Table of Contents



isolate - Isolate a process using Linux Containers


isolate options --init

isolate options --run -- program arguments

isolate options --cleanup


Run program within a sandbox, so that it cannot communicate with the outside world and its resource consumption is limited. This can be used for example in a programming contest to run untrusted programs submitted by contestants in a controlled environment.

The sandbox is used in the following way:

  • Run isolate --init, which initializes the sandbox, creates its working directory and prints its name to the standard output.
  • Populate the directory with the executable file of the program and its input files.
  • Call isolate --run to run the program. A single line describing the status of the program is written to the standard error stream.
  • Fetch the output of the program from the directory.
  • Run isolate --cleanup to remove temporary files.

Please note that by default, the program is not allowed to start multiple processes of threads. If you need that, turn on the control group mode (see below).


-M, --meta=file
Output meta-data on the execution of the program to a given file. See below for syntax of the meta-files.
-m, --mem=size
Limit address space of the program to size kilobytes. If more processes are allowed, this applies to each of them separately.
-t, --time=time
Limit run time of the program to time seconds. Fractional numbers are allowed. Time in which the OS assigns the processor to different tasks is not counted.
-w, --wall-time=time
Limit wall-clock time to time seconds. Fractional values are allowed. This clock measures the time from the start of the program to its exit, so it does not stop when the program has lost the CPU or when it is waiting for an external event. We recommend to use --time as the main limit, but set --wall-time to a much higher value as a precaution against sleeping programs.
-x, --extra-time=time
When a time limit is exceeded, wait for extra time seconds before killing the program. This has the advantage that the real execution time is reported, even though it slightly exceeds the limit. Fractional numbers are again allowed.
-b, --box-id=id
When you run multiple sandboxes in parallel, you have to assign each unique IDs to them by this option. See the discussion on UIDs in the INSTALLATION section. The ID defaults to 0.
-k, --stack=size
Limit process stack to size kilobytes. By default, the whole address space is available for the stack, but it is subject to the --mem limit.
-q, --quota=blocks,inodes
Set disk quota to a given number of blocks and inodes. This requires the filesystem to be mounted with support for quotas.
-i, --stdin=file
Redirect standard input from file. The file has to be accessible inside the sandbox.
-o, --stdout=file
Redirect standard output to file. The file has to be accessible inside the sandbox.
-r, --stderr=file
Redirect standard error output to file. The file has to be accessible inside the sandbox.
-c, --chdir=dir
Change directory to dir before executing the program. This path must be relative to the root of the sandbox.
-p, --processes[=max]
Permit the program to create up to max processes and/or threads. Please keep in mind that time and memory limit do not work with multiple processes unless you enable the control group mode. If max is not given, an arbitrary number of processes can be run.
-v, --verbose
Tell the sandbox manager to be verbose and report on what is going on. Using -v multiple times produces even more jabber.


UNIX processes normally inherit all environment variables from their parent. The sandbox however passes only those variables which are explicitly requested by environment rules:

-E, --env=var
Inherit the variable var from the parent.
-E, --env=var=value
Set the variable var to value. When the value is empty, the variable is removed from the environment.
-e, --full-env
Inherit all variables from the parent.

The rules are applied in the order in which they were given, except for --full-env, which is applied first.

The list of rules is automatically initialized with -ELIBC_FATAL_STDERR_=1.


The sandboxed process gets its own filesystem namespace, which contains only subtrees requested by directory rules:

-d, --dir=in=out[:options]
Bind the directory out as seen by the caller to the path in inside the sandbox. If there already was a directory rule for out, it is replaced.
-d, --dir=dir[:options]
Bind the directory /dir to dir inside the sandbox. If there already was a directory rule for out, it is replaced.
-d, --dir=in=
Remove a directory rule for the path in inside the sandbox.

By default, all directories are bound read-only and restricted (no devices, no setuid binaries). This behavior can be modified using the options:

Allow read-write access.
Allow access to character and block devices.
Disallow execution of binaries.
Silently ignore the rule if the directory to be bound does not exist.
Instead of binding a directory, mount a device-less filesystem called in. For example, this can be proc or sysfs.

The default set of directory rules binds /bin, /dev (with devices allowed), /lib, /lib64 (if it exists), and /usr. It also binds the working directory to /box (read-write) and mounts the proc filesystem at /proc.


Isolate can make use of system control groups provided by the kernel to constrain programs consisting of multiple processes. Please note that this feature needs special system setup described in the REQUIREMENTS section.

Enable use of control groups.
Limit total memory usage by the whole control group to size kilobytes.
Use control groups for timing, so that the --time switch affects the total run time of all processes and threads in the control group.


The meta-file contains miscellaneous meta-information on execution of the program within the sandbox. It is a textual file consisting of lines of format key:value. The following keys are defined:

When control groups are enabled, this is the total memory use by the whole control group (in kilobytes).
Number of context switches forced by the kernel.
Number of context switches caused by the process giving up the CPU voluntarily.
The program has exited normally with this exit code.
The program has exited after receiving this fatal signal.
Present when the program was terminated by the sandbox (e.g., because it has exceeded the time limit).
Maximum resident set size of the process (in kilobytes).
Status message, not intended for machine processing. E.g., "Time limit exceeded."

Two-letter status code:

  • RE — run-time error, i.e., exited with a non-zero exit code
  • SG — program died on a signal
  • TO — timed out
  • XX — internal error of the sandbox
Run time of the program in fractional seconds.
Wall clock time of the program in fractional seconds.


When the program inside the sandbox finishes correctly, the sandbox returns 0. If it finishes incorrectly, it returns 1. All other return codes signal an internal error.


Isolate depends on several advanced features of the Linux kernel. Please make sure that your kernel supports PID namespaces (CONFIG_PID_NS), IPC namespaces (CONFIG_IPC_NS), and network namespaces (CONFIG_NET_IS). If you want to use control groups, you need the cpusets (CONFIG_CPUSETS), CPU accounting controller (CONFIG_CGROUP_CPUACCT), and memory resource controller (CONFIG_CGROUP_MEM_RES_CTLR).

Isolate is designed to run setuid to root. The sub-process inside the sandbox then switches to a non-privileged user ID (different for each --box-id). The range of UIDs available and several filesystem paths are embedded in the isolate’s binary during compilation; please see default.cfg in the source tree for description.

Before you run isolate with control groups, you have to mount the control group filesystem. Most modern Linux distributions use libcgroup, which mounts a tmpfs at /sys/fs/cgroup, with individual controllers mounted within subdirectories. It is recommended to use your distribution’s cgroup configuration support. Debian-based distributions have a choice of the cgroup-lite or cgroup-bin packages; Red Hat-based distributions provide the libcgroup package.


Isolate was written by Martin Mares and Bernard Blackham. It can be distributed and used under the terms of the GNU General Public License version 2.