diff options
author | Lauri Aarnio <Lauri.Aarnio@iki.fi> | 2009-01-29 17:01:40 +0200 |
---|---|---|
committer | Lauri Leukkunen <lle@rahina.org> | 2009-02-10 08:38:10 +0200 |
commit | 905e4b3d3ad88ef66587707ed975184afaff9dcc (patch) | |
tree | cd8fcb3c6b7d90a5c246cf251fff894fc1d4eb07 /lua_scripts/argvenvp.lua | |
parent | 3af026302c6095daf1be51a72372e7b91c6fe789 (diff) |
Exec algorithm improvements: Policy-based mapping of script interpreters
- this commit adds support for exec policy based mapping of script interpreter:
A script interpreter can be selected based on location of the script.
For example, perl scripts from tools_root may map /usr/bin/perl to
tools_root, while perl scripts from the target_root can map /usr/bin/perl
to target_root.
- This commit does not contain changes to the mapping rules => everything
still works just as before (related changes to the "devel" mode will be
added by another commit)
Diffstat (limited to 'lua_scripts/argvenvp.lua')
-rw-r--r-- | lua_scripts/argvenvp.lua | 145 |
1 files changed, 115 insertions, 30 deletions
diff --git a/lua_scripts/argvenvp.lua b/lua_scripts/argvenvp.lua index e647e78..ac65000 100644 --- a/lua_scripts/argvenvp.lua +++ b/lua_scripts/argvenvp.lua @@ -205,6 +205,115 @@ function setenv_native_app_ld_library_path(exec_policy, envp) end -- ------------------------------------ +-- returns args_ok, rule, exec_policy +function check_rule_and_policy(rule, exec_policy, filename, mapped_file) + + -- First, if either rule or the exec policy is a string, something + -- has failed during the previous steps or mapping has been disabled; + -- => fail + if ((type(rule) == "string") or (type(exec_policy) == "string")) then + local rs = "" + local eps = "" + if (type(rule) == "string") then + rs = rule + end + if (type(exec_policy) == "string") then + eps = exec_policy + end + + sb.log("debug", "check_rule_and_policy: "..rs..";"..eps); + return false, rule, exec_policy + end + + -- if exec_policy was not provided by the caller (i.e. not + -- provided by the mapping rule), look up the policy from + -- exec_policy_chains array. + if (exec_policy == nil) then + local res + + sb.log("debug", "trying exec_policy_chains..") + res, exec_policy = sb_find_exec_policy(binaryname, mapped_file) + if res == 0 then + -- there is no default policy for this mode + sb.log("notice", + "sb_execve_postprocess: No exec_policy for "..filename) + return false, rule, exec_policy + end + end + + -- Exec policy is OK. + + return true, rule, exec_policy +end + +-- ------------------------------------ +-- Script interpreter mapping. + +-- This is called from C: +-- returns: rule, policy, result, mapped_interpreter, #argv, argv, #envp, envp +-- "result" is one of: +-- 0: argv / envp were modified; mapped_interpreter was set +-- 1: argv / envp were not modified; mapped_interpreter was set +-- 2: argv / envp were not modified; caller should call ordinary path +-- mapping to find the interpreter +-- -1: deny exec. +function sb_execve_map_script_interpreter(rule, exec_policy, interpreter, + interp_arg, mapped_script_filename, orig_script_filename, argv, envp) + + local args_ok + args_ok, rule, exec_policy = check_rule_and_policy(rule, + exec_policy, orig_script_filename, mapped_script_filename) + + if args_ok == false then + -- no exec policy. Deny exec, we can't find the interpreter + sb.log("error", "Unable to map script interpreter."); + return rule, exec_policy, -1, interpreter, #argv, argv, #envp, envp + end + + -- exec policy is OK. + + if (exec_policy.script_log_level ~= nil) then + sb.log(exec_policy.script_log_level, + exec_policy.script_log_message) + end + + if (exec_policy.script_deny_exec == true) then + return rule, exec_policy, -1, interpreter, #argv, argv, #envp, envp + end + + if (exec_policy.name == nil) then + sb.log("debug", "Applying nameless exec_policy to script") + else + sb.log("debug", string.format( + "Applying exec_policy '%s' to script", + exec_policy.name)) + end + + if (exec_policy.script_interpreter_rule ~= nil) then + local exec_pol_2, mapped_interpreter, ro_flag + + exec_pol_2, mapped_interpreter, ro_flag = sbox_execute_rule( + interpreter, "map_script_interpreter", + interpreter, interpreter, + exec_policy.script_interpreter_rule) + + if exec_policy.script_set_argv0_to_mapped_interpreter then + argv[1] = mapped_interpreter + return rule, exec_policy, 0, + mapped_interpreter, #argv, argv, #envp, envp + else + return rule, exec_policy, 1, + mapped_interpreter, #argv, argv, #envp, envp + end + end + + -- The default case: + -- exec policy says nothing about the script interpreters. + -- use ordinary path mapping to find it + return rule, exec_policy, 2, interpreter, #argv, argv, #envp, envp +end + +-- ------------------------------------ -- Exec postprocessing. -- function sb_execve_postprocess is called to decide HOW the executable -- should be started (see description of the algorithm in sb_exec.c) @@ -533,40 +642,16 @@ end function sb_execve_postprocess(rule, exec_policy, exec_type, mapped_file, filename, binaryname, argv, envp) - -- First, if either rule or the exec policy is a string, something - -- has failed during the previous steps or mapping has been disabled; - -- in both cases postprocessing is not needed, exec must be allowed. - if ((type(rule) == "string") or (type(exec_policy) == "string")) then - local rs = "" - local eps = "" - if (type(rule) == "string") then - rs = rule - end - if (type(exec_policy) == "string") then - eps = exec_policy - end + local args_ok + args_ok, rule, exec_policy = check_rule_and_policy(rule, + exec_policy, filename, mapped_file) - sb.log("debug", "sb_execve_postprocess: "..rs..";"..eps.. - " (going to exec with orig.args)") + if args_ok == false then + -- postprocessing is not needed / can't be done, but + -- exec must be allowed. return 1, mapped_file, filename, #argv, argv, #envp, envp end - -- if exec_policy was not provided by the caller (i.e. not - -- provided by the mapping rule), look up the policy from - -- exec_policy_chains array. - if (exec_policy == nil) then - local res - - sb.log("debug", "trying exec_policy_chains..") - res, exec_policy = sb_find_exec_policy(binaryname, mapped_file) - if res == 0 then - -- there is no default policy for this mode - sb.log("notice", - "sb_execve_postprocess: No exec_policy for "..filename) - return 1, mapped_file, filename, #argv, argv, #envp, envp - end - end - -- Exec policy found. if (exec_policy.log_level ~= nil) then |