Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 1 | // Copyright 2019 The Chromium OS Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
Garrick Evans | 3388a03 | 2020-03-24 11:25:55 +0900 | [diff] [blame] | 5 | #include "patchpanel/minijailed_process_runner.h" |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 6 | |
| 7 | #include <linux/capability.h> |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 8 | #include <sys/wait.h> |
| 9 | #include <utility> |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 10 | |
Qijiang Fan | 713061e | 2021-03-08 15:45:12 +0900 | [diff] [blame] | 11 | #include <base/check.h> |
Jie Jiang | 0137f5d | 2020-12-16 16:23:59 +0900 | [diff] [blame] | 12 | #include <base/files/scoped_file.h> |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 13 | #include <base/logging.h> |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 14 | #include <base/posix/eintr_wrapper.h> |
Garrick Evans | 2470caa | 2020-03-04 14:15:41 +0900 | [diff] [blame] | 15 | #include <base/strings/string_number_conversions.h> |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 16 | #include <base/strings/string_util.h> |
Simon Glass | 2b1da09 | 2020-05-21 12:24:16 -0600 | [diff] [blame] | 17 | #include <brillo/process/process.h> |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 18 | |
Garrick Evans | 3388a03 | 2020-03-24 11:25:55 +0900 | [diff] [blame] | 19 | #include "patchpanel/net_util.h" |
Garrick Evans | 7a1a9ee | 2020-01-28 11:03:57 +0900 | [diff] [blame] | 20 | |
Garrick Evans | 3388a03 | 2020-03-24 11:25:55 +0900 | [diff] [blame] | 21 | namespace patchpanel { |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 22 | |
| 23 | namespace { |
| 24 | |
Jason Jeremy Iman | d89b5f5 | 2019-10-24 10:39:17 +0900 | [diff] [blame] | 25 | constexpr char kUnprivilegedUser[] = "nobody"; |
Garrick Evans | 6776b50 | 2020-05-01 10:41:56 +0900 | [diff] [blame] | 26 | constexpr char kNetworkUnprivilegedUser[] = "patchpaneld"; |
Jason Jeremy Iman | d89b5f5 | 2019-10-24 10:39:17 +0900 | [diff] [blame] | 27 | constexpr uint64_t kModprobeCapMask = CAP_TO_MASK(CAP_SYS_MODULE); |
Garrick Evans | 8e8e347 | 2020-01-23 14:03:50 +0900 | [diff] [blame] | 28 | constexpr uint64_t kNetRawCapMask = CAP_TO_MASK(CAP_NET_RAW); |
| 29 | constexpr uint64_t kNetRawAdminCapMask = |
| 30 | CAP_TO_MASK(CAP_NET_ADMIN) | CAP_TO_MASK(CAP_NET_RAW); |
| 31 | |
| 32 | // These match what is used in iptables.cc in firewalld. |
Garrick Evans | 8e8e347 | 2020-01-23 14:03:50 +0900 | [diff] [blame] | 33 | constexpr char kIpPath[] = "/bin/ip"; |
| 34 | constexpr char kIptablesPath[] = "/sbin/iptables"; |
| 35 | constexpr char kIp6tablesPath[] = "/sbin/ip6tables"; |
Jason Jeremy Iman | d89b5f5 | 2019-10-24 10:39:17 +0900 | [diff] [blame] | 36 | constexpr char kModprobePath[] = "/sbin/modprobe"; |
Garrick Evans | 6d227b9 | 2019-12-03 16:11:29 +0900 | [diff] [blame] | 37 | constexpr char kSysctlPath[] = "/usr/sbin/sysctl"; |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 38 | |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 39 | // An empty string will be returned if read fails. |
Jie Jiang | 0137f5d | 2020-12-16 16:23:59 +0900 | [diff] [blame] | 40 | std::string ReadBlockingFDToStringAndClose(base::ScopedFD fd) { |
| 41 | if (!fd.is_valid()) { |
| 42 | LOG(ERROR) << "Invalid fd"; |
| 43 | return ""; |
| 44 | } |
| 45 | |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 46 | static constexpr int kBufSize = 2048; |
| 47 | char buf[kBufSize] = {0}; |
| 48 | std::string output; |
| 49 | while (true) { |
Jie Jiang | 0137f5d | 2020-12-16 16:23:59 +0900 | [diff] [blame] | 50 | ssize_t cnt = HANDLE_EINTR(read(fd.get(), buf, kBufSize)); |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 51 | if (cnt == -1) { |
| 52 | PLOG(ERROR) << __func__ << " failed"; |
Jie Jiang | 0137f5d | 2020-12-16 16:23:59 +0900 | [diff] [blame] | 53 | return ""; |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 54 | } |
| 55 | |
Jie Jiang | 0137f5d | 2020-12-16 16:23:59 +0900 | [diff] [blame] | 56 | if (cnt == 0) { |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 57 | return output; |
Jie Jiang | 0137f5d | 2020-12-16 16:23:59 +0900 | [diff] [blame] | 58 | } |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 59 | |
| 60 | output.append({buf, static_cast<size_t>(cnt)}); |
| 61 | } |
| 62 | } |
| 63 | |
| 64 | } // namespace |
| 65 | |
| 66 | pid_t MinijailedProcessRunner::SyscallImpl::WaitPID(pid_t pid, |
| 67 | int* wstatus, |
| 68 | int options) { |
| 69 | return waitpid(pid, wstatus, options); |
| 70 | } |
| 71 | |
| 72 | int MinijailedProcessRunner::RunSyncDestroy( |
| 73 | const std::vector<std::string>& argv, |
| 74 | brillo::Minijail* mj, |
| 75 | minijail* jail, |
| 76 | bool log_failures, |
Jie Jiang | 0137f5d | 2020-12-16 16:23:59 +0900 | [diff] [blame] | 77 | std::string* output) { |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 78 | std::vector<char*> args; |
| 79 | for (const auto& arg : argv) { |
| 80 | args.push_back(const_cast<char*>(arg.c_str())); |
| 81 | } |
| 82 | args.push_back(nullptr); |
| 83 | |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 84 | pid_t pid; |
Jie Jiang | 0137f5d | 2020-12-16 16:23:59 +0900 | [diff] [blame] | 85 | int fd_stdout = -1; |
| 86 | int* stdout_p = output ? &fd_stdout : nullptr; |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 87 | bool ran = mj->RunPipesAndDestroy(jail, args, &pid, nullptr /*stdin*/, |
Jie Jiang | 0137f5d | 2020-12-16 16:23:59 +0900 | [diff] [blame] | 88 | stdout_p, nullptr /*stderr*/); |
| 89 | if (output) { |
| 90 | *output = ReadBlockingFDToStringAndClose(base::ScopedFD(fd_stdout)); |
| 91 | } |
| 92 | |
| 93 | int status = 0; |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 94 | if (ran) { |
| 95 | ran = syscall_->WaitPID(pid, &status) == pid; |
| 96 | } |
| 97 | |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 98 | if (!ran) { |
| 99 | LOG(ERROR) << "Could not execute '" << base::JoinString(argv, " ") << "'"; |
| 100 | } else if (log_failures && (!WIFEXITED(status) || WEXITSTATUS(status) != 0)) { |
| 101 | if (WIFEXITED(status)) { |
Hugo Benichi | d4b1956 | 2019-06-21 13:00:12 +0900 | [diff] [blame] | 102 | LOG(WARNING) << "Subprocess '" << base::JoinString(argv, " ") |
| 103 | << "' exited with code " << WEXITSTATUS(status); |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 104 | } else if (WIFSIGNALED(status)) { |
Hugo Benichi | d4b1956 | 2019-06-21 13:00:12 +0900 | [diff] [blame] | 105 | LOG(WARNING) << "Subprocess '" << base::JoinString(argv, " ") |
| 106 | << "' exited with signal " << WTERMSIG(status); |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 107 | } else { |
Hugo Benichi | d4b1956 | 2019-06-21 13:00:12 +0900 | [diff] [blame] | 108 | LOG(WARNING) << "Subprocess '" << base::JoinString(argv, " ") |
| 109 | << "' exited with unknown status " << status; |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 110 | } |
| 111 | } |
| 112 | return ran && WIFEXITED(status) ? WEXITSTATUS(status) : -1; |
| 113 | } |
| 114 | |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 115 | int MinijailedProcessRunner::RunSync(const std::vector<std::string>& argv, |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 116 | bool log_failures, |
Jie Jiang | c9a5cd5 | 2020-12-14 17:38:52 +0900 | [diff] [blame] | 117 | std::string* output) { |
Jie Jiang | 0137f5d | 2020-12-16 16:23:59 +0900 | [diff] [blame] | 118 | return RunSyncDestroy(argv, mj_, mj_->New(), log_failures, output); |
Garrick Evans | 721eee5 | 2019-01-28 16:26:23 +0900 | [diff] [blame] | 119 | } |
| 120 | |
Jason Jeremy Iman | d89b5f5 | 2019-10-24 10:39:17 +0900 | [diff] [blame] | 121 | void EnterChildProcessJail() { |
| 122 | brillo::Minijail* m = brillo::Minijail::GetInstance(); |
| 123 | struct minijail* jail = m->New(); |
| 124 | |
| 125 | // Most of these return void, but DropRoot() can fail if the user/group |
| 126 | // does not exist. |
| 127 | CHECK(m->DropRoot(jail, kNetworkUnprivilegedUser, kNetworkUnprivilegedUser)) |
| 128 | << "Could not drop root privileges"; |
Garrick Evans | 8e8e347 | 2020-01-23 14:03:50 +0900 | [diff] [blame] | 129 | m->UseCapabilities(jail, kNetRawCapMask); |
Jason Jeremy Iman | d89b5f5 | 2019-10-24 10:39:17 +0900 | [diff] [blame] | 130 | m->Enter(jail); |
| 131 | m->Destroy(jail); |
| 132 | } |
| 133 | |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 134 | MinijailedProcessRunner::MinijailedProcessRunner(brillo::Minijail* mj) { |
| 135 | mj_ = mj ? mj : brillo::Minijail::GetInstance(); |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 136 | syscall_ = std::make_unique<SyscallImpl>(); |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 137 | } |
| 138 | |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 139 | MinijailedProcessRunner::MinijailedProcessRunner( |
| 140 | brillo::Minijail* mj, std::unique_ptr<SyscallImpl> syscall) |
| 141 | : mj_(mj), syscall_(std::move(syscall)) {} |
| 142 | |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 143 | int MinijailedProcessRunner::Run(const std::vector<std::string>& argv, |
| 144 | bool log_failures) { |
| 145 | minijail* jail = mj_->New(); |
| 146 | CHECK(mj_->DropRoot(jail, kUnprivilegedUser, kUnprivilegedUser)); |
Garrick Evans | 8e8e347 | 2020-01-23 14:03:50 +0900 | [diff] [blame] | 147 | mj_->UseCapabilities(jail, kNetRawAdminCapMask); |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 148 | return RunSyncDestroy(argv, mj_, jail, log_failures, nullptr); |
Garrick Evans | 64a2df3 | 2018-12-12 16:53:46 +0900 | [diff] [blame] | 149 | } |
| 150 | |
Garrick Evans | 8e8e347 | 2020-01-23 14:03:50 +0900 | [diff] [blame] | 151 | int MinijailedProcessRunner::ip(const std::string& obj, |
| 152 | const std::string& cmd, |
| 153 | const std::vector<std::string>& argv, |
| 154 | bool log_failures) { |
| 155 | std::vector<std::string> args = {kIpPath, obj, cmd}; |
| 156 | args.insert(args.end(), argv.begin(), argv.end()); |
| 157 | return Run(args, log_failures); |
| 158 | } |
| 159 | |
| 160 | int MinijailedProcessRunner::ip6(const std::string& obj, |
| 161 | const std::string& cmd, |
| 162 | const std::vector<std::string>& argv, |
| 163 | bool log_failures) { |
| 164 | std::vector<std::string> args = {kIpPath, "-6", obj, cmd}; |
| 165 | args.insert(args.end(), argv.begin(), argv.end()); |
| 166 | return Run(args, log_failures); |
| 167 | } |
| 168 | |
| 169 | int MinijailedProcessRunner::iptables(const std::string& table, |
| 170 | const std::vector<std::string>& argv, |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 171 | bool log_failures, |
| 172 | std::string* output) { |
Garrick Evans | 8e8e347 | 2020-01-23 14:03:50 +0900 | [diff] [blame] | 173 | std::vector<std::string> args = {kIptablesPath, "-t", table}; |
| 174 | args.insert(args.end(), argv.begin(), argv.end()); |
Jie Jiang | c9a5cd5 | 2020-12-14 17:38:52 +0900 | [diff] [blame] | 175 | return RunSync(args, log_failures, output); |
Garrick Evans | 8e8e347 | 2020-01-23 14:03:50 +0900 | [diff] [blame] | 176 | } |
| 177 | |
| 178 | int MinijailedProcessRunner::ip6tables(const std::string& table, |
| 179 | const std::vector<std::string>& argv, |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 180 | bool log_failures, |
| 181 | std::string* output) { |
Garrick Evans | 8e8e347 | 2020-01-23 14:03:50 +0900 | [diff] [blame] | 182 | std::vector<std::string> args = {kIp6tablesPath, "-t", table}; |
| 183 | args.insert(args.end(), argv.begin(), argv.end()); |
Jie Jiang | c9a5cd5 | 2020-12-14 17:38:52 +0900 | [diff] [blame] | 184 | return RunSync(args, log_failures, output); |
Garrick Evans | 8e8e347 | 2020-01-23 14:03:50 +0900 | [diff] [blame] | 185 | } |
| 186 | |
| 187 | int MinijailedProcessRunner::modprobe_all( |
| 188 | const std::vector<std::string>& modules, bool log_failures) { |
Garrick Evans | 78b414e | 2019-03-14 15:58:56 +0900 | [diff] [blame] | 189 | minijail* jail = mj_->New(); |
| 190 | CHECK(mj_->DropRoot(jail, kUnprivilegedUser, kUnprivilegedUser)); |
| 191 | mj_->UseCapabilities(jail, kModprobeCapMask); |
| 192 | std::vector<std::string> args = {kModprobePath, "-a"}; |
| 193 | args.insert(args.end(), modules.begin(), modules.end()); |
Jie Jiang | cf5ce9c | 2020-07-14 17:22:03 +0900 | [diff] [blame] | 194 | return RunSyncDestroy(args, mj_, jail, log_failures, nullptr); |
Garrick Evans | 78b414e | 2019-03-14 15:58:56 +0900 | [diff] [blame] | 195 | } |
| 196 | |
Garrick Evans | 8e8e347 | 2020-01-23 14:03:50 +0900 | [diff] [blame] | 197 | int MinijailedProcessRunner::sysctl_w(const std::string& key, |
| 198 | const std::string& value, |
| 199 | bool log_failures) { |
Garrick Evans | 6d227b9 | 2019-12-03 16:11:29 +0900 | [diff] [blame] | 200 | std::vector<std::string> args = {kSysctlPath, "-w", key + "=" + value}; |
Jie Jiang | c9a5cd5 | 2020-12-14 17:38:52 +0900 | [diff] [blame] | 201 | return RunSync(args, log_failures, nullptr); |
Garrick Evans | 6d227b9 | 2019-12-03 16:11:29 +0900 | [diff] [blame] | 202 | } |
| 203 | |
Hugo Benichi | 33860d7 | 2020-07-09 16:34:01 +0900 | [diff] [blame] | 204 | int MinijailedProcessRunner::ip_netns_attach(const std::string& netns_name, |
| 205 | pid_t netns_pid, |
| 206 | bool log_failures) { |
| 207 | std::vector<std::string> args = {kIpPath, "netns", "attach", netns_name, |
| 208 | std::to_string(netns_pid)}; |
Jie Jiang | c9a5cd5 | 2020-12-14 17:38:52 +0900 | [diff] [blame] | 209 | return RunSync(args, log_failures, nullptr); |
Hugo Benichi | 33860d7 | 2020-07-09 16:34:01 +0900 | [diff] [blame] | 210 | } |
| 211 | |
| 212 | int MinijailedProcessRunner::ip_netns_delete(const std::string& netns_name, |
| 213 | bool log_failures) { |
| 214 | std::vector<std::string> args = {kIpPath, "netns", "delete", netns_name}; |
Jie Jiang | c9a5cd5 | 2020-12-14 17:38:52 +0900 | [diff] [blame] | 215 | return RunSync(args, log_failures, nullptr); |
Hugo Benichi | 33860d7 | 2020-07-09 16:34:01 +0900 | [diff] [blame] | 216 | } |
| 217 | |
Garrick Evans | 3388a03 | 2020-03-24 11:25:55 +0900 | [diff] [blame] | 218 | } // namespace patchpanel |