mirror of
https://github.com/google/sandboxed-api.git
synced 2024-03-22 13:11:30 +08:00
Move forkserver into a dedicated binary
PiperOrigin-RevId: 242637894 Change-Id: I16f19d077e2b5b9d0d4ef58344d5caaef95af7c6
This commit is contained in:
parent
e44231e28a
commit
1b50485be6
|
@ -24,22 +24,43 @@ sapi_proto_library(
|
|||
visibility = ["//visibility:public"],
|
||||
)
|
||||
|
||||
cc_library(
|
||||
name = "embed_file",
|
||||
srcs = [
|
||||
"embed_file.cc",
|
||||
"file_toc.h",
|
||||
],
|
||||
hdrs = ["embed_file.h"],
|
||||
visibility = ["//visibility:public"],
|
||||
deps = [
|
||||
"//sandboxed_api/sandbox2:util",
|
||||
"//sandboxed_api/sandbox2/util:fileops",
|
||||
"//sandboxed_api/sandbox2/util:strerror",
|
||||
"//sandboxed_api/util:status",
|
||||
"@com_google_absl//absl/container:flat_hash_map",
|
||||
"@com_google_absl//absl/strings",
|
||||
"@com_google_absl//absl/synchronization",
|
||||
"@com_google_glog//:glog",
|
||||
],
|
||||
)
|
||||
|
||||
# The main Sandboxed-API library
|
||||
cc_library(
|
||||
name = "sapi",
|
||||
srcs = [
|
||||
"embed_file.cc",
|
||||
"file_toc.h",
|
||||
"sandbox.cc",
|
||||
"transaction.cc",
|
||||
],
|
||||
hdrs = [
|
||||
# TODO(hamacher): Remove reexport workaround as soon as the buildsystem
|
||||
# supports this usecase.
|
||||
"embed_file.h",
|
||||
"sandbox.h",
|
||||
"transaction.h",
|
||||
],
|
||||
visibility = ["//visibility:public"],
|
||||
deps = [
|
||||
":embed_file",
|
||||
":vars",
|
||||
"//sandboxed_api/sandbox2",
|
||||
"//sandboxed_api/sandbox2:client",
|
||||
|
|
|
@ -21,6 +21,7 @@ package(default_visibility = [
|
|||
licenses(["notice"]) # Apache 2.0
|
||||
|
||||
load("//sandboxed_api/bazel:proto.bzl", "sapi_proto_library")
|
||||
load("//sandboxed_api/bazel:embed_data.bzl", "sapi_cc_embed_data")
|
||||
|
||||
cc_library(
|
||||
name = "bpfdisassembler",
|
||||
|
@ -199,6 +200,25 @@ cc_library(
|
|||
],
|
||||
)
|
||||
|
||||
cc_binary(
|
||||
name = "forkserver_bin",
|
||||
srcs = ["forkserver_bin.cc"],
|
||||
deps = [
|
||||
":client",
|
||||
":comms",
|
||||
":forkserver",
|
||||
"//sandboxed_api/sandbox2/util:strerror",
|
||||
"//sandboxed_api/util:raw_logging",
|
||||
"@com_google_absl//absl/base:core_headers",
|
||||
"@com_google_absl//absl/strings",
|
||||
],
|
||||
)
|
||||
|
||||
sapi_cc_embed_data(
|
||||
name = "forkserver_bin_embed",
|
||||
srcs = [":forkserver_bin.stripped"],
|
||||
)
|
||||
|
||||
cc_library(
|
||||
name = "global_forkserver",
|
||||
srcs = ["global_forkclient.cc"],
|
||||
|
@ -207,6 +227,8 @@ cc_library(
|
|||
":client",
|
||||
":comms",
|
||||
":forkserver",
|
||||
":forkserver_bin_embed",
|
||||
"//sandboxed_api:embed_file",
|
||||
"//sandboxed_api/sandbox2/util:strerror",
|
||||
"//sandboxed_api/util:raw_logging",
|
||||
"@com_google_absl//absl/base:core_headers",
|
||||
|
|
|
@ -182,6 +182,11 @@ static void RunInitProcess(int signaling_fd, std::set<int> open_fds) {
|
|||
if (prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0) != 0) {
|
||||
SAPI_RAW_PLOG(ERROR, "prctl(PR_SET_PDEATHSIG, SIGKILL) failed");
|
||||
}
|
||||
|
||||
if (prctl(PR_SET_NAME, "S2-INIT-PROC", 0, 0, 0) != 0) {
|
||||
SAPI_RAW_PLOG(WARNING, "prctl(PR_SET_NAME, 'S2-INIT-PROC')");
|
||||
}
|
||||
|
||||
for (const auto& fd : open_fds) {
|
||||
close(fd);
|
||||
}
|
||||
|
|
69
sandboxed_api/sandbox2/forkserver_bin.cc
Normal file
69
sandboxed_api/sandbox2/forkserver_bin.cc
Normal file
|
@ -0,0 +1,69 @@
|
|||
// Copyright 2019 Google LLC. All Rights Reserved.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#include <sys/prctl.h>
|
||||
#include <sys/socket.h>
|
||||
#include <unistd.h>
|
||||
|
||||
#include <csignal>
|
||||
#include <cstdlib>
|
||||
|
||||
#include "absl/base/attributes.h"
|
||||
#include "absl/strings/str_cat.h"
|
||||
#include "sandboxed_api/sandbox2/comms.h"
|
||||
#include "sandboxed_api/sandbox2/forkserver.h"
|
||||
#include "sandboxed_api/sandbox2/sanitizer.h"
|
||||
#include "sandboxed_api/sandbox2/util/strerror.h"
|
||||
#include "sandboxed_api/util/raw_logging.h"
|
||||
|
||||
int main() {
|
||||
// Make sure the logs go stderr.
|
||||
google::LogToStderr();
|
||||
|
||||
// Close all non-essential FDs to keep newly opened FD numbers consistent.
|
||||
sandbox2::sanitizer::CloseAllFDsExcept(
|
||||
{0, 1, 2, sandbox2::Comms::kSandbox2ClientCommsFD});
|
||||
|
||||
// Make the process' name easily recognizable with ps/pstree.
|
||||
if (prctl(PR_SET_NAME, "S2-FORK-SERV", 0, 0, 0) != 0) {
|
||||
SAPI_RAW_PLOG(WARNING, "prctl(PR_SET_NAME, 'S2-FORK-SERV')");
|
||||
}
|
||||
|
||||
// Don't react (with stack-tracing) to SIGTERM's sent from other processes
|
||||
// (e.g. from the borglet or SubProcess). This ForkServer should go down if
|
||||
// the parent goes down (or if the GlobalForkServerComms is closed), which is
|
||||
// assured by prctl(PR_SET_PDEATHSIG, SIGKILL) being called in the
|
||||
// ForkServer::Initialize(). We don't want to change behavior of non-global
|
||||
// ForkServers, hence it's called here and not in the
|
||||
// ForkServer::Initialize().
|
||||
struct sigaction sa;
|
||||
sa.sa_handler = SIG_IGN;
|
||||
sa.sa_flags = 0;
|
||||
sigemptyset(&sa.sa_mask);
|
||||
if (sigaction(SIGTERM, &sa, nullptr) == -1) {
|
||||
SAPI_RAW_PLOG(WARNING, "sigaction(SIGTERM, sa_handler=SIG_IGN)");
|
||||
}
|
||||
|
||||
sandbox2::Comms comms(sandbox2::Comms::kSandbox2ClientCommsFD);
|
||||
sandbox2::ForkServer fork_server(&comms);
|
||||
|
||||
while (true) {
|
||||
pid_t child_pid = fork_server.ServeRequest();
|
||||
if (!child_pid) {
|
||||
// FORKSERVER_FORK sent to the global forkserver. This case does not make
|
||||
// sense, we thus kill the process here.
|
||||
exit(0);
|
||||
}
|
||||
}
|
||||
}
|
|
@ -16,8 +16,10 @@
|
|||
|
||||
#include "sandboxed_api/sandbox2/global_forkclient.h"
|
||||
|
||||
#include <fcntl.h>
|
||||
#include <sys/prctl.h>
|
||||
#include <sys/socket.h>
|
||||
#include <syscall.h>
|
||||
#include <unistd.h>
|
||||
|
||||
#include <csignal>
|
||||
|
@ -25,8 +27,10 @@
|
|||
|
||||
#include "absl/base/attributes.h"
|
||||
#include "absl/strings/str_cat.h"
|
||||
#include "sandboxed_api/embed_file.h"
|
||||
#include "sandboxed_api/sandbox2/comms.h"
|
||||
#include "sandboxed_api/sandbox2/forkserver.h"
|
||||
#include "sandboxed_api/sandbox2/forkserver_bin_embed.h"
|
||||
#include "sandboxed_api/sandbox2/sanitizer.h"
|
||||
#include "sandboxed_api/sandbox2/util/strerror.h"
|
||||
#include "sandboxed_api/util/raw_logging.h"
|
||||
|
@ -84,43 +88,20 @@ static void StartGlobalForkServer() {
|
|||
return;
|
||||
}
|
||||
|
||||
// Make sure the logs go stderr.
|
||||
google::LogToStderr();
|
||||
// Move the comms FD to the proper, expected FD number.
|
||||
// The new FD will not be CLOEXEC, which is what we want.
|
||||
dup2(sv[0], Comms::kSandbox2ClientCommsFD);
|
||||
|
||||
// Close all non-essential FDs to keep newly opened FD numbers consistent.
|
||||
sandbox2::sanitizer::CloseAllFDsExcept({0, 1, 2, sv[0]});
|
||||
|
||||
// Make the process' name easily recognizable with ps/pstree.
|
||||
if (prctl(PR_SET_NAME, "S2-FORK-SERV", 0, 0, 0) != 0) {
|
||||
SAPI_RAW_PLOG(WARNING, "prctl(PR_SET_NAME, 'S2-FORK-SERV')");
|
||||
int exec_fd = sapi::EmbedFile::GetEmbedFileSingleton()->GetFdForFileToc(
|
||||
forkserver_bin_embed_create());
|
||||
if (exec_fd < 0) {
|
||||
SAPI_RAW_LOG(FATAL, "Getting FD for init binary failed");
|
||||
}
|
||||
|
||||
// Don't react (with stack-tracing) to SIGTERM's sent from other processes
|
||||
// (e.g. from the borglet or SubProcess). This ForkServer should go down if
|
||||
// the parent goes down (or if the GlobalForkServerComms is closed), which is
|
||||
// assured by prctl(PR_SET_PDEATHSIG, SIGKILL) being called in the
|
||||
// ForkServer::Initialize(). We don't want to change behavior of non-global
|
||||
// ForkServers, hence it's called here and not in the
|
||||
// ForkServer::Initialize().
|
||||
struct sigaction sa;
|
||||
sa.sa_handler = SIG_IGN;
|
||||
sa.sa_flags = 0;
|
||||
sigemptyset(&sa.sa_mask);
|
||||
if (sigaction(SIGTERM, &sa, nullptr) == -1) {
|
||||
SAPI_RAW_PLOG(WARNING, "sigaction(SIGTERM, sa_handler=SIG_IGN)");
|
||||
}
|
||||
|
||||
Comms comms(sv[0]);
|
||||
ForkServer fork_server(&comms);
|
||||
|
||||
while (true) {
|
||||
pid_t child_pid = fork_server.ServeRequest();
|
||||
if (!child_pid) {
|
||||
// FORKSERVER_FORK sent to the global forkserver. This case does not make
|
||||
// sense, we thus kill the process here.
|
||||
exit(0);
|
||||
}
|
||||
}
|
||||
char* const args[] = {strdup("S2-FORK-SERV"), nullptr};
|
||||
char* const envp[] = {nullptr};
|
||||
syscall(__NR_execveat, exec_fd, "", args, envp, AT_EMPTY_PATH);
|
||||
SAPI_RAW_PCHECK(false, "Could not launch forkserver binary");
|
||||
}
|
||||
|
||||
} // namespace sandbox2
|
||||
|
|
Loading…
Reference in New Issue
Block a user