feat(sandbox): add Python 3 code execution sandbox support
This commit is contained in:
195
sandbox/lib/seccomp_python/src/lib.rs
Normal file
195
sandbox/lib/seccomp_python/src/lib.rs
Normal file
@@ -0,0 +1,195 @@
|
||||
mod syscalls;
|
||||
|
||||
use crate::syscalls::*;
|
||||
use libc::{chdir, chroot, gid_t, uid_t, c_int};
|
||||
use libseccomp_sys::*;
|
||||
use std::env;
|
||||
use std::ffi::CString;
|
||||
use std::str::FromStr;
|
||||
|
||||
|
||||
/*
|
||||
* get_allowed_syscalls - retrieve allowed syscalls for the sandbox
|
||||
* @enable_network: enable network-related syscalls if non-zero
|
||||
*
|
||||
* Syscall selection order:
|
||||
* 1. ALLOWED_SYSCALLS environment variable
|
||||
* 2. Built-in default allowlist
|
||||
* 3. Optional network syscall extension
|
||||
*
|
||||
* Returns:
|
||||
* (allowed_syscalls, allowed_not_kill_syscalls)
|
||||
* allowed_syscalls: syscalls fully allowed
|
||||
* allowed_not_kill_syscalls: syscalls returning EPERM
|
||||
*/
|
||||
pub fn get_allowed_syscalls(enable_network: bool) -> (Vec<i32>, Vec<i32>) {
|
||||
let mut allowed_syscalls = Vec::new();
|
||||
let mut allowed_not_kill_syscalls = Vec::new();
|
||||
|
||||
/* Syscalls that return error instead of killing */
|
||||
allowed_not_kill_syscalls.extend(ALLOW_ERROR_SYSCALLS);
|
||||
|
||||
/* Load from environment variable ALLOWED_SYSCALLS */
|
||||
if let Ok(env_val) = env::var("ALLOWED_SYSCALLS") {
|
||||
if !env_val.is_empty() {
|
||||
for s in env_val.split(',') {
|
||||
if let Ok(sc) = i32::from_str(s) {
|
||||
allowed_syscalls.push(sc);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/* Fallback to default syscalls if env not set */
|
||||
if allowed_syscalls.is_empty() {
|
||||
allowed_syscalls.extend(ALLOW_SYSCALLS);
|
||||
if enable_network {
|
||||
allowed_syscalls.extend(ALLOW_NETWORK_SYSCALLS);
|
||||
}
|
||||
}
|
||||
|
||||
(allowed_syscalls, allowed_not_kill_syscalls)
|
||||
}
|
||||
|
||||
/*
|
||||
* setup_root - setup restricted filesystem root
|
||||
*
|
||||
* Perform chroot(".") and change working directory to "/".
|
||||
*
|
||||
* Return:
|
||||
* 0 on success
|
||||
* negative error code on failure
|
||||
*/
|
||||
fn setup_root() -> Result<(), c_int> {
|
||||
let root = CString::new(".").unwrap();
|
||||
if unsafe { chroot(root.as_ptr()) } != 0 {
|
||||
return Err(-1);
|
||||
}
|
||||
|
||||
let root_dir = CString::new("/").unwrap();
|
||||
if unsafe { chdir(root_dir.as_ptr()) } != 0 {
|
||||
return Err(-2);
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/*
|
||||
* set_no_new_privs - enable PR_SET_NO_NEW_PRIVS
|
||||
*
|
||||
* Prevent privilege escalation via execve.
|
||||
*
|
||||
* Return:
|
||||
* 0 on success
|
||||
* negative error code on failure
|
||||
*/
|
||||
fn set_no_new_privs() -> Result<(), c_int> {
|
||||
if unsafe { libc::prctl(libc::PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) } != 0 {
|
||||
return Err(-3);
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/*
|
||||
* drop_privileges - drop process privileges
|
||||
* @uid: target user ID
|
||||
* @gid: target group ID
|
||||
*
|
||||
* Permanently reduce process privileges.
|
||||
*
|
||||
* Return:
|
||||
* 0 on success
|
||||
* negative error code on failure
|
||||
*/
|
||||
fn drop_privileges(uid: uid_t, gid: gid_t) -> Result<(), c_int> {
|
||||
if unsafe { libc::setgid(gid) } != 0 {
|
||||
return Err(-4);
|
||||
}
|
||||
if unsafe { libc::setuid(uid) } != 0 {
|
||||
return Err(-5);
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/*
|
||||
* install_seccomp - install seccomp filter
|
||||
* @enable_network: enable network-related syscalls if non-zero
|
||||
*
|
||||
* Default action is SCMP_ACT_KILL_PROCESS.
|
||||
* Allowed syscalls are explicitly whitelisted.
|
||||
*
|
||||
* Return:
|
||||
* 0 on success
|
||||
* negative error code on failure
|
||||
*/
|
||||
fn install_seccomp(enable_network: bool) -> Result<(), c_int> {
|
||||
unsafe {
|
||||
let ctx = seccomp_init(SCMP_ACT_KILL_PROCESS);
|
||||
if ctx.is_null() {
|
||||
return Err(-6); /* failed to init seccomp context */
|
||||
}
|
||||
|
||||
let (allowed_syscalls, allowed_not_kill_syscalls) = get_allowed_syscalls(enable_network);
|
||||
|
||||
/* add fully allowed syscalls */
|
||||
for &sc in &allowed_syscalls {
|
||||
if seccomp_rule_add(ctx, SCMP_ACT_ALLOW, sc, 0) != 0 {
|
||||
seccomp_release(ctx);
|
||||
return Err(-7);
|
||||
}
|
||||
}
|
||||
|
||||
/* add syscalls returning EPERM */
|
||||
for &sc in &allowed_not_kill_syscalls {
|
||||
if seccomp_rule_add(ctx, SCMP_ACT_ERRNO(libc::EPERM as u16), sc, 0) != 0 {
|
||||
seccomp_release(ctx);
|
||||
return Err(-8);
|
||||
}
|
||||
}
|
||||
|
||||
if seccomp_load(ctx) != 0 {
|
||||
seccomp_release(ctx);
|
||||
return Err(-9);
|
||||
}
|
||||
|
||||
seccomp_release(ctx);
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
* init_seccomp - initialize seccomp sandbox
|
||||
* @uid: target user ID
|
||||
* @gid: target group ID
|
||||
* @enable_network: enable network syscalls if non-zero
|
||||
*
|
||||
* Initialize the sandbox and apply privilege restrictions
|
||||
* in the following order:
|
||||
* 1. setup_root()
|
||||
* 2. set_no_new_privs()
|
||||
* 3. drop_privileges()
|
||||
* 4. install_seccomp()
|
||||
*
|
||||
* This function must be called before executing any untrusted code.
|
||||
* It is not thread-safe and must be invoked once per process.
|
||||
*
|
||||
* Return:
|
||||
* 0 on success
|
||||
* negative error code on failure
|
||||
*/
|
||||
#[unsafe(no_mangle)]
|
||||
pub unsafe extern "C" fn init_seccomp(uid: uid_t, gid: gid_t, enable_network: i32) -> c_int {
|
||||
if let Err(code) = setup_root() {
|
||||
return code;
|
||||
}
|
||||
if let Err(code) = set_no_new_privs() {
|
||||
return code;
|
||||
}
|
||||
if let Err(code) = drop_privileges(uid, gid) {
|
||||
return code;
|
||||
}
|
||||
match install_seccomp(enable_network != 0) {
|
||||
Ok(_) => 0,
|
||||
Err(code) => code,
|
||||
}
|
||||
}
|
||||
85
sandbox/lib/seccomp_python/src/syscalls.rs
Normal file
85
sandbox/lib/seccomp_python/src/syscalls.rs
Normal file
@@ -0,0 +1,85 @@
|
||||
// src/syscalls.rs
|
||||
|
||||
pub static ALLOW_SYSCALLS: &[i32] = &[
|
||||
// file io
|
||||
libc::SYS_read as i32,
|
||||
libc::SYS_write as i32,
|
||||
libc::SYS_openat as i32,
|
||||
libc::SYS_close as i32,
|
||||
libc::SYS_newfstatat as i32,
|
||||
libc::SYS_ioctl as i32,
|
||||
libc::SYS_lseek as i32,
|
||||
libc::SYS_getdents64 as i32,
|
||||
|
||||
// thread
|
||||
libc::SYS_futex as i32,
|
||||
|
||||
// memory
|
||||
libc::SYS_mmap as i32,
|
||||
libc::SYS_brk as i32,
|
||||
libc::SYS_mprotect as i32,
|
||||
libc::SYS_munmap as i32,
|
||||
libc::SYS_rt_sigreturn as i32,
|
||||
libc::SYS_mremap as i32,
|
||||
|
||||
// user / group
|
||||
libc::SYS_setuid as i32,
|
||||
libc::SYS_setgid as i32,
|
||||
libc::SYS_getuid as i32,
|
||||
|
||||
// process
|
||||
libc::SYS_getpid as i32,
|
||||
libc::SYS_getppid as i32,
|
||||
libc::SYS_gettid as i32,
|
||||
libc::SYS_exit as i32,
|
||||
libc::SYS_exit_group as i32,
|
||||
libc::SYS_tgkill as i32,
|
||||
libc::SYS_rt_sigaction as i32,
|
||||
libc::SYS_sched_yield as i32,
|
||||
libc::SYS_set_robust_list as i32,
|
||||
libc::SYS_get_robust_list as i32,
|
||||
libc::SYS_rseq as i32,
|
||||
|
||||
// time
|
||||
libc::SYS_clock_gettime as i32,
|
||||
libc::SYS_gettimeofday as i32,
|
||||
libc::SYS_nanosleep as i32,
|
||||
libc::SYS_epoll_create1 as i32,
|
||||
libc::SYS_epoll_ctl as i32,
|
||||
libc::SYS_clock_nanosleep as i32,
|
||||
libc::SYS_pselect6 as i32,
|
||||
libc::SYS_rt_sigprocmask as i32,
|
||||
libc::SYS_sigaltstack as i32,
|
||||
libc::SYS_getrandom as i32,
|
||||
|
||||
];
|
||||
|
||||
pub static ALLOW_ERROR_SYSCALLS: &[i32] = &[
|
||||
libc::SYS_clone as i32,
|
||||
libc::SYS_mkdirat as i32,
|
||||
libc::SYS_mkdir as i32,
|
||||
];
|
||||
|
||||
pub static ALLOW_NETWORK_SYSCALLS: &[i32] = &[
|
||||
libc::SYS_socket as i32,
|
||||
libc::SYS_connect as i32,
|
||||
libc::SYS_bind as i32,
|
||||
libc::SYS_listen as i32,
|
||||
libc::SYS_accept as i32,
|
||||
libc::SYS_sendto as i32,
|
||||
libc::SYS_recvfrom as i32,
|
||||
libc::SYS_getsockname as i32,
|
||||
libc::SYS_recvmsg as i32,
|
||||
libc::SYS_getpeername as i32,
|
||||
libc::SYS_setsockopt as i32,
|
||||
libc::SYS_ppoll as i32,
|
||||
libc::SYS_uname as i32,
|
||||
libc::SYS_sendmsg as i32,
|
||||
libc::SYS_sendmmsg as i32,
|
||||
libc::SYS_getsockopt as i32,
|
||||
libc::SYS_fstat as i32,
|
||||
libc::SYS_fcntl as i32,
|
||||
libc::SYS_fstatfs as i32,
|
||||
libc::SYS_poll as i32,
|
||||
libc::SYS_epoll_pwait as i32,
|
||||
];
|
||||
Reference in New Issue
Block a user