2020-01-17 21:05:03 +08:00
|
|
|
// Copyright 2019 Google LLC
|
2019-03-19 00:21:48 +08:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
2022-01-28 17:38:27 +08:00
|
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
2019-03-19 00:21:48 +08:00
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
// Implementation of the sandbox2::ForkServer class.
|
|
|
|
|
|
|
|
#include "sandboxed_api/sandbox2/forkserver.h"
|
|
|
|
|
|
|
|
#include <fcntl.h>
|
2023-08-24 21:23:03 +08:00
|
|
|
#include <linux/filter.h>
|
|
|
|
#include <linux/seccomp.h>
|
2019-03-19 00:21:48 +08:00
|
|
|
#include <sched.h>
|
2023-08-17 18:01:23 +08:00
|
|
|
#include <sys/eventfd.h>
|
2019-03-19 00:21:48 +08:00
|
|
|
#include <sys/prctl.h>
|
2023-06-16 19:36:42 +08:00
|
|
|
#include <sys/resource.h>
|
2019-03-19 00:21:48 +08:00
|
|
|
#include <sys/socket.h>
|
2023-08-24 21:23:03 +08:00
|
|
|
#include <sys/uio.h>
|
2019-03-19 00:21:48 +08:00
|
|
|
#include <sys/wait.h>
|
|
|
|
#include <syscall.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include <cerrno>
|
|
|
|
#include <csignal>
|
|
|
|
#include <cstdint>
|
|
|
|
#include <cstdlib>
|
|
|
|
#include <cstring>
|
2022-03-10 17:32:23 +08:00
|
|
|
#include <fstream>
|
2023-08-24 21:23:03 +08:00
|
|
|
#include <initializer_list>
|
2022-03-10 17:32:23 +08:00
|
|
|
#include <string>
|
2023-08-30 17:20:25 +08:00
|
|
|
#include <utility>
|
2023-09-07 17:42:26 +08:00
|
|
|
#include <vector>
|
2019-03-19 00:21:48 +08:00
|
|
|
|
2023-08-30 17:20:25 +08:00
|
|
|
#include "absl/base/attributes.h"
|
2021-07-14 16:32:57 +08:00
|
|
|
#include "absl/container/flat_hash_map.h"
|
2021-09-06 16:00:42 +08:00
|
|
|
#include "absl/container/flat_hash_set.h"
|
2020-02-28 01:23:44 +08:00
|
|
|
#include "absl/status/status.h"
|
2020-09-02 23:46:48 +08:00
|
|
|
#include "absl/status/statusor.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
#include "absl/strings/match.h"
|
|
|
|
#include "absl/strings/str_cat.h"
|
|
|
|
#include "absl/strings/str_join.h"
|
2022-03-10 17:32:23 +08:00
|
|
|
#include "absl/strings/str_split.h"
|
2023-08-24 21:23:03 +08:00
|
|
|
#include "absl/strings/string_view.h"
|
2020-07-01 23:23:20 +08:00
|
|
|
#include "libcap/include/sys/capability.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
#include "sandboxed_api/sandbox2/client.h"
|
|
|
|
#include "sandboxed_api/sandbox2/comms.h"
|
2020-07-17 19:54:20 +08:00
|
|
|
#include "sandboxed_api/sandbox2/fork_client.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
#include "sandboxed_api/sandbox2/forkserver.pb.h"
|
|
|
|
#include "sandboxed_api/sandbox2/namespace.h"
|
|
|
|
#include "sandboxed_api/sandbox2/policy.h"
|
|
|
|
#include "sandboxed_api/sandbox2/sanitizer.h"
|
|
|
|
#include "sandboxed_api/sandbox2/syscall.h"
|
|
|
|
#include "sandboxed_api/sandbox2/util.h"
|
|
|
|
#include "sandboxed_api/sandbox2/util/bpf_helper.h"
|
2021-01-14 01:25:25 +08:00
|
|
|
#include "sandboxed_api/util/fileops.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
#include "sandboxed_api/util/raw_logging.h"
|
2021-01-14 01:25:25 +08:00
|
|
|
#include "sandboxed_api/util/strerror.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
|
2023-03-28 20:50:06 +08:00
|
|
|
namespace sandbox2 {
|
2019-04-05 19:51:20 +08:00
|
|
|
namespace {
|
2021-01-14 01:25:25 +08:00
|
|
|
|
|
|
|
using ::sapi::StrError;
|
2023-08-30 17:20:25 +08:00
|
|
|
using ::sapi::file_util::fileops::FDCloser;
|
2021-01-14 01:25:25 +08:00
|
|
|
|
2021-07-14 16:32:57 +08:00
|
|
|
// "Moves" FDs in move_fds from current to target FD number while keeping FDs
|
|
|
|
// in keep_fds open - potentially moving them to another FD number as well in
|
|
|
|
// case of colisions.
|
|
|
|
// Ignores invalid (-1) fds.
|
|
|
|
void MoveFDs(std::initializer_list<std::pair<int*, int>> move_fds,
|
|
|
|
std::initializer_list<int*> keep_fds) {
|
|
|
|
absl::flat_hash_map<int, int*> fd_map;
|
|
|
|
for (int* fd : keep_fds) {
|
|
|
|
if (*fd != -1) {
|
|
|
|
fd_map.emplace(*fd, fd);
|
|
|
|
}
|
2019-04-05 19:51:20 +08:00
|
|
|
}
|
|
|
|
|
2021-07-14 16:32:57 +08:00
|
|
|
for (auto [old_fd, new_fd] : move_fds) {
|
|
|
|
if (*old_fd != -1) {
|
|
|
|
fd_map.emplace(*old_fd, old_fd);
|
|
|
|
}
|
2019-04-05 19:51:20 +08:00
|
|
|
}
|
|
|
|
|
2021-07-14 16:32:57 +08:00
|
|
|
for (auto [old_fd, new_fd] : move_fds) {
|
|
|
|
if (*old_fd == -1 || *old_fd == new_fd) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure we won't override another fd
|
2023-08-17 18:01:23 +08:00
|
|
|
if (auto it = fd_map.find(new_fd); it != fd_map.end()) {
|
2021-07-14 16:32:57 +08:00
|
|
|
int fd = dup(new_fd);
|
|
|
|
SAPI_RAW_CHECK(fd != -1, "Duplicating an FD failed.");
|
|
|
|
*it->second = fd;
|
|
|
|
fd_map.emplace(fd, it->second);
|
|
|
|
fd_map.erase(it);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (dup2(*old_fd, new_fd) == -1) {
|
|
|
|
SAPI_RAW_PLOG(FATAL, "Moving temporary to proper FD failed.");
|
|
|
|
}
|
|
|
|
|
|
|
|
close(*old_fd);
|
|
|
|
fd_map.erase(*old_fd);
|
|
|
|
*old_fd = new_fd;
|
|
|
|
}
|
2019-04-05 19:51:20 +08:00
|
|
|
}
|
2019-07-16 22:22:54 +08:00
|
|
|
|
2023-08-30 17:20:25 +08:00
|
|
|
ABSL_ATTRIBUTE_NORETURN void RunInitProcess(pid_t main_pid, FDCloser pipe_fd) {
|
2019-07-16 22:22:54 +08:00
|
|
|
if (prctl(PR_SET_NAME, "S2-INIT-PROC", 0, 0, 0) != 0) {
|
|
|
|
SAPI_RAW_PLOG(WARNING, "prctl(PR_SET_NAME, 'S2-INIT-PROC')");
|
|
|
|
}
|
2023-03-09 00:08:35 +08:00
|
|
|
|
|
|
|
// Clear SA_NOCLDWAIT.
|
|
|
|
struct sigaction sa;
|
|
|
|
sa.sa_handler = SIG_DFL;
|
|
|
|
sa.sa_flags = 0;
|
|
|
|
sigemptyset(&sa.sa_mask);
|
|
|
|
SAPI_RAW_CHECK(sigaction(SIGCHLD, &sa, nullptr) == 0,
|
|
|
|
"clearing SA_NOCLDWAIT");
|
|
|
|
|
2019-07-16 22:22:54 +08:00
|
|
|
// Apply seccomp.
|
2023-03-09 00:08:35 +08:00
|
|
|
std::vector<sock_filter> code = {
|
2019-07-16 22:22:54 +08:00
|
|
|
LOAD_ARCH,
|
|
|
|
JNE32(sandbox2::Syscall::GetHostAuditArch(), DENY),
|
|
|
|
|
|
|
|
LOAD_SYSCALL_NR,
|
2023-03-09 00:08:35 +08:00
|
|
|
SYSCALL(__NR_waitid, ALLOW),
|
2019-07-16 22:22:54 +08:00
|
|
|
SYSCALL(__NR_exit, ALLOW),
|
|
|
|
};
|
2023-08-30 17:20:25 +08:00
|
|
|
if (pipe_fd.get() >= 0) {
|
2023-06-16 19:36:42 +08:00
|
|
|
code.insert(code.end(),
|
|
|
|
{SYSCALL(__NR_getrusage, ALLOW), SYSCALL(__NR_write, ALLOW)});
|
2023-03-09 00:08:35 +08:00
|
|
|
}
|
|
|
|
code.push_back(DENY);
|
2019-07-16 22:22:54 +08:00
|
|
|
|
2023-03-09 00:08:35 +08:00
|
|
|
struct sock_fprog prog {
|
2023-03-09 17:02:54 +08:00
|
|
|
.len = static_cast<uint16_t>(code.size()), .filter = code.data(),
|
2023-03-09 00:08:35 +08:00
|
|
|
};
|
2019-07-16 22:22:54 +08:00
|
|
|
|
|
|
|
SAPI_RAW_CHECK(prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) == 0,
|
|
|
|
"Denying new privs");
|
|
|
|
SAPI_RAW_CHECK(prctl(PR_SET_KEEPCAPS, 0) == 0, "Dropping caps");
|
|
|
|
SAPI_RAW_CHECK(
|
|
|
|
syscall(__NR_seccomp, SECCOMP_SET_MODE_FILTER, SECCOMP_FILTER_FLAG_TSYNC,
|
|
|
|
reinterpret_cast<uintptr_t>(&prog)) == 0,
|
|
|
|
"Enabling seccomp filter");
|
|
|
|
|
2023-03-09 00:08:35 +08:00
|
|
|
siginfo_t info;
|
2019-07-16 22:22:54 +08:00
|
|
|
// Reap children.
|
2023-03-09 00:08:35 +08:00
|
|
|
for (;;) {
|
|
|
|
int rv = TEMP_FAILURE_RETRY(waitid(P_ALL, -1, &info, WEXITED | __WALL));
|
|
|
|
if (rv != 0) {
|
2019-07-16 22:22:54 +08:00
|
|
|
_exit(1);
|
|
|
|
}
|
2023-03-09 00:08:35 +08:00
|
|
|
|
|
|
|
if (info.si_pid == main_pid) {
|
2023-08-30 17:20:25 +08:00
|
|
|
if (pipe_fd.get() >= 0) {
|
|
|
|
write(pipe_fd.get(), &info.si_code, sizeof(info.si_code));
|
|
|
|
write(pipe_fd.get(), &info.si_status, sizeof(info.si_status));
|
2023-06-16 19:36:42 +08:00
|
|
|
|
|
|
|
rusage usage{};
|
|
|
|
getrusage(RUSAGE_CHILDREN, &usage);
|
2023-08-30 17:20:25 +08:00
|
|
|
write(pipe_fd.get(), &usage, sizeof(usage));
|
2023-03-09 00:08:35 +08:00
|
|
|
}
|
|
|
|
_exit(0);
|
|
|
|
}
|
2019-07-16 22:22:54 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-28 01:23:44 +08:00
|
|
|
absl::Status SendPid(int signaling_fd) {
|
2019-07-16 22:22:54 +08:00
|
|
|
// Send our PID (the actual sandboxee process) via SCM_CREDENTIALS.
|
|
|
|
// The ancillary message will be attached to the message as SO_PASSCRED is set
|
|
|
|
// on the socket.
|
|
|
|
char dummy = ' ';
|
|
|
|
if (TEMP_FAILURE_RETRY(send(signaling_fd, &dummy, 1, 0)) != 1) {
|
2022-04-21 21:15:07 +08:00
|
|
|
return absl::ErrnoToStatus(errno, "Sending PID: send()");
|
2019-07-16 22:22:54 +08:00
|
|
|
}
|
2020-02-28 01:23:44 +08:00
|
|
|
return absl::OkStatus();
|
2019-07-16 22:22:54 +08:00
|
|
|
}
|
|
|
|
|
2020-09-02 23:46:48 +08:00
|
|
|
absl::StatusOr<pid_t> ReceivePid(int signaling_fd) {
|
2019-07-16 22:22:54 +08:00
|
|
|
union {
|
|
|
|
struct cmsghdr cmh;
|
|
|
|
char ctrl[CMSG_SPACE(sizeof(struct ucred))];
|
|
|
|
} ucred_msg{};
|
|
|
|
|
|
|
|
struct msghdr msgh {};
|
|
|
|
struct iovec iov {};
|
|
|
|
|
|
|
|
msgh.msg_iov = &iov;
|
|
|
|
msgh.msg_iovlen = 1;
|
|
|
|
msgh.msg_control = ucred_msg.ctrl;
|
|
|
|
msgh.msg_controllen = sizeof(ucred_msg);
|
|
|
|
|
|
|
|
char dummy;
|
|
|
|
iov.iov_base = &dummy;
|
|
|
|
iov.iov_len = sizeof(char);
|
|
|
|
|
|
|
|
if (TEMP_FAILURE_RETRY(recvmsg(signaling_fd, &msgh, MSG_WAITALL)) != 1) {
|
2022-04-21 21:15:07 +08:00
|
|
|
return absl::ErrnoToStatus(errno, "Receiving pid failed: recvmsg");
|
2019-07-16 22:22:54 +08:00
|
|
|
}
|
|
|
|
struct cmsghdr* cmsgp = CMSG_FIRSTHDR(&msgh);
|
|
|
|
if (cmsgp->cmsg_len != CMSG_LEN(sizeof(struct ucred)) ||
|
|
|
|
cmsgp->cmsg_level != SOL_SOCKET || cmsgp->cmsg_type != SCM_CREDENTIALS) {
|
2020-02-28 01:23:44 +08:00
|
|
|
return absl::InternalError("Receiving pid failed");
|
2019-07-16 22:22:54 +08:00
|
|
|
}
|
2022-04-21 21:15:07 +08:00
|
|
|
auto* ucredp = reinterpret_cast<struct ucred*>(CMSG_DATA(cmsgp));
|
2019-07-16 22:22:54 +08:00
|
|
|
return ucredp->pid;
|
|
|
|
}
|
2022-03-10 17:32:23 +08:00
|
|
|
|
|
|
|
absl::StatusOr<std::string> GetRootMountId(const std::string& proc_id) {
|
|
|
|
std::ifstream mounts(absl::StrCat("/proc/", proc_id, "/mountinfo"));
|
|
|
|
if (!mounts.good()) {
|
|
|
|
return absl::InternalError("Failed to open mountinfo");
|
|
|
|
}
|
|
|
|
std::string line;
|
|
|
|
while (std::getline(mounts, line)) {
|
|
|
|
std::vector<absl::string_view> parts =
|
|
|
|
absl::StrSplit(line, absl::MaxSplits(' ', 4));
|
|
|
|
if (parts.size() >= 4 && parts[3] == "/") {
|
|
|
|
return std::string(parts[0]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return absl::NotFoundError("Root entry not found in mountinfo");
|
|
|
|
}
|
|
|
|
|
|
|
|
bool IsLikelyChrooted() {
|
|
|
|
absl::StatusOr<std::string> self_root_id = GetRootMountId("self");
|
|
|
|
if (!self_root_id.ok()) {
|
|
|
|
return absl::IsNotFound(self_root_id.status());
|
|
|
|
}
|
|
|
|
absl::StatusOr<std::string> init_root_id = GetRootMountId("1");
|
|
|
|
if (!init_root_id.ok()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return *self_root_id != *init_root_id;
|
|
|
|
}
|
|
|
|
|
2019-04-05 19:51:20 +08:00
|
|
|
} // namespace
|
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
void ForkServer::PrepareExecveArgs(const ForkRequest& request,
|
|
|
|
std::vector<std::string>* args,
|
|
|
|
std::vector<std::string>* envp) {
|
|
|
|
// Prepare arguments for execve.
|
|
|
|
for (const auto& arg : request.args()) {
|
|
|
|
args->push_back(arg);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Prepare environment variables for execve.
|
|
|
|
for (const auto& env : request.envs()) {
|
|
|
|
envp->push_back(env);
|
|
|
|
}
|
|
|
|
|
|
|
|
// The child process should not start any fork-servers.
|
|
|
|
envp->push_back(absl::StrCat(kForkServerDisableEnv, "=1"));
|
|
|
|
|
|
|
|
constexpr char kSapiVlogLevel[] = "SAPI_VLOG_LEVEL";
|
|
|
|
char* sapi_vlog = getenv(kSapiVlogLevel);
|
|
|
|
if (sapi_vlog && strlen(sapi_vlog) > 0) {
|
|
|
|
envp->push_back(absl::StrCat(kSapiVlogLevel, "=", sapi_vlog));
|
|
|
|
}
|
|
|
|
|
|
|
|
SAPI_RAW_VLOG(1, "Will execute args:['%s'], environment:['%s']",
|
2020-12-14 19:33:29 +08:00
|
|
|
absl::StrJoin(*args, "', '").c_str(),
|
|
|
|
absl::StrJoin(*envp, "', '").c_str());
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void ForkServer::LaunchChild(const ForkRequest& request, int execve_fd,
|
2023-08-30 17:20:25 +08:00
|
|
|
uid_t uid, gid_t gid, FDCloser signaling_fd,
|
|
|
|
FDCloser status_fd, bool avoid_pivot_root) const {
|
2022-03-14 22:27:57 +08:00
|
|
|
SAPI_RAW_CHECK(request.mode() != FORKSERVER_FORK_UNSPECIFIED,
|
|
|
|
"Forkserver mode is unspecified");
|
|
|
|
|
2023-08-18 21:52:10 +08:00
|
|
|
const bool will_execve = execve_fd != -1;
|
2023-08-30 22:11:49 +08:00
|
|
|
const bool should_sandbox = request.mode() == FORKSERVER_FORK_EXECVE_SANDBOX;
|
2019-03-19 00:21:48 +08:00
|
|
|
|
2021-09-06 16:00:42 +08:00
|
|
|
absl::StatusOr<absl::flat_hash_set<int>> open_fds = sanitizer::GetListOfFDs();
|
|
|
|
if (!open_fds.ok()) {
|
|
|
|
SAPI_RAW_LOG(WARNING, "Could not get list of current open FDs: %s",
|
|
|
|
std::string(open_fds.status().message()).c_str());
|
|
|
|
open_fds = absl::flat_hash_set<int>();
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
2023-08-30 22:11:49 +08:00
|
|
|
SanitizeEnvironment();
|
2021-05-17 19:06:39 +08:00
|
|
|
|
2019-11-20 01:01:59 +08:00
|
|
|
InitializeNamespaces(request, uid, gid, avoid_pivot_root);
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
auto caps = cap_init();
|
|
|
|
SAPI_RAW_CHECK(cap_set_proc(caps) == 0, "while dropping capabilities");
|
|
|
|
cap_free(caps);
|
|
|
|
|
2019-03-19 20:14:08 +08:00
|
|
|
// A custom init process is only needed if a new PID NS is created.
|
|
|
|
if (request.clone_flags() & CLONE_NEWPID) {
|
2019-07-16 22:22:54 +08:00
|
|
|
// Spawn a child process
|
2023-09-07 17:42:26 +08:00
|
|
|
pid_t child = util::ForkWithFlags(SIGCHLD);
|
2019-07-16 22:22:54 +08:00
|
|
|
if (child < 0) {
|
|
|
|
SAPI_RAW_PLOG(FATAL, "Could not spawn init process");
|
|
|
|
}
|
|
|
|
if (child != 0) {
|
2023-08-30 17:20:25 +08:00
|
|
|
if (status_fd.get() >= 0) {
|
|
|
|
open_fds->erase(status_fd.get());
|
2023-03-09 00:08:35 +08:00
|
|
|
}
|
2023-08-30 17:20:25 +08:00
|
|
|
// Close all open fds (equals to CloseAllFDsExcept but does not require
|
|
|
|
// /proc to be available).
|
|
|
|
for (const auto& fd : *open_fds) {
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
RunInitProcess(child, std::move(status_fd));
|
2019-07-16 22:22:54 +08:00
|
|
|
}
|
|
|
|
// Send sandboxee pid
|
2023-08-30 17:20:25 +08:00
|
|
|
auto status = SendPid(signaling_fd.get());
|
2020-12-14 19:33:29 +08:00
|
|
|
SAPI_RAW_CHECK(status.ok(),
|
|
|
|
absl::StrCat("sending pid: ", status.message()).c_str());
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
2023-08-30 17:20:25 +08:00
|
|
|
signaling_fd.Close();
|
|
|
|
status_fd.Close();
|
2019-07-16 22:22:54 +08:00
|
|
|
|
2023-08-30 22:11:49 +08:00
|
|
|
Client c(comms_);
|
2019-03-19 00:21:48 +08:00
|
|
|
|
2023-08-30 22:11:49 +08:00
|
|
|
// Prepare the arguments before sandboxing (if needed), as doing it after
|
|
|
|
// sandoxing can cause syscall violations (e.g. related to memory management).
|
|
|
|
std::vector<std::string> args;
|
|
|
|
std::vector<std::string> envs;
|
|
|
|
if (will_execve) {
|
|
|
|
PrepareExecveArgs(request, &args, &envs);
|
|
|
|
}
|
2019-03-19 00:21:48 +08:00
|
|
|
|
2023-08-30 22:11:49 +08:00
|
|
|
// Sandboxing can be enabled either here - just before execve, or somewhere
|
|
|
|
// inside the executed binary (e.g. after basic structures have been
|
|
|
|
// initialized, and resources acquired). In the latter case, it's up to the
|
|
|
|
// sandboxed binary to establish proper Comms channel (using
|
|
|
|
// Comms::kSandbox2ClientCommsFD) and call sandbox2::Client::SandboxMeHere()
|
|
|
|
if (should_sandbox) {
|
2019-03-19 00:21:48 +08:00
|
|
|
// The following client calls are basically SandboxMeHere. We split it so
|
|
|
|
// that we can set up the envp after we received the file descriptors but
|
|
|
|
// before we enable the syscall filter.
|
2023-08-18 21:52:10 +08:00
|
|
|
c.PrepareEnvironment(&execve_fd);
|
2023-08-30 17:20:25 +08:00
|
|
|
if (comms_->GetConnectionFD() != Comms::kSandbox2ClientCommsFD) {
|
2022-10-11 00:38:14 +08:00
|
|
|
envs.push_back(absl::StrCat(Comms::kSandbox2CommsFDEnvVar, "=",
|
2023-08-30 17:20:25 +08:00
|
|
|
comms_->GetConnectionFD()));
|
2022-10-11 00:38:14 +08:00
|
|
|
}
|
2019-03-19 00:21:48 +08:00
|
|
|
envs.push_back(c.GetFdMapEnvVar());
|
2023-08-30 22:11:49 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Convert args and envs before enabling sandbox (it'll allocate which might
|
|
|
|
// be blocked).
|
|
|
|
util::CharPtrArray argv = util::CharPtrArray::FromStringVector(args);
|
|
|
|
util::CharPtrArray envp = util::CharPtrArray::FromStringVector(envs);
|
2019-03-19 00:21:48 +08:00
|
|
|
|
2023-08-30 22:11:49 +08:00
|
|
|
if (should_sandbox) {
|
2019-03-19 00:21:48 +08:00
|
|
|
c.EnableSandbox();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (will_execve) {
|
2023-08-30 22:11:49 +08:00
|
|
|
ExecuteProcess(execve_fd, argv.data(), envp.data());
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-02 21:31:19 +08:00
|
|
|
pid_t ForkServer::ServeRequest() {
|
2019-03-19 00:21:48 +08:00
|
|
|
ForkRequest fork_request;
|
|
|
|
if (!comms_->RecvProtoBuf(&fork_request)) {
|
|
|
|
if (comms_->IsTerminated()) {
|
2023-03-29 17:21:31 +08:00
|
|
|
return -1;
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
2021-05-17 19:06:39 +08:00
|
|
|
SAPI_RAW_LOG(FATAL, "Failed to receive ForkServer request");
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
int comms_fd;
|
2020-01-28 21:59:01 +08:00
|
|
|
SAPI_RAW_CHECK(comms_->RecvFD(&comms_fd), "Failed to receive Comms FD");
|
2019-03-19 00:21:48 +08:00
|
|
|
|
2022-03-14 22:27:57 +08:00
|
|
|
SAPI_RAW_CHECK(fork_request.mode() != FORKSERVER_FORK_UNSPECIFIED,
|
|
|
|
"Forkserver mode is unspecified");
|
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
int exec_fd = -1;
|
|
|
|
if (fork_request.mode() == FORKSERVER_FORK_EXECVE ||
|
|
|
|
fork_request.mode() == FORKSERVER_FORK_EXECVE_SANDBOX) {
|
2020-01-28 21:59:01 +08:00
|
|
|
SAPI_RAW_CHECK(comms_->RecvFD(&exec_fd), "Failed to receive Exec FD");
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Make the kernel notify us with SIGCHLD when the process terminates.
|
|
|
|
// We use sigaction(SIGCHLD, flags=SA_NOCLDWAIT) in combination with
|
|
|
|
// this to make sure the zombie process is reaped immediately.
|
|
|
|
int clone_flags = fork_request.clone_flags() | SIGCHLD;
|
|
|
|
|
|
|
|
// Store uid and gid since they will change if CLONE_NEWUSER is set.
|
|
|
|
uid_t uid = getuid();
|
|
|
|
uid_t gid = getgid();
|
|
|
|
|
2023-08-30 17:20:25 +08:00
|
|
|
FDCloser pipe_fds[2];
|
|
|
|
{
|
|
|
|
int pfds[2] = {-1, -1};
|
|
|
|
if (fork_request.monitor_type() == FORKSERVER_MONITOR_UNOTIFY) {
|
|
|
|
SAPI_RAW_PCHECK(pipe(pfds) == 0, "creating status pipe");
|
|
|
|
}
|
|
|
|
pipe_fds[0] = FDCloser(pfds[0]);
|
|
|
|
pipe_fds[1] = FDCloser(pfds[1]);
|
2023-03-09 00:08:35 +08:00
|
|
|
}
|
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
int socketpair_fds[2];
|
2020-01-28 21:59:01 +08:00
|
|
|
SAPI_RAW_PCHECK(
|
|
|
|
socketpair(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0, socketpair_fds) == 0,
|
|
|
|
"creating signaling socketpair");
|
2019-03-19 00:21:48 +08:00
|
|
|
for (int i = 0; i < 2; i++) {
|
|
|
|
int val = 1;
|
2020-01-28 21:59:01 +08:00
|
|
|
SAPI_RAW_PCHECK(setsockopt(socketpair_fds[i], SOL_SOCKET, SO_PASSCRED, &val,
|
|
|
|
sizeof(val)) == 0,
|
|
|
|
"setsockopt failed");
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
|
2023-08-30 17:20:25 +08:00
|
|
|
FDCloser signaling_fds[] = {FDCloser(socketpair_fds[0]),
|
|
|
|
FDCloser(socketpair_fds[1])};
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
// Note: init_pid will be overwritten with the actual init pid if the init
|
2019-11-20 01:01:59 +08:00
|
|
|
// process was started or stays at 0 if that is not needed - no pidns.
|
2019-03-19 00:21:48 +08:00
|
|
|
pid_t init_pid = 0;
|
2019-11-20 01:01:59 +08:00
|
|
|
pid_t sandboxee_pid = -1;
|
|
|
|
bool avoid_pivot_root = clone_flags & (CLONE_NEWUSER | CLONE_NEWNS);
|
|
|
|
if (avoid_pivot_root) {
|
2019-12-02 21:31:19 +08:00
|
|
|
// Create initial namespaces only when they're first needed.
|
|
|
|
// This allows sandbox2 to be still used without any namespaces support
|
|
|
|
if (initial_mntns_fd_ == -1) {
|
|
|
|
CreateInitialNamespaces();
|
|
|
|
}
|
2019-11-20 01:01:59 +08:00
|
|
|
// We first just fork a child, which will join the initial namespaces
|
|
|
|
// Note: Not a regular fork() as one really needs to be single-threaded to
|
|
|
|
// setns and this is not the case with TSAN.
|
2019-12-03 23:58:49 +08:00
|
|
|
pid_t pid = util::ForkWithFlags(SIGCHLD);
|
2019-11-20 01:01:59 +08:00
|
|
|
SAPI_RAW_PCHECK(pid != -1, "fork failed");
|
|
|
|
if (pid == 0) {
|
|
|
|
SAPI_RAW_PCHECK(setns(initial_userns_fd_, CLONE_NEWUSER) != -1,
|
|
|
|
"joining initial user namespace");
|
|
|
|
SAPI_RAW_PCHECK(setns(initial_mntns_fd_, CLONE_NEWNS) != -1,
|
|
|
|
"joining initial mnt namespace");
|
|
|
|
close(initial_userns_fd_);
|
|
|
|
close(initial_mntns_fd_);
|
|
|
|
// Do not create new userns it will be unshared later
|
|
|
|
sandboxee_pid =
|
|
|
|
util::ForkWithFlags((clone_flags & ~CLONE_NEWUSER) | CLONE_PARENT);
|
|
|
|
if (sandboxee_pid == -1) {
|
|
|
|
SAPI_RAW_LOG(ERROR, "util::ForkWithFlags(%x)", clone_flags);
|
|
|
|
}
|
|
|
|
if (sandboxee_pid != 0) {
|
|
|
|
_exit(0);
|
|
|
|
}
|
|
|
|
// Send sandboxee pid
|
2023-08-30 17:20:25 +08:00
|
|
|
absl::Status status = SendPid(signaling_fds[1].get());
|
2020-12-14 19:33:29 +08:00
|
|
|
SAPI_RAW_CHECK(status.ok(),
|
|
|
|
absl::StrCat("sending pid: ", status.message()).c_str());
|
2019-11-20 01:01:59 +08:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
sandboxee_pid = util::ForkWithFlags(clone_flags);
|
|
|
|
if (sandboxee_pid == -1) {
|
|
|
|
SAPI_RAW_LOG(ERROR, "util::ForkWithFlags(%x)", clone_flags);
|
|
|
|
}
|
|
|
|
if (sandboxee_pid == 0) {
|
|
|
|
close(initial_userns_fd_);
|
|
|
|
close(initial_mntns_fd_);
|
|
|
|
}
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Child.
|
|
|
|
if (sandboxee_pid == 0) {
|
2023-08-30 17:20:25 +08:00
|
|
|
signaling_fds[0].Close();
|
|
|
|
pipe_fds[0].Close();
|
|
|
|
// Make sure we override the forkserver's comms fd
|
|
|
|
comms_->Terminate();
|
|
|
|
if (exec_fd != -1) {
|
|
|
|
int signaling_fd = signaling_fds[1].Release();
|
|
|
|
int pipe_fd = pipe_fds[1].Release();
|
|
|
|
MoveFDs({{&exec_fd, Comms::kSandbox2TargetExecFD},
|
|
|
|
{&comms_fd, Comms::kSandbox2ClientCommsFD}},
|
|
|
|
{&signaling_fd, &pipe_fd});
|
|
|
|
signaling_fds[1] = FDCloser(signaling_fd);
|
|
|
|
pipe_fds[1] = FDCloser(pipe_fd);
|
|
|
|
}
|
|
|
|
*comms_ = Comms(comms_fd);
|
|
|
|
LaunchChild(fork_request, exec_fd, uid, gid, std::move(signaling_fds[1]),
|
|
|
|
std::move(pipe_fds[1]), avoid_pivot_root);
|
2019-03-19 00:21:48 +08:00
|
|
|
return sandboxee_pid;
|
|
|
|
}
|
|
|
|
|
2023-08-30 17:20:25 +08:00
|
|
|
signaling_fds[1].Close();
|
2019-03-19 00:21:48 +08:00
|
|
|
|
2023-05-30 20:48:55 +08:00
|
|
|
if (avoid_pivot_root) {
|
2023-08-30 17:20:25 +08:00
|
|
|
if (auto pid = ReceivePid(signaling_fds[0].get()); !pid.ok()) {
|
2023-05-30 20:48:55 +08:00
|
|
|
SAPI_RAW_LOG(ERROR, "%s", std::string(pid.status().message()).c_str());
|
|
|
|
} else {
|
|
|
|
sandboxee_pid = pid.value();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-19 20:14:08 +08:00
|
|
|
if (fork_request.clone_flags() & CLONE_NEWPID) {
|
2019-03-19 00:21:48 +08:00
|
|
|
// The pid of the init process is equal to the child process that we've
|
|
|
|
// previously forked.
|
|
|
|
init_pid = sandboxee_pid;
|
2019-07-16 22:22:54 +08:00
|
|
|
sandboxee_pid = -1;
|
|
|
|
// And the actual sandboxee is forked from the init process, so we need to
|
|
|
|
// receive the actual PID.
|
2023-08-30 17:20:25 +08:00
|
|
|
if (auto pid_or = ReceivePid(signaling_fds[0].get()); !pid_or.ok()) {
|
2020-12-14 19:33:29 +08:00
|
|
|
SAPI_RAW_LOG(ERROR, "%s", std::string(pid_or.status().message()).c_str());
|
2023-05-30 20:48:55 +08:00
|
|
|
if (init_pid != -1) {
|
|
|
|
kill(init_pid, SIGKILL);
|
|
|
|
}
|
2019-07-16 22:22:54 +08:00
|
|
|
init_pid = -1;
|
2019-03-19 00:21:48 +08:00
|
|
|
} else {
|
2020-04-02 22:42:17 +08:00
|
|
|
sandboxee_pid = pid_or.value();
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
}
|
2019-03-19 20:14:08 +08:00
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
// Parent.
|
2023-08-30 17:20:25 +08:00
|
|
|
pipe_fds[1].Close();
|
2019-03-19 00:21:48 +08:00
|
|
|
close(comms_fd);
|
|
|
|
if (exec_fd >= 0) {
|
|
|
|
close(exec_fd);
|
|
|
|
}
|
2020-12-14 19:33:29 +08:00
|
|
|
SAPI_RAW_CHECK(comms_->SendInt32(init_pid),
|
|
|
|
absl::StrCat("Failed to send init PID: ", init_pid).c_str());
|
|
|
|
SAPI_RAW_CHECK(
|
|
|
|
comms_->SendInt32(sandboxee_pid),
|
|
|
|
absl::StrCat("Failed to send sandboxee PID: ", sandboxee_pid).c_str());
|
2023-03-09 00:08:35 +08:00
|
|
|
|
2023-08-30 17:20:25 +08:00
|
|
|
if (pipe_fds[0].get() >= 0) {
|
|
|
|
SAPI_RAW_CHECK(comms_->SendFD(pipe_fds[0].get()),
|
|
|
|
"Failed to send status pipe");
|
2023-03-09 00:08:35 +08:00
|
|
|
}
|
2019-03-19 00:21:48 +08:00
|
|
|
return sandboxee_pid;
|
|
|
|
}
|
|
|
|
|
2023-03-29 17:21:31 +08:00
|
|
|
bool ForkServer::IsTerminated() const { return comms_->IsTerminated(); }
|
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
bool ForkServer::Initialize() {
|
2023-10-31 16:31:00 +08:00
|
|
|
// For safety drop as many capabilities as possible.
|
|
|
|
// Note that cap_t is actually a pointer.
|
|
|
|
cap_t have_caps = cap_get_proc(); // caps we currently have
|
|
|
|
SAPI_RAW_CHECK(have_caps, "failed to cap_get_proc()");
|
|
|
|
cap_t wanted_caps = cap_init(); // starts as empty set, ie. no caps
|
|
|
|
SAPI_RAW_CHECK(wanted_caps, "failed to cap_init()");
|
|
|
|
|
2023-11-02 15:41:55 +08:00
|
|
|
// CAP_SYS_PTRACE appears to be needed for apparmor (or possibly yama)
|
|
|
|
// CAP_SETFCAP is needed on newer kernels (5.10 needs it, 4.15 does not)
|
|
|
|
for (cap_value_t cap : {CAP_SYS_PTRACE, CAP_SETFCAP}) {
|
|
|
|
for (cap_flag_t flag : {CAP_EFFECTIVE, CAP_PERMITTED}) {
|
|
|
|
cap_flag_value_t value;
|
|
|
|
int rc = cap_get_flag(have_caps, cap, flag, &value);
|
|
|
|
SAPI_RAW_CHECK(!rc, "cap_get_flag");
|
|
|
|
if (value == CAP_SET) {
|
|
|
|
cap_value_t caps_to_set[1] = {
|
|
|
|
cap,
|
|
|
|
};
|
|
|
|
rc = cap_set_flag(wanted_caps, flag, 1, caps_to_set, CAP_SET);
|
|
|
|
SAPI_RAW_CHECK(!rc, "cap_set_flag");
|
|
|
|
}
|
2023-10-31 16:31:00 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
SAPI_RAW_CHECK(!cap_set_proc(wanted_caps), "while dropping capabilities");
|
|
|
|
SAPI_RAW_CHECK(!cap_free(wanted_caps), "while freeing wanted_caps");
|
|
|
|
SAPI_RAW_CHECK(!cap_free(have_caps), "while freeing have_caps");
|
|
|
|
|
2019-12-02 21:31:19 +08:00
|
|
|
// All processes spawned by the fork'd/execute'd process will see this process
|
|
|
|
// as /sbin/init. Therefore it will receive (and ignore) their final status
|
|
|
|
// (see the next comment as well). PR_SET_CHILD_SUBREAPER is available since
|
|
|
|
// kernel version 3.4, so don't panic if it fails.
|
|
|
|
if (prctl(PR_SET_CHILD_SUBREAPER, 1, 0, 0, 0) == -1) {
|
|
|
|
SAPI_RAW_VLOG(3, "prctl(PR_SET_CHILD_SUBREAPER, 1): %s [%d]",
|
2020-12-14 19:33:29 +08:00
|
|
|
StrError(errno).c_str(), errno);
|
2019-12-02 21:31:19 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Don't convert terminated child processes into zombies. It's up to the
|
|
|
|
// sandbox (Monitor) to track them and receive/report their final status.
|
|
|
|
struct sigaction sa;
|
2023-08-16 16:32:33 +08:00
|
|
|
sa.sa_handler = SIG_DFL;
|
|
|
|
sa.sa_flags = SA_NOCLDWAIT;
|
2019-12-02 21:31:19 +08:00
|
|
|
sigemptyset(&sa.sa_mask);
|
|
|
|
if (sigaction(SIGCHLD, &sa, nullptr) == -1) {
|
2023-08-16 16:32:33 +08:00
|
|
|
SAPI_RAW_PLOG(ERROR, "sigaction(SIGCHLD, flags=SA_NOCLDWAIT)");
|
2019-12-02 21:31:19 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void ForkServer::CreateInitialNamespaces() {
|
2019-11-20 01:01:59 +08:00
|
|
|
// Spawn a new process to create initial user and mount namespaces to be used
|
|
|
|
// as a base for each namespaced sandboxee.
|
|
|
|
|
|
|
|
// Store uid and gid to create mappings after CLONE_NEWUSER
|
|
|
|
uid_t uid = getuid();
|
|
|
|
gid_t gid = getgid();
|
|
|
|
|
2019-12-02 21:31:19 +08:00
|
|
|
// Socket to synchronize so that we open ns fds before process dies
|
2023-08-30 17:20:25 +08:00
|
|
|
FDCloser create_efd(eventfd(0, EFD_CLOEXEC));
|
2023-08-17 18:01:23 +08:00
|
|
|
SAPI_RAW_PCHECK(create_efd.get() != -1, "creating eventfd");
|
2023-08-30 17:20:25 +08:00
|
|
|
FDCloser open_efd(eventfd(0, EFD_CLOEXEC));
|
2023-08-17 18:01:23 +08:00
|
|
|
SAPI_RAW_PCHECK(open_efd.get() != -1, "creating eventfd");
|
2019-12-03 23:58:49 +08:00
|
|
|
pid_t pid = util::ForkWithFlags(CLONE_NEWUSER | CLONE_NEWNS | SIGCHLD);
|
2022-03-10 17:32:23 +08:00
|
|
|
if (pid == -1 && errno == EPERM && IsLikelyChrooted()) {
|
|
|
|
SAPI_RAW_LOG(FATAL,
|
|
|
|
"failed to fork initial namespaces process: parent process is "
|
|
|
|
"likely chrooted");
|
|
|
|
}
|
2019-11-20 01:01:59 +08:00
|
|
|
SAPI_RAW_PCHECK(pid != -1, "failed to fork initial namespaces process");
|
2023-08-17 18:01:23 +08:00
|
|
|
uint64_t value = 1;
|
2019-11-20 01:01:59 +08:00
|
|
|
if (pid == 0) {
|
|
|
|
Namespace::InitializeInitialNamespaces(uid, gid);
|
2023-08-17 18:01:23 +08:00
|
|
|
SAPI_RAW_PCHECK(TEMP_FAILURE_RETRY(write(create_efd.get(), &value,
|
|
|
|
sizeof(value))) == sizeof(value),
|
2019-12-02 21:31:19 +08:00
|
|
|
"synchronizing initial namespaces creation");
|
2023-08-17 18:01:23 +08:00
|
|
|
SAPI_RAW_PCHECK(TEMP_FAILURE_RETRY(read(open_efd.get(), &value,
|
|
|
|
sizeof(value))) == sizeof(value),
|
2019-11-20 01:01:59 +08:00
|
|
|
"synchronizing initial namespaces creation");
|
2023-09-07 17:42:26 +08:00
|
|
|
SAPI_RAW_PCHECK(chroot("/realroot") == 0,
|
|
|
|
"chrooting prior to dumping coverage");
|
|
|
|
util::DumpCoverageData();
|
2019-11-20 01:01:59 +08:00
|
|
|
_exit(0);
|
|
|
|
}
|
2023-08-17 18:01:23 +08:00
|
|
|
SAPI_RAW_PCHECK(TEMP_FAILURE_RETRY(read(create_efd.get(), &value,
|
|
|
|
sizeof(value))) == sizeof(value),
|
|
|
|
"synchronizing initial namespaces creation");
|
2019-11-20 01:01:59 +08:00
|
|
|
initial_userns_fd_ = open(absl::StrCat("/proc/", pid, "/ns/user").c_str(),
|
|
|
|
O_RDONLY | O_CLOEXEC);
|
|
|
|
SAPI_RAW_PCHECK(initial_userns_fd_ != -1, "getting initial userns fd");
|
|
|
|
initial_mntns_fd_ = open(absl::StrCat("/proc/", pid, "/ns/mnt").c_str(),
|
|
|
|
O_RDONLY | O_CLOEXEC);
|
|
|
|
SAPI_RAW_PCHECK(initial_mntns_fd_ != -1, "getting initial mntns fd");
|
2023-08-17 18:01:23 +08:00
|
|
|
SAPI_RAW_PCHECK(TEMP_FAILURE_RETRY(write(open_efd.get(), &value,
|
|
|
|
sizeof(value))) == sizeof(value),
|
2019-11-20 01:01:59 +08:00
|
|
|
"synchronizing initial namespaces creation");
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
|
2023-08-30 17:20:25 +08:00
|
|
|
void ForkServer::SanitizeEnvironment() const {
|
2019-03-19 00:21:48 +08:00
|
|
|
// Mark all file descriptors, except the standard ones (needed
|
|
|
|
// for proper sandboxed process operations), as close-on-exec.
|
2021-09-10 18:34:21 +08:00
|
|
|
absl::Status status = sanitizer::SanitizeCurrentProcess(
|
2023-08-30 17:20:25 +08:00
|
|
|
{STDIN_FILENO, STDOUT_FILENO, STDERR_FILENO, comms_->GetConnectionFD()},
|
2021-09-10 18:34:21 +08:00
|
|
|
/* close_fds = */ false);
|
|
|
|
SAPI_RAW_CHECK(
|
|
|
|
status.ok(),
|
|
|
|
absl::StrCat("while sanitizing process: ", status.message()).c_str());
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
|
2021-12-20 21:07:40 +08:00
|
|
|
void ForkServer::ExecuteProcess(int execve_fd, const char* const* argv,
|
|
|
|
const char* const* envp) {
|
2019-03-19 00:21:48 +08:00
|
|
|
// Do not add any code before execve(), as it's subject to seccomp policies.
|
|
|
|
// Indicate that it's a special execve(), by setting 4th, 5th and 6th syscall
|
|
|
|
// argument to magic values.
|
2023-03-28 20:50:06 +08:00
|
|
|
util::Execveat(execve_fd, "", argv, envp, AT_EMPTY_PATH,
|
|
|
|
internal::kExecveMagic);
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
int saved_errno = errno;
|
2023-08-16 14:30:02 +08:00
|
|
|
SAPI_RAW_PLOG(ERROR, "execveat failed");
|
|
|
|
if (argv[0]) {
|
|
|
|
SAPI_RAW_LOG(ERROR, "argv[0]=%s", argv[0]);
|
|
|
|
}
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
if (saved_errno == ENOSYS) {
|
|
|
|
SAPI_RAW_LOG(ERROR,
|
2023-08-16 14:30:02 +08:00
|
|
|
"This is likely caused by running on a kernel that is too old."
|
2019-03-19 00:21:48 +08:00
|
|
|
);
|
2019-12-19 23:48:09 +08:00
|
|
|
} else if (saved_errno == ENOENT && execve_fd >= 0) {
|
|
|
|
// Since we know the file exists, it must be that the file is dynamically
|
|
|
|
// linked and the ELF interpreter is what's actually missing.
|
2023-08-16 14:30:02 +08:00
|
|
|
SAPI_RAW_LOG(
|
|
|
|
ERROR,
|
|
|
|
"This is likely caused by running dynamically-linked sandboxee without "
|
|
|
|
"calling .AddLibrariesForBinary() on the policy builder.");
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
util::Syscall(__NR_exit_group, EXIT_FAILURE);
|
2023-03-22 19:06:25 +08:00
|
|
|
abort();
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void ForkServer::InitializeNamespaces(const ForkRequest& request, uid_t uid,
|
2019-11-20 01:01:59 +08:00
|
|
|
gid_t gid, bool avoid_pivot_root) {
|
2019-03-19 00:21:48 +08:00
|
|
|
if (!request.has_mount_tree()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
Namespace::InitializeNamespaces(
|
2023-01-19 21:44:11 +08:00
|
|
|
uid, gid, request.clone_flags(), Mounts(request.mount_tree()),
|
|
|
|
request.hostname(), avoid_pivot_root, request.allow_mount_propagation());
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace sandbox2
|