9LVGH8mD4b%2FHnftUQoNG4vLQ0gixMqlW%2B4qOjtNHDg3r1f6YiRSGxRy7UvqLb9U4qkqnxPONva5lDpHr1%2ByyKRNKWBZy5edMUHB2m5ry%2B%2BEQw%2Bzgf4zo9%2F0ocN3WRzLBw4J%2BJyPWCrqmIgGYtUOsWD4oxZFQoPUjGpVHqI4%2FafkQPC6fZQeeM1%2BvLuIQnjuBWQDDCscrmHP9eoNPAtBqfOnXuaK%2Bh6JEbGrs%2BpvvMmxeIbh863abVPeYySEo9FJHpNMFJY%2BP5cWZkfg7O1tSwYCeSQLTY3E8Q09%2FBVPJUlxQjshT1BscCY02r9UDUBfvCHB66pcfPA3lyAe3ngr3%2F47XDgaJzsly7xwA6NZtlUUPCuAHqaSjUIP%2Bsue8BRWAC%2FNfQ7JZPZ59s0Gj7VtpISz4hQ%2BCpfXGMKhZcvLpUKxfWM8ohvf7p%2FODjHBfcVF8Isk82g1FHykcVFE%2BUZAAX47aE%2FMl4PO50Pnuh0%2Fx4nmcyWPsdwDhBx6CmkLV%2FgFDjYKxOJOFtb0wQyIhL9RyCwK3AOfIGp1YFEBhnMJcLRWEbKdKQoU6ncTZkIEDicAy%2F81dVuEM5RwPfey4xOx0Ik%2FI2NnFki%2BWafOoFIYFcgYZCyxd7eCUjbc4AmF65ft%2FkMhk3o%2B5hc7sMJyqjJEGvYFaQFIr7Y0wPw8BFAY%2B6%2Bvmk3w6zzRuDMmZVRsfh8RtA0uETSD7uCBT6DYQN6iveU0fpkYLjE6qrVrtOxeNKU9THLZJ9kBU2JBsBhV5AivB%2FoKaQNKgPCBwDYaIfZC4adThOqF4WENViLJwVoXobfLBKVw67AOaTsLc65TaVK21vQ4La99eKcYg5vbxsbObzTQ9N7UKDgUO1wDjiDIIBshh5ztg39nQMLSZBH4OzBOUDEQXm206d3fcLgswbXQA4PhcK3nhswU1Bz8wvQ09RHG%2FoYy3ejfwBNmtoYqLA0XgAAAABJRU5ErkJggg%3D%3D&amp;label=CreatedAt\" style=\"max-width: 100%;\"></a></td>\n</tr>\n</tbody>\n</table></markdown-accessiblity-table>\n<a href=\"https://github.com/opsre/awesome-ops\">\n</a><p dir=\"auto\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.com/b964a36ea4078c39f603d46a29436371c7541a2f26e0228d7b21b9d9805b43d3/68747470733a2f2f736f6369616c6966792e6769742e63692f6f707372652f617765736f6d652d6f70732f696d6167653f6465736372697074696f6e3d3126666f6e743d42697474657226666f726b733d31266973737565733d31266c616e67756167653d31266c6f676f3d6874747073253341253246253246617661746172732e67697468756275736572636f6e74656e742e636f6d25324675253246313838353638303230266e616d653d31266f776e65723d31267061747465726e3d436972637569742b426f6172642670756c6c733d31267374617267617a6572733d31267468656d653d4c69676874\" alt=\"\" data-canonical-src=\"https://socialify.git.ci/opsre/awesome-ops/image?description=1&amp;font=Bitter&amp;forks=1&amp;issues=1&amp;language=1&amp;logo=https%3A%2F%2Favatars.githubusercontent.com%2Fu%2F188568020&amp;name=1&amp;owner=1&amp;pattern=Circuit+Board&amp;pulls=1&amp;stargazers=1&amp;theme=Light\" style=\"max-width: 100%;\"></a></p>\n<a target=\"_blank\" rel=\"noopener noreferrer nofollow\" href=\"https://camo.githubusercontent.com/a15b413168923d02e21292705ceaf86b92675f98e250c5c896a02ba7504a6eae/68747470733a2f2f63646e2e6a7364656c6976722e6e65742f67682f657279616a662f7475406d61696e2f696d672f696d6167655f32303234303432305f3231343430382e676966\"><img src=\"https://camo.githubusercontent.com/a15b413168923d02e21292705ceaf86b92675f98e250c5c896a02ba7504a6eae/68747470733a2f2f63646e2e6a7364656c6976722e6e65742f67682f657279616a662f7475406d61696e2f696d672f696d6167655f32303234303432305f3231343430382e676966\" width=\"100%\" height=\"3\" data-animated-image=\"\" data-canonical-src=\"https://cdn.jsdelivr.net/gh/eryajf/tu@main/img/image_20240420_214408.gif\" style=\"max-width: 100%; height: auto; max-height: 3px;\"></a>\n</div>\n<h1 dir=\"auto\">Landrun <a target=\"_blank\" rel=\"noopener noreferrer nofollow\" href=\"https://avatars.githubusercontent.com/u/21111839?s=48&amp;v=4\"><img src=\"https://avatars.githubusercontent.com/u/21111839?s=48&amp;v=4\" align=\"right\" style=\"max-width: 100%;\"></a></h1>\n<p dir=\"auto\">A lightweight, secure sandbox for running Linux processes using Landlock. Think firejail, but with kernel-level security and minimal overhead.</p>\n<p dir=\"auto\">Linux Landlock is a kernel-native security module that lets unprivileged processes sandbox themselves.</p>\n<p dir=\"auto\">Landrun is designed to make it practical to sandbox any command with fine-grained filesystem and network access controls. No root. No containers. No SELinux/AppArmor configs.</p>\n<p dir=\"auto\">It's lightweight, auditable, and wraps Landlock v5 features (file access + TCP restrictions).</p>\n<h2 dir=\"auto\">Features</h2>\n<ul dir=\"auto\">\n<li>🔒 Kernel-level security using Landlock</li>\n<li>🚀 Lightweight and fast execution</li>\n<li>🛡️ Fine-grained access control for directories and files</li>\n<li>🔄 Support for read and write paths</li>\n<li>⚡ Path-specific execution permissions</li>\n<li>🌐 TCP network access control (binding and connecting)</li>\n</ul>\n<h2 dir=\"auto\">Demo</h2>\n<p align=\"center\" dir=\"auto\">\n  <a target=\"_blank\" rel=\"noopener noreferrer\" href=\"demo.gif\"><img src=\"demo.gif\" alt=\"landrun demo\" width=\"700\" data-animated-image=\"\" style=\"max-width: 100%;\"></a>\n</p>\n<h2 dir=\"auto\">Requirements</h2>\n<ul dir=\"auto\">\n<li>Linux kernel 5.13 or later with Landlock enabled</li>\n<li>Linux kernel 6.7 or later for network restrictions (TCP bind/connect)</li>\n<li>Go 1.18 or later (for building from source)</li>\n</ul>\n<h2 dir=\"auto\">Installation</h2>\n<h3 dir=\"auto\">Quick Install</h3>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"go install github.com/zouuup/landrun/cmd/landrun@latest\"><pre class=\"notranslate\">go install github.com/zouuup/landrun/cmd/landrun@latest</pre></div>\n<h3 dir=\"auto\">From Source</h3>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"git clone https://github.com/zouuup/landrun.git\ncd landrun\ngo build -o landrun cmd/landrun/main.go\nsudo cp landrun /usr/local/bin/\"><pre class=\"notranslate\">git clone https://github.com/zouuup/landrun.git\n<span class=\"pl-c1\">cd</span> landrun\ngo build -o landrun cmd/landrun/main.go\nsudo cp landrun /usr/local/bin/</pre></div>\n<h3 dir=\"auto\">Distros</h3>\n<h4 dir=\"auto\">Arch (AUR)</h4>\n<ul dir=\"auto\">\n<li><a href=\"https://aur.archlinux.org/packages/landrun\" rel=\"nofollow\">stable</a> maintained by <a href=\"https://github.com/vcalv\">Vcalv</a></li>\n<li><a href=\"https://aur.archlinux.org/packages/landrun-git\" rel=\"nofollow\">latest commit</a> maintained by <a href=\"https://github.com/juxuanu/\">juxuanu</a></li>\n</ul>\n<h4 dir=\"auto\">Slackware</h4>\n<p dir=\"auto\">maintained by <a href=\"https://github.com/r1w1s1\">r1w1s1</a></p>\n<p dir=\"auto\"><a href=\"https://slackbuilds.org/repository/15.0/network/landrun/?search=landrun\" rel=\"nofollow\">Slackbuild</a></p>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"sudo sbopkg -i packagename\"><pre class=\"notranslate\">sudo sbopkg -i packagename</pre></div>\n<h2 dir=\"auto\">Usage</h2>\n<p dir=\"auto\">Basic syntax:</p>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun [options] &lt;command&gt; [args...]\"><pre class=\"notranslate\">landrun [options] <span class=\"pl-k\">&lt;</span>command<span class=\"pl-k\">&gt;</span> [args...]</pre></div>\n<h3 dir=\"auto\">Options</h3>\n<ul dir=\"auto\">\n<li><code class=\"notranslate\">--ro &lt;path&gt;</code>: Allow read-only access to specified path (can be specified multiple times or as comma-separated values)</li>\n<li><code class=\"notranslate\">--rox &lt;path&gt;</code>: Allow read-only access with execution to specified path (can be specified multiple times or as comma-separated values)</li>\n<li><code class=\"notranslate\">--rw &lt;path&gt;</code>: Allow read-write access to specified path (can be specified multiple times or as comma-separated values)</li>\n<li><code class=\"notranslate\">--rwx &lt;path&gt;</code>: Allow read-write access with execution to specified path (can be specified multiple times or as comma-separated values)</li>\n<li><code class=\"notranslate\">--bind-tcp &lt;port&gt;</code>: Allow binding to specified TCP port (can be specified multiple times or as comma-separated values)</li>\n<li><code class=\"notranslate\">--connect-tcp &lt;port&gt;</code>: Allow connecting to specified TCP port (can be specified multiple times or as comma-separated values)</li>\n<li><code class=\"notranslate\">--env &lt;var&gt;</code>: Environment variable to pass to the sandboxed command (format: KEY=VALUE or just KEY to pass current value)</li>\n<li><code class=\"notranslate\">--best-effort</code>: Use best effort mode, falling back to less restrictive sandbox if necessary [default: disabled]</li>\n<li><code class=\"notranslate\">--log-level &lt;level&gt;</code>: Set logging level (error, info, debug) [default: \"error\"]</li>\n<li><code class=\"notranslate\">--unrestricted-network</code>: Allows unrestricted network access (disables all network restrictions)</li>\n<li><code class=\"notranslate\">--unrestricted-filesystem</code>: Allows unrestricted filesystem access (disables all filesystem restrictions)</li>\n<li><code class=\"notranslate\">--add-exec</code>: Automatically adds the executing binary to --rox</li>\n<li><code class=\"notranslate\">--ldd</code>: Automatically adds required libraries to --rox</li>\n</ul>\n<h3 dir=\"auto\">Important Notes</h3>\n<ul dir=\"auto\">\n<li>You must explicitly add the directory or files to the command you want to run with <code class=\"notranslate\">--rox</code> flag</li>\n<li>For system commands, you typically need to include <code class=\"notranslate\">/usr/bin</code>, <code class=\"notranslate\">/usr/lib</code>, and other system directories</li>\n<li>Use <code class=\"notranslate\">--rwx</code> for directories or files where you need both write access and the ability to execute files</li>\n<li>Network restrictions require Linux kernel 6.7 or later with Landlock ABI v4</li>\n<li>By default, no environment variables are passed to the sandboxed command. Use <code class=\"notranslate\">--env</code> to explicitly pass environment variables</li>\n<li>The <code class=\"notranslate\">--best-effort</code> flag allows graceful degradation on older kernels that don't support all requested restrictions</li>\n<li>Paths can be specified either using multiple flags or as comma-separated values (e.g., <code class=\"notranslate\">--ro /usr,/lib,/home</code>)</li>\n<li>If no paths or network rules are specified and neither unrestricted flag is set, landrun will apply maximum restrictions (denying all access)</li>\n</ul>\n<h3 dir=\"auto\">Environment Variables</h3>\n<ul dir=\"auto\">\n<li><code class=\"notranslate\">LANDRUN_LOG_LEVEL</code>: Set logging level (error, info, debug)</li>\n</ul>\n<h3 dir=\"auto\">Examples</h3>\n<ol dir=\"auto\">\n<li>Run a command that allows exec access to a specific file</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --rox /usr/bin/ls --rox /usr/lib --ro /home ls /home\"><pre class=\"notranslate\">landrun --rox /usr/bin/ls --rox /usr/lib --ro /home ls /home</pre></div>\n<ol start=\"2\" dir=\"auto\">\n<li>Run a command with read-only access to a directory:</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --rox /usr/ --ro /path/to/dir ls /path/to/dir\"><pre class=\"notranslate\">landrun --rox /usr/ --ro /path/to/dir ls /path/to/dir</pre></div>\n<ol start=\"3\" dir=\"auto\">\n<li>Run a command with write access to a directory:</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --rox /usr/bin --ro /lib --rw /path/to/dir touch /path/to/dir/newfile\"><pre class=\"notranslate\">landrun --rox /usr/bin --ro /lib --rw /path/to/dir touch /path/to/dir/newfile</pre></div>\n<ol start=\"4\" dir=\"auto\">\n<li>Run a command with write access to a file:</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --rox /usr/bin --ro /lib --rw /path/to/dir/newfile touch /path/to/dir/newfile\"><pre class=\"notranslate\">landrun --rox /usr/bin --ro /lib --rw /path/to/dir/newfile touch /path/to/dir/newfile</pre></div>\n<ol start=\"5\" dir=\"auto\">\n<li>Run a command with execution permissions:</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --rox /usr/ --ro /lib,/lib64 /usr/bin/bash\"><pre class=\"notranslate\">landrun --rox /usr/ --ro /lib,/lib64 /usr/bin/bash</pre></div>\n<ol start=\"6\" dir=\"auto\">\n<li>Run with debug logging:</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --log-level debug --rox /usr/ --ro /lib,/lib64,/path/to/dir ls /path/to/dir\"><pre class=\"notranslate\">landrun --log-level debug --rox /usr/ --ro /lib,/lib64,/path/to/dir ls /path/to/dir</pre></div>\n<ol start=\"7\" dir=\"auto\">\n<li>Run with network restrictions:</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --rox /usr/ --ro /lib,/lib64 --bind-tcp 8080 --connect-tcp 80 /usr/bin/my-server\"><pre class=\"notranslate\">landrun --rox /usr/ --ro /lib,/lib64 --bind-tcp 8080 --connect-tcp 80 /usr/bin/my-server</pre></div>\n<p dir=\"auto\">This will allow the program to only bind to TCP port 8080 and connect to TCP port 80.</p>\n<ol start=\"8\" dir=\"auto\">\n<li>Run a DNS client with appropriate permissions:</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --log-level debug --ro /etc,/usr --rox /usr/ --connect-tcp 443 nc kernel.org 443\"><pre class=\"notranslate\">landrun --log-level debug --ro /etc,/usr --rox /usr/ --connect-tcp 443 nc kernel.org 443</pre></div>\n<p dir=\"auto\">This allows connections to port 443, requires access to /etc/resolv.conf for resolving DNS.</p>\n<ol start=\"9\" dir=\"auto\">\n<li>Run a web server with selective network permissions:</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --rox /usr/bin --ro /lib,/lib64,/var/www --rwx /var/log --bind-tcp 80,443 /usr/bin/nginx\"><pre class=\"notranslate\">landrun --rox /usr/bin --ro /lib,/lib64,/var/www --rwx /var/log --bind-tcp 80,443 /usr/bin/nginx</pre></div>\n<ol start=\"10\" dir=\"auto\">\n<li>Running anything without providing parameters is... maximum security jail!</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun ls\"><pre class=\"notranslate\">landrun ls</pre></div>\n<ol start=\"11\" dir=\"auto\">\n<li>If you keep getting permission denied without knowing what exactly going on, best to use strace with it.</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --rox /usr strace -f -e trace=all ls\"><pre class=\"notranslate\">landrun --rox /usr strace -f -e trace=all ls</pre></div>\n<ol start=\"12\" dir=\"auto\">\n<li>Run with specific environment variables:</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --rox /usr --ro /etc --env HOME --env PATH --env CUSTOM_VAR=my_value -- env\"><pre class=\"notranslate\">landrun --rox /usr --ro /etc --env HOME --env PATH --env CUSTOM_VAR=my_value -- env</pre></div>\n<p dir=\"auto\">This example passes the current HOME and PATH variables, plus a custom variable named CUSTOM_VAR.</p>\n<ol start=\"13\" dir=\"auto\">\n<li>Run command with explicity access to files instead of directories:</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --rox /usr/lib/libc.so.6 --rox /usr/lib64/ld-linux-x86-64.so.2  --rox /usr/bin/true /usr/bin/true\"><pre class=\"notranslate\">landrun --rox /usr/lib/libc.so.6 --rox /usr/lib64/ld-linux-x86-64.so.2  --rox /usr/bin/true /usr/bin/true</pre></div>\n<ol start=\"14\" dir=\"auto\">\n<li>Run a command with --add-exec which automatically adds target binary to --rox</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --rox /usr/lib/ --add-exec /usr/bin/true\"><pre class=\"notranslate\">landrun --rox /usr/lib/ --add-exec /usr/bin/true</pre></div>\n<ol start=\"15\" dir=\"auto\">\n<li>Run a command with --ldd and --add-exec which automatically adds required libraries and target binary to --rox</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"landrun --ldd --add-exec /usr/bin/true\"><pre class=\"notranslate\">landrun --ldd --add-exec /usr/bin/true</pre></div>\n<p dir=\"auto\">Note that shared libs always need exec permission due to how they are loaded, PROT_EXEC on mmap() etc.</p>\n<h2 dir=\"auto\">Systemd Integration</h2>\n<p dir=\"auto\">landrun can be integrated with systemd to run services with enhanced security. Here's an example of running nginx with landrun:</p>\n<ol dir=\"auto\">\n<li>Create a systemd service file (e.g., <code class=\"notranslate\">/etc/systemd/system/nginx-landrun.service</code>):</li>\n</ol>\n<div class=\"highlight highlight-source-ini notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"[Unit]\nDescription=nginx with landrun sandbox\nAfter=network.target\n\n[Service]\nType=simple\nExecStart=/usr/bin/landrun \\\n    --rox /usr/bin,/usr/lib \\\n    --ro  /etc/nginx,/etc/ssl,/etc/passwd,/etc/group,/etc/nsswitch.conf \\\n    --rwx /var/log/nginx \\\n    --rwx /var/cache/nginx \\\n    --bind-tcp 80,443 \\\n    /usr/bin/nginx -g 'daemon off;'\nRestart=always\nUser=nginx\nGroup=nginx\n\n[Install]\nWantedBy=multi-user.target\"><pre class=\"notranslate\"><span class=\"pl-en\">[Unit]</span>\n<span class=\"pl-k\">Description</span>=nginx with landrun sandbox\n<span class=\"pl-k\">After</span>=network.target\n\n<span class=\"pl-en\">[Service]</span>\n<span class=\"pl-k\">Type</span>=simple\n<span class=\"pl-k\">ExecStart</span>=/usr/bin/landrun \\\n    --rox /usr/bin,/usr/lib \\\n    --ro  /etc/nginx,/etc/ssl,/etc/passwd,/etc/group,/etc/nsswitch.conf \\\n    --rwx /var/log/nginx \\\n    --rwx /var/cache/nginx \\\n    --bind-tcp 80,443 \\\n    /usr/bin/nginx -g <span class=\"pl-s\"><span class=\"pl-pds\">'</span>daemon off;<span class=\"pl-pds\">'</span></span>\n<span class=\"pl-k\">Restart</span>=always\n<span class=\"pl-k\">User</span>=nginx\n<span class=\"pl-k\">Group</span>=nginx\n\n<span class=\"pl-en\">[Install]</span>\n<span class=\"pl-k\">WantedBy</span>=multi-user.target</pre></div>\n<ol start=\"2\" dir=\"auto\">\n<li>Enable and start the service:</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"sudo systemctl daemon-reload\nsudo systemctl enable nginx-landrun\nsudo systemctl start nginx-landrun\"><pre class=\"notranslate\">sudo systemctl daemon-reload\nsudo systemctl <span class=\"pl-c1\">enable</span> nginx-landrun\nsudo systemctl start nginx-landrun</pre></div>\n<ol start=\"3\" dir=\"auto\">\n<li>Check the service status:</li>\n</ol>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"sudo systemctl status nginx-landrun\"><pre class=\"notranslate\">sudo systemctl status nginx-landrun</pre></div>\n<p dir=\"auto\">This configuration:</p>\n<ul dir=\"auto\">\n<li>Runs nginx with minimal required permissions</li>\n<li>Allows binding to ports 80 and 443</li>\n<li>Provides read-only access to configuration files</li>\n<li>Allows write access only to log and cache directories</li>\n<li>Runs as the nginx user and group</li>\n<li>Automatically restarts on failure</li>\n</ul>\n<p dir=\"auto\">You can adjust the permissions based on your specific needs. For example, if you need to serve static files from <code class=\"notranslate\">/var/www</code>, add <code class=\"notranslate\">--ro /var/www</code> to the ExecStart line.</p>\n<h2 dir=\"auto\">Security</h2>\n<p dir=\"auto\">landrun uses Linux's Landlock to create a secure sandbox environment. It provides:</p>\n<ul dir=\"auto\">\n<li>File system access control</li>\n<li>Directory access restrictions</li>\n<li>Execution control</li>\n<li>TCP network restrictions</li>\n<li>Process isolation</li>\n<li>Default restrictive mode when no rules are specified</li>\n</ul>\n<p dir=\"auto\">Landlock is an access-control system that enables processes to securely restrict themselves and their future children. As a stackable Linux Security Module (LSM), it creates additional security layers on top of existing system-wide access controls, helping to mitigate security impacts from bugs or malicious behavior in applications.</p>\n<h3 dir=\"auto\">Landlock Access Control Rights</h3>\n<p dir=\"auto\">landrun leverages Landlock's fine-grained access control mechanisms, which include:</p>\n<p dir=\"auto\"><strong>File-specific rights:</strong></p>\n<ul dir=\"auto\">\n<li>Execute files (<code class=\"notranslate\">LANDLOCK_ACCESS_FS_EXECUTE</code>)</li>\n<li>Write to files (<code class=\"notranslate\">LANDLOCK_ACCESS_FS_WRITE_FILE</code>)</li>\n<li>Read files (<code class=\"notranslate\">LANDLOCK_ACCESS_FS_READ_FILE</code>)</li>\n<li>Truncate files (<code class=\"notranslate\">LANDLOCK_ACCESS_FS_TRUNCATE</code>) - Available since Landlock ABI v3</li>\n<li>IOCTL operations on devices (<code class=\"notranslate\">LANDLOCK_ACCESS_FS_IOCTL_DEV</code>) - Available since Landlock ABI v5</li>\n</ul>\n<p dir=\"auto\"><strong>Directory-specific rights:</strong></p>\n<ul dir=\"auto\">\n<li>Read directory contents (<code class=\"notranslate\">LANDLOCK_ACCESS_FS_READ_DIR</code>)</li>\n<li>Remove directories (<code class=\"notranslate\">LANDLOCK_ACCESS_FS_REMOVE_DIR</code>)</li>\n<li>Remove files (<code class=\"notranslate\">LANDLOCK_ACCESS_FS_REMOVE_FILE</code>)</li>\n<li>Create various filesystem objects (char devices, directories, regular files, sockets, etc.)</li>\n<li>Refer/reparent files across directories (<code class=\"notranslate\">LANDLOCK_ACCESS_FS_REFER</code>) - Available since Landlock ABI v2</li>\n</ul>\n<p dir=\"auto\"><strong>Network-specific rights</strong> (requires Linux 6.7+ with Landlock ABI v4):</p>\n<ul dir=\"auto\">\n<li>Bind to specific TCP ports (<code class=\"notranslate\">LANDLOCK_ACCESS_NET_BIND_TCP</code>)</li>\n<li>Connect to specific TCP ports (<code class=\"notranslate\">LANDLOCK_ACCESS_NET_CONNECT_TCP</code>)</li>\n</ul>\n<h3 dir=\"auto\">Limitations</h3>\n<ul dir=\"auto\">\n<li>Landlock must be supported by your kernel</li>\n<li>Network restrictions require Linux kernel 6.7 or later with Landlock ABI v4</li>\n<li>Some operations may require additional permissions</li>\n<li>Files or directories opened before sandboxing are not subject to Landlock restrictions</li>\n</ul>\n<h2 dir=\"auto\">Kernel Compatibility Table</h2>\n<markdown-accessiblity-table><table role=\"table\">\n<thead>\n<tr>\n<th>Feature</th>\n<th>Minimum Kernel Version</th>\n<th>Landlock ABI Version</th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>Basic filesystem sandboxing</td>\n<td>5.13</td>\n<td>1</td>\n</tr>\n<tr>\n<td>File referring/reparenting control</td>\n<td>5.19</td>\n<td>2</td>\n</tr>\n<tr>\n<td>File truncation control</td>\n<td>6.2</td>\n<td>3</td>\n</tr>\n<tr>\n<td>Network TCP restrictions</td>\n<td>6.7</td>\n<td>4</td>\n</tr>\n<tr>\n<td>IOCTL on special files</td>\n<td>6.10</td>\n<td>5</td>\n</tr>\n</tbody>\n</table></markdown-accessiblity-table>\n<h2 dir=\"auto\">Troubleshooting</h2>\n<p dir=\"auto\">If you receive \"permission denied\" or similar errors:</p>\n<ol dir=\"auto\">\n<li>Ensure you've added all necessary paths with <code class=\"notranslate\">--ro</code> or <code class=\"notranslate\">--rw</code></li>\n<li>Try running with <code class=\"notranslate\">--log-level debug</code> to see detailed permission information</li>\n<li>Check that Landlock is supported and enabled on your system:\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"grep -E 'landlock|lsm=' /boot/config-$(uname -r)\n# alternatively, if there are no /boot/config-* files\nzgrep -iE 'landlock|lsm=' /proc/config.gz\n# another alternate method\ngrep -iE 'landlock|lsm=' /lib/modules/$(uname -r)/config\"><pre class=\"notranslate\">grep -E <span class=\"pl-s\"><span class=\"pl-pds\">'</span>landlock|lsm=<span class=\"pl-pds\">'</span></span> /boot/config-<span class=\"pl-s\"><span class=\"pl-pds\">$(</span>uname -r<span class=\"pl-pds\">)</span></span>\n<span class=\"pl-c\"><span class=\"pl-c\">#</span> alternatively, if there are no /boot/config-* files</span>\nzgrep -iE <span class=\"pl-s\"><span class=\"pl-pds\">'</span>landlock|lsm=<span class=\"pl-pds\">'</span></span> /proc/config.gz\n<span class=\"pl-c\"><span class=\"pl-c\">#</span> another alternate method</span>\ngrep -iE <span class=\"pl-s\"><span class=\"pl-pds\">'</span>landlock|lsm=<span class=\"pl-pds\">'</span></span> /lib/modules/<span class=\"pl-s\"><span class=\"pl-pds\">$(</span>uname -r<span class=\"pl-pds\">)</span></span>/config</pre></div>\nYou should see <code class=\"notranslate\">CONFIG_SECURITY_LANDLOCK=y</code> and <code class=\"notranslate\">lsm=landlock,...</code> in the output</li>\n<li>For network restrictions, verify your kernel version is 6.7+ with Landlock ABI v4:\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"uname -r\"><pre class=\"notranslate\">uname -r</pre></div>\n</li>\n</ol>\n<h2 dir=\"auto\">Technical Details</h2>\n<h3 dir=\"auto\">Implementation</h3>\n<p dir=\"auto\">This project uses the <a href=\"https://github.com/landlock-lsm/go-landlock\">landlock-lsm/go-landlock</a> package for sandboxing, which provides both filesystem and network restrictions. The current implementation supports:</p>\n<ul dir=\"auto\">\n<li>Read/write/execute restrictions for files and directories</li>\n<li>TCP port binding restrictions</li>\n<li>TCP port connection restrictions</li>\n<li>Best-effort mode for graceful degradation on older kernels</li>\n</ul>\n<h3 dir=\"auto\">Best-Effort Mode</h3>\n<p dir=\"auto\">When using <code class=\"notranslate\">--best-effort</code> (disabled by default), landrun will gracefully degrade to using the best available Landlock version on the current kernel. This means:</p>\n<ul dir=\"auto\">\n<li>On Linux 6.7+: Full filesystem and network restrictions</li>\n<li>On Linux 6.2-6.6: Filesystem restrictions including truncation, but no network restrictions</li>\n<li>On Linux 5.19-6.1: Basic filesystem restrictions including file reparenting, but no truncation control or network restrictions</li>\n<li>On Linux 5.13-5.18: Basic filesystem restrictions without file reparenting, truncation control, or network restrictions</li>\n<li>On older Linux: No restrictions (sandbox disabled)</li>\n</ul>\n<p dir=\"auto\">When no rules are specified and neither unrestricted flag is set, landrun will apply maximum restrictions available for the current kernel version.</p>\n<h3 dir=\"auto\">Tests</h3>\n<p dir=\"auto\">The project includes a comprehensive test suite that verifies:</p>\n<ul dir=\"auto\">\n<li>Basic filesystem access controls (read-only, read-write, execute)</li>\n<li>Directory traversal and path handling</li>\n<li>Network restrictions (TCP bind/connect)</li>\n<li>Environment variable isolation</li>\n<li>System command execution</li>\n<li>Edge cases and regression tests</li>\n</ul>\n<p dir=\"auto\">Run the tests with:</p>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"./test.sh\"><pre class=\"notranslate\">./test.sh</pre></div>\n<p dir=\"auto\">Use <code class=\"notranslate\">--keep-binary</code> to preserve the test binary after completion:</p>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"./test.sh --keep-binary\"><pre class=\"notranslate\">./test.sh --keep-binary</pre></div>\n<p dir=\"auto\">Use <code class=\"notranslate\">--use-system</code> to test against the system-installed landrun binary:</p>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"./test.sh --use-system\"><pre class=\"notranslate\">./test.sh --use-system</pre></div>\n<h2 dir=\"auto\">Future Features</h2>\n<p dir=\"auto\">Based on the Linux Landlock API capabilities, we plan to add:</p>\n<ul dir=\"auto\">\n<li>🔒 Enhanced filesystem controls with more fine-grained permissions</li>\n<li>🌐 Support for UDP and other network protocol restrictions (when supported by Linux kernel)</li>\n<li>🔄 Process scoping and resource controls</li>\n<li>🛡️ Additional security features as they become available in the Landlock API</li>\n</ul>\n<h2 dir=\"auto\">Acknowledgements</h2>\n<p dir=\"auto\">This project wouldn't exist without:</p>\n<ul dir=\"auto\">\n<li><a href=\"https://landlock.io\" rel=\"nofollow\">Landlock</a>, the kernel security module enabling unprivileged sandboxing - maintained by <a href=\"https://github.com/l0kod\">@l0kod</a></li>\n<li><a href=\"https://github.com/landlock-lsm/go-landlock\">go-landlock</a>, the Go bindings powering this tool - developed by <a href=\"https://github.com/gnoack\">@gnoack</a></li>\n</ul>\n<h2 dir=\"auto\">Contributing</h2>\n<p dir=\"auto\">Contributions are welcome! Please feel free to submit a Pull Request.</p>","updatedAt":"2025-05-21T16:09:54Z","upvoteCount":null,"author":{"login":"eryajf","avatarUrl":"https://avatars.githubusercontent.com/u/33259379?u=e4a4090a38ac2473aaed4ef9945233636776c6c3&v=4","url":"https://github.com/eryajf"},"category":null,"labels":{"edges":[{"node":{"name":"更多","color":"25B472"}},{"node":{"name":"命令行工具","color":"e05879"}},{"node":{"name":"Zouuup","color":"45d73f"}}]},"comments":{"edges":[]}}},"pageContext":{"number":346,"previous":{"title":"kubernetes-sigs/kwok: 一个没有 Kubelet 的 Kubernetes， 你可以在笔记本电脑上在几秒钟内模拟数千个节点，而不会大量消耗 CPU 或内存资源。且兼容 K8S API","number":345},"next":{"title":"aceld/Lars: Lars是一个简单、易用、高性能的服务间远程调用管理、调度、负载均衡系统。","number":347}}},
    "staticQueryHashes": ["151096407","2861350382"]}