1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
// Copyright 2015 The Rust Project Developers. See the COPYRIGHT
// file at the top-level directory of this distribution and at
// http://rust-lang.org/COPYRIGHT.
//
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
// option. This file may not be copied, modified, or distributed
// except according to those terms.

//! Sandboxing on Linux via miscellaneous kernel features.

use libc;
use std::io;

pub fn activate() -> Result<(), libc::c_int> {
    // Disable writing by setting the write limit to zero.
    let rlimit = libc::rlimit {
        rlim_cur: 0,
        rlim_max: 0,
    };
    let result = unsafe {
         libc::setrlimit(libc::RLIMIT_FSIZE, &rlimit)
    };
    if result != 0 {
        return Err(result)
    }

    // Set a restrictive `umask` so that even if files happened to get written it'd be hard to do
    // anything with them.
    unsafe {
        libc::umask(0);
    }

    // Disable core dumps and debugging via `PTRACE_ATTACH`.
    let result = unsafe {
        libc::prctl(libc::PR_SET_DUMPABLE, 0, 0, 0, 0)
    };
    if result != 0 {
        return Err(result)
    }

    // Enter a new session group. (This can fail with -EPERM if we're already the session leader,
    // which is OK.)
    unsafe {
        if libc::setsid() < 0 {
            let result = io::Error::last_os_error().raw_os_error().unwrap() as i32;
            if result != libc::EPERM {
                return Err(result)
            }
        }
    }

    // Clear out the process environment.
    let result = unsafe {
        libc::clearenv()
    };
    if result == 0 {
        Ok(())
    } else {
        Err(result)
    }
}