Documentation Index
Fetch the complete documentation index at: https://nono.sh/docs/llms.txt
Use this file to discover all available pages before exploring further.
nono works on WSL2 with most features available. This page documents the compatibility details, known limitations, and workarounds.
For the complete feature-by-feature breakdown (118 features), see the WSL2 Feature Matrix.
At a glance: 85% full on Microsoft kernel, 96% with rolling kernel.
Quick Summary
WSL2 runs a real Linux kernel with Landlock LSM enabled. Core filesystem sandboxing works out of the box. Two kernel-level limitations affect advanced features:
- Landlock ABI V3 (kernel 6.6) — no per-port TCP filtering (needs V4, kernel 6.7+)
- seccomp user notification conflict — WSL2’s init process claims the sole notify listener, blocking capability elevation
Compatibility Matrix
| Feature | Status | Notes |
|---|
Filesystem sandbox (--allow, --read, --write) | Available | Landlock V1-V3, full enforcement |
| Sensitive path blocking | Available | All 46 paths blocked |
| Dangerous command blocking | Available | All 46 commands blocked |
Block-all network (--block-net) | Available | seccomp RET_ERRNO, kernel-enforced |
| Per-port network filtering | Unavailable | Needs Landlock V4 (kernel 6.7+) |
Credential proxy (--credential) | Blocked (default) | Fails secure; requires wsl2_proxy_policy: "insecure_proxy" in profile |
Supervised mode (nono run) | Available | Basic fork+sandbox+exec works |
Direct mode (nono wrap) | Available | No fork, no supervisor |
GPU access (--allow-gpu) | Available | Via /dev/dxg DirectX passthrough (CUDA, ollama verified) |
Capability elevation (--capability-elevation) | Unavailable | seccomp notify returns EBUSY |
Snapshots and rollback (--rollback) | Available | Pure userspace |
Session management (ps, attach, detach, stop, logs, inspect, prune) | Available | Pure userspace / PTY relay |
| Audit trail | Available | Pure userspace |
| Profiles | Available | All profiles work |
nono setup --check-only | Available | Reports WSL2 feature matrix |
Detection
nono detects WSL2 automatically at runtime by checking:
/proc/sys/fs/binfmt_misc/WSLInterop (filesystem indicator, present in all WSL2 distros)
/proc/version contains “microsoft” or “WSL” (kernel-controlled string)
The WSL_DISTRO_NAME environment variable is intentionally not trusted because it is caller-controlled and could be spoofed to disable security features on native Linux.
The result is cached for the process lifetime. You can verify detection with:
On WSL2, this prints a feature availability matrix under “Testing sandbox support”.
Landlock ABI Versions
WSL2 shares a single Microsoft-built kernel across all distros. The kernel version determines which Landlock ABI is available:
| Landlock ABI | Kernel | Key Feature | WSL2 (kernel 6.6) |
|---|
| V1 | 5.13+ | Basic filesystem access | Yes |
| V2 | 5.19+ | File rename across directories (Refer) | Yes |
| V3 | 6.2+ | File truncation (Truncate) | Yes |
| V4 | 6.7+ | TCP network filtering | No |
| V5 | 6.10+ | Device ioctl filtering | No |
| V6 | 6.12+ | Process scoping | No |
nono automatically detects the highest available ABI. When Microsoft upgrades the WSL2 kernel to 6.7+, per-port network filtering will activate automatically with no code changes needed.
The WSL2 kernel version is independent of the Linux distribution — upgrading from Ubuntu 20.04 to 24.04 does not change the kernel.
seccomp User Notification Limitation
What is seccomp notify?
SECCOMP_RET_USER_NOTIF is a Linux kernel feature that allows a supervisor process to intercept and make decisions about a child’s system calls. nono uses this for:
- Capability elevation — intercepting
openat calls to grant access to paths not in the original capability set
- Proxy network filtering — intercepting
connect/bind calls to enforce per-connection rules on pre-V4 kernels
Why it fails on WSL2
WSL2’s init process (PID 1) installs its own seccomp user notification filter for Windows/Linux interop (running .exe files from Linux). The Linux kernel only allows one user notification listener per filter chain. When nono tries to install a second listener, it receives EBUSY.
This is tracked in microsoft/WSL#9548 (open since January 2023).
What nono does about it
When WSL2 is detected:
--capability-elevation is automatically disabled with a warning
- Proxy-only network mode (
--credential, --network-profile) is rejected by default to prevent unenforced execution
- All other features continue to work normally
Credential Proxy on WSL2
On native Linux (including pre-Landlock-V4 kernels), the credential proxy’s network lockdown is enforced via seccomp user notification — the supervisor validates every connect/bind call. On WSL2, this enforcement is unavailable.
By default, nono refuses to run in proxy-only mode on WSL2 rather than silently losing network enforcement. You will see:
nono: Sandbox initialization failed: WSL2: proxy-only network mode cannot be kernel-enforced.
...
To allow degraded execution, set wsl2_proxy_policy: "insecure_proxy" in your profile's security config.
Opting in to insecure proxy mode
If credential injection is more important than network lockdown for your use case (e.g., development workflows where the agent is trusted), you can explicitly opt in by adding wsl2_proxy_policy to your profile:
{
"security": {
"wsl2_proxy_policy": "insecure_proxy"
}
}
Policy values:
| Value | Behavior |
|---|
error (default) | Refuse to run if proxy-only mode cannot be kernel-enforced |
insecure_proxy | Allow degraded execution with a strong warning. The credential proxy runs and injects credentials, but the child is not prevented from bypassing the proxy and opening arbitrary outbound connections. |
When insecure_proxy is active, nono prints:
[nono] WARNING: WSL2 insecure proxy mode — credential proxy active but network is NOT
kernel-enforced. The sandboxed process can bypass the proxy and open arbitrary outbound connections.
This is an explicit opt-in to reduced enforcement. Do not set insecure_proxy in profiles distributed to untrusted users.
When Landlock V4 becomes available on WSL2 (kernel 6.7+), port-level lockdown will activate automatically and both policy values will behave identically.
Workarounds
The WSL2-Linux-Kernel-Rolling project provides pre-built WSL2 kernels tracking upstream Linux stable releases. As of kernel 6.19+, this gives nono full Landlock V6 support:
- Per-port TCP filtering (V4)
- Device ioctl filtering (V5)
- Process scoping (V6)
- Native credential proxy port enforcement (no
wsl2_proxy_policy opt-in needed)
Install:
- Download
bzImage-x86_64 from the latest release
- Add to
%USERPROFILE%\.wslconfig:
[wsl2]
kernel=C:\\path\\to\\bzImage-x86_64
- Restart WSL:
wsl --shutdown
- Verify:
nono setup --check-only should report Landlock V6
Note: This is a community-maintained project, not officially supported by Microsoft or nono. The kernel combines upstream Linux stable releases with Microsoft’s WSL2 patches. Users should understand they are trusting a third-party kernel binary. The seccomp notify limitation (--capability-elevation) persists regardless of kernel version as it is a WSL2 userspace issue.
To revert to the Microsoft kernel, comment out or remove the kernel= line from .wslconfig and restart WSL.
Custom WSL2 Kernel
Advanced users can build a custom WSL2 kernel from microsoft/WSL2-Linux-Kernel:
git clone --depth 1 --branch linux-msft-wsl-6.6.y \
https://github.com/microsoft/WSL2-Linux-Kernel.git
cd WSL2-Linux-Kernel
cp arch/x86/configs/config-wsl .config
make -j$(nproc)
Then configure WSL2 to use the custom kernel in %USERPROFILE%\.wslconfig as above. Note: Getting Landlock V4+ from the Microsoft source requires rebasing their patches onto a 6.7+ upstream kernel.
Block-All Network
If you need guaranteed network isolation (not just proxy routing), use --block-net which is fully kernel-enforced on WSL2 regardless of kernel version:
nono run --block-net --allow /path/to/project -- your-command
Future Improvements
- Landlock V4+: Available now via rolling kernel; will arrive on the Microsoft kernel when they upgrade from 6.6 LTS (no nono changes needed)
- microsoft/WSL#9548: If Microsoft resolves the seccomp notify conflict, capability elevation will work automatically. This is a WSL2 userspace issue, not a kernel version issue.