Skip to content

Commit 3950840

Browse files
gnoackl0kod
authored andcommitted
landlock: Document LANDLOCK_RESTRICT_SELF_TSYNC
Add documentation for LANDLOCK_RESTRICT_SELF_TSYNC. It does not need to go into the main example, but it has a section in the ABI compatibility notes. In the HTML rendering, the main reference is the system call documentation, which is included from the landlock.h header file. Cc: Andrew G. Morgan <morgan@kernel.org> Cc: John Johansen <john.johansen@canonical.com> Cc: Paul Moore <paul@paul-moore.com> Signed-off-by: Günther Noack <gnoack@google.com> Link: https://lore.kernel.org/r/20251127115136.3064948-4-gnoack@google.com [mic: Update date] Signed-off-by: Mickaël Salaün <mic@digikod.net>
1 parent 50c058e commit 3950840

1 file changed

Lines changed: 9 additions & 1 deletion

File tree

Documentation/userspace-api/landlock.rst

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Landlock: unprivileged access control
88
=====================================
99

1010
:Author: Mickaël Salaün
11-
:Date: March 2025
11+
:Date: November 2025
1212

1313
The goal of Landlock is to enable restriction of ambient rights (e.g. global
1414
filesystem or network access) for a set of processes. Because Landlock
@@ -604,6 +604,14 @@ Landlock audit events with the ``LANDLOCK_RESTRICT_SELF_LOG_SAME_EXEC_OFF``,
604604
sys_landlock_restrict_self(). See Documentation/admin-guide/LSM/landlock.rst
605605
for more details on audit.
606606

607+
Thread synchronization (ABI < 8)
608+
--------------------------------
609+
610+
Starting with the Landlock ABI version 8, it is now possible to
611+
enforce Landlock rulesets across all threads of the calling process
612+
using the ``LANDLOCK_RESTRICT_SELF_TSYNC`` flag passed to
613+
sys_landlock_restrict_self().
614+
607615
.. _kernel_support:
608616

609617
Kernel support

0 commit comments

Comments
 (0)