#include "sandboxed_api/sandbox2/monitor_unotify.h" #include #include #include #include #include #include #include #include #include #include #include "absl/cleanup/cleanup.h" #include "absl/log/log.h" #include "absl/status/status.h" #include "absl/time/time.h" #include "sandboxed_api/sandbox2/client.h" #include "sandboxed_api/sandbox2/forkserver.pb.h" #include "sandboxed_api/sandbox2/monitor_base.h" #include "sandboxed_api/util/fileops.h" #include "sandboxed_api/util/raw_logging.h" #ifndef SECCOMP_GET_NOTIF_SIZES #define SECCOMP_GET_NOTIF_SIZES 3 struct seccomp_notif_sizes { __u16 seccomp_notif; __u16 seccomp_notif_resp; __u16 seccomp_data; }; #endif #ifndef SECCOMP_IOCTL_NOTIF_RECV #ifndef SECCOMP_IOWR #define SECCOMP_IOC_MAGIC '!' #define SECCOMP_IO(nr) _IO(SECCOMP_IOC_MAGIC, nr) #define SECCOMP_IOWR(nr, type) _IOWR(SECCOMP_IOC_MAGIC, nr, type) #endif /* Flags for seccomp notification fd ioctl. */ #define SECCOMP_IOCTL_NOTIF_RECV SECCOMP_IOWR(0, struct seccomp_notif) #endif namespace sandbox2 { namespace { int seccomp(unsigned int operation, unsigned int flags, void* args) { return syscall(SYS_seccomp, operation, flags, args); } sapi::cpu::Architecture AuditArchToCPUArch(uint32_t arch) { switch (arch) { case AUDIT_ARCH_AARCH64: return sapi::cpu::Architecture::kArm64; case AUDIT_ARCH_ARM: return sapi::cpu::Architecture::kArm; case AUDIT_ARCH_X86_64: return sapi::cpu::Architecture::kX8664; case AUDIT_ARCH_I386: return sapi::cpu::Architecture::kX86; case AUDIT_ARCH_PPC64LE: return sapi::cpu::Architecture::kPPC64LE; default: return sapi::cpu::Architecture::kUnknown; } } using ::sapi::file_util::fileops::FDCloser; } // namespace UnotifyMonitor::UnotifyMonitor(Executor* executor, Policy* policy, Notify* notify) : MonitorBase(executor, policy, notify) { type_ = FORKSERVER_MONITOR_UNOTIFY; if (executor_->limits()->wall_time_limit() != absl::ZeroDuration()) { auto deadline = absl::Now() + executor_->limits()->wall_time_limit(); deadline_millis_.store(absl::ToUnixMillis(deadline), std::memory_order_relaxed); } external_kill_request_flag_.test_and_set(std::memory_order_relaxed); dump_stack_request_flag_.test_and_set(std::memory_order_relaxed); } void UnotifyMonitor::RunInternal() { thread_ = std::make_unique(&UnotifyMonitor::Run, this); // Wait for the Monitor to set-up the sandboxee correctly (or fail while // doing that). From here on, it is safe to use the IPC object for // non-sandbox-related data exchange. setup_notification_.WaitForNotification(); } void UnotifyMonitor::HandleUnotify() { memset(req_.get(), 0, req_size_); if (ioctl(seccomp_notify_fd_.get(), SECCOMP_IOCTL_NOTIF_RECV, req_.get()) != 0) { if (errno == ENOENT) { VLOG(1) << "Unotify recv failed with ENOENT"; } else { SetExitStatusCode(Result::INTERNAL_ERROR, Result::FAILED_NOTIFY); } return; } Syscall syscall(AuditArchToCPUArch(req_->data.arch), req_->data.nr, {req_->data.args[0], req_->data.args[1], req_->data.args[2], req_->data.args[3], req_->data.args[4], req_->data.args[5]}, req_->pid, 0, req_->data.instruction_pointer); ViolationType violation_type = syscall.arch() == Syscall::GetHostArch() ? kSyscallViolation : kArchitectureSwitchViolation; LogSyscallViolation(syscall); notify_->EventSyscallViolation(syscall, violation_type); MaybeGetStackTrace(req_->pid, Result::VIOLATION); SetExitStatusCode(Result::VIOLATION, syscall.nr()); notify_->EventSyscallViolation(syscall, violation_type); result_.SetSyscall(std::make_unique(syscall)); KillSandboxee(); } void UnotifyMonitor::Run() { absl::Cleanup monitor_done = [this] { getrusage(RUSAGE_THREAD, result_.GetRUsageMonitor()); OnDone(); }; absl::Cleanup setup_notify = [this] { setup_notification_.Notify(); }; if (!InitSetupUnotify()) { SetExitStatusCode(Result::SETUP_ERROR, Result::FAILED_NOTIFY); return; } if (!InitSetupNotifyPipe()) { SetExitStatusCode(Result::SETUP_ERROR, Result::FAILED_NOTIFY); return; } std::move(setup_notify).Invoke(); pollfd pfds[] = { {.fd = process_.status_fd.get(), .events = POLLIN}, {.fd = seccomp_notify_fd_.get(), .events = POLLIN}, {.fd = monitor_notify_pipe_[0].get(), .events = POLLIN}, }; bool wait_for_sandboxee = true; while (result_.final_status() == Result::UNSET) { int64_t deadline = deadline_millis_.load(std::memory_order_relaxed); absl::Duration remaining = absl::FromUnixMillis(deadline) - absl::Now(); if (deadline != 0 && remaining < absl::ZeroDuration()) { VLOG(1) << "Sandbox process hit timeout due to the walltime timer"; timed_out_ = true; MaybeGetStackTrace(process_.main_pid, Result::TIMEOUT); KillSandboxee(); break; } if (!external_kill_request_flag_.test_and_set(std::memory_order_relaxed)) { external_kill_ = true; MaybeGetStackTrace(process_.main_pid, Result::EXTERNAL_KILL); KillSandboxee(); break; } if (network_proxy_server_ && network_proxy_server_->violation_occurred_.load( std::memory_order_acquire) && !network_violation_) { network_violation_ = true; MaybeGetStackTrace(process_.main_pid, Result::VIOLATION); KillSandboxee(); break; } constexpr int64_t kMinWakeupMsec = 30000; int timeout_msec = kMinWakeupMsec; if (remaining > absl::ZeroDuration()) { timeout_msec = static_cast( std::min(kMinWakeupMsec, absl::ToInt64Milliseconds(remaining))); } int ret = poll(pfds, ABSL_ARRAYSIZE(pfds), timeout_msec); if (ret == 0 || (ret == -1 && errno == EINTR)) { continue; } PCHECK(ret != -1); if (pfds[2].revents & POLLIN) { char c = ' '; read(monitor_notify_pipe_[0].get(), &c, 1); continue; } if (pfds[0].revents & POLLIN) { SetExitStatusFromStatusPipe(); wait_for_sandboxee = false; break; } if (pfds[0].revents & POLLHUP) { SetExitStatusCode(Result::INTERNAL_ERROR, Result::FAILED_MONITOR); wait_for_sandboxee = false; break; } if (pfds[1].revents & POLLIN) { HandleUnotify(); wait_for_sandboxee = false; } } if (wait_for_sandboxee) { absl::Time deadline = absl::Now() + absl::Seconds(1); int ret = 0; do { absl::Duration remaining = deadline - absl::Now(); if (remaining <= absl::ZeroDuration()) { ret = 0; break; } ret = poll(pfds, 1, static_cast(absl::ToInt64Milliseconds(remaining))); } while (ret == -1 && errno == EINTR); PCHECK(ret != -1); if (ret == 0) { LOG(WARNING) << "Waiting for sandboxee exit timed out"; } else if (pfds[0].revents & POLLIN) { SetExitStatusFromStatusPipe(); } else if (pfds[0].revents & POLLHUP) { SetExitStatusCode(Result::INTERNAL_ERROR, Result::FAILED_MONITOR); } } KillInit(); } void UnotifyMonitor::SetExitStatusFromStatusPipe() { int code, status; SAPI_RAW_PCHECK( read(process_.status_fd.get(), &code, sizeof(code)) == sizeof(int), "read"); SAPI_RAW_PCHECK( read(process_.status_fd.get(), &status, sizeof(status)) == sizeof(int), "read"); if (code == CLD_EXITED) { SetExitStatusCode(Result::OK, status); } else if (code == CLD_KILLED || code == CLD_DUMPED) { if (network_violation_) { SetExitStatusCode(Result::VIOLATION, Result::VIOLATION_NETWORK); result_.SetNetworkViolation(network_proxy_server_->violation_msg_); } else if (external_kill_) { SetExitStatusCode(Result::EXTERNAL_KILL, 0); } else if (timed_out_) { SetExitStatusCode(Result::TIMEOUT, 0); } else { SetExitStatusCode(Result::SIGNALED, status); } } else { SetExitStatusCode(Result::SETUP_ERROR, Result::FAILED_MONITOR); } } bool UnotifyMonitor::InitSetupUnotify() { if (!comms_->SendUint32(Client::kSandbox2ClientUnotify)) { LOG(ERROR) << "Couldn't send Client::kSandbox2ClientUnotify message"; return false; } int fd; if (!comms_->RecvFD(&fd)) { LOG(ERROR) << "Couldn't recv unotify fd"; return false; } seccomp_notify_fd_ = FDCloser(fd); struct seccomp_notif_sizes sizes = {}; if (seccomp(SECCOMP_GET_NOTIF_SIZES, 0, &sizes) == -1) { LOG(ERROR) << "Couldn't get seccomp_notif_sizes"; return false; } req_size_ = sizes.seccomp_notif; req_.reset(static_cast(malloc(req_size_))); return true; } bool UnotifyMonitor::InitSetupNotifyPipe() { int pfds[2]; if (pipe(pfds) != 0) { PLOG(ERROR) << "failed creating monitor pipe"; return false; } monitor_notify_pipe_[0] = FDCloser(pfds[0]); monitor_notify_pipe_[1] = FDCloser(pfds[1]); return true; } void UnotifyMonitor::NotifyMonitor() { absl::ReaderMutexLock lock(¬ify_mutex_); if (!monitor_notify_pipe_[1].get()) { return; } char c = ' '; write(monitor_notify_pipe_[1].get(), &c, 1); } bool UnotifyMonitor::KillSandboxee() { VLOG(1) << "Sending SIGKILL to the PID: " << process_.main_pid; if (kill(process_.main_pid, SIGKILL) != 0) { PLOG(ERROR) << "Could not send SIGKILL to PID " << process_.main_pid; return false; } return true; } void UnotifyMonitor::KillInit() { VLOG(1) << "Sending SIGKILL to the PID: " << process_.init_pid; if (kill(process_.init_pid, SIGKILL) != 0) { PLOG(ERROR) << "Could not send SIGKILL to PID " << process_.init_pid; } } void UnotifyMonitor::Join() { absl::MutexLock lock(¬ify_mutex_); if (thread_) { thread_->join(); CHECK(IsDone()) << "Monitor did not terminate"; VLOG(1) << "Final execution status: " << result_.ToString(); CHECK(result_.final_status() != Result::UNSET); thread_.reset(); monitor_notify_pipe_[0].Close(); monitor_notify_pipe_[1].Close(); } } void UnotifyMonitor::MaybeGetStackTrace(pid_t pid, Result::StatusEnum status) { if (ShouldCollectStackTrace(status)) { auto stack = GetStackTrace(pid); if (stack.ok()) { result_.set_stack_trace(*stack); } else { LOG(ERROR) << "Getting stack trace: " << stack.status(); } } } absl::StatusOr> UnotifyMonitor::GetStackTrace( pid_t pid) { if (ptrace(PTRACE_ATTACH, pid, 0, 0) != 0) { return absl::ErrnoToStatus(errno, absl::StrCat("could not attach to pid = ", pid)); } int wstatus = 0; while (!WIFSTOPPED(wstatus)) { pid_t ret = waitpid(pid, &wstatus, __WNOTHREAD | __WALL | WUNTRACED | WNOHANG); if (ret == -1) { return absl::ErrnoToStatus(errno, absl::StrCat("waiting for stop, pid = ", pid)); } } absl::Cleanup cleanup = [pid] { if (ptrace(PTRACE_DETACH, pid, 0, 0) != 0) { LOG(ERROR) << "Could not detach after obtaining stack trace from pid = " << pid; } }; Regs regs(pid); absl::Status status = regs.Fetch(); if (!status.ok()) { if (absl::IsNotFound(status)) { LOG(WARNING) << "failed to fetch regs: " << status; return status; } SetExitStatusCode(Result::INTERNAL_ERROR, Result::FAILED_FETCH); return status; } return GetAndLogStackTrace(®s); } } // namespace sandbox2