Skip to main content
nono works on WSL2 with most features available. This page documents the compatibility details, known limitations, and workarounds. For the complete feature-by-feature breakdown (118 features), see the WSL2 Feature Matrix. At a glance: 85% full on Microsoft kernel, 96% with rolling kernel.

Quick Summary

WSL2 runs a real Linux kernel with Landlock LSM enabled. Core filesystem sandboxing works out of the box. Two kernel-level limitations affect advanced features:
  1. Landlock ABI V3 (kernel 6.6) — no per-port TCP filtering (needs V4, kernel 6.7+)
  2. seccomp user notification conflict — WSL2’s init process claims the sole notify listener, blocking capability elevation

Compatibility Matrix

FeatureStatusNotes
Filesystem sandbox (--allow, --read, --write)AvailableLandlock V1-V3, full enforcement
Sensitive path blockingAvailableAll 46 paths blocked
Dangerous command blockingAvailableAll 46 commands blocked
Block-all network (--block-net)Availableseccomp RET_ERRNO, kernel-enforced
Per-port network filteringUnavailableNeeds Landlock V4 (kernel 6.7+)
Credential proxy (--credential)Blocked (default)Fails secure; requires wsl2_proxy_policy: "insecure_proxy" in profile
Supervised mode (nono run)AvailableBasic fork+sandbox+exec works
Direct mode (nono wrap)AvailableNo fork, no supervisor
GPU access (--allow-gpu)AvailableVia /dev/dxg DirectX passthrough (CUDA, ollama verified)
Capability elevation (--capability-elevation)Unavailableseccomp notify returns EBUSY
Snapshots and rollback (--rollback)AvailablePure userspace
Session management (ps, attach, detach, stop, logs, inspect, prune)AvailablePure userspace / PTY relay
Audit trailAvailablePure userspace
ProfilesAvailableAll built-in profiles work
nono setup --check-onlyAvailableReports WSL2 feature matrix

Detection

nono detects WSL2 automatically at runtime by checking:
  1. /proc/sys/fs/binfmt_misc/WSLInterop (filesystem indicator, present in all WSL2 distros)
  2. /proc/version contains “microsoft” or “WSL” (kernel-controlled string)
The WSL_DISTRO_NAME environment variable is intentionally not trusted because it is caller-controlled and could be spoofed to disable security features on native Linux. The result is cached for the process lifetime. You can verify detection with:
nono setup --check-only
On WSL2, this prints a feature availability matrix under “Testing sandbox support”.

Landlock ABI Versions

WSL2 shares a single Microsoft-built kernel across all distros. The kernel version determines which Landlock ABI is available:
Landlock ABIKernelKey FeatureWSL2 (kernel 6.6)
V15.13+Basic filesystem accessYes
V25.19+File rename across directories (Refer)Yes
V36.2+File truncation (Truncate)Yes
V46.7+TCP network filteringNo
V56.10+Device ioctl filteringNo
V66.12+Process scopingNo
nono automatically detects the highest available ABI. When Microsoft upgrades the WSL2 kernel to 6.7+, per-port network filtering will activate automatically with no code changes needed. The WSL2 kernel version is independent of the Linux distribution — upgrading from Ubuntu 20.04 to 24.04 does not change the kernel.

seccomp User Notification Limitation

What is seccomp notify?

SECCOMP_RET_USER_NOTIF is a Linux kernel feature that allows a supervisor process to intercept and make decisions about a child’s system calls. nono uses this for:
  • Capability elevation — intercepting openat calls to grant access to paths not in the original capability set
  • Proxy network filtering — intercepting connect/bind calls to enforce per-connection rules on pre-V4 kernels

Why it fails on WSL2

WSL2’s init process (PID 1) installs its own seccomp user notification filter for Windows/Linux interop (running .exe files from Linux). The Linux kernel only allows one user notification listener per filter chain. When nono tries to install a second listener, it receives EBUSY. This is tracked in microsoft/WSL#9548 (open since January 2023).

What nono does about it

When WSL2 is detected:
  1. --capability-elevation is automatically disabled with a warning
  2. Proxy-only network mode (--credential, --network-profile) is rejected by default to prevent unenforced execution
  3. All other features continue to work normally

Credential Proxy on WSL2

On native Linux (including pre-Landlock-V4 kernels), the credential proxy’s network lockdown is enforced via seccomp user notification — the supervisor validates every connect/bind call. On WSL2, this enforcement is unavailable. By default, nono refuses to run in proxy-only mode on WSL2 rather than silently losing network enforcement. You will see:
nono: Sandbox initialization failed: WSL2: proxy-only network mode cannot be kernel-enforced.
...
To allow degraded execution, set wsl2_proxy_policy: "insecure_proxy" in your profile's security config.

Opting in to insecure proxy mode

If credential injection is more important than network lockdown for your use case (e.g., development workflows where the agent is trusted), you can explicitly opt in by adding wsl2_proxy_policy to your profile:
{
  "security": {
    "wsl2_proxy_policy": "insecure_proxy"
  }
}
Policy values:
ValueBehavior
error (default)Refuse to run if proxy-only mode cannot be kernel-enforced
insecure_proxyAllow degraded execution with a strong warning. The credential proxy runs and injects credentials, but the child is not prevented from bypassing the proxy and opening arbitrary outbound connections.
When insecure_proxy is active, nono prints:
[nono] WARNING: WSL2 insecure proxy mode — credential proxy active but network is NOT
kernel-enforced. The sandboxed process can bypass the proxy and open arbitrary outbound connections.
This is an explicit opt-in to reduced enforcement. Do not set insecure_proxy in profiles distributed to untrusted users. When Landlock V4 becomes available on WSL2 (kernel 6.7+), port-level lockdown will activate automatically and both policy values will behave identically.

Workarounds

Rolling Release Kernel (Community)

The WSL2-Linux-Kernel-Rolling project provides pre-built WSL2 kernels tracking upstream Linux stable releases. As of kernel 6.19+, this gives nono full Landlock V6 support:
  • Per-port TCP filtering (V4)
  • Device ioctl filtering (V5)
  • Process scoping (V6)
  • Native credential proxy port enforcement (no wsl2_proxy_policy opt-in needed)
Install:
  1. Download bzImage-x86_64 from the latest release
  2. Add to %USERPROFILE%\.wslconfig:
    [wsl2]
    kernel=C:\\path\\to\\bzImage-x86_64
    
  3. Restart WSL: wsl --shutdown
  4. Verify: nono setup --check-only should report Landlock V6
Note: This is a community-maintained project, not officially supported by Microsoft or nono. The kernel combines upstream Linux stable releases with Microsoft’s WSL2 patches. Users should understand they are trusting a third-party kernel binary. The seccomp notify limitation (--capability-elevation) persists regardless of kernel version as it is a WSL2 userspace issue. To revert to the Microsoft kernel, comment out or remove the kernel= line from .wslconfig and restart WSL.

Custom WSL2 Kernel

Advanced users can build a custom WSL2 kernel from microsoft/WSL2-Linux-Kernel:
git clone --depth 1 --branch linux-msft-wsl-6.6.y \
  https://github.com/microsoft/WSL2-Linux-Kernel.git
cd WSL2-Linux-Kernel
cp arch/x86/configs/config-wsl .config
make -j$(nproc)
Then configure WSL2 to use the custom kernel in %USERPROFILE%\.wslconfig as above. Note: Getting Landlock V4+ from the Microsoft source requires rebasing their patches onto a 6.7+ upstream kernel.

Block-All Network

If you need guaranteed network isolation (not just proxy routing), use --block-net which is fully kernel-enforced on WSL2 regardless of kernel version:
nono run --block-net --allow /path/to/project -- your-command

Future Improvements

  • Landlock V4+: Available now via rolling kernel; will arrive on the Microsoft kernel when they upgrade from 6.6 LTS (no nono changes needed)
  • microsoft/WSL#9548: If Microsoft resolves the seccomp notify conflict, capability elevation will work automatically. This is a WSL2 userspace issue, not a kernel version issue.