aboutsummaryrefslogtreecommitdiff
path: root/selinux
diff options
context:
space:
mode:
Diffstat (limited to 'selinux')
-rw-r--r--selinux/chcon.c175
-rw-r--r--selinux/runcon.c137
2 files changed, 312 insertions, 0 deletions
diff --git a/selinux/chcon.c b/selinux/chcon.c
new file mode 100644
index 000000000..d7ff40816
--- /dev/null
+++ b/selinux/chcon.c
@@ -0,0 +1,175 @@
1/*
2 * chcon -- change security context, based on coreutils-5.97-13
3 *
4 * Port to busybox: KaiGai Kohei <kaigai@kaigai.gr.jp>
5 *
6 * Copyright (C) 2006 - 2007 KaiGai Kohei <kaigai@kaigai.gr.jp>
7 */
8#include "busybox.h"
9#include <getopt.h>
10#include <selinux/context.h>
11
12#define OPT_RECURSIVE (1<<0) /* 'R' */
13#define OPT_CHANHES (1<<1) /* 'c' */
14#define OPT_NODEREFERENCE (1<<2) /* 'h' */
15#define OPT_QUIET (1<<3) /* 'f' */
16#define OPT_USER (1<<4) /* 'u' */
17#define OPT_ROLE (1<<5) /* 'r' */
18#define OPT_TYPE (1<<6) /* 't' */
19#define OPT_RANGE (1<<7) /* 'l' */
20#define OPT_VERBOSE (1<<8) /* 'v' */
21#define OPT_REFERENCE ((1<<9) * ENABLE_FEATURE_CHCON_LONG_OPTIONS)
22#define OPT_COMPONENT_SPECIFIED (OPT_USER | OPT_ROLE | OPT_TYPE | OPT_RANGE)
23
24static char *user = NULL;
25static char *role = NULL;
26static char *type = NULL;
27static char *range = NULL;
28static char *specified_context = NULL;
29
30static int change_filedir_context(const char *fname, struct stat *stbuf, void *userData, int depth)
31{
32 context_t context = NULL;
33 security_context_t file_context = NULL;
34 security_context_t context_string;
35 int rc = FALSE;
36 int status = 0;
37
38 if (option_mask32 & OPT_NODEREFERENCE) {
39 status = lgetfilecon(fname, &file_context);
40 } else {
41 status = getfilecon(fname, &file_context);
42 }
43 if (status < 0 && errno != ENODATA) {
44 if ((option_mask32 & OPT_QUIET) == 0)
45 bb_error_msg("cannot obtain security context: %s", fname);
46 goto skip;
47 }
48
49 if (file_context == NULL && specified_context == NULL) {
50 bb_error_msg("cannot apply partial context to unlabeled file %s", fname);
51 goto skip;
52 }
53
54 if (specified_context == NULL) {
55 context = set_security_context_component(file_context,
56 user, role, type, range);
57 if (!context) {
58 bb_error_msg("cannot compute security context from %s", file_context);
59 goto skip;
60 }
61 } else {
62 context = context_new(specified_context);
63 if (!context) {
64 bb_error_msg("invalid context: %s", specified_context);
65 goto skip;
66 }
67 }
68
69 context_string = context_str(context);
70 if (!context_string) {
71 bb_error_msg("cannot obtain security context in text expression");
72 goto skip;
73 }
74
75 if (file_context == NULL || strcmp(context_string, file_context) != 0) {
76 int fail;
77
78 if (option_mask32 & OPT_NODEREFERENCE) {
79 fail = lsetfilecon(fname, context_string);
80 } else {
81 fail = setfilecon(fname, context_string);
82 }
83 if ((option_mask32 & OPT_VERBOSE) || ((option_mask32 & OPT_CHANHES) && !fail)) {
84 printf(!fail
85 ? "context of %s changed to %s\n"
86 : "failed to change context of %s to %s\n",
87 fname, context_string);
88 }
89 if (!fail) {
90 rc = TRUE;
91 } else if ((option_mask32 & OPT_QUIET) == 0) {
92 bb_error_msg("failed to change context of %s to %s",
93 fname, context_string);
94 }
95 } else if (option_mask32 & OPT_VERBOSE) {
96 printf("context of %s retained as %s\n", fname, context_string);
97 rc = TRUE;
98 }
99skip:
100 /* FIXME: aren't these work ok on NULL ptr? Remove if() then */
101 if (context)
102 context_free(context);
103 if (file_context)
104 freecon(file_context);
105
106 return rc;
107}
108
109#if ENABLE_FEATURE_CHCON_LONG_OPTIONS
110static struct option chcon_options[] = {
111 { "recursive", 0, NULL, 'R' },
112 { "changes", 0, NULL, 'c' },
113 { "no-dereference", 0, NULL, 'h' },
114 { "silent", 0, NULL, 'f' },
115 { "quiet", 0, NULL, 'f' },
116 { "user", 1, NULL, 'u' },
117 { "role", 1, NULL, 'r' },
118 { "type", 1, NULL, 't' },
119 { "range", 1, NULL, 'l' },
120 { "verbose", 0, NULL, 'v' },
121 { "reference", 1, NULL, 0xff }, /* no short option */
122 { NULL, 0, NULL, 0 },
123};
124#endif
125
126int chcon_main(int argc, char *argv[]);
127int chcon_main(int argc, char *argv[])
128{
129 char *reference_file;
130 char *fname;
131 int i, errors = 0;
132
133#if ENABLE_FEATURE_CHCON_LONG_OPTIONS
134 applet_long_options = chcon_options;
135#endif
136 opt_complementary = "-1" /* at least 1 param */
137 ":?:f--v:v--f" /* 'verbose' and 'quiet' are exclusive */
138 ":\xff--urtl:u--\xff:r--\xff:t--\xff:l--\xff";
139 getopt32(argc, argv, "Rchf:u:r:t:l:v",
140 &user, &role, &type, &range, &reference_file);
141 argv += optind;
142
143#if ENABLE_FEATURE_CHCON_LONG_OPTIONS
144 if (option_mask32 & OPT_REFERENCE) {
145 /* FIXME: lgetfilecon() should be used when '-h' is specified.
146 But current implementation follows the original one. */
147 if (getfilecon(reference_file, &specified_context) < 0)
148 bb_perror_msg_and_die("getfilecon('%s') failed", reference_file);
149 } else
150#endif
151 if ((option_mask32 & OPT_COMPONENT_SPECIFIED) == 0) {
152 specified_context = *argv++;
153 /* specified_context is never NULL -
154 * "-1" in opt_complementary prevents this. */
155 if (!argv[0])
156 bb_error_msg_and_die("too few arguments");
157 }
158
159 for (i = 0; (fname = argv[i]) != NULL; i++) {
160 int fname_len = strlen(fname);
161 while (fname_len > 1 && fname[fname_len - 1] == '/')
162 fname_len--;
163 fname[fname_len] = '\0';
164
165 if (recursive_action(fname,
166 option_mask32 & OPT_RECURSIVE,
167 FALSE, /* followLinks */
168 FALSE, /* depthFirst */
169 change_filedir_context,
170 change_filedir_context,
171 NULL, 0) != TRUE)
172 errors = 1;
173 }
174 return errors;
175}
diff --git a/selinux/runcon.c b/selinux/runcon.c
new file mode 100644
index 000000000..24e436feb
--- /dev/null
+++ b/selinux/runcon.c
@@ -0,0 +1,137 @@
1/*
2 * runcon [ context |
3 * ( [ -c ] [ -r role ] [-t type] [ -u user ] [ -l levelrange ] )
4 * command [arg1 [arg2 ...] ]
5 *
6 * attempt to run the specified command with the specified context.
7 *
8 * -r role : use the current context with the specified role
9 * -t type : use the current context with the specified type
10 * -u user : use the current context with the specified user
11 * -l level : use the current context with the specified level range
12 * -c : compute process transition context before modifying
13 *
14 * Contexts are interpreted as follows:
15 *
16 * Number of MLS
17 * components system?
18 *
19 * 1 - type
20 * 2 - role:type
21 * 3 Y role:type:range
22 * 3 N user:role:type
23 * 4 Y user:role:type:range
24 * 4 N error
25 *
26 * Port to busybox: KaiGai Kohei <kaigai@kaigai.gr.jp>
27 * - based on coreutils-5.97 (in Fedora Core 6)
28 */
29#include "busybox.h"
30#include <getopt.h>
31#include <selinux/context.h>
32#include <selinux/flask.h>
33
34static context_t runcon_compute_new_context(char *user, char *role, char *type, char *range,
35 char *command, int compute_trans)
36{
37 context_t con;
38 security_context_t cur_context;
39
40 if (getcon(&cur_context))
41 bb_error_msg_and_die("cannot get current context");
42
43 if (compute_trans) {
44 security_context_t file_context, new_context;
45
46 if (getfilecon(command, &file_context) < 0)
47 bb_error_msg_and_die("cannot retrieve attributes of '%s'",
48 command);
49 if (security_compute_create(cur_context, file_context,
50 SECCLASS_PROCESS, &new_context))
51 bb_error_msg_and_die("unable to compute a new context");
52 cur_context = new_context;
53 }
54
55 con = context_new(cur_context);
56 if (!con)
57 bb_error_msg_and_die("'%s' is not a valid context", cur_context);
58 if (user && context_user_set(con, user))
59 bb_error_msg_and_die("failed to set new user '%s'", user);
60 if (type && context_type_set(con, type))
61 bb_error_msg_and_die("failed to set new type '%s'", type);
62 if (range && context_range_set(con, range))
63 bb_error_msg_and_die("failed to set new range '%s'", range);
64 if (role && context_role_set(con, role))
65 bb_error_msg_and_die("failed to set new role '%s'", role);
66
67 return con;
68}
69
70#if ENABLE_FEATURE_RUNCON_LONG_OPTIONS
71static const struct option runcon_options[] = {
72 { "user", 1, NULL, 'u' },
73 { "role", 1, NULL, 'r' },
74 { "type", 1, NULL, 't' },
75 { "range", 1, NULL, 'l' },
76 { "compute", 0, NULL, 'c' },
77 { "help", 0, NULL, 'h' },
78 { NULL, 0, NULL, 0 },
79};
80#endif
81
82#define OPTS_ROLE (1<<0) /* r */
83#define OPTS_TYPE (1<<1) /* t */
84#define OPTS_USER (1<<2) /* u */
85#define OPTS_RANGE (1<<3) /* l */
86#define OPTS_COMPUTE (1<<4) /* c */
87#define OPTS_HELP (1<<5) /* h */
88#define OPTS_CONTEXT_COMPONENT (OPTS_ROLE | OPTS_TYPE | OPTS_USER | OPTS_RANGE)
89
90int runcon_main(int argc, char *argv[]);
91int runcon_main(int argc, char *argv[])
92{
93 char *role = NULL;
94 char *range = NULL;
95 char *user = NULL;
96 char *type = NULL;
97 char *context = NULL;
98 unsigned opts;
99 context_t con;
100
101 selinux_or_die();
102
103#if ENABLE_FEATURE_RUNCON_LONG_OPTIONS
104 applet_long_options = runcon_options;
105#endif
106 opt_complementary = "-1";
107 opts = getopt32(argc, argv, "r:t:u:l:ch", &role, &type, &user, &range);
108 argv += optind;
109
110 if (!(opts & OPTS_CONTEXT_COMPONENT)) {
111 context = *argv++;
112 if (!argv[0])
113 bb_error_msg_and_die("no command found");
114 }
115
116 if (context) {
117 con = context_new(context);
118 if (!con)
119 bb_error_msg_and_die("'%s' is not a valid context", context);
120 } else {
121 con = runcon_compute_new_context(user, role, type, range,
122 argv[0], opts & OPTS_COMPUTE);
123 }
124
125 if (security_check_context(context_str(con)))
126 bb_error_msg_and_die("'%s' is not a valid context",
127 context_str(con));
128
129 if (setexeccon(context_str(con)))
130 bb_error_msg_and_die("cannot set up security context '%s'",
131 context_str(con));
132
133 execvp(argv[0], argv);
134
135 bb_perror_msg_and_die("cannot execute '%s'", command);
136 return 1;
137}