| // Copyright 2016 The Bazel Authors. All rights reserved. | 
 | // | 
 | // Licensed under the Apache License, Version 2.0 (the "License"); | 
 | // you may not use this file except in compliance with the License. | 
 | // You may obtain a copy of the License at | 
 | // | 
 | //    http://www.apache.org/licenses/LICENSE-2.0 | 
 | // | 
 | // Unless required by applicable law or agreed to in writing, software | 
 | // distributed under the License is distributed on an "AS IS" BASIS, | 
 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 | // See the License for the specific language governing permissions and | 
 | // limitations under the License. | 
 |  | 
 | /** | 
 |  * linux-sandbox runs commands in a restricted environment where they are | 
 |  * subject to a few rules: | 
 |  * | 
 |  *  - The entire filesystem is made read-only. | 
 |  *  - The working directory (-W) will be made read-write, though. | 
 |  *  - Individual files or directories can be made writable (but not deletable) | 
 |  *    (-w). | 
 |  *  - If the process takes longer than the timeout (-T), it will be killed with | 
 |  *    SIGTERM. If it does not exit within the grace period (-t), it all of its | 
 |  *    children will be killed with SIGKILL. | 
 |  *  - tmpfs can be mounted on top of existing directories (-e). | 
 |  *  - If option -R is passed, the process will run as user 'root'. | 
 |  *  - If option -U is passed, the process will run as user 'nobody'. | 
 |  *  - Otherwise, the process runs using the current uid / gid. | 
 |  *  - If linux-sandbox itself gets killed, the process and all of its children | 
 |  *    will be killed. | 
 |  *  - If linux-sandbox's parent dies, it will kill itself, the process and all | 
 |  *    the children. | 
 |  *  - Network access is allowed, but can be disabled via -N. | 
 |  *  - The hostname and domainname will be set to "sandbox". | 
 |  *  - The process runs in its own PID namespace, so other processes on the | 
 |  *    system are invisible. | 
 |  */ | 
 |  | 
 | #include "src/main/tools/linux-sandbox.h" | 
 |  | 
 | #include <ctype.h> | 
 | #include <dirent.h> | 
 | #include <errno.h> | 
 | #include <fcntl.h> | 
 | #include <math.h> | 
 | #include <sched.h> | 
 | #include <signal.h> | 
 | #include <stdbool.h> | 
 | #include <stdio.h> | 
 | #include <stdlib.h> | 
 | #include <string.h> | 
 | #include <sys/prctl.h> | 
 | #include <sys/resource.h> | 
 | #include <sys/stat.h> | 
 | #include <sys/time.h> | 
 | #include <sys/types.h> | 
 | #include <sys/wait.h> | 
 | #include <unistd.h> | 
 | #include <string> | 
 | #include <vector> | 
 |  | 
 | #include "src/main/tools/linux-sandbox-options.h" | 
 | #include "src/main/tools/linux-sandbox-pid1.h" | 
 | #include "src/main/tools/logging.h" | 
 | #include "src/main/tools/process-tools.h" | 
 |  | 
 | int global_outer_uid; | 
 | int global_outer_gid; | 
 |  | 
 | static int global_child_pid; | 
 |  | 
 | // The signal that will be sent to the child when a timeout occurs. | 
 | static volatile sig_atomic_t global_next_timeout_signal = SIGTERM; | 
 |  | 
 | // The signal that caused us to kill the child (e.g. on timeout). | 
 | static volatile sig_atomic_t global_signal; | 
 |  | 
 | // Make sure the child process does not inherit any accidentally left open file | 
 | // handles from our parent. | 
 | static void CloseFds() { | 
 |   DIR *fds = opendir("/proc/self/fd"); | 
 |   if (fds == nullptr) { | 
 |     DIE("opendir"); | 
 |   } | 
 |  | 
 |   while (1) { | 
 |     errno = 0; | 
 |     struct dirent *dent = readdir(fds); | 
 |  | 
 |     if (dent == nullptr) { | 
 |       if (errno != 0) { | 
 |         DIE("readdir"); | 
 |       } | 
 |       break; | 
 |     } | 
 |  | 
 |     if (isdigit(dent->d_name[0])) { | 
 |       errno = 0; | 
 |       int fd = strtol(dent->d_name, nullptr, 10); | 
 |  | 
 |       // (1) Skip unparseable entries. | 
 |       // (2) Close everything except stdin, stdout and stderr. | 
 |       // (3) Do not accidentally close our directory handle. | 
 |       if (errno == 0 && fd > STDERR_FILENO && fd != dirfd(fds)) { | 
 |         if (close(fd) < 0) { | 
 |           DIE("close"); | 
 |         } | 
 |       } | 
 |     } | 
 |   } | 
 |  | 
 |   if (closedir(fds) < 0) { | 
 |     DIE("closedir"); | 
 |   } | 
 | } | 
 |  | 
 | static void OnTimeout(int sig) { | 
 |   global_signal = sig; | 
 |   kill(global_child_pid, global_next_timeout_signal); | 
 |   if (global_next_timeout_signal == SIGTERM && opt.kill_delay_secs > 0) { | 
 |     global_next_timeout_signal = SIGKILL; | 
 |     alarm(opt.kill_delay_secs); | 
 |   } | 
 | } | 
 |  | 
 | static void SpawnPid1() { | 
 |   const int kStackSize = 1024 * 1024; | 
 |   std::vector<char> child_stack(kStackSize); | 
 |  | 
 |   int sync_pipe[2]; | 
 |   if (pipe(sync_pipe) < 0) { | 
 |     DIE("pipe"); | 
 |   } | 
 |  | 
 |   int clone_flags = | 
 |       CLONE_NEWUSER | CLONE_NEWNS | CLONE_NEWIPC | CLONE_NEWPID | SIGCHLD; | 
 |   if (opt.create_netns) { | 
 |     clone_flags |= CLONE_NEWNET; | 
 |   } | 
 |   if (opt.fake_hostname) { | 
 |     clone_flags |= CLONE_NEWUTS; | 
 |   } | 
 |  | 
 |   // We use clone instead of unshare, because unshare sometimes fails with | 
 |   // EINVAL due to a race condition in the Linux kernel (see | 
 |   // https://lkml.org/lkml/2015/7/28/833). | 
 |   global_child_pid = | 
 |       clone(Pid1Main, child_stack.data() + kStackSize, clone_flags, sync_pipe); | 
 |   if (global_child_pid < 0) { | 
 |     DIE("clone"); | 
 |   } | 
 |  | 
 |   PRINT_DEBUG("linux-sandbox-pid1 has PID %d", global_child_pid); | 
 |  | 
 |   // We close the write end of the sync pipe, read a byte and then close the | 
 |   // pipe. This proves to the linux-sandbox-pid1 process that we still existed | 
 |   // after it ran prctl(PR_SET_PDEATHSIG, SIGKILL), thus preventing a race | 
 |   // condition where the parent is killed before that call was made. | 
 |   char buf; | 
 |   if (close(sync_pipe[1]) < 0) { | 
 |     DIE("close"); | 
 |   } | 
 |   if (read(sync_pipe[0], &buf, 1) < 0) { | 
 |     DIE("read"); | 
 |   } | 
 |   if (close(sync_pipe[0]) < 0) { | 
 |     DIE("close"); | 
 |   } | 
 | } | 
 |  | 
 | static int WaitForPid1() { | 
 |   int err, status; | 
 |   if (!opt.stats_path.empty()) { | 
 |     struct rusage child_rusage; | 
 |     do { | 
 |       err = wait4(global_child_pid, &status, 0, &child_rusage); | 
 |     } while (err < 0 && errno == EINTR); | 
 |     if (err < 0) { | 
 |       DIE("wait4"); | 
 |     } | 
 |     WriteStatsToFile(&child_rusage, opt.stats_path); | 
 |   } else { | 
 |     do { | 
 |       err = waitpid(global_child_pid, &status, 0); | 
 |     } while (err < 0 && errno == EINTR); | 
 |     if (err < 0) { | 
 |       DIE("waitpid"); | 
 |     } | 
 |   } | 
 |  | 
 |   if (global_signal > 0) { | 
 |     // The child exited because we killed it due to receiving a signal | 
 |     // ourselves. Do not trust the exitcode in this case, just calculate it from | 
 |     // the signal. | 
 |     PRINT_DEBUG("child exited due to us catching signal: %s", | 
 |                 strsignal(global_signal)); | 
 |     return 128 + global_signal; | 
 |   } else if (WIFSIGNALED(status)) { | 
 |     PRINT_DEBUG("child exited due to receiving signal: %s", | 
 |                 strsignal(WTERMSIG(status))); | 
 |     return 128 + WTERMSIG(status); | 
 |   } else { | 
 |     PRINT_DEBUG("child exited normally with exitcode %d", WEXITSTATUS(status)); | 
 |     return WEXITSTATUS(status); | 
 |   } | 
 | } | 
 |  | 
 | int main(int argc, char *argv[]) { | 
 |   // Ask the kernel to kill us with SIGKILL if our parent dies. | 
 |   if (prctl(PR_SET_PDEATHSIG, SIGKILL) < 0) { | 
 |     DIE("prctl"); | 
 |   } | 
 |  | 
 |   ParseOptions(argc, argv); | 
 |   global_debug = opt.debug; | 
 |  | 
 |   Redirect(opt.stdout_path, STDOUT_FILENO); | 
 |   Redirect(opt.stderr_path, STDERR_FILENO); | 
 |  | 
 |   global_outer_uid = getuid(); | 
 |   global_outer_gid = getgid(); | 
 |  | 
 |   CloseFds(); | 
 |  | 
 |   if (opt.timeout_secs > 0) { | 
 |     InstallSignalHandler(SIGALRM, OnTimeout); | 
 |     SetTimeout(opt.timeout_secs); | 
 |   } | 
 |  | 
 |   SpawnPid1(); | 
 |   return WaitForPid1(); | 
 | } |