// SPDX-License-Identifier: GPL-2.0 /* * Sandbox itself and execute another program (in a different mount point). * * Used by layout1.umount_sandboxer from fs_test.c * * Copyright © 2024-2025 Microsoft Corporation */ #define _GNU_SOURCE #include #include #include #include #include #include "wrappers.h" int main(int argc, char *argv[]) { struct landlock_ruleset_attr ruleset_attr = { .scoped = LANDLOCK_SCOPE_SIGNAL, }; int pipe_child, pipe_parent, ruleset_fd; char buf; /* * The first argument must be the file descriptor number of a pipe. * The second argument must be the program to execute. */ if (argc != 4) { fprintf(stderr, "Wrong number of arguments (not three)\n"); return 1; } pipe_child = atoi(argv[2]); pipe_parent = atoi(argv[3]); ruleset_fd = landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0); if (ruleset_fd < 0) { perror("Failed to create ruleset"); return 1; } if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) { perror("Failed to call prctl()"); return 1; } if (landlock_restrict_self(ruleset_fd, 0)) { perror("Failed to restrict self"); return 1; } if (close(ruleset_fd)) { perror("Failed to close ruleset"); return 1; } /* Signals that we are sandboxed. */ errno = 0; if (write(pipe_child, ".", 1) != 1) { perror("Failed to write to the second argument"); return 1; } /* Waits for the parent to try to umount. */ if (read(pipe_parent, &buf, 1) != 1) { perror("Failed to write to the third argument"); return 1; } /* Shifts arguments. */ argv[0] = argv[1]; argv[1] = argv[2]; argv[2] = argv[3]; argv[3] = NULL; execve(argv[0], argv, NULL); perror("Failed to execute the provided binary"); return 1; }