2020-01-17 21:05:03 +08:00
|
|
|
// Copyright 2019 Google LLC
|
2019-03-19 00:21:48 +08:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
// This file defines the sandbox2::Result class which will in future handle both
|
|
|
|
// exit status of the sandboxed process, and possible results returned from it.
|
|
|
|
|
|
|
|
#ifndef SANDBOXED_API_SANDBOX2_RESULT_H_
|
|
|
|
#define SANDBOXED_API_SANDBOX2_RESULT_H_
|
|
|
|
|
|
|
|
#include <sys/resource.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
|
|
|
|
#include <cstdint>
|
|
|
|
#include <memory>
|
|
|
|
#include <string>
|
|
|
|
#include <utility>
|
|
|
|
|
|
|
|
#include "absl/memory/memory.h"
|
2020-02-28 01:23:44 +08:00
|
|
|
#include "absl/status/status.h"
|
2021-01-14 01:25:25 +08:00
|
|
|
#include "sandboxed_api/config.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
#include "sandboxed_api/sandbox2/regs.h"
|
|
|
|
#include "sandboxed_api/sandbox2/syscall.h"
|
|
|
|
|
|
|
|
namespace sandbox2 {
|
|
|
|
|
|
|
|
class Result {
|
|
|
|
public:
|
|
|
|
// Final execution status.
|
|
|
|
enum StatusEnum {
|
|
|
|
// Not set yet
|
|
|
|
UNSET = 0,
|
|
|
|
// OK
|
|
|
|
OK,
|
|
|
|
// Sandbox initialization failure
|
|
|
|
SETUP_ERROR,
|
|
|
|
// Syscall violation
|
|
|
|
VIOLATION,
|
|
|
|
// Process terminated with a signal
|
|
|
|
SIGNALED,
|
|
|
|
// Process terminated with a timeout
|
|
|
|
TIMEOUT,
|
|
|
|
// Killed externally by user
|
|
|
|
EXTERNAL_KILL,
|
|
|
|
// Most likely ptrace() API failed
|
|
|
|
INTERNAL_ERROR,
|
|
|
|
};
|
|
|
|
|
|
|
|
// Detailed reason codes
|
|
|
|
enum ReasonCodeEnum {
|
|
|
|
// Codes used by status=`SETUP_ERROR`:
|
|
|
|
UNSUPPORTED_ARCH = 0,
|
|
|
|
FAILED_TIMERS,
|
|
|
|
FAILED_SIGNALS,
|
|
|
|
FAILED_SUBPROCESS,
|
|
|
|
FAILED_NOTIFY,
|
|
|
|
FAILED_CONNECTION,
|
|
|
|
FAILED_WAIT,
|
|
|
|
FAILED_NAMESPACES,
|
|
|
|
FAILED_PTRACE,
|
|
|
|
FAILED_IPC,
|
|
|
|
FAILED_LIMITS,
|
|
|
|
FAILED_CWD,
|
|
|
|
FAILED_POLICY,
|
|
|
|
|
|
|
|
// Codes used by status=`INTERNAL_ERROR`:
|
|
|
|
FAILED_STORE,
|
|
|
|
FAILED_FETCH,
|
|
|
|
FAILED_GETEVENT,
|
|
|
|
FAILED_MONITOR,
|
2019-05-15 22:46:26 +08:00
|
|
|
FAILED_KILL,
|
|
|
|
FAILED_CHILD,
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
// TODO(wiktorg) not used currently (syscall number stored insted) - need to
|
|
|
|
// fix clients first
|
|
|
|
// Codes used by status=`VIOLATION`:
|
|
|
|
VIOLATION_SYSCALL,
|
|
|
|
VIOLATION_ARCH,
|
2020-02-20 23:45:22 +08:00
|
|
|
VIOLATION_NETWORK = 0x10000000, // TODO(eternalred): temporary value, needs
|
|
|
|
// to be big until it's fixed
|
2019-03-19 00:21:48 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
Result() = default;
|
|
|
|
Result(const Result& other) { *this = other; }
|
|
|
|
Result& operator=(const Result& other);
|
|
|
|
Result(Result&&) = default;
|
|
|
|
Result& operator=(Result&&) = default;
|
|
|
|
|
|
|
|
void IgnoreResult() const {}
|
|
|
|
|
|
|
|
// Setters/getters for the final status/code value.
|
|
|
|
void SetExitStatusCode(StatusEnum final_status, uintptr_t reason_code) {
|
|
|
|
// Don't overwrite exit status codes.
|
|
|
|
if (final_status_ != UNSET) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
final_status_ = final_status;
|
|
|
|
reason_code_ = reason_code;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Sets the stack trace.
|
|
|
|
// The stacktrace must be sometimes fetched before SetExitStatusCode is
|
|
|
|
// called, because after WIFEXITED() or WIFSIGNALED() the process is just a
|
|
|
|
// zombie.
|
2020-07-20 15:24:12 +08:00
|
|
|
void set_stack_trace(std::vector<std::string> value) {
|
|
|
|
stack_trace_ = std::move(value);
|
2019-03-26 22:54:02 +08:00
|
|
|
}
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
void SetRegs(std::unique_ptr<Regs> regs) { regs_ = std::move(regs); }
|
|
|
|
|
|
|
|
void SetSyscall(std::unique_ptr<Syscall> syscall) {
|
|
|
|
syscall_ = std::move(syscall);
|
|
|
|
}
|
|
|
|
|
2020-02-20 23:45:22 +08:00
|
|
|
void SetNetworkViolation(std::string network_violation) {
|
|
|
|
network_violation_ = std::move(network_violation);
|
|
|
|
}
|
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
StatusEnum final_status() const { return final_status_; }
|
|
|
|
uintptr_t reason_code() const { return reason_code_; }
|
|
|
|
|
2021-02-12 01:33:56 +08:00
|
|
|
// If true, indicates that the non-OK status is transient and a retry might
|
|
|
|
// succeed.
|
|
|
|
bool IsRetryable() const { return false; }
|
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
// Returns the current syscall architecture.
|
|
|
|
// Client architecture when final_status_ == VIOLATION, might be different
|
|
|
|
// from the host architecture (32-bit vs 64-bit syscalls).
|
2021-01-14 01:25:25 +08:00
|
|
|
sapi::cpu::Architecture GetSyscallArch() const {
|
|
|
|
return syscall_ ? syscall_->arch() : sapi::cpu::kUnknown;
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
|
2021-02-12 01:33:56 +08:00
|
|
|
const std::vector<std::string>& stack_trace() const { return stack_trace_; }
|
2020-07-20 15:24:12 +08:00
|
|
|
|
|
|
|
// Returns the stack trace as a space-delimited string.
|
|
|
|
std::string GetStackTrace() const;
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
const Regs* GetRegs() const { return regs_.get(); }
|
|
|
|
|
|
|
|
const Syscall* GetSyscall() const { return syscall_.get(); }
|
|
|
|
|
|
|
|
const std::string& GetProgName() const { return prog_name_; }
|
|
|
|
|
2020-02-20 23:45:22 +08:00
|
|
|
const std::string& GetNetworkViolation() const { return network_violation_; }
|
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
void SetProgName(const std::string& name) { prog_name_ = name; }
|
|
|
|
|
|
|
|
const std::string& GetProcMaps() const { return proc_maps_; }
|
|
|
|
|
|
|
|
void SetProcMaps(const std::string& proc_maps) { proc_maps_ = proc_maps; }
|
|
|
|
|
2020-02-28 01:23:44 +08:00
|
|
|
// Converts this result to a absl::Status object. The status will only be
|
2019-03-19 00:21:48 +08:00
|
|
|
// OK if the sandbox process exited normally with an exit code of 0.
|
2020-02-28 01:23:44 +08:00
|
|
|
absl::Status ToStatus() const;
|
2019-03-19 00:21:48 +08:00
|
|
|
|
2019-03-26 22:54:02 +08:00
|
|
|
// Returns a descriptive string for final result.
|
2019-03-19 00:21:48 +08:00
|
|
|
std::string ToString() const;
|
|
|
|
|
2019-03-26 22:54:02 +08:00
|
|
|
// Converts StatusEnum to a string.
|
2019-03-19 00:21:48 +08:00
|
|
|
static std::string StatusEnumToString(StatusEnum value);
|
|
|
|
|
2019-03-26 22:54:02 +08:00
|
|
|
// Converts ReasonCodeEnum to a string.
|
2019-03-19 00:21:48 +08:00
|
|
|
static std::string ReasonCodeEnumToString(ReasonCodeEnum value);
|
|
|
|
|
|
|
|
rusage* GetRUsageMonitor() { return &rusage_monitor_; }
|
|
|
|
|
|
|
|
private:
|
|
|
|
// Final execution status - see 'StatusEnum' for details.
|
|
|
|
StatusEnum final_status_ = UNSET;
|
|
|
|
// Termination cause:
|
|
|
|
// a). process exit value if final_status_ == OK,
|
|
|
|
// b). terminating signal if final_status_ == SIGNALED,
|
|
|
|
// c). violating syscall if final_status_ == VIOLATION,
|
|
|
|
// unspecified for the rest of status_ values.
|
|
|
|
uintptr_t reason_code_ = 0;
|
|
|
|
// Might contain stack-trace of the process, especially if it failed with
|
|
|
|
// syscall violation, or was terminated by a signal.
|
2020-07-20 15:24:12 +08:00
|
|
|
std::vector<std::string> stack_trace_;
|
2019-03-19 00:21:48 +08:00
|
|
|
// Might contain the register values of the process, similar to the stack.
|
|
|
|
// trace
|
|
|
|
std::unique_ptr<Regs> regs_;
|
|
|
|
// Might contain violating syscall information
|
|
|
|
std::unique_ptr<Syscall> syscall_;
|
|
|
|
// Name of the process (as it can not be accessed anymore after termination).
|
|
|
|
std::string prog_name_;
|
|
|
|
// /proc/pid/maps of the main process.
|
|
|
|
std::string proc_maps_;
|
2020-02-20 23:45:22 +08:00
|
|
|
// IP and port if network violation occurred
|
|
|
|
std::string network_violation_;
|
2019-03-19 00:21:48 +08:00
|
|
|
// Final resource usage as defined in <sys/resource.h> (man getrusage), for
|
|
|
|
// the Monitor thread.
|
|
|
|
rusage rusage_monitor_;
|
|
|
|
};
|
|
|
|
|
|
|
|
} // namespace sandbox2
|
|
|
|
|
|
|
|
#endif // SANDBOXED_API_SANDBOX2_RESULT_H_
|