hakurei/container/syscall.go
Ophestra cf3d18c4cd
All checks were successful
Test / Create distribution (push) Successful in 35s
Test / Sandbox (push) Successful in 42s
Test / Hpkg (push) Successful in 44s
Test / Sandbox (race detector) (push) Successful in 1m33s
Test / Hakurei (race detector) (push) Successful in 2m15s
Test / Hakurei (push) Successful in 2m20s
Test / Flake checks (push) Successful in 1m27s
container: ptrace protection via Yama LSM
This is only a nice to have feature as the init process has no additional privileges and the monitor process was never reachable anyway.

Closes #4.

Signed-off-by: Ophestra <cat@gensokyo.uk>
2025-08-20 00:32:02 +09:00

52 lines
1.2 KiB
Go

package container
import (
"syscall"
)
const (
SUID_DUMP_DISABLE = iota
SUID_DUMP_USER
)
func SetPtracer(pid uintptr) error {
_, _, errno := syscall.Syscall(syscall.SYS_PRCTL, syscall.PR_SET_PTRACER, pid, 0)
if errno == 0 {
return nil
}
return errno
}
func SetDumpable(dumpable uintptr) error {
// linux/sched/coredump.h
if _, _, errno := syscall.Syscall(syscall.SYS_PRCTL, syscall.PR_SET_DUMPABLE, dumpable, 0); errno != 0 {
return errno
}
return nil
}
func SetNoNewPrivs() error {
_, _, errno := syscall.Syscall(syscall.SYS_PRCTL, PR_SET_NO_NEW_PRIVS, 1, 0)
if errno == 0 {
return nil
}
return errno
}
// IgnoringEINTR makes a function call and repeats it if it returns an
// EINTR error. This appears to be required even though we install all
// signal handlers with SA_RESTART: see #22838, #38033, #38836, #40846.
// Also #20400 and #36644 are issues in which a signal handler is
// installed without setting SA_RESTART. None of these are the common case,
// but there are enough of them that it seems that we can't avoid
// an EINTR loop.
func IgnoringEINTR(fn func() error) error {
for {
err := fn()
if err != syscall.EINTR {
return err
}
}
}