Skip to content

Commit bf00b57

Browse files
committed
Add option to abort VMM when parent process dies
If Firecracker is being monitored by a parent process that unexpectedly terminates, it will be abandoned up the process tree, likely to a process that doesn't know what do with it (such as init). This becomes even trickier if the process was running in a mount namespace that was controlled by the parent process, as the API socket is now inaccessible. If the parent process was also keeping handles on other resources used by the Firecracker VMM, these could be re-used by new processes and cause conflicts with the now orphaned Firecracker. This adds a flag to set the parent death signal (SIGUSR2 in this instance) that the process will receive when its parent process exits before the VMM does. Receipt of this signal will cause the VMM to abruptly abort, much like the SIGILL signal. While a graceful shutdown would be preferable, since the parent process may have been controlling outside resources for Firecracker (disks, networking, etc.), it's indeterminate whether or not it is safe to continue running the VM. Signed-off-by: Josh Seba <[email protected]>
1 parent 3fa32ef commit bf00b57

File tree

4 files changed

+47
-4
lines changed

4 files changed

+47
-4
lines changed

src/firecracker/src/main.rs

+7-1
Original file line numberDiff line numberDiff line change
@@ -248,6 +248,11 @@ fn main_exec() -> Result<(), MainError> {
248248
Argument::new("mmds-size-limit")
249249
.takes_value(true)
250250
.help("Mmds data store limit, in bytes."),
251+
)
252+
.arg(
253+
Argument::new("no-outlive-parent")
254+
.takes_value(false)
255+
.help("Whether to abort the VMM when the parent process dies."),
251256
);
252257

253258
arg_parser.parse_from_cmdline()?;
@@ -297,7 +302,8 @@ fn main_exec() -> Result<(), MainError> {
297302
.map_err(MainError::LoggerInitialization)?;
298303
info!("Running Firecracker v{FIRECRACKER_VERSION}");
299304

300-
register_signal_handlers().map_err(MainError::RegisterSignalHandlers)?;
305+
let register_pdeathsig = arguments.flag_present("no-outlive-parent");
306+
register_signal_handlers(register_pdeathsig).map_err(MainError::RegisterSignalHandlers)?;
301307

302308
#[cfg(target_arch = "aarch64")]
303309
enable_ssbd_mitigation();

src/vmm/src/lib.rs

+2
Original file line numberDiff line numberDiff line change
@@ -178,6 +178,8 @@ pub enum FcExitCode {
178178
SIGHUP = 156,
179179
/// Firecracker was shut down after intercepting `SIGILL`.
180180
SIGILL = 157,
181+
/// Firecracker was shut down after intercepting `SIGUSR2` (parent process has died).
182+
SIGUSR2 = 158,
181183
/// Bad configuration for microvm's resources, when using a single json.
182184
BadConfiguration = 152,
183185
/// Command line arguments parsing error.

src/vmm/src/logger/metrics.rs

+3
Original file line numberDiff line numberDiff line change
@@ -814,6 +814,8 @@ pub struct SignalMetrics {
814814
pub sighup: SharedStoreMetric,
815815
/// Number of times that SIGILL was handled.
816816
pub sigill: SharedStoreMetric,
817+
/// Number of times that SIGUSR2 was handled.
818+
pub sigusr2: SharedStoreMetric,
817819
}
818820
impl SignalMetrics {
819821
/// Const default construction.
@@ -826,6 +828,7 @@ impl SignalMetrics {
826828
sigpipe: SharedIncMetric::new(),
827829
sighup: SharedStoreMetric::new(),
828830
sigill: SharedStoreMetric::new(),
831+
sigusr2: SharedStoreMetric::new(),
829832
}
830833
}
831834
}

src/vmm/src/signal_handler.rs

+35-3
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
// SPDX-License-Identifier: Apache-2.0
33

44
use libc::{
5-
c_int, c_void, siginfo_t, SIGBUS, SIGHUP, SIGILL, SIGPIPE, SIGSEGV, SIGSYS, SIGXCPU, SIGXFSZ,
5+
c_int, c_void, prctl, siginfo_t, PR_SET_PDEATHSIG, SIGBUS, SIGHUP, SIGILL, SIGPIPE, SIGSEGV,
6+
SIGSYS, SIGUSR2, SIGXCPU, SIGXFSZ,
67
};
78
use log::error;
89
use utils::signal::register_signal_handler;
@@ -74,6 +75,13 @@ fn log_sigsys_err(si_code: c_int, info: *mut siginfo_t) {
7475
);
7576
}
7677

78+
fn log_parent_death_signal(si_code: c_int, _info: *mut siginfo_t) {
79+
error!(
80+
"Shutting down VM after intercepting the parent death signal ({}).",
81+
si_code
82+
);
83+
}
84+
7785
fn empty_fn(_si_code: c_int, _info: *mut siginfo_t) {}
7886

7987
generate_handler!(
@@ -123,6 +131,7 @@ generate_handler!(
123131
METRICS.signals.sighup,
124132
empty_fn
125133
);
134+
126135
generate_handler!(
127136
sigill_handler,
128137
SIGILL,
@@ -131,6 +140,14 @@ generate_handler!(
131140
empty_fn
132141
);
133142

143+
generate_handler!(
144+
sigusr2_handler,
145+
SIGUSR2,
146+
SIGUSR2,
147+
METRICS.signals.sigusr2,
148+
log_parent_death_signal
149+
);
150+
134151
#[inline(always)]
135152
extern "C" fn sigpipe_handler(num: c_int, info: *mut siginfo_t, _unused: *mut c_void) {
136153
// Just record the metric and allow the process to continue, the EPIPE error needs
@@ -155,7 +172,7 @@ extern "C" fn sigpipe_handler(num: c_int, info: *mut siginfo_t, _unused: *mut c_
155172
///
156173
/// Custom handlers are installed for: `SIGBUS`, `SIGSEGV`, `SIGSYS`
157174
/// `SIGXFSZ` `SIGXCPU` `SIGPIPE` `SIGHUP` and `SIGILL`.
158-
pub fn register_signal_handlers() -> utils::errno::Result<()> {
175+
pub fn register_signal_handlers(register_pdeathsig: bool) -> utils::errno::Result<()> {
159176
// Call to unsafe register_signal_handler which is considered unsafe because it will
160177
// register a signal handler which will be called in the current thread and will interrupt
161178
// whatever work is done on the current thread, so we have to keep in mind that the registered
@@ -168,6 +185,14 @@ pub fn register_signal_handlers() -> utils::errno::Result<()> {
168185
register_signal_handler(SIGPIPE, sigpipe_handler)?;
169186
register_signal_handler(SIGHUP, sighup_handler)?;
170187
register_signal_handler(SIGILL, sigill_handler)?;
188+
189+
if register_pdeathsig {
190+
register_signal_handler(SIGUSR2, sigusr2_handler)?;
191+
unsafe {
192+
let rc = libc::prctl(PR_SET_PDEATHSIG, SIGUSR2);
193+
assert_eq!(rc, 0);
194+
}
195+
}
171196
Ok(())
172197
}
173198

@@ -184,7 +209,7 @@ mod tests {
184209
#[test]
185210
fn test_signal_handler() {
186211
let child = thread::spawn(move || {
187-
assert!(register_signal_handlers().is_ok());
212+
assert!(register_signal_handlers(true).is_ok());
188213

189214
let filter = make_test_seccomp_bpf_filter();
190215

@@ -235,6 +260,12 @@ mod tests {
235260
unsafe {
236261
syscall(libc::SYS_kill, process::id(), SIGILL);
237262
}
263+
264+
// Call SIGUSR2 signal handler.
265+
assert_eq!(METRICS.signals.sigusr2.fetch(), 0);
266+
unsafe {
267+
syscall(libc::SYS_kill, process::id(), SIGUSR2);
268+
}
238269
});
239270
assert!(child.join().is_ok());
240271

@@ -246,6 +277,7 @@ mod tests {
246277
assert!(METRICS.signals.sigpipe.count() >= 1);
247278
assert!(METRICS.signals.sighup.fetch() >= 1);
248279
assert!(METRICS.signals.sigill.fetch() >= 1);
280+
assert!(METRICS.signals.sigusr2.fetch() >= 1);
249281
}
250282

251283
fn make_test_seccomp_bpf_filter() -> Vec<sock_filter> {

0 commit comments

Comments
 (0)