2020-01-17 21:05:03 +08:00
|
|
|
// Copyright 2019 Google LLC
|
2019-07-09 16:31:48 +08:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
2022-01-28 17:38:27 +08:00
|
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
2019-07-09 16:31:48 +08:00
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
// The sandbox2::StackTrace class provides static methods useful when analyzing
|
|
|
|
// call-stack of the process. It uses libunwind-ptrace, so the process must be
|
|
|
|
// in a stopped state to call those methods.
|
|
|
|
|
|
|
|
#ifndef SANDBOXED_API_SANDBOX2_STACK_TRACE_H_
|
|
|
|
#define SANDBOXED_API_SANDBOX2_STACK_TRACE_H_
|
|
|
|
|
2023-08-24 21:23:03 +08:00
|
|
|
#include <cstddef>
|
2023-02-16 21:06:50 +08:00
|
|
|
#include <memory>
|
2019-07-09 16:31:48 +08:00
|
|
|
#include <string>
|
2023-08-24 21:23:03 +08:00
|
|
|
#include <utility>
|
2020-07-20 15:24:12 +08:00
|
|
|
#include <vector>
|
2019-07-09 16:31:48 +08:00
|
|
|
|
2023-08-24 21:23:03 +08:00
|
|
|
#include "absl/log/check.h"
|
2021-06-28 17:02:35 +08:00
|
|
|
#include "absl/status/statusor.h"
|
2023-02-16 21:06:50 +08:00
|
|
|
#include "sandboxed_api/sandbox2/comms.h"
|
|
|
|
#include "sandboxed_api/sandbox2/executor.h"
|
2023-01-19 18:47:17 +08:00
|
|
|
#include "sandboxed_api/sandbox2/namespace.h"
|
2023-02-16 21:06:50 +08:00
|
|
|
#include "sandboxed_api/sandbox2/policy.h"
|
2019-07-09 16:31:48 +08:00
|
|
|
#include "sandboxed_api/sandbox2/regs.h"
|
2023-02-16 21:06:50 +08:00
|
|
|
#include "sandboxed_api/sandbox2/result.h"
|
2019-07-09 16:31:48 +08:00
|
|
|
|
|
|
|
namespace sandbox2 {
|
|
|
|
|
2023-02-16 21:06:50 +08:00
|
|
|
class Sandbox2;
|
|
|
|
|
|
|
|
namespace internal {
|
|
|
|
|
|
|
|
class SandboxPeer {
|
|
|
|
public:
|
|
|
|
static std::unique_ptr<SandboxPeer> Spawn(std::unique_ptr<Executor> executor,
|
|
|
|
std::unique_ptr<Policy> policy) {
|
|
|
|
CHECK_NE(spawn_fn_, nullptr);
|
|
|
|
return spawn_fn_(std::move(executor), std::move(policy));
|
|
|
|
}
|
|
|
|
|
|
|
|
virtual ~SandboxPeer() = default;
|
|
|
|
|
|
|
|
virtual Comms* comms() = 0;
|
|
|
|
virtual void Kill() = 0;
|
|
|
|
virtual Result AwaitResult() = 0;
|
|
|
|
|
|
|
|
private:
|
|
|
|
friend class ::sandbox2::Sandbox2;
|
|
|
|
using SpawnFn = std::unique_ptr<SandboxPeer> (*)(std::unique_ptr<Executor>,
|
|
|
|
std::unique_ptr<Policy>);
|
|
|
|
static SpawnFn spawn_fn_;
|
|
|
|
};
|
|
|
|
|
|
|
|
} // namespace internal
|
|
|
|
|
2019-07-09 16:31:48 +08:00
|
|
|
// Maximum depth of analyzed call stack.
|
|
|
|
constexpr size_t kDefaultMaxFrames = 200;
|
|
|
|
|
2020-07-20 15:24:12 +08:00
|
|
|
// Returns the stack-trace of the PID=pid, one line per frame.
|
2023-01-19 18:47:17 +08:00
|
|
|
absl::StatusOr<std::vector<std::string>> GetStackTrace(
|
|
|
|
const Regs* regs, const Namespace* ns, bool uses_custom_forkserver);
|
2020-07-20 15:24:12 +08:00
|
|
|
|
|
|
|
// Returns a stack trace that collapses duplicate stack frames and annotates
|
|
|
|
// them with a repetition count.
|
|
|
|
// Example:
|
|
|
|
// _start _start
|
|
|
|
// main main
|
|
|
|
// recursive_call recursive_call
|
|
|
|
// recursive_call (previous frame repeated 2 times)
|
|
|
|
// recursive_call tail_call
|
|
|
|
// tail_call
|
|
|
|
std::vector<std::string> CompactStackTrace(
|
|
|
|
const std::vector<std::string>& stack_trace);
|
2019-07-09 16:31:48 +08:00
|
|
|
|
|
|
|
} // namespace sandbox2
|
|
|
|
|
|
|
|
#endif // SANDBOXED_API_SANDBOX2_STACK_TRACE_H_
|