mirror of
https://github.com/google/sandboxed-api.git
synced 2024-03-22 13:11:30 +08:00
690b31a038
PiperOrigin-RevId: 516544270 Change-Id: Ibb10611b9b7713ac6513199b6213c15d22772ea5
371 lines
11 KiB
C++
371 lines
11 KiB
C++
#include "sandboxed_api/sandbox2/monitor_unotify.h"
|
|
|
|
#include <linux/audit.h>
|
|
#include <linux/filter.h>
|
|
#include <linux/ioctl.h>
|
|
#include <linux/seccomp.h>
|
|
#include <poll.h>
|
|
#include <sys/ioctl.h>
|
|
#include <sys/ptrace.h>
|
|
#include <sys/wait.h>
|
|
#include <syscall.h>
|
|
#include <unistd.h>
|
|
|
|
#include "absl/cleanup/cleanup.h"
|
|
#include "absl/log/log.h"
|
|
#include "absl/status/status.h"
|
|
#include "absl/time/time.h"
|
|
#include "sandboxed_api/sandbox2/client.h"
|
|
#include "sandboxed_api/sandbox2/forkserver.pb.h"
|
|
#include "sandboxed_api/sandbox2/monitor_base.h"
|
|
#include "sandboxed_api/util/fileops.h"
|
|
#include "sandboxed_api/util/raw_logging.h"
|
|
|
|
#ifndef SECCOMP_GET_NOTIF_SIZES
|
|
#define SECCOMP_GET_NOTIF_SIZES 3
|
|
|
|
struct seccomp_notif_sizes {
|
|
__u16 seccomp_notif;
|
|
__u16 seccomp_notif_resp;
|
|
__u16 seccomp_data;
|
|
};
|
|
#endif
|
|
|
|
#ifndef SECCOMP_IOCTL_NOTIF_RECV
|
|
#ifndef SECCOMP_IOWR
|
|
#define SECCOMP_IOC_MAGIC '!'
|
|
#define SECCOMP_IO(nr) _IO(SECCOMP_IOC_MAGIC, nr)
|
|
#define SECCOMP_IOWR(nr, type) _IOWR(SECCOMP_IOC_MAGIC, nr, type)
|
|
#endif
|
|
|
|
/* Flags for seccomp notification fd ioctl. */
|
|
#define SECCOMP_IOCTL_NOTIF_RECV SECCOMP_IOWR(0, struct seccomp_notif)
|
|
#endif
|
|
|
|
namespace sandbox2 {
|
|
|
|
namespace {
|
|
|
|
int seccomp(unsigned int operation, unsigned int flags, void* args) {
|
|
return syscall(SYS_seccomp, operation, flags, args);
|
|
}
|
|
|
|
sapi::cpu::Architecture AuditArchToCPUArch(uint32_t arch) {
|
|
switch (arch) {
|
|
case AUDIT_ARCH_AARCH64:
|
|
return sapi::cpu::Architecture::kArm64;
|
|
case AUDIT_ARCH_ARM:
|
|
return sapi::cpu::Architecture::kArm;
|
|
case AUDIT_ARCH_X86_64:
|
|
return sapi::cpu::Architecture::kX8664;
|
|
case AUDIT_ARCH_I386:
|
|
return sapi::cpu::Architecture::kX86;
|
|
case AUDIT_ARCH_PPC64LE:
|
|
return sapi::cpu::Architecture::kPPC64LE;
|
|
default:
|
|
return sapi::cpu::Architecture::kUnknown;
|
|
}
|
|
}
|
|
|
|
using ::sapi::file_util::fileops::FDCloser;
|
|
|
|
} // namespace
|
|
|
|
UnotifyMonitor::UnotifyMonitor(Executor* executor, Policy* policy,
|
|
Notify* notify)
|
|
: MonitorBase(executor, policy, notify) {
|
|
type_ = FORKSERVER_MONITOR_UNOTIFY;
|
|
if (executor_->limits()->wall_time_limit() != absl::ZeroDuration()) {
|
|
auto deadline = absl::Now() + executor_->limits()->wall_time_limit();
|
|
deadline_millis_.store(absl::ToUnixMillis(deadline),
|
|
std::memory_order_relaxed);
|
|
}
|
|
external_kill_request_flag_.test_and_set(std::memory_order_relaxed);
|
|
dump_stack_request_flag_.test_and_set(std::memory_order_relaxed);
|
|
}
|
|
|
|
void UnotifyMonitor::RunInternal() {
|
|
thread_ = std::make_unique<std::thread>(&UnotifyMonitor::Run, this);
|
|
|
|
// Wait for the Monitor to set-up the sandboxee correctly (or fail while
|
|
// doing that). From here on, it is safe to use the IPC object for
|
|
// non-sandbox-related data exchange.
|
|
setup_notification_.WaitForNotification();
|
|
}
|
|
|
|
void UnotifyMonitor::HandleUnotify() {
|
|
memset(req_.get(), 0, req_size_);
|
|
if (ioctl(seccomp_notify_fd_.get(), SECCOMP_IOCTL_NOTIF_RECV, req_.get()) !=
|
|
0) {
|
|
if (errno == ENOENT) {
|
|
VLOG(1) << "Unotify recv failed with ENOENT";
|
|
} else {
|
|
SetExitStatusCode(Result::INTERNAL_ERROR, Result::FAILED_NOTIFY);
|
|
}
|
|
return;
|
|
}
|
|
Syscall syscall(AuditArchToCPUArch(req_->data.arch), req_->data.nr,
|
|
{req_->data.args[0], req_->data.args[1], req_->data.args[2],
|
|
req_->data.args[3], req_->data.args[4], req_->data.args[5]},
|
|
req_->pid, 0, req_->data.instruction_pointer);
|
|
ViolationType violation_type = syscall.arch() == Syscall::GetHostArch()
|
|
? kSyscallViolation
|
|
: kArchitectureSwitchViolation;
|
|
LogSyscallViolation(syscall);
|
|
notify_->EventSyscallViolation(syscall, violation_type);
|
|
MaybeGetStackTrace(req_->pid, Result::VIOLATION);
|
|
SetExitStatusCode(Result::VIOLATION, syscall.nr());
|
|
notify_->EventSyscallViolation(syscall, violation_type);
|
|
result_.SetSyscall(std::make_unique<Syscall>(syscall));
|
|
KillSandboxee();
|
|
}
|
|
|
|
void UnotifyMonitor::Run() {
|
|
absl::Cleanup monitor_done = [this] {
|
|
getrusage(RUSAGE_THREAD, result_.GetRUsageMonitor());
|
|
OnDone();
|
|
};
|
|
|
|
absl::Cleanup setup_notify = [this] { setup_notification_.Notify(); };
|
|
if (!InitSetupUnotify()) {
|
|
SetExitStatusCode(Result::SETUP_ERROR, Result::FAILED_NOTIFY);
|
|
return;
|
|
}
|
|
if (!InitSetupNotifyPipe()) {
|
|
SetExitStatusCode(Result::SETUP_ERROR, Result::FAILED_NOTIFY);
|
|
return;
|
|
}
|
|
|
|
std::move(setup_notify).Invoke();
|
|
|
|
pollfd pfds[] = {
|
|
{.fd = process_.status_fd.get(), .events = POLLIN},
|
|
{.fd = seccomp_notify_fd_.get(), .events = POLLIN},
|
|
{.fd = monitor_notify_pipe_[0].get(), .events = POLLIN},
|
|
};
|
|
bool wait_for_sandboxee = true;
|
|
while (result_.final_status() == Result::UNSET) {
|
|
int64_t deadline = deadline_millis_.load(std::memory_order_relaxed);
|
|
absl::Duration remaining = absl::FromUnixMillis(deadline) - absl::Now();
|
|
if (deadline != 0 && remaining < absl::ZeroDuration()) {
|
|
VLOG(1) << "Sandbox process hit timeout due to the walltime timer";
|
|
timed_out_ = true;
|
|
MaybeGetStackTrace(process_.main_pid, Result::TIMEOUT);
|
|
KillSandboxee();
|
|
break;
|
|
}
|
|
|
|
if (!external_kill_request_flag_.test_and_set(std::memory_order_relaxed)) {
|
|
external_kill_ = true;
|
|
MaybeGetStackTrace(process_.main_pid, Result::EXTERNAL_KILL);
|
|
KillSandboxee();
|
|
break;
|
|
}
|
|
|
|
if (network_proxy_server_ &&
|
|
network_proxy_server_->violation_occurred_.load(
|
|
std::memory_order_acquire) &&
|
|
!network_violation_) {
|
|
network_violation_ = true;
|
|
MaybeGetStackTrace(process_.main_pid, Result::VIOLATION);
|
|
KillSandboxee();
|
|
break;
|
|
}
|
|
constexpr int64_t kMinWakeupMsec = 30000;
|
|
int timeout_msec = kMinWakeupMsec;
|
|
if (remaining > absl::ZeroDuration()) {
|
|
timeout_msec = static_cast<int>(
|
|
std::min(kMinWakeupMsec, absl::ToInt64Milliseconds(remaining)));
|
|
}
|
|
int ret = poll(pfds, ABSL_ARRAYSIZE(pfds), timeout_msec);
|
|
if (ret == 0 || (ret == -1 && errno == EINTR)) {
|
|
continue;
|
|
}
|
|
PCHECK(ret != -1);
|
|
if (pfds[2].revents & POLLIN) {
|
|
char c = ' ';
|
|
read(monitor_notify_pipe_[0].get(), &c, 1);
|
|
continue;
|
|
}
|
|
if (pfds[0].revents & POLLIN) {
|
|
SetExitStatusFromStatusPipe();
|
|
wait_for_sandboxee = false;
|
|
break;
|
|
}
|
|
if (pfds[0].revents & POLLHUP) {
|
|
SetExitStatusCode(Result::INTERNAL_ERROR, Result::FAILED_MONITOR);
|
|
wait_for_sandboxee = false;
|
|
break;
|
|
}
|
|
if (pfds[1].revents & POLLIN) {
|
|
HandleUnotify();
|
|
wait_for_sandboxee = false;
|
|
}
|
|
}
|
|
if (wait_for_sandboxee) {
|
|
absl::Time deadline = absl::Now() + absl::Seconds(1);
|
|
int ret = 0;
|
|
do {
|
|
absl::Duration remaining = deadline - absl::Now();
|
|
if (remaining <= absl::ZeroDuration()) {
|
|
ret = 0;
|
|
break;
|
|
}
|
|
ret =
|
|
poll(pfds, 1, static_cast<int>(absl::ToInt64Milliseconds(remaining)));
|
|
} while (ret == -1 && errno == EINTR);
|
|
PCHECK(ret != -1);
|
|
if (ret == 0) {
|
|
LOG(WARNING) << "Waiting for sandboxee exit timed out";
|
|
} else if (pfds[0].revents & POLLIN) {
|
|
SetExitStatusFromStatusPipe();
|
|
} else if (pfds[0].revents & POLLHUP) {
|
|
SetExitStatusCode(Result::INTERNAL_ERROR, Result::FAILED_MONITOR);
|
|
}
|
|
}
|
|
KillInit();
|
|
}
|
|
|
|
void UnotifyMonitor::SetExitStatusFromStatusPipe() {
|
|
int code, status;
|
|
SAPI_RAW_PCHECK(
|
|
read(process_.status_fd.get(), &code, sizeof(code)) == sizeof(int),
|
|
"read");
|
|
SAPI_RAW_PCHECK(
|
|
read(process_.status_fd.get(), &status, sizeof(status)) == sizeof(int),
|
|
"read");
|
|
if (code == CLD_EXITED) {
|
|
SetExitStatusCode(Result::OK, status);
|
|
} else if (code == CLD_KILLED || code == CLD_DUMPED) {
|
|
if (network_violation_) {
|
|
SetExitStatusCode(Result::VIOLATION, Result::VIOLATION_NETWORK);
|
|
result_.SetNetworkViolation(network_proxy_server_->violation_msg_);
|
|
} else if (external_kill_) {
|
|
SetExitStatusCode(Result::EXTERNAL_KILL, 0);
|
|
} else if (timed_out_) {
|
|
SetExitStatusCode(Result::TIMEOUT, 0);
|
|
} else {
|
|
SetExitStatusCode(Result::SIGNALED, status);
|
|
}
|
|
} else {
|
|
SetExitStatusCode(Result::SETUP_ERROR, Result::FAILED_MONITOR);
|
|
}
|
|
}
|
|
|
|
bool UnotifyMonitor::InitSetupUnotify() {
|
|
if (!comms_->SendUint32(Client::kSandbox2ClientUnotify)) {
|
|
LOG(ERROR) << "Couldn't send Client::kSandbox2ClientUnotify message";
|
|
return false;
|
|
}
|
|
int fd;
|
|
if (!comms_->RecvFD(&fd)) {
|
|
LOG(ERROR) << "Couldn't recv unotify fd";
|
|
return false;
|
|
}
|
|
seccomp_notify_fd_ = FDCloser(fd);
|
|
struct seccomp_notif_sizes sizes = {};
|
|
if (seccomp(SECCOMP_GET_NOTIF_SIZES, 0, &sizes) == -1) {
|
|
LOG(ERROR) << "Couldn't get seccomp_notif_sizes";
|
|
return false;
|
|
}
|
|
req_size_ = sizes.seccomp_notif;
|
|
req_.reset(static_cast<seccomp_notif*>(malloc(req_size_)));
|
|
return true;
|
|
}
|
|
|
|
bool UnotifyMonitor::InitSetupNotifyPipe() {
|
|
int pfds[2];
|
|
if (pipe(pfds) != 0) {
|
|
PLOG(ERROR) << "failed creating monitor pipe";
|
|
return false;
|
|
}
|
|
monitor_notify_pipe_[0] = FDCloser(pfds[0]);
|
|
monitor_notify_pipe_[1] = FDCloser(pfds[1]);
|
|
return true;
|
|
}
|
|
|
|
void UnotifyMonitor::NotifyMonitor() {
|
|
absl::ReaderMutexLock lock(¬ify_mutex_);
|
|
if (!monitor_notify_pipe_[1].get()) {
|
|
return;
|
|
}
|
|
char c = ' ';
|
|
write(monitor_notify_pipe_[1].get(), &c, 1);
|
|
}
|
|
|
|
bool UnotifyMonitor::KillSandboxee() {
|
|
VLOG(1) << "Sending SIGKILL to the PID: " << process_.main_pid;
|
|
if (kill(process_.main_pid, SIGKILL) != 0) {
|
|
PLOG(ERROR) << "Could not send SIGKILL to PID " << process_.main_pid;
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
void UnotifyMonitor::KillInit() {
|
|
VLOG(1) << "Sending SIGKILL to the PID: " << process_.init_pid;
|
|
if (kill(process_.init_pid, SIGKILL) != 0) {
|
|
PLOG(ERROR) << "Could not send SIGKILL to PID " << process_.init_pid;
|
|
}
|
|
}
|
|
|
|
void UnotifyMonitor::Join() {
|
|
absl::MutexLock lock(¬ify_mutex_);
|
|
if (thread_) {
|
|
thread_->join();
|
|
CHECK(IsDone()) << "Monitor did not terminate";
|
|
VLOG(1) << "Final execution status: " << result_.ToString();
|
|
CHECK(result_.final_status() != Result::UNSET);
|
|
thread_.reset();
|
|
monitor_notify_pipe_[0].Close();
|
|
monitor_notify_pipe_[1].Close();
|
|
}
|
|
}
|
|
|
|
void UnotifyMonitor::MaybeGetStackTrace(pid_t pid, Result::StatusEnum status) {
|
|
if (ShouldCollectStackTrace(status)) {
|
|
auto stack = GetStackTrace(pid);
|
|
if (stack.ok()) {
|
|
result_.set_stack_trace(*stack);
|
|
} else {
|
|
LOG(ERROR) << "Getting stack trace: " << stack.status();
|
|
}
|
|
}
|
|
}
|
|
|
|
absl::StatusOr<std::vector<std::string>> UnotifyMonitor::GetStackTrace(
|
|
pid_t pid) {
|
|
if (ptrace(PTRACE_ATTACH, pid, 0, 0) != 0) {
|
|
return absl::ErrnoToStatus(errno,
|
|
absl::StrCat("could not attach to pid = ", pid));
|
|
}
|
|
int wstatus = 0;
|
|
while (!WIFSTOPPED(wstatus)) {
|
|
pid_t ret =
|
|
waitpid(pid, &wstatus, __WNOTHREAD | __WALL | WUNTRACED | WNOHANG);
|
|
if (ret == -1) {
|
|
return absl::ErrnoToStatus(errno,
|
|
absl::StrCat("waiting for stop, pid = ", pid));
|
|
}
|
|
}
|
|
absl::Cleanup cleanup = [pid] {
|
|
if (ptrace(PTRACE_DETACH, pid, 0, 0) != 0) {
|
|
LOG(ERROR) << "Could not detach after obtaining stack trace from pid = "
|
|
<< pid;
|
|
}
|
|
};
|
|
Regs regs(pid);
|
|
absl::Status status = regs.Fetch();
|
|
if (!status.ok()) {
|
|
if (absl::IsNotFound(status)) {
|
|
LOG(WARNING) << "failed to fetch regs: " << status;
|
|
return status;
|
|
}
|
|
SetExitStatusCode(Result::INTERNAL_ERROR, Result::FAILED_FETCH);
|
|
return status;
|
|
}
|
|
return GetAndLogStackTrace(®s);
|
|
}
|
|
|
|
} // namespace sandbox2
|