// Copyright 2019 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #include "sandboxed_api/sandbox2/sandbox2.h" #include #include #include #include #include #include #include "gmock/gmock.h" #include "gtest/gtest.h" #include "absl/memory/memory.h" #include "absl/strings/str_cat.h" #include "sandboxed_api/config.h" #include "sandboxed_api/sandbox2/executor.h" #include "sandboxed_api/sandbox2/policy.h" #include "sandboxed_api/sandbox2/policybuilder.h" #include "sandboxed_api/sandbox2/result.h" #include "sandboxed_api/sandbox2/util/bpf_helper.h" #include "sandboxed_api/testing.h" #include "sandboxed_api/util/status_matchers.h" namespace sandbox2 { namespace { using ::sapi::GetTestSourcePath; using ::testing::Eq; using ::testing::HasSubstr; using ::testing::IsEmpty; using ::testing::IsTrue; using ::testing::Lt; // Test that aborting inside a sandbox with all userspace core dumping // disabled reports the signal. TEST(SandboxCoreDumpTest, AbortWithoutCoreDumpReturnsSignaled) { SKIP_SANITIZERS_AND_COVERAGE; const std::string path = GetTestSourcePath("sandbox2/testcases/abort"); std::vector args = { path, }; auto executor = absl::make_unique(path, args); SAPI_ASSERT_OK_AND_ASSIGN(auto policy, PolicyBuilder() .DisableNamespaces() // Don't restrict the syscalls at all. .DangerDefaultAllowAll() .TryBuild()); Sandbox2 sandbox(std::move(executor), std::move(policy)); auto result = sandbox.Run(); ASSERT_THAT(result.final_status(), Eq(Result::SIGNALED)); EXPECT_THAT(result.reason_code(), Eq(SIGABRT)); } // Test that with TSYNC we are able to sandbox when multithreaded and with no // memory checks. If TSYNC is not supported, then no. TEST(TsyncTest, TsyncNoMemoryChecks) { SKIP_SANITIZERS_AND_COVERAGE; const std::string path = GetTestSourcePath("sandbox2/testcases/tsync"); std::vector args = {path}; auto executor = absl::make_unique(path, args); executor->set_enable_sandbox_before_exec(false); SAPI_ASSERT_OK_AND_ASSIGN(auto policy, PolicyBuilder() .DisableNamespaces() // Don't restrict the syscalls at all. .DangerDefaultAllowAll() .TryBuild()); Sandbox2 sandbox(std::move(executor), std::move(policy)); auto result = sandbox.Run(); // With TSYNC, SandboxMeHere should be able to sandbox when multithreaded. ASSERT_EQ(result.final_status(), Result::OK); ASSERT_EQ(result.reason_code(), 0); } // Tests whether Executor(fd, args, envp) constructor works as // expected. TEST(ExecutorTest, ExecutorFdConstructor) { SKIP_SANITIZERS_AND_COVERAGE; const std::string path = GetTestSourcePath("sandbox2/testcases/minimal"); int fd = open(path.c_str(), O_RDONLY); ASSERT_NE(fd, -1); std::vector args = {absl::StrCat("FD:", fd)}; std::vector envs; auto executor = absl::make_unique(fd, args, envs); SAPI_ASSERT_OK_AND_ASSIGN(auto policy, PolicyBuilder() .DisableNamespaces() // Don't restrict the syscalls at all. .DangerDefaultAllowAll() .TryBuild()); Sandbox2 sandbox(std::move(executor), std::move(policy)); auto result = sandbox.Run(); ASSERT_EQ(result.final_status(), Result::OK); } // Tests that we return the correct state when the sandboxee was killed by an // external signal. Also make sure that we do not have the stack trace. TEST(RunAsyncTest, SandboxeeExternalKill) { const std::string path = GetTestSourcePath("sandbox2/testcases/sleep"); std::vector args = {path}; std::vector envs; auto executor = absl::make_unique(path, args, envs); SAPI_ASSERT_OK_AND_ASSIGN(auto policy, PolicyBuilder() // Don't restrict the syscalls at all. .DangerDefaultAllowAll() .TryBuild()); Sandbox2 sandbox(std::move(executor), std::move(policy)); ASSERT_TRUE(sandbox.RunAsync()); sleep(1); sandbox.Kill(); auto result = sandbox.AwaitResult(); EXPECT_EQ(result.final_status(), Result::EXTERNAL_KILL); EXPECT_THAT(result.GetStackTrace(), IsEmpty()); } // Tests that we return the correct state when the sandboxee timed out. TEST(RunAsyncTest, SandboxeeTimeoutWithStacktraces) { const std::string path = GetTestSourcePath("sandbox2/testcases/sleep"); std::vector args = {path}; std::vector envs; auto executor = absl::make_unique(path, args, envs); SAPI_ASSERT_OK_AND_ASSIGN(auto policy, PolicyBuilder() // Don't restrict the syscalls at all. .DangerDefaultAllowAll() .TryBuild()); Sandbox2 sandbox(std::move(executor), std::move(policy)); ASSERT_TRUE(sandbox.RunAsync()); sandbox.set_walltime_limit(absl::Seconds(1)); auto result = sandbox.AwaitResult(); EXPECT_EQ(result.final_status(), Result::TIMEOUT); EXPECT_THAT(result.GetStackTrace(), HasSubstr("sleep")); } // Tests that we do not collect stack traces if it was disabled (signaled). TEST(RunAsyncTest, SandboxeeTimeoutDisabledStacktraces) { const std::string path = GetTestSourcePath("sandbox2/testcases/sleep"); std::vector args = {path}; std::vector envs; auto executor = absl::make_unique(path, args, envs); SAPI_ASSERT_OK_AND_ASSIGN(auto policy, PolicyBuilder() // Don't restrict the syscalls at all. .DangerDefaultAllowAll() .CollectStacktracesOnTimeout(false) .TryBuild()); Sandbox2 sandbox(std::move(executor), std::move(policy)); ASSERT_TRUE(sandbox.RunAsync()); sandbox.set_walltime_limit(absl::Seconds(1)); auto result = sandbox.AwaitResult(); EXPECT_EQ(result.final_status(), Result::TIMEOUT); EXPECT_THAT(result.GetStackTrace(), IsEmpty()); } // Tests that we do not collect stack traces if it was disabled (violation). TEST(RunAsyncTest, SandboxeeViolationDisabledStacktraces) { const std::string path = GetTestSourcePath("sandbox2/testcases/sleep"); std::vector args = {path}; std::vector envs; auto executor = absl::make_unique(path, args, envs); SAPI_ASSERT_OK_AND_ASSIGN(auto policy, PolicyBuilder() // Don't allow anything - Make sure that we'll crash. .CollectStacktracesOnViolation(false) .TryBuild()); Sandbox2 sandbox(std::move(executor), std::move(policy)); ASSERT_TRUE(sandbox.RunAsync()); auto result = sandbox.AwaitResult(); EXPECT_EQ(result.final_status(), Result::VIOLATION); EXPECT_THAT(result.GetStackTrace(), IsEmpty()); } TEST(StarvationTest, MonitorIsNotStarvedByTheSandboxee) { const std::string path = GetTestSourcePath("sandbox2/testcases/starve"); std::vector args = {path}; std::vector envs; auto executor = absl::make_unique(path, args, envs); SAPI_ASSERT_OK_AND_ASSIGN( auto policy, PolicyBuilder().DisableNamespaces().DangerDefaultAllowAll().TryBuild()); executor->limits()->set_walltime_limit(absl::Seconds(5)); Sandbox2 sandbox(std::move(executor), std::move(policy)); auto start = absl::Now(); ASSERT_THAT(sandbox.RunAsync(), IsTrue()); auto result = sandbox.AwaitResult(); EXPECT_THAT(result.final_status(), Eq(Result::TIMEOUT)); auto end = absl::Now(); auto elapsed = end - start; EXPECT_THAT(elapsed, Lt(absl::Seconds(10))); } } // namespace } // namespace sandbox2