/* setfiles: based on policycoreutils 2.0.19 policycoreutils was released under GPL 2. Port to BusyBox (c) 2007 by Yuichi Nakamura <ynakam@hitachisoft.jp> */ //usage:#define setfiles_trivial_usage //usage: "[-dnpqsvW] [-e DIR]... [-o FILE] [-r alt_root_path]" //usage: IF_FEATURE_SETFILES_CHECK_OPTION( //usage: " [-c policyfile] spec_file" //usage: ) //usage: " pathname" //usage:#define setfiles_full_usage "\n\n" //usage: "Reset file contexts under pathname according to spec_file\n" //usage: IF_FEATURE_SETFILES_CHECK_OPTION( //usage: "\n -c FILE Check the validity of the contexts against the specified binary policy" //usage: ) //usage: "\n -d Show which specification matched each file" //usage: "\n -l Log changes in file labels to syslog" //usage: "\n -n Don't change any file labels" //usage: "\n -q Suppress warnings" //usage: "\n -r DIR Use an alternate root path" //usage: "\n -e DIR Exclude DIR" //usage: "\n -F Force reset of context to match file_context for customizable files" //usage: "\n -o FILE Save list of files with incorrect context" //usage: "\n -s Take a list of files from stdin (instead of command line)" //usage: "\n -v Show changes in file labels, if type or role are changing" //usage: "\n -vv Show changes in file labels, if type, role, or user are changing" //usage: "\n -W Display warnings about entries that had no matching files" //usage: //usage:#define restorecon_trivial_usage //usage: "[-iFnRv] [-e EXCLUDEDIR]... [-o FILE] [-f FILE]" //usage:#define restorecon_full_usage "\n\n" //usage: "Reset security contexts of files in pathname\n" //usage: "\n -i Ignore files that don't exist" //usage: "\n -f FILE File with list of files to process" //usage: "\n -e DIR Directory to exclude" //usage: "\n -R,-r Recurse" //usage: "\n -n Don't change any file labels" //usage: "\n -o FILE Save list of files with incorrect context" //usage: "\n -v Verbose" //usage: "\n -vv Show changed labels" //usage: "\n -F Force reset of context to match file_context" //usage: "\n for customizable files, or the user section," //usage: "\n if it has changed" #include "libbb.h" #if ENABLE_FEATURE_SETFILES_CHECK_OPTION #include <sepol/sepol.h> #endif #define MAX_EXCLUDES 50 struct edir { char *directory; size_t size; }; struct globals { FILE *outfile; char *policyfile; char *rootpath; int rootpathlen; unsigned count; int excludeCtr; int errors; int verbose; /* getopt32 uses it, has to be int */ smallint recurse; /* Recursive descent */ smallint follow_mounts; /* Behavior flags determined based on setfiles vs. restorecon */ smallint expand_realpath; /* Expand paths via realpath */ smallint abort_on_error; /* Abort the file tree walk upon an error */ int add_assoc; /* Track inode associations for conflict detection */ int matchpathcon_flags; /* Flags to matchpathcon */ dev_t dev_id; /* Device id where target file exists */ int nerr; struct edir excludeArray[MAX_EXCLUDES]; } FIX_ALIASING; #define G (*(struct globals*)&bb_common_bufsiz1) void BUG_setfiles_globals_too_big(void); #define INIT_G() do { \ if (sizeof(G) > COMMON_BUFSIZE) \ BUG_setfiles_globals_too_big(); \ /* memset(&G, 0, sizeof(G)); - already is */ \ } while (0) #define outfile (G.outfile ) #define policyfile (G.policyfile ) #define rootpath (G.rootpath ) #define rootpathlen (G.rootpathlen ) #define count (G.count ) #define excludeCtr (G.excludeCtr ) #define errors (G.errors ) #define verbose (G.verbose ) #define recurse (G.recurse ) #define follow_mounts (G.follow_mounts ) #define expand_realpath (G.expand_realpath ) #define abort_on_error (G.abort_on_error ) #define add_assoc (G.add_assoc ) #define matchpathcon_flags (G.matchpathcon_flags) #define dev_id (G.dev_id ) #define nerr (G.nerr ) #define excludeArray (G.excludeArray ) /* Must match getopt32 string! */ enum { OPT_d = (1 << 0), OPT_e = (1 << 1), OPT_f = (1 << 2), OPT_i = (1 << 3), OPT_l = (1 << 4), OPT_n = (1 << 5), OPT_p = (1 << 6), OPT_q = (1 << 7), OPT_r = (1 << 8), OPT_s = (1 << 9), OPT_v = (1 << 10), OPT_o = (1 << 11), OPT_F = (1 << 12), OPT_W = (1 << 13), OPT_c = (1 << 14), /* c only for setfiles */ OPT_R = (1 << 14), /* R only for restorecon */ }; #define FLAG_d_debug (option_mask32 & OPT_d) #define FLAG_e (option_mask32 & OPT_e) #define FLAG_f (option_mask32 & OPT_f) #define FLAG_i_ignore_enoent (option_mask32 & OPT_i) #define FLAG_l_take_log (option_mask32 & OPT_l) #define FLAG_n_dry_run (option_mask32 & OPT_n) #define FLAG_p_progress (option_mask32 & OPT_p) #define FLAG_q_quiet (option_mask32 & OPT_q) #define FLAG_r (option_mask32 & OPT_r) #define FLAG_s (option_mask32 & OPT_s) #define FLAG_v (option_mask32 & OPT_v) #define FLAG_o (option_mask32 & OPT_o) #define FLAG_F_force (option_mask32 & OPT_F) #define FLAG_W_warn_no_match (option_mask32 & OPT_W) #define FLAG_c (option_mask32 & OPT_c) #define FLAG_R (option_mask32 & OPT_R) static void qprintf(const char *fmt UNUSED_PARAM, ...) { /* quiet, do nothing */ } static void inc_err(void) { nerr++; if (nerr > 9 && !FLAG_d_debug) { bb_error_msg_and_die("exiting after 10 errors"); } } static void add_exclude(const char *directory) { struct stat sb; size_t len; if (directory == NULL || directory[0] != '/') { bb_error_msg_and_die("full path required for exclude: %s", directory); } if (lstat(directory, &sb)) { bb_error_msg("directory \"%s\" not found, ignoring", directory); return; } if ((sb.st_mode & S_IFDIR) == 0) { bb_error_msg("\"%s\" is not a directory: mode %o, ignoring", directory, sb.st_mode); return; } if (excludeCtr == MAX_EXCLUDES) { bb_error_msg_and_die("maximum excludes %d exceeded", MAX_EXCLUDES); } len = strlen(directory); while (len > 1 && directory[len - 1] == '/') { len--; } excludeArray[excludeCtr].directory = xstrndup(directory, len); excludeArray[excludeCtr++].size = len; } static bool exclude(const char *file) { int i = 0; for (i = 0; i < excludeCtr; i++) { if (strncmp(file, excludeArray[i].directory, excludeArray[i].size) == 0) { if (file[excludeArray[i].size] == '\0' || file[excludeArray[i].size] == '/') { return 1; } } } return 0; } static int match(const char *name, struct stat *sb, char **con) { int ret; char path[PATH_MAX + 1]; char *tmp_path = xstrdup(name); if (excludeCtr > 0 && exclude(name)) { goto err; } ret = lstat(name, sb); if (ret) { if (FLAG_i_ignore_enoent && errno == ENOENT) { free(tmp_path); return 0; } bb_error_msg("stat(%s)", name); goto err; } if (expand_realpath) { if (S_ISLNK(sb->st_mode)) { char *p = NULL; char *file_sep; size_t len = 0; if (verbose > 1) bb_error_msg("warning! %s refers to a symbolic link, not following last component", name); file_sep = strrchr(tmp_path, '/'); if (file_sep == tmp_path) { file_sep++; path[0] = '\0'; p = path; } else if (file_sep) { *file_sep++ = '\0'; p = realpath(tmp_path, path); } else { file_sep = tmp_path; p = realpath("./", path); } if (p) len = strlen(p); if (!p || len + strlen(file_sep) + 2 > PATH_MAX) { bb_perror_msg("realpath(%s) failed", name); goto err; } p += len; /* ensure trailing slash of directory name */ if (len == 0 || p[-1] != '/') { *p++ = '/'; } strcpy(p, file_sep); name = path; if (excludeCtr > 0 && exclude(name)) goto err; } else { char *p; p = realpath(name, path); if (!p) { bb_perror_msg("realpath(%s)", name); goto err; } name = p; if (excludeCtr > 0 && exclude(name)) goto err; } } /* name will be what is matched in the policy */ if (NULL != rootpath) { if (0 != strncmp(rootpath, name, rootpathlen)) { bb_error_msg("%s is not located in %s", name, rootpath); goto err; } name += rootpathlen; } free(tmp_path); if (rootpath != NULL && name[0] == '\0') /* this is actually the root dir of the alt root */ return matchpathcon_index("/", sb->st_mode, con); return matchpathcon_index(name, sb->st_mode, con); err: free(tmp_path); return -1; } /* Compare two contexts to see if their differences are "significant", * or whether the only difference is in the user. */ static bool only_changed_user(const char *a, const char *b) { if (FLAG_F_force) return 0; if (!a || !b) return 0; a = strchr(a, ':'); /* Rest of the context after the user */ b = strchr(b, ':'); if (!a || !b) return 0; return (strcmp(a, b) == 0); } static int restore(const char *file) { char *my_file; struct stat my_sb; int i, j, ret; char *context = NULL; char *newcon = NULL; bool user_only_changed = 0; int retval = 0; my_file = bb_simplify_path(file); i = match(my_file, &my_sb, &newcon); if (i < 0) /* No matching specification. */ goto out; if (FLAG_p_progress) { count++; if (count % 0x400 == 0) { /* every 1024 times */ count = (count % (80*0x400)); if (count == 0) bb_putchar('\n'); bb_putchar('*'); fflush_all(); } } /* * Try to add an association between this inode and * this specification. If there is already an association * for this inode and it conflicts with this specification, * then use the last matching specification. */ if (add_assoc) { j = matchpathcon_filespec_add(my_sb.st_ino, i, my_file); if (j < 0) goto err; if (j != i) { /* There was already an association and it took precedence. */ goto out; } } if (FLAG_d_debug) printf("%s: %s matched by %s\n", applet_name, my_file, newcon); /* Get the current context of the file. */ ret = lgetfilecon_raw(my_file, &context); if (ret < 0) { if (errno == ENODATA) { context = NULL; /* paranoia */ } else { bb_perror_msg("lgetfilecon_raw on %s", my_file); goto err; } user_only_changed = 0; } else user_only_changed = only_changed_user(context, newcon); /* * Do not relabel the file if the matching specification is * <<none>> or the file is already labeled according to the * specification. */ if ((strcmp(newcon, "<<none>>") == 0) || (context && (strcmp(context, newcon) == 0) && !FLAG_F_force)) { goto out; } if (!FLAG_F_force && context && (is_context_customizable(context) > 0)) { if (verbose > 1) { bb_error_msg("skipping %s. %s is customizable_types", my_file, context); } goto out; } if (verbose) { /* If we're just doing "-v", trim out any relabels where * the user has changed but the role and type are the * same. For "-vv", emit everything. */ if (verbose > 1 || !user_only_changed) { bb_info_msg("%s: reset %s context %s->%s", applet_name, my_file, context ? context : "", newcon); } } if (FLAG_l_take_log && !user_only_changed) { if (context) bb_info_msg("relabeling %s from %s to %s", my_file, context, newcon); else bb_info_msg("labeling %s to %s", my_file, newcon); } if (outfile && !user_only_changed) fprintf(outfile, "%s\n", my_file); /* * Do not relabel the file if -n was used. */ if (FLAG_n_dry_run || user_only_changed) goto out; /* * Relabel the file to the specified context. */ ret = lsetfilecon(my_file, newcon); if (ret) { bb_perror_msg("lsetfileconon(%s,%s)", my_file, newcon); goto err; } out: freecon(context); freecon(newcon); free(my_file); return retval; err: retval--; /* -1 */ goto out; } /* * Apply the last matching specification to a file. * This function is called by recursive_action on each file during * the directory traversal. */ static int FAST_FUNC apply_spec( const char *file, struct stat *sb, void *userData UNUSED_PARAM, int depth UNUSED_PARAM) { if (!follow_mounts) { /* setfiles does not process across different mount points */ if (sb->st_dev != dev_id) { return SKIP; } } errors |= restore(file); if (abort_on_error && errors) return FALSE; return TRUE; } static int canoncon(const char *path, unsigned lineno, char **contextp) { static const char err_msg[] ALIGN1 = "%s: line %u has invalid context %s"; char *tmpcon; char *context = *contextp; int invalid = 0; #if ENABLE_FEATURE_SETFILES_CHECK_OPTION if (policyfile) { if (sepol_check_context(context) >= 0) return 0; /* Exit immediately if we're in checking mode. */ bb_error_msg_and_die(err_msg, path, lineno, context); } #endif if (security_canonicalize_context_raw(context, &tmpcon) < 0) { if (errno != ENOENT) { invalid = 1; inc_err(); } } else { free(context); *contextp = tmpcon; } if (invalid) { bb_error_msg(err_msg, path, lineno, context); } return invalid; } static int process_one(char *name) { struct stat sb; int rc; rc = lstat(name, &sb); if (rc < 0) { if (FLAG_i_ignore_enoent && errno == ENOENT) return 0; bb_perror_msg("stat(%s)", name); goto err; } dev_id = sb.st_dev; if (S_ISDIR(sb.st_mode) && recurse) { if (recursive_action(name, ACTION_RECURSE, apply_spec, apply_spec, NULL, 0) != TRUE ) { bb_error_msg("error while labeling %s", name); goto err; } } else { rc = restore(name); if (rc) goto err; } out: if (add_assoc) { if (FLAG_q_quiet) set_matchpathcon_printf(&qprintf); matchpathcon_filespec_eval(); set_matchpathcon_printf(NULL); matchpathcon_filespec_destroy(); } return rc; err: rc = -1; goto out; } int setfiles_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; int setfiles_main(int argc UNUSED_PARAM, char **argv) { struct stat sb; int rc, i = 0; const char *input_filename = NULL; char *buf = NULL; size_t buf_len; int flags; llist_t *exclude_dir = NULL; char *out_filename = NULL; INIT_G(); if (applet_name[0] == 's') { /* "setfiles" */ /* * setfiles: * Recursive descent, * Does not expand paths via realpath, * Aborts on errors during the file tree walk, * Try to track inode associations for conflict detection, * Does not follow mounts, * Validates all file contexts at init time. */ recurse = 1; abort_on_error = 1; add_assoc = 1; /* follow_mounts = 0; - already is */ matchpathcon_flags = MATCHPATHCON_VALIDATE | MATCHPATHCON_NOTRANS; } else { /* * restorecon: * No recursive descent unless -r/-R, * Expands paths via realpath, * Do not abort on errors during the file tree walk, * Do not try to track inode associations for conflict detection, * Follows mounts, * Does lazy validation of contexts upon use. */ expand_realpath = 1; follow_mounts = 1; matchpathcon_flags = MATCHPATHCON_NOTRANS; /* restorecon only */ selinux_or_die(); } set_matchpathcon_flags(matchpathcon_flags); opt_complementary = "e::vv:v--p:p--v:v--q:q--v"; /* Option order must match OPT_x definitions! */ if (applet_name[0] == 'r') { /* restorecon */ flags = getopt32(argv, "de:f:ilnpqrsvo:FWR", &exclude_dir, &input_filename, &out_filename, &verbose); } else { /* setfiles */ flags = getopt32(argv, "de:f:ilnpqr:svo:FW" IF_FEATURE_SETFILES_CHECK_OPTION("c:"), &exclude_dir, &input_filename, &rootpath, &out_filename, IF_FEATURE_SETFILES_CHECK_OPTION(&policyfile,) &verbose); } argv += optind; #if ENABLE_FEATURE_SETFILES_CHECK_OPTION if ((applet_name[0] == 's') && (flags & OPT_c)) { FILE *policystream; policystream = xfopen_for_read(policyfile); if (sepol_set_policydb_from_file(policystream) < 0) { bb_error_msg_and_die("sepol_set_policydb_from_file on %s", policyfile); } fclose(policystream); /* Only process the specified file_contexts file, not * any .homedirs or .local files, and do not perform * context translations. */ set_matchpathcon_flags(MATCHPATHCON_BASEONLY | MATCHPATHCON_NOTRANS | MATCHPATHCON_VALIDATE); } #endif while (exclude_dir) add_exclude(llist_pop(&exclude_dir)); if (flags & OPT_o) { outfile = stdout; if (NOT_LONE_CHAR(out_filename, '-')) { outfile = xfopen_for_write(out_filename); } } if (applet_name[0] == 'r') { /* restorecon */ if (flags & (OPT_r | OPT_R)) recurse = 1; } else { /* setfiles */ if (flags & OPT_r) rootpathlen = strlen(rootpath); } if (flags & OPT_s) { input_filename = "-"; add_assoc = 0; } if (applet_name[0] == 's') { /* setfiles */ /* Use our own invalid context checking function so that * we can support either checking against the active policy or * checking against a binary policy file. */ set_matchpathcon_canoncon(&canoncon); if (!argv[0]) bb_show_usage(); xstat(argv[0], &sb); if (!S_ISREG(sb.st_mode)) { bb_error_msg_and_die("spec file %s is not a regular file", argv[0]); } /* Load the file contexts configuration and check it. */ rc = matchpathcon_init(argv[0]); if (rc < 0) { bb_simple_perror_msg_and_die(argv[0]); } if (nerr) exit(EXIT_FAILURE); argv++; } if (input_filename) { ssize_t len; FILE *f = stdin; if (NOT_LONE_CHAR(input_filename, '-')) f = xfopen_for_read(input_filename); while ((len = getline(&buf, &buf_len, f)) > 0) { buf[len - 1] = '\0'; errors |= process_one(buf); } if (ENABLE_FEATURE_CLEAN_UP) fclose_if_not_stdin(f); } else { if (!argv[0]) bb_show_usage(); for (i = 0; argv[i]; i++) { errors |= process_one(argv[i]); } } if (FLAG_W_warn_no_match) matchpathcon_checkmatches(argv[0]); if (ENABLE_FEATURE_CLEAN_UP && outfile) fclose(outfile); return errors; }