Blob Blame History Raw
/*
 * Author: Karl MacMillan <kmacmillan@tresys.com>
 *
 * Modified:  
 *   Dan Walsh <dwalsh@redhat.com> - Added security_load_booleans().
 */

#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <assert.h>
#include <stdlib.h>
#include <dirent.h>
#include <string.h>
#include <stdio.h>
#include <unistd.h>
#include <fnmatch.h>
#include <limits.h>
#include <ctype.h>
#include <errno.h>

#include "selinux_internal.h"
#include "policy.h"

#define SELINUX_BOOL_DIR "/booleans/"

static int filename_select(const struct dirent *d)
{
	int len;

	len = strlen(d->d_name);
	if (len == 1 && d->d_name[0] == '.')
		return 0;
	if (len == 2 && d->d_name[0] == '.' &&
	    d->d_name[1] == '.')
		return 0;
	return 1;
}

int security_get_boolean_names(char ***names, int *len)
{
	char path[PATH_MAX];
	int i, rc;
	struct dirent **namelist;
	char **n;

	assert(len);
	if (!selinux_mnt) {
		errno = ENOENT;
		return -1;
	}

	snprintf(path, sizeof path, "%s%s", selinux_mnt, SELINUX_BOOL_DIR);
	*len = scandir(path, &namelist, &filename_select,
		       alphasort);
	if (*len <= 0) {
		return -1;
	}

	n = (char**)malloc(sizeof(char*) * *len);
	if (!n) {
		rc = -1;
		goto bad;
	}

	memset(n, 0, sizeof(char*) * *len);
	
	for (i = 0; i < *len; i++) {
		n[i] = (char*)malloc(sizeof(char)
				     * (namelist[i]->d_reclen + 1));
		if (!n[i]) {
			rc = -1;
			goto bad_freen;
		}
		strncpy(n[i], namelist[i]->d_name, namelist[i]->d_reclen + 1);
	}
	rc = 0;
	*names = n;
out:
	for (i = 0; i < *len; i++) {
		free(namelist[i]);
	}
	free(namelist);
	return rc;
bad_freen:
	for (i = 0; i < *len; i++) {
		if (n[i])
			free(n[i]);
	}
	free(n);
bad:
	goto out;
}
hidden_def(security_get_boolean_names)

#define STRBUF_SIZE 3 
static int get_bool_value(const char *name, char **buf)
{
	int fd, len;
	char *fname = NULL;

	if (!selinux_mnt) {
		errno = ENOENT;
		return -1;
	}

	*buf = (char*)malloc(sizeof(char) * (STRBUF_SIZE + 1));
	if (!*buf)
		goto out;
	(*buf)[STRBUF_SIZE] = 0;

	len = strlen(name) + strlen(selinux_mnt) + sizeof(SELINUX_BOOL_DIR);
	fname = (char*)malloc(sizeof(char) * len);
	if (!fname)
		goto out;
	snprintf(fname, len, "%s%s%s", selinux_mnt, SELINUX_BOOL_DIR, name);

	fd = open(fname, O_RDONLY);
	if (fd < 0)
		goto out;

	len = read(fd, *buf, STRBUF_SIZE);
	close(fd);
	if (len != STRBUF_SIZE)
		goto out;

	free(fname);
	return 0;
out:
	if (*buf)
		free(*buf);
	if (fname)
		free(fname);
	return -1;
}

int security_get_boolean_pending(const char *name)
{
	char *buf;
	int val;

	if (get_bool_value(name, &buf))
		return -1;

	if (atoi(&buf[1]))
		val = 1;
	else
		val = 0;
	free(buf);
	return val;
}

int security_get_boolean_active(const char *name)
{
	char *buf;
	int val;

	if (get_bool_value(name, &buf))
		return -1;

	buf[1] = '\0';
	if (atoi(buf))
		val = 1;
	else
		val = 0;
	free(buf);
	return val;
}
hidden_def(security_get_boolean_active)

int security_set_boolean(const char *name, int value)
{
	int fd, ret, len;
	char buf[2], *fname;

	if (!selinux_mnt) {
		errno = ENOENT;
		return -1;
	}
	if ( value < 0 || value > 1 ) {
		errno = EINVAL;
		return -1;
	}

	len = strlen(name) + strlen(selinux_mnt) + sizeof(SELINUX_BOOL_DIR);
	fname = (char*)malloc(sizeof(char) * len);
	if (!fname)
		return -1;
	snprintf(fname, len, "%s%s%s", selinux_mnt, SELINUX_BOOL_DIR, name);

	fd = open(fname, O_WRONLY);
	if (fd < 0) {
		ret = -1;
		goto out;
	}

	if (value)
		buf[0] = '1';
	else
		buf[0] = '0';
	buf[1] = '\0';
	
	ret = write(fd, buf, 2);
	close(fd);
out:
	free(fname);
	if (ret > 0)
		return 0;
	else
		return -1;
}
hidden_def(security_set_boolean)

int security_commit_booleans(void)
{
	int fd, ret;
	char buf[2];
	char path[PATH_MAX];

	if (!selinux_mnt) {
		errno = ENOENT;
		return -1;
	}

	snprintf(path, sizeof path, "%s/commit_pending_bools", selinux_mnt);
	fd = open(path, O_WRONLY);
	if (fd < 0)
		return -1;

	buf[0] = '1';
	buf[1] = '\0';
	
	ret = write(fd, buf, 2);
	close(fd);

	if (ret > 0)
		return 0;
	else
		return -1;
}
hidden_def(security_commit_booleans)

static char *strtrim(char *dest, char *source, int size) {
	int i=0;
	char *ptr=source;
	i=0;
	while(isspace(*ptr) && i < size) {
		ptr++;
		i++;
	}
	strncpy(dest,ptr,size);
	for(i=strlen(dest)-1; i> 0; i--) {
		if (!isspace(dest[i])) break;
	}
	dest[i+1]='\0';
	return dest;
}
static int process_boolean(char *buffer, char *name, int namesize, int *val) {
	char name1[BUFSIZ];
	char *ptr;
	char *tok=strtok_r(buffer,"=",&ptr);
	if (tok) {
		strncpy(name1,tok, BUFSIZ-1);
		strtrim(name,name1,namesize-1);
		if ( name[0]=='#' ) return 0;
		tok=strtok_r(NULL,"\0",&ptr);
		if (tok) {
			while (isspace(*tok)) tok++;
			*val = -1;
			if (isdigit(tok[0]))
				*val=atoi(tok);
			else if (!strncasecmp(tok, "true", sizeof("true")-1))
				*val = 1;
			else if (!strncasecmp(tok, "false", sizeof("false")-1))
				*val = 0;
			if (*val != 0 && *val != 1) {
				errno=EINVAL;
				return -1;
			}
			
		}
	}
	return 1;
}
static int save_booleans(size_t boolcnt, SELboolean *boollist) {
	ssize_t len;
	size_t i;
	char outbuf[BUFSIZ];
	char *inbuf=NULL;
	
	/* Open file */
	const char *bool_file = selinux_booleans_path();
	char local_bool_file[PATH_MAX];
	char tmp_bool_file[PATH_MAX]; 
	FILE *boolf;
	int fd;
	int *used= (int *) malloc (sizeof(int) * boolcnt);
	if (! used) {
		return -1;
	}
	/* zero out used field */
	for (i=0; i < boolcnt; i++)
		used[i]=0;


	snprintf(tmp_bool_file,sizeof(tmp_bool_file),"%s.XXXXXX", bool_file);
	fd = mkstemp(tmp_bool_file);
	if (fd < 0) { 
		free(used);
		return -1;
	}

	snprintf(local_bool_file,sizeof(local_bool_file),"%s.local", bool_file);	boolf = fopen(local_bool_file,"r");
	if (boolf != NULL) {
		ssize_t ret;
		size_t size=0;
		int val;
		char boolname[BUFSIZ];
		char *buffer;
		char *inbuf=NULL;
		while ((len=getline(&inbuf, &size, boolf)) > 0) {
			buffer=strdup(inbuf);
			if (!buffer) goto close_remove_fail;
			ret=process_boolean(inbuf, boolname, sizeof(boolname), &val);
			if (ret!=1) { 
				ret=write(fd, buffer, len);
				free(buffer);
				if (ret != len) 
					goto close_remove_fail;
			} else {
				free(buffer);
				for (i=0; i < boolcnt; i++) {
					if (strcmp(boollist[i].name, boolname)==0) {
						snprintf(outbuf,sizeof(outbuf), "%s=%d\n", boolname, boollist[i].value); 
						len=strlen(outbuf);
						used[i]=1;
						if (write(fd, outbuf, len) != len) 
							goto close_remove_fail;
						else 
							break;
					}
				}
				if ( i == boolcnt ) {
					snprintf(outbuf,sizeof(outbuf), "%s=%d\n", boolname, val); 
					len=strlen(outbuf);
					if (write(fd, outbuf, len) != len) 
						goto close_remove_fail;
				}
			}
			free(inbuf);
			inbuf=NULL;
		}
		fclose(boolf);
	}
	
	for (i=0; i < boolcnt; i++) {
		if (used[i]==0) {
			snprintf(outbuf,sizeof(outbuf), "%s=%d\n", boollist[i].name, boollist[i].value); 
			len=strlen(outbuf);
			if (write(fd, outbuf, len) != len) {
			close_remove_fail:
				free(inbuf);
				close(fd);
			remove_fail:
				unlink(tmp_bool_file);
				free(used);
				return -1;
			}
		}
		
	}
	if (fchmod(fd, S_IRUSR | S_IWUSR) != 0)
		goto close_remove_fail;
	close(fd);
	if (rename(tmp_bool_file, local_bool_file) != 0)
		goto remove_fail;

	free(used);
	return 0;
}
static void rollback(SELboolean *boollist, int end)
{
	int i;

        for(i=0; i<end; i++)
                security_set_boolean(boollist[i].name,
                        security_get_boolean_active(boollist[i].name));
}


int security_set_boolean_list(size_t boolcnt, SELboolean *boollist, int permanent) {

	size_t i;
	for (i=0; i < boolcnt; i++) {
		if(security_set_boolean(boollist[i].name, boollist[i].value)) {
			rollback(boollist, i);
			return -1;
		}
	}

	/* OK, let's do the commit */
	if (security_commit_booleans()) {
		return -1;
	}

	if (permanent) 
		return save_booleans(boolcnt, boollist);

	return 0;
}
int security_load_booleans(char *path) {
	FILE *boolf;
	char *inbuf;
	char localbools[BUFSIZ];
	size_t len=0, errors=0;
	int val;
	char name[BUFSIZ];

	boolf = fopen(path ? path : selinux_booleans_path(),"r");
	if (boolf == NULL) 
	  goto localbool;

	while (getline(&inbuf, &len, boolf) > 0) {
		int ret=process_boolean(inbuf, name, sizeof(name), &val);
		if (ret==-1) 
			errors++;
		if (ret==1) 
			if (security_set_boolean(name, val) < 0) {
				errors++;
			}
	}
	fclose(boolf);
localbool:
	snprintf(localbools,sizeof(localbools), "%s.local", (path ? path : selinux_booleans_path()));
	boolf = fopen(localbools,"r");

	if (boolf != NULL) {
		int ret;
		while (getline(&inbuf, &len, boolf) > 0) {
			ret=process_boolean(inbuf, name, sizeof(name), &val);
			if (ret==-1) 
				errors++;
			if (ret==1) 
				if (security_set_boolean(name, val) < 0) {
					errors++;
				}
		}
		fclose(boolf);
	}
	if (security_commit_booleans() < 0)
		return -1;

	if (errors)
		errno = EINVAL;
	return errors ? -1 : 0;
}