1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63
// Copyright 2015 The Rust Project Developers. See the COPYRIGHT
// file at the top-level directory of this distribution and at
// http://rust-lang.org/COPYRIGHT.
//
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
// option. This file may not be copied, modified, or distributed
// except according to those terms.
//! Sandboxing on Linux via miscellaneous kernel features.
use libc;
use std::io;
pub fn activate() -> Result<(), libc::c_int> {
// Disable writing by setting the write limit to zero.
let rlimit = libc::rlimit {
rlim_cur: 0,
rlim_max: 0,
};
let result = unsafe {
libc::setrlimit(libc::RLIMIT_FSIZE, &rlimit)
};
if result != 0 {
return Err(result)
}
// Set a restrictive `umask` so that even if files happened to get written it'd be hard to do
// anything with them.
unsafe {
libc::umask(0);
}
// Disable core dumps and debugging via `PTRACE_ATTACH`.
let result = unsafe {
libc::prctl(libc::PR_SET_DUMPABLE, 0, 0, 0, 0)
};
if result != 0 {
return Err(result)
}
// Enter a new session group. (This can fail with -EPERM if we're already the session leader,
// which is OK.)
unsafe {
if libc::setsid() < 0 {
let result = io::Error::last_os_error().raw_os_error().unwrap() as i32;
if result != libc::EPERM {
return Err(result)
}
}
}
// Clear out the process environment.
let result = unsafe {
libc::clearenv()
};
if result == 0 {
Ok(())
} else {
Err(result)
}
}