Home | History | Annotate | Download | only in src
      1 /* Author: Jason Tang	  <jtang (at) tresys.com>
      2  *         Christopher Ashworth <cashworth (at) tresys.com>
      3  *
      4  * Copyright (C) 2004-2006 Tresys Technology, LLC
      5  * Copyright (C) 2005 Red Hat, Inc.
      6  *
      7  *  This library is free software; you can redistribute it and/or
      8  *  modify it under the terms of the GNU Lesser General Public
      9  *  License as published by the Free Software Foundation; either
     10  *  version 2.1 of the License, or (at your option) any later version.
     11  *
     12  *  This library is distributed in the hope that it will be useful,
     13  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
     14  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
     15  *  Lesser General Public License for more details.
     16  *
     17  *  You should have received a copy of the GNU Lesser General Public
     18  *  License along with this library; if not, write to the Free Software
     19  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
     20  */
     21 
     22 #include <sepol/module.h>
     23 #include <sepol/handle.h>
     24 #include <sepol/cil/cil.h>
     25 #include <selinux/selinux.h>
     26 
     27 #include <assert.h>
     28 #include <fcntl.h>
     29 #include <stdio.h>
     30 #include <stdio_ext.h>
     31 #include <stdlib.h>
     32 #include <string.h>
     33 #include <unistd.h>
     34 #include <sys/stat.h>
     35 #include <sys/types.h>
     36 #include <limits.h>
     37 #include <errno.h>
     38 #include <dirent.h>
     39 
     40 #include "user_internal.h"
     41 #include "seuser_internal.h"
     42 #include "port_internal.h"
     43 #include "ibpkey_internal.h"
     44 #include "ibendport_internal.h"
     45 #include "iface_internal.h"
     46 #include "boolean_internal.h"
     47 #include "fcontext_internal.h"
     48 #include "node_internal.h"
     49 #include "genhomedircon.h"
     50 
     51 #include "debug.h"
     52 #include "handle.h"
     53 #include "modules.h"
     54 #include "direct_api.h"
     55 #include "semanage_store.h"
     56 #include "database_policydb.h"
     57 #include "policy.h"
     58 #include <sys/mman.h>
     59 #include <sys/wait.h>
     60 
     61 #define PIPE_READ 0
     62 #define PIPE_WRITE 1
     63 #define ARRAY_SIZE(x) (sizeof(x) / sizeof((x)[0]))
     64 
     65 static void semanage_direct_destroy(semanage_handle_t * sh);
     66 static int semanage_direct_disconnect(semanage_handle_t * sh);
     67 static int semanage_direct_begintrans(semanage_handle_t * sh);
     68 static int semanage_direct_commit(semanage_handle_t * sh);
     69 static int semanage_direct_install(semanage_handle_t * sh, char *data,
     70 				   size_t data_len, const char *module_name, const char *lang_ext);
     71 static int semanage_direct_install_file(semanage_handle_t * sh, const char *module_name);
     72 static int semanage_direct_extract(semanage_handle_t * sh,
     73 					   semanage_module_key_t *modkey,
     74 					   int extract_cil,
     75 					   void **mapped_data,
     76 					   size_t *data_len,
     77 					   semanage_module_info_t **modinfo);
     78 static int semanage_direct_remove(semanage_handle_t * sh, char *module_name);
     79 static int semanage_direct_list(semanage_handle_t * sh,
     80 				semanage_module_info_t ** modinfo,
     81 				int *num_modules);
     82 static int semanage_direct_get_enabled(semanage_handle_t *sh,
     83 				       const semanage_module_key_t *modkey,
     84 				       int *enabled);
     85 static int semanage_direct_set_enabled(semanage_handle_t *sh,
     86 				       const semanage_module_key_t *modkey,
     87 				       int enabled);
     88 
     89 static int semanage_direct_get_module_info(semanage_handle_t *sh,
     90 					   const semanage_module_key_t *modkey,
     91 					   semanage_module_info_t **modinfo);
     92 
     93 static int semanage_direct_list_all(semanage_handle_t *sh,
     94 				    semanage_module_info_t **modinfo,
     95 				    int *num_modules);
     96 
     97 static int semanage_direct_install_info(semanage_handle_t *sh,
     98 					const semanage_module_info_t *modinfo,
     99 					char *data,
    100 					size_t data_len);
    101 
    102 static int semanage_direct_remove_key(semanage_handle_t *sh,
    103 				      const semanage_module_key_t *modkey);
    104 
    105 static struct semanage_policy_table direct_funcs = {
    106 	.get_serial = semanage_direct_get_serial,
    107 	.destroy = semanage_direct_destroy,
    108 	.disconnect = semanage_direct_disconnect,
    109 	.begin_trans = semanage_direct_begintrans,
    110 	.commit = semanage_direct_commit,
    111 	.install = semanage_direct_install,
    112 	.extract = semanage_direct_extract,
    113 	.install_file = semanage_direct_install_file,
    114 	.remove = semanage_direct_remove,
    115 	.list = semanage_direct_list,
    116 	.get_enabled = semanage_direct_get_enabled,
    117 	.set_enabled = semanage_direct_set_enabled,
    118 	.get_module_info = semanage_direct_get_module_info,
    119 	.list_all = semanage_direct_list_all,
    120 	.install_info = semanage_direct_install_info,
    121 	.remove_key = semanage_direct_remove_key,
    122 };
    123 
    124 int semanage_direct_is_managed(semanage_handle_t * sh)
    125 {
    126 	if (semanage_check_init(sh, sh->conf->store_root_path))
    127 		goto err;
    128 
    129 	if (semanage_access_check(sh) < 0)
    130 		return 0;
    131 
    132 	return 1;
    133 
    134       err:
    135 	ERR(sh, "could not check whether policy is managed");
    136 	return STATUS_ERR;
    137 }
    138 
    139 /* Check that the module store exists, creating it if necessary.
    140  */
    141 int semanage_direct_connect(semanage_handle_t * sh)
    142 {
    143 	const char *path;
    144 	struct stat sb;
    145 
    146 	if (semanage_check_init(sh, sh->conf->store_root_path))
    147 		goto err;
    148 
    149 	if (sh->create_store)
    150 		if (semanage_create_store(sh, 1))
    151 			goto err;
    152 
    153 	sh->u.direct.translock_file_fd = -1;
    154 	sh->u.direct.activelock_file_fd = -1;
    155 
    156 	/* set up function pointers */
    157 	sh->funcs = &direct_funcs;
    158 
    159 	/* Object databases: local modifications */
    160 	if (user_base_file_dbase_init(sh,
    161 				      semanage_path(SEMANAGE_ACTIVE,
    162 						    SEMANAGE_USERS_BASE_LOCAL),
    163 				      semanage_path(SEMANAGE_TMP,
    164 						    SEMANAGE_USERS_BASE_LOCAL),
    165 				      semanage_user_base_dbase_local(sh)) < 0)
    166 		goto err;
    167 
    168 	if (user_extra_file_dbase_init(sh,
    169 				       semanage_path(SEMANAGE_ACTIVE,
    170 						     SEMANAGE_USERS_EXTRA_LOCAL),
    171 				       semanage_path(SEMANAGE_TMP,
    172 						     SEMANAGE_USERS_EXTRA_LOCAL),
    173 				       semanage_user_extra_dbase_local(sh)) < 0)
    174 		goto err;
    175 
    176 	if (user_join_dbase_init(sh,
    177 				 semanage_user_base_dbase_local(sh),
    178 				 semanage_user_extra_dbase_local(sh),
    179 				 semanage_user_dbase_local(sh)) < 0)
    180 		goto err;
    181 
    182 	if (port_file_dbase_init(sh,
    183 				 semanage_path(SEMANAGE_ACTIVE,
    184 					       SEMANAGE_PORTS_LOCAL),
    185 				 semanage_path(SEMANAGE_TMP,
    186 					       SEMANAGE_PORTS_LOCAL),
    187 				 semanage_port_dbase_local(sh)) < 0)
    188 		goto err;
    189 
    190 	if (iface_file_dbase_init(sh,
    191 				  semanage_path(SEMANAGE_ACTIVE,
    192 						SEMANAGE_INTERFACES_LOCAL),
    193 				  semanage_path(SEMANAGE_TMP,
    194 						SEMANAGE_INTERFACES_LOCAL),
    195 				  semanage_iface_dbase_local(sh)) < 0)
    196 		goto err;
    197 
    198 	if (bool_file_dbase_init(sh,
    199 				 semanage_path(SEMANAGE_ACTIVE,
    200 					       SEMANAGE_BOOLEANS_LOCAL),
    201 				 semanage_path(SEMANAGE_TMP,
    202 					       SEMANAGE_BOOLEANS_LOCAL),
    203 				 semanage_bool_dbase_local(sh)) < 0)
    204 		goto err;
    205 
    206 	if (fcontext_file_dbase_init(sh,
    207 				     semanage_path(SEMANAGE_ACTIVE, SEMANAGE_STORE_FC_LOCAL),
    208 				     semanage_path(SEMANAGE_TMP, SEMANAGE_STORE_FC_LOCAL),
    209 				     semanage_fcontext_dbase_local(sh)) < 0)
    210 		goto err;
    211 
    212 	if (fcontext_file_dbase_init(sh,
    213 				     semanage_path(SEMANAGE_ACTIVE, SEMANAGE_STORE_FC_HOMEDIRS),
    214 				     semanage_path(SEMANAGE_TMP, SEMANAGE_STORE_FC_HOMEDIRS),
    215 				     semanage_fcontext_dbase_homedirs(sh)) < 0)
    216 		goto err;
    217 
    218 	if (seuser_file_dbase_init(sh,
    219 				   semanage_path(SEMANAGE_ACTIVE,
    220 						 SEMANAGE_SEUSERS_LOCAL),
    221 				   semanage_path(SEMANAGE_TMP,
    222 						 SEMANAGE_SEUSERS_LOCAL),
    223 				   semanage_seuser_dbase_local(sh)) < 0)
    224 		goto err;
    225 
    226 	if (node_file_dbase_init(sh,
    227 				 semanage_path(SEMANAGE_ACTIVE,
    228 					       SEMANAGE_NODES_LOCAL),
    229 				 semanage_path(SEMANAGE_TMP,
    230 					       SEMANAGE_NODES_LOCAL),
    231 				 semanage_node_dbase_local(sh)) < 0)
    232 		goto err;
    233 
    234 	if (ibpkey_file_dbase_init(sh,
    235 				   semanage_path(SEMANAGE_ACTIVE,
    236 					         SEMANAGE_IBPKEYS_LOCAL),
    237 				   semanage_path(SEMANAGE_TMP,
    238 					         SEMANAGE_IBPKEYS_LOCAL),
    239 				   semanage_ibpkey_dbase_local(sh)) < 0)
    240 		goto err;
    241 
    242 	if (ibendport_file_dbase_init(sh,
    243 				      semanage_path(SEMANAGE_ACTIVE,
    244 						    SEMANAGE_IBENDPORTS_LOCAL),
    245 				      semanage_path(SEMANAGE_TMP,
    246 						    SEMANAGE_IBENDPORTS_LOCAL),
    247 				      semanage_ibendport_dbase_local(sh)) < 0)
    248 		goto err;
    249 
    250 	/* Object databases: local modifications + policy */
    251 	if (user_base_policydb_dbase_init(sh,
    252 					  semanage_user_base_dbase_policy(sh)) <
    253 	    0)
    254 		goto err;
    255 
    256 	if (user_extra_file_dbase_init(sh,
    257 				       semanage_path(SEMANAGE_ACTIVE,
    258 						     SEMANAGE_USERS_EXTRA),
    259 				       semanage_path(SEMANAGE_TMP,
    260 						     SEMANAGE_USERS_EXTRA),
    261 				       semanage_user_extra_dbase_policy(sh)) <
    262 	    0)
    263 		goto err;
    264 
    265 	if (user_join_dbase_init(sh,
    266 				 semanage_user_base_dbase_policy(sh),
    267 				 semanage_user_extra_dbase_policy(sh),
    268 				 semanage_user_dbase_policy(sh)) < 0)
    269 		goto err;
    270 
    271 	if (port_policydb_dbase_init(sh, semanage_port_dbase_policy(sh)) < 0)
    272 		goto err;
    273 
    274 	if (ibpkey_policydb_dbase_init(sh, semanage_ibpkey_dbase_policy(sh)) < 0)
    275 		goto err;
    276 
    277 	if (ibendport_policydb_dbase_init(sh, semanage_ibendport_dbase_policy(sh)) < 0)
    278 		goto err;
    279 
    280 	if (iface_policydb_dbase_init(sh, semanage_iface_dbase_policy(sh)) < 0)
    281 		goto err;
    282 
    283 	if (bool_policydb_dbase_init(sh, semanage_bool_dbase_policy(sh)) < 0)
    284 		goto err;
    285 
    286 	if (fcontext_file_dbase_init(sh,
    287 				     semanage_path(SEMANAGE_ACTIVE, SEMANAGE_STORE_FC),
    288 				     semanage_path(SEMANAGE_TMP, SEMANAGE_STORE_FC),
    289 				     semanage_fcontext_dbase_policy(sh)) < 0)
    290 		goto err;
    291 
    292 	if (seuser_file_dbase_init(sh,
    293 				   semanage_path(SEMANAGE_ACTIVE, SEMANAGE_STORE_SEUSERS),
    294 				   semanage_path(SEMANAGE_TMP, SEMANAGE_STORE_SEUSERS),
    295 				   semanage_seuser_dbase_policy(sh)) < 0)
    296 		goto err;
    297 
    298 	if (node_policydb_dbase_init(sh, semanage_node_dbase_policy(sh)) < 0)
    299 		goto err;
    300 
    301 	/* Active kernel policy */
    302 	if (bool_activedb_dbase_init(sh, semanage_bool_dbase_active(sh)) < 0)
    303 		goto err;
    304 
    305 	/* set the disable dontaudit value */
    306 	path = semanage_path(SEMANAGE_ACTIVE, SEMANAGE_DISABLE_DONTAUDIT);
    307 
    308 	if (stat(path, &sb) == 0)
    309 		sepol_set_disable_dontaudit(sh->sepolh, 1);
    310 	else if (errno == ENOENT) {
    311 		/* The file does not exist */
    312 		sepol_set_disable_dontaudit(sh->sepolh, 0);
    313 	} else {
    314 		ERR(sh, "Unable to access %s: %s\n", path, strerror(errno));
    315 		goto err;
    316 	}
    317 
    318 	return STATUS_SUCCESS;
    319 
    320       err:
    321 	ERR(sh, "could not establish direct connection");
    322 	return STATUS_ERR;
    323 }
    324 
    325 static void semanage_direct_destroy(semanage_handle_t * sh
    326 					__attribute__ ((unused)))
    327 {
    328 	/* do nothing */
    329 }
    330 
    331 static int semanage_remove_tmps(semanage_handle_t *sh)
    332 {
    333 	if (sh->commit_err)
    334 		return 0;
    335 
    336 	/* destroy sandbox if it exists */
    337 	if (semanage_remove_directory
    338 	    (semanage_path(SEMANAGE_TMP, SEMANAGE_TOPLEVEL)) < 0) {
    339 		if (errno != ENOENT) {
    340 			ERR(sh, "Could not cleanly remove sandbox %s.",
    341 			    semanage_path(SEMANAGE_TMP, SEMANAGE_TOPLEVEL));
    342 			return -1;
    343 		}
    344 	}
    345 
    346 	/* destroy tmp policy if it exists */
    347 	if (semanage_remove_directory
    348 	    (semanage_final_path(SEMANAGE_FINAL_TMP,
    349 				 SEMANAGE_FINAL_TOPLEVEL)) < 0) {
    350 		if (errno != ENOENT) {
    351 			ERR(sh, "Could not cleanly remove tmp %s.",
    352 			    semanage_final_path(SEMANAGE_FINAL_TMP,
    353 						SEMANAGE_FINAL_TOPLEVEL));
    354 			return -1;
    355 		}
    356 	}
    357 
    358 	return 0;
    359 }
    360 
    361 static int semanage_direct_disconnect(semanage_handle_t *sh)
    362 {
    363 	int retval = 0;
    364 
    365 	/* destroy transaction and remove tmp files if no commit error */
    366 	if (sh->is_in_transaction) {
    367 		retval = semanage_remove_tmps(sh);
    368 		semanage_release_trans_lock(sh);
    369 	}
    370 
    371 	/* Release object databases: local modifications */
    372 	user_base_file_dbase_release(semanage_user_base_dbase_local(sh));
    373 	user_extra_file_dbase_release(semanage_user_extra_dbase_local(sh));
    374 	user_join_dbase_release(semanage_user_dbase_local(sh));
    375 	port_file_dbase_release(semanage_port_dbase_local(sh));
    376 	ibpkey_file_dbase_release(semanage_ibpkey_dbase_local(sh));
    377 	ibendport_file_dbase_release(semanage_ibendport_dbase_local(sh));
    378 	iface_file_dbase_release(semanage_iface_dbase_local(sh));
    379 	bool_file_dbase_release(semanage_bool_dbase_local(sh));
    380 	fcontext_file_dbase_release(semanage_fcontext_dbase_local(sh));
    381 	fcontext_file_dbase_release(semanage_fcontext_dbase_homedirs(sh));
    382 	seuser_file_dbase_release(semanage_seuser_dbase_local(sh));
    383 	node_file_dbase_release(semanage_node_dbase_local(sh));
    384 
    385 	/* Release object databases: local modifications + policy */
    386 	user_base_policydb_dbase_release(semanage_user_base_dbase_policy(sh));
    387 	user_extra_file_dbase_release(semanage_user_extra_dbase_policy(sh));
    388 	user_join_dbase_release(semanage_user_dbase_policy(sh));
    389 	port_policydb_dbase_release(semanage_port_dbase_policy(sh));
    390 	ibpkey_policydb_dbase_release(semanage_ibpkey_dbase_policy(sh));
    391 	ibendport_policydb_dbase_release(semanage_ibendport_dbase_policy(sh));
    392 	iface_policydb_dbase_release(semanage_iface_dbase_policy(sh));
    393 	bool_policydb_dbase_release(semanage_bool_dbase_policy(sh));
    394 	fcontext_file_dbase_release(semanage_fcontext_dbase_policy(sh));
    395 	seuser_file_dbase_release(semanage_seuser_dbase_policy(sh));
    396 	node_policydb_dbase_release(semanage_node_dbase_policy(sh));
    397 
    398 	/* Release object databases: active kernel policy */
    399 	bool_activedb_dbase_release(semanage_bool_dbase_active(sh));
    400 
    401 	return retval;
    402 }
    403 
    404 static int semanage_direct_begintrans(semanage_handle_t * sh)
    405 {
    406 	if (semanage_get_trans_lock(sh) < 0) {
    407 		return -1;
    408 	}
    409 	if ((semanage_make_sandbox(sh)) < 0) {
    410 		return -1;
    411 	}
    412 	if ((semanage_make_final(sh)) < 0) {
    413 		return -1;
    414 	}
    415 	return 0;
    416 }
    417 
    418 /********************* utility functions *********************/
    419 
    420 /* Takes a module stored in 'module_data' and parses its headers.
    421  * Sets reference variables 'module_name' to module's name, and
    422  * 'version' to module's version.  The caller is responsible for
    423  * free()ing 'module_name', and 'version'; they will be
    424  * set to NULL upon entering this function.  Returns 0 on success, -1
    425  * if out of memory.
    426  */
    427 static int parse_module_headers(semanage_handle_t * sh, char *module_data,
    428                                size_t data_len, char **module_name,
    429                                char **version)
    430 {
    431        struct sepol_policy_file *pf;
    432        int file_type;
    433        *module_name = *version = NULL;
    434 
    435        if (sepol_policy_file_create(&pf)) {
    436                ERR(sh, "Out of memory!");
    437                return -1;
    438        }
    439        sepol_policy_file_set_mem(pf, module_data, data_len);
    440        sepol_policy_file_set_handle(pf, sh->sepolh);
    441        if (module_data != NULL && data_len > 0)
    442            sepol_module_package_info(pf, &file_type, module_name,
    443                                      version);
    444        sepol_policy_file_free(pf);
    445 
    446        return 0;
    447 }
    448 
    449 #include <stdlib.h>
    450 #include <bzlib.h>
    451 #include <string.h>
    452 #include <sys/sendfile.h>
    453 
    454 /* bzip() a data to a file, returning the total number of compressed bytes
    455  * in the file.  Returns -1 if file could not be compressed. */
    456 static ssize_t bzip(semanage_handle_t *sh, const char *filename, char *data,
    457 			size_t num_bytes)
    458 {
    459 	BZFILE* b;
    460 	size_t  size = 1<<16;
    461 	int     bzerror;
    462 	size_t  total = 0;
    463 	size_t len = 0;
    464 	FILE *f;
    465 
    466 	if ((f = fopen(filename, "wb")) == NULL) {
    467 		return -1;
    468 	}
    469 
    470 	if (!sh->conf->bzip_blocksize) {
    471 		if (fwrite(data, 1, num_bytes, f) < num_bytes) {
    472 			fclose(f);
    473 			return -1;
    474 		}
    475 		fclose(f);
    476 		return num_bytes;
    477 	}
    478 
    479 	b = BZ2_bzWriteOpen( &bzerror, f, sh->conf->bzip_blocksize, 0, 0);
    480 	if (bzerror != BZ_OK) {
    481 		BZ2_bzWriteClose ( &bzerror, b, 1, 0, 0 );
    482 		return -1;
    483 	}
    484 
    485 	while ( num_bytes > total ) {
    486 		if (num_bytes - total > size) {
    487 			len = size;
    488 		} else {
    489 			len = num_bytes - total;
    490 		}
    491 		BZ2_bzWrite ( &bzerror, b, &data[total], len );
    492 		if (bzerror == BZ_IO_ERROR) {
    493 			BZ2_bzWriteClose ( &bzerror, b, 1, 0, 0 );
    494 			return -1;
    495 		}
    496 		total += len;
    497 	}
    498 
    499 	BZ2_bzWriteClose ( &bzerror, b, 0, 0, 0 );
    500 	fclose(f);
    501 	if (bzerror == BZ_IO_ERROR) {
    502 		return -1;
    503 	}
    504 	return total;
    505 }
    506 
    507 #define BZ2_MAGICSTR "BZh"
    508 #define BZ2_MAGICLEN (sizeof(BZ2_MAGICSTR)-1)
    509 
    510 /* bunzip() a file to '*data', returning the total number of uncompressed bytes
    511  * in the file.  Returns -1 if file could not be decompressed. */
    512 ssize_t bunzip(semanage_handle_t *sh, FILE *f, char **data)
    513 {
    514 	BZFILE* b = NULL;
    515 	size_t  nBuf;
    516 	char*   buf = NULL;
    517 	size_t  size = 1<<18;
    518 	size_t  bufsize = size;
    519 	int     bzerror;
    520 	size_t  total=0;
    521 	char*   uncompress = NULL;
    522 	char*   tmpalloc = NULL;
    523 	int     ret = -1;
    524 
    525 	buf = malloc(bufsize);
    526 	if (buf == NULL) {
    527 		ERR(sh, "Failure allocating memory.");
    528 		goto exit;
    529 	}
    530 
    531 	/* Check if the file is bzipped */
    532 	bzerror = fread(buf, 1, BZ2_MAGICLEN, f);
    533 	rewind(f);
    534 	if ((bzerror != BZ2_MAGICLEN) || memcmp(buf, BZ2_MAGICSTR, BZ2_MAGICLEN)) {
    535 		goto exit;
    536 	}
    537 
    538 	b = BZ2_bzReadOpen ( &bzerror, f, 0, sh->conf->bzip_small, NULL, 0 );
    539 	if ( bzerror != BZ_OK ) {
    540 		ERR(sh, "Failure opening bz2 archive.");
    541 		goto exit;
    542 	}
    543 
    544 	uncompress = malloc(size);
    545 	if (uncompress == NULL) {
    546 		ERR(sh, "Failure allocating memory.");
    547 		goto exit;
    548 	}
    549 
    550 	while ( bzerror == BZ_OK) {
    551 		nBuf = BZ2_bzRead ( &bzerror, b, buf, bufsize);
    552 		if (( bzerror == BZ_OK ) || ( bzerror == BZ_STREAM_END )) {
    553 			if (total + nBuf > size) {
    554 				size *= 2;
    555 				tmpalloc = realloc(uncompress, size);
    556 				if (tmpalloc == NULL) {
    557 					ERR(sh, "Failure allocating memory.");
    558 					goto exit;
    559 				}
    560 				uncompress = tmpalloc;
    561 			}
    562 			memcpy(&uncompress[total], buf, nBuf);
    563 			total += nBuf;
    564 		}
    565 	}
    566 	if ( bzerror != BZ_STREAM_END ) {
    567 		ERR(sh, "Failure reading bz2 archive.");
    568 		goto exit;
    569 	}
    570 
    571 	ret = total;
    572 	*data = uncompress;
    573 
    574 exit:
    575 	BZ2_bzReadClose ( &bzerror, b );
    576 	free(buf);
    577 	if ( ret < 0 ) {
    578 		free(uncompress);
    579 	}
    580 	return ret;
    581 }
    582 
    583 /* mmap() a file to '*data',
    584  *  If the file is bzip compressed map_file will uncompress
    585  * the file into '*data'.
    586  * Returns the total number of bytes in memory .
    587  * Returns -1 if file could not be opened or mapped. */
    588 static ssize_t map_file(semanage_handle_t *sh, const char *path, char **data,
    589 			int *compressed)
    590 {
    591 	ssize_t size = -1;
    592 	char *uncompress;
    593 	int fd = -1;
    594 	FILE *file = NULL;
    595 
    596 	fd = open(path, O_RDONLY);
    597 	if (fd == -1) {
    598 		ERR(sh, "Unable to open %s\n", path);
    599 		return -1;
    600 	}
    601 
    602 	file = fdopen(fd, "r");
    603 	if (file == NULL) {
    604 		ERR(sh, "Unable to open %s\n", path);
    605 		close(fd);
    606 		return -1;
    607 	}
    608 
    609 	if ((size = bunzip(sh, file, &uncompress)) > 0) {
    610 		*data = mmap(0, size, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0);
    611 		if (*data == MAP_FAILED) {
    612 			free(uncompress);
    613 			fclose(file);
    614 			return -1;
    615 		} else {
    616 			memcpy(*data, uncompress, size);
    617 		}
    618 		free(uncompress);
    619 		*compressed = 1;
    620 	} else {
    621 		struct stat sb;
    622 		if (fstat(fd, &sb) == -1 ||
    623 		    (*data = mmap(NULL, sb.st_size, PROT_READ, MAP_PRIVATE, fd, 0)) ==
    624 		    MAP_FAILED) {
    625 			size = -1;
    626 		} else {
    627 			size = sb.st_size;
    628 		}
    629 		*compressed = 0;
    630 	}
    631 
    632 	fclose(file);
    633 
    634 	return size;
    635 }
    636 
    637 /* Writes a block of data to a file.  Returns 0 on success, -1 on
    638  * error. */
    639 static int write_file(semanage_handle_t * sh,
    640 		      const char *filename, char *data, size_t num_bytes)
    641 {
    642 	int out;
    643 
    644 	if ((out =
    645 	     open(filename, O_WRONLY | O_CREAT | O_TRUNC,
    646 		  S_IRUSR | S_IWUSR)) == -1) {
    647 		ERR(sh, "Could not open %s for writing.", filename);
    648 		return -1;
    649 	}
    650 	if (write(out, data, num_bytes) == -1) {
    651 		ERR(sh, "Error while writing to %s.", filename);
    652 		close(out);
    653 		return -1;
    654 	}
    655 	close(out);
    656 	return 0;
    657 }
    658 
    659 static int semanage_direct_update_user_extra(semanage_handle_t * sh, cil_db_t *cildb)
    660 {
    661 	const char *ofilename = NULL;
    662 	int retval = -1;
    663 	char *data = NULL;
    664 	size_t size = 0;
    665 
    666 	dbase_config_t *pusers_extra = semanage_user_extra_dbase_policy(sh);
    667 
    668 	retval = cil_userprefixes_to_string(cildb, &data, &size);
    669 	if (retval != SEPOL_OK) {
    670 		goto cleanup;
    671 	}
    672 
    673 	if (size > 0) {
    674 		/*
    675 		 * Write the users_extra entries from CIL modules.
    676 		 * This file is used as our baseline when we do not require
    677 		 * re-linking.
    678 		 */
    679 		ofilename = semanage_path(SEMANAGE_TMP,
    680 					  SEMANAGE_USERS_EXTRA_LINKED);
    681 		if (ofilename == NULL) {
    682 			retval = -1;
    683 			goto cleanup;
    684 		}
    685 		retval = write_file(sh, ofilename, data, size);
    686 		if (retval < 0)
    687 			goto cleanup;
    688 
    689 		/*
    690 		 * Write the users_extra file; users_extra.local
    691 		 * will be merged into this file.
    692 		 */
    693 		ofilename = semanage_path(SEMANAGE_TMP, SEMANAGE_USERS_EXTRA);
    694 		if (ofilename == NULL) {
    695 			retval = -1;
    696 			goto cleanup;
    697 		}
    698 		retval = write_file(sh, ofilename, data, size);
    699 		if (retval < 0)
    700 			goto cleanup;
    701 
    702 		pusers_extra->dtable->drop_cache(pusers_extra->dbase);
    703 
    704 	} else {
    705 		retval =  pusers_extra->dtable->clear(sh, pusers_extra->dbase);
    706 	}
    707 
    708 cleanup:
    709 	free(data);
    710 
    711 	return retval;
    712 }
    713 
    714 static int semanage_direct_update_seuser(semanage_handle_t * sh, cil_db_t *cildb)
    715 {
    716 	const char *ofilename = NULL;
    717 	int retval = -1;
    718 	char *data = NULL;
    719 	size_t size = 0;
    720 
    721 	dbase_config_t *pseusers = semanage_seuser_dbase_policy(sh);
    722 
    723 	retval = cil_selinuxusers_to_string(cildb, &data, &size);
    724 	if (retval != SEPOL_OK) {
    725 		goto cleanup;
    726 	}
    727 
    728 	if (size > 0) {
    729 		/*
    730 		 * Write the seusers entries from CIL modules.
    731 		 * This file is used as our baseline when we do not require
    732 		 * re-linking.
    733 		 */
    734 		ofilename = semanage_path(SEMANAGE_TMP,
    735 					  SEMANAGE_SEUSERS_LINKED);
    736 		if (ofilename == NULL) {
    737 			retval = -1;
    738 			goto cleanup;
    739 		}
    740 		retval = write_file(sh, ofilename, data, size);
    741 		if (retval < 0)
    742 			goto cleanup;
    743 
    744 		/*
    745 		 * Write the seusers file; seusers.local will be merged into
    746 		 * this file.
    747 		 */
    748 		ofilename = semanage_path(SEMANAGE_TMP, SEMANAGE_STORE_SEUSERS);
    749 		if (ofilename == NULL) {
    750 			retval = -1;
    751 			goto cleanup;
    752 		}
    753 		retval = write_file(sh, ofilename, data, size);
    754 		if (retval < 0)
    755 			goto cleanup;
    756 
    757 		pseusers->dtable->drop_cache(pseusers->dbase);
    758 	} else {
    759 		retval = pseusers->dtable->clear(sh, pseusers->dbase);
    760 	}
    761 
    762 cleanup:
    763 	free(data);
    764 
    765 	return retval;
    766 }
    767 
    768 static int read_from_pipe_to_data(semanage_handle_t *sh, size_t initial_len, int fd, char **out_data_read, size_t *out_read_len)
    769 {
    770 	size_t max_len = initial_len;
    771 	size_t read_len = 0;
    772 	size_t data_read_len = 0;
    773 	char *data_read = NULL;
    774 
    775 	if (max_len <= 0) {
    776 		max_len = 1;
    777 	}
    778 	data_read = malloc(max_len * sizeof(*data_read));
    779 	if (data_read == NULL) {
    780 		ERR(sh, "Failed to malloc, out of memory.\n");
    781 		return -1;
    782 	}
    783 
    784 	while ((read_len = read(fd, data_read + data_read_len, max_len - data_read_len)) > 0) {
    785 		data_read_len += read_len;
    786 		if (data_read_len == max_len) {
    787 			max_len *= 2;
    788 			data_read = realloc(data_read, max_len);
    789 			if (data_read == NULL) {
    790 				ERR(sh, "Failed to realloc, out of memory.\n");
    791 				return -1;
    792 			}
    793 		}
    794 	}
    795 
    796 	*out_read_len = data_read_len;
    797 	*out_data_read = data_read;
    798 
    799 	return 0;
    800 }
    801 
    802 static int semanage_pipe_data(semanage_handle_t *sh, char *path, char *in_data, size_t in_data_len, char **out_data, size_t *out_data_len, char **err_data, size_t *err_data_len)
    803 {
    804 	int input_fd[2] = {-1, -1};
    805 	int output_fd[2] = {-1, -1};
    806 	int err_fd[2] = {-1, -1};
    807 	pid_t pid;
    808 	char *data_read = NULL;
    809 	char *err_data_read = NULL;
    810 	int retval;
    811 	int status = 0;
    812 	size_t initial_len;
    813 	size_t data_read_len = 0;
    814 	size_t err_data_read_len = 0;
    815 	struct sigaction old_signal;
    816 	struct sigaction new_signal;
    817 	new_signal.sa_handler = SIG_IGN;
    818 	sigemptyset(&new_signal.sa_mask);
    819 	new_signal.sa_flags = 0;
    820 	/* This is needed in case the read end of input_fd is closed causing a SIGPIPE signal to be sent.
    821 	 * If SIGPIPE is not caught, the signal will cause semanage to terminate immediately. The sigaction below
    822 	 * creates a new_signal that ignores SIGPIPE allowing the write to exit cleanly.
    823 	 *
    824 	 * Another sigaction is called in cleanup to restore the original behavior when a SIGPIPE is received.
    825 	 */
    826 	sigaction(SIGPIPE, &new_signal, &old_signal);
    827 
    828 	retval = pipe(input_fd);
    829 	if (retval == -1) {
    830 		ERR(sh, "Unable to create pipe for input pipe: %s\n", strerror(errno));
    831 		goto cleanup;
    832 	}
    833 	retval = pipe(output_fd);
    834 	if (retval == -1) {
    835 		ERR(sh, "Unable to create pipe for output pipe: %s\n", strerror(errno));
    836 		goto cleanup;
    837 	}
    838 	retval = pipe(err_fd);
    839 	if (retval == -1) {
    840 		ERR(sh, "Unable to create pipe for error pipe: %s\n", strerror(errno));
    841 		goto cleanup;
    842 	}
    843 
    844 	pid = fork();
    845 	if (pid == -1) {
    846 		ERR(sh, "Unable to fork from parent: %s.", strerror(errno));
    847 		retval = -1;
    848 		goto cleanup;
    849 	} else if (pid == 0) {
    850 		retval = dup2(input_fd[PIPE_READ], STDIN_FILENO);
    851 		if (retval == -1) {
    852 			ERR(sh, "Unable to dup2 input pipe: %s\n", strerror(errno));
    853 			goto cleanup;
    854 		}
    855 		retval = dup2(output_fd[PIPE_WRITE], STDOUT_FILENO);
    856 		if (retval == -1) {
    857 			ERR(sh, "Unable to dup2 output pipe: %s\n", strerror(errno));
    858 			goto cleanup;
    859 		}
    860 		retval = dup2(err_fd[PIPE_WRITE], STDERR_FILENO);
    861 		if (retval == -1) {
    862 			ERR(sh, "Unable to dup2 error pipe: %s\n", strerror(errno));
    863 			goto cleanup;
    864 		}
    865 
    866 		retval = close(input_fd[PIPE_WRITE]);
    867 		if (retval == -1) {
    868 			ERR(sh, "Unable to close input pipe: %s\n", strerror(errno));
    869 			goto cleanup;
    870 		}
    871 		retval = close(output_fd[PIPE_READ]);
    872 		if (retval == -1) {
    873 			ERR(sh, "Unable to close output pipe: %s\n", strerror(errno));
    874 			goto cleanup;
    875 		}
    876 		retval = close(err_fd[PIPE_READ]);
    877 		if (retval == -1) {
    878 			ERR(sh, "Unable to close error pipe: %s\n", strerror(errno));
    879 			goto cleanup;
    880 		}
    881 		retval = execl(path, path, NULL);
    882 		if (retval == -1) {
    883 			ERR(sh, "Unable to execute %s : %s\n", path, strerror(errno));
    884 			_exit(EXIT_FAILURE);
    885 		}
    886 	} else {
    887 		retval = close(input_fd[PIPE_READ]);
    888 		input_fd[PIPE_READ] = -1;
    889 		if (retval == -1) {
    890 			ERR(sh, "Unable to close read end of input pipe: %s\n", strerror(errno));
    891 			goto cleanup;
    892 		}
    893 
    894 		retval = close(output_fd[PIPE_WRITE]);
    895 		output_fd[PIPE_WRITE] = -1;
    896 		if (retval == -1) {
    897 			ERR(sh, "Unable to close write end of output pipe: %s\n", strerror(errno));
    898 			goto cleanup;
    899 		}
    900 
    901 		retval = close(err_fd[PIPE_WRITE]);
    902 		err_fd[PIPE_WRITE] = -1;
    903 		if (retval == -1) {
    904 			ERR(sh, "Unable to close write end of error pipe: %s\n", strerror(errno));
    905 			goto cleanup;
    906 		}
    907 
    908 		retval = write(input_fd[PIPE_WRITE], in_data, in_data_len);
    909 		if (retval == -1) {
    910 			ERR(sh, "Failed to write data to input pipe: %s\n", strerror(errno));
    911 			goto cleanup;
    912 		}
    913 		retval = close(input_fd[PIPE_WRITE]);
    914 		input_fd[PIPE_WRITE] = -1;
    915 		if (retval == -1) {
    916 			ERR(sh, "Unable to close write end of input pipe: %s\n", strerror(errno));
    917 			goto cleanup;
    918 		}
    919 
    920 		initial_len = 1 << 17;
    921 		retval = read_from_pipe_to_data(sh, initial_len, output_fd[PIPE_READ], &data_read, &data_read_len);
    922 		if (retval != 0) {
    923 			goto cleanup;
    924 		}
    925 		retval = close(output_fd[PIPE_READ]);
    926 		output_fd[PIPE_READ] = -1;
    927 		if (retval == -1) {
    928 			ERR(sh, "Unable to close read end of output pipe: %s\n", strerror(errno));
    929 			goto cleanup;
    930 		}
    931 
    932 		initial_len = 1 << 9;
    933 		retval = read_from_pipe_to_data(sh, initial_len, err_fd[PIPE_READ], &err_data_read, &err_data_read_len);
    934 		if (retval != 0) {
    935 			goto cleanup;
    936 		}
    937 		retval = close(err_fd[PIPE_READ]);
    938 		err_fd[PIPE_READ] = -1;
    939 		if (retval == -1) {
    940 			ERR(sh, "Unable to close read end of error pipe: %s\n", strerror(errno));
    941 			goto cleanup;
    942 		}
    943 
    944 		if (waitpid(pid, &status, 0) == -1 || !WIFEXITED(status)) {
    945 			ERR(sh, "Child process %s did not exit cleanly.", path);
    946 			retval = -1;
    947 			goto cleanup;
    948 		}
    949 		if (WEXITSTATUS(status) != 0) {
    950 			ERR(sh, "Child process %s failed with code: %d.", path, WEXITSTATUS(status));
    951 			retval = -1;
    952 			goto cleanup;
    953 		}
    954 	}
    955 
    956 	retval = 0;
    957 
    958 cleanup:
    959 	sigaction(SIGPIPE, &old_signal, NULL);
    960 
    961 	if (data_read != NULL) {
    962 		*out_data = data_read;
    963 		*out_data_len = data_read_len;
    964 	}
    965 
    966 	if (err_data_read != NULL) {
    967 		*err_data = err_data_read;
    968 		*err_data_len = err_data_read_len;
    969 	}
    970 
    971 	if (output_fd[PIPE_READ] != -1) {
    972 		close(output_fd[PIPE_READ]);
    973 	}
    974 	if (output_fd[PIPE_WRITE] != -1) {
    975 		close(output_fd[PIPE_WRITE]);
    976 	}
    977 	if (err_fd[PIPE_READ] != -1) {
    978 		close(err_fd[PIPE_READ]);
    979 	}
    980 	if (err_fd[PIPE_WRITE] != -1) {
    981 		close(err_fd[PIPE_WRITE]);
    982 	}
    983 	if (input_fd[PIPE_READ] != -1) {
    984 		close(input_fd[PIPE_READ]);
    985 	}
    986 	if (input_fd[PIPE_WRITE] != -1) {
    987 		close(input_fd[PIPE_WRITE]);
    988 	}
    989 
    990 	return retval;
    991 }
    992 
    993 static int semanage_direct_write_langext(semanage_handle_t *sh,
    994 				const char *lang_ext,
    995 				const semanage_module_info_t *modinfo)
    996 {
    997 	int ret = -1;
    998 	char fn[PATH_MAX];
    999 	FILE *fp = NULL;
   1000 
   1001 	ret = semanage_module_get_path(sh,
   1002 			modinfo,
   1003 			SEMANAGE_MODULE_PATH_LANG_EXT,
   1004 			fn,
   1005 			sizeof(fn));
   1006 	if (ret != 0) {
   1007 		goto cleanup;
   1008 	}
   1009 
   1010 	fp = fopen(fn, "w");
   1011 	if (fp == NULL) {
   1012 		ERR(sh, "Unable to open %s module ext file.", modinfo->name);
   1013 		ret = -1;
   1014 		goto cleanup;
   1015 	}
   1016 
   1017 	if (fputs(lang_ext, fp) < 0) {
   1018 		ERR(sh, "Unable to write %s module ext file.", modinfo->name);
   1019 		ret = -1;
   1020 		goto cleanup;
   1021 	}
   1022 
   1023 	if (fclose(fp) != 0) {
   1024 		ERR(sh, "Unable to close %s module ext file.", modinfo->name);
   1025 		ret = -1;
   1026 		goto cleanup;
   1027 	}
   1028 
   1029 	fp = NULL;
   1030 
   1031 	ret = 0;
   1032 
   1033 cleanup:
   1034 	if (fp != NULL) fclose(fp);
   1035 
   1036 	return ret;
   1037 }
   1038 
   1039 static int semanage_compile_module(semanage_handle_t *sh,
   1040 				semanage_module_info_t *modinfo)
   1041 {
   1042 	char cil_path[PATH_MAX];
   1043 	char hll_path[PATH_MAX];
   1044 	char *compiler_path = NULL;
   1045 	char *cil_data = NULL;
   1046 	char *err_data = NULL;
   1047 	char *hll_data = NULL;
   1048 	char *start = NULL;
   1049 	char *end = NULL;
   1050 	ssize_t hll_data_len = 0;
   1051 	ssize_t bzip_status;
   1052 	int status = 0;
   1053 	int compressed;
   1054 	size_t cil_data_len = 0;
   1055 	size_t err_data_len = 0;
   1056 
   1057 	if (!strcasecmp(modinfo->lang_ext, "cil")) {
   1058 		goto cleanup;
   1059 	}
   1060 
   1061 	status = semanage_get_hll_compiler_path(sh, modinfo->lang_ext, &compiler_path);
   1062 	if (status != 0) {
   1063 		goto cleanup;
   1064 	}
   1065 
   1066 	status = semanage_module_get_path(
   1067 			sh,
   1068 			modinfo,
   1069 			SEMANAGE_MODULE_PATH_CIL,
   1070 			cil_path,
   1071 			sizeof(cil_path));
   1072 	if (status != 0) {
   1073 		goto cleanup;
   1074 	}
   1075 
   1076 	status = semanage_module_get_path(
   1077 			sh,
   1078 			modinfo,
   1079 			SEMANAGE_MODULE_PATH_HLL,
   1080 			hll_path,
   1081 			sizeof(hll_path));
   1082 	if (status != 0) {
   1083 		goto cleanup;
   1084 	}
   1085 
   1086 	if ((hll_data_len = map_file(sh, hll_path, &hll_data, &compressed)) <= 0) {
   1087 		ERR(sh, "Unable to read file %s\n", hll_path);
   1088 		status = -1;
   1089 		goto cleanup;
   1090 	}
   1091 
   1092 	status = semanage_pipe_data(sh, compiler_path, hll_data, (size_t)hll_data_len, &cil_data, &cil_data_len, &err_data, &err_data_len);
   1093 	if (err_data_len > 0) {
   1094 		for (start = end = err_data; end < err_data + err_data_len; end++) {
   1095 			if (*end == '\n') {
   1096 				fprintf(stderr, "%s: ", modinfo->name);
   1097 				fwrite(start, 1, end - start + 1, stderr);
   1098 				start = end + 1;
   1099 			}
   1100 		}
   1101 
   1102 		if (end != start) {
   1103 			fprintf(stderr, "%s: ", modinfo->name);
   1104 			fwrite(start, 1, end - start, stderr);
   1105 			fprintf(stderr, "\n");
   1106 		}
   1107 	}
   1108 	if (status != 0) {
   1109 		goto cleanup;
   1110 	}
   1111 
   1112 	bzip_status = bzip(sh, cil_path, cil_data, cil_data_len);
   1113 	if (bzip_status == -1) {
   1114 		ERR(sh, "Failed to bzip %s\n", cil_path);
   1115 		status = -1;
   1116 		goto cleanup;
   1117 	}
   1118 
   1119 	if (sh->conf->remove_hll == 1) {
   1120 		status = unlink(hll_path);
   1121 		if (status != 0) {
   1122 			ERR(sh, "Error while removing HLL file %s: %s", hll_path, strerror(errno));
   1123 			goto cleanup;
   1124 		}
   1125 
   1126 		status = semanage_direct_write_langext(sh, "cil", modinfo);
   1127 		if (status != 0) {
   1128 			goto cleanup;
   1129 		}
   1130 	}
   1131 
   1132 cleanup:
   1133 	if (hll_data_len > 0) {
   1134 		munmap(hll_data, hll_data_len);
   1135 	}
   1136 	free(cil_data);
   1137 	free(err_data);
   1138 	free(compiler_path);
   1139 
   1140 	return status;
   1141 }
   1142 
   1143 static int semanage_compile_hll_modules(semanage_handle_t *sh,
   1144 				semanage_module_info_t *modinfos,
   1145 				int num_modinfos)
   1146 {
   1147 	int status = 0;
   1148 	int i;
   1149 	char cil_path[PATH_MAX];
   1150 	struct stat sb;
   1151 
   1152 	assert(sh);
   1153 	assert(modinfos);
   1154 
   1155 	for (i = 0; i < num_modinfos; i++) {
   1156 		status = semanage_module_get_path(
   1157 				sh,
   1158 				&modinfos[i],
   1159 				SEMANAGE_MODULE_PATH_CIL,
   1160 				cil_path,
   1161 				sizeof(cil_path));
   1162 		if (status != 0) {
   1163 			goto cleanup;
   1164 		}
   1165 
   1166 		if (semanage_get_ignore_module_cache(sh) == 0 &&
   1167 				(status = stat(cil_path, &sb)) == 0) {
   1168 			continue;
   1169 		}
   1170 		if (status != 0 && errno != ENOENT) {
   1171 			ERR(sh, "Unable to access %s: %s\n", cil_path, strerror(errno));
   1172 			goto cleanup; //an error in the "stat" call
   1173 		}
   1174 
   1175 		status = semanage_compile_module(sh, &modinfos[i]);
   1176 		if (status < 0) {
   1177 			goto cleanup;
   1178 		}
   1179 	}
   1180 
   1181 	status = 0;
   1182 
   1183 cleanup:
   1184 	return status;
   1185 }
   1186 
   1187 /* Copies a file from src to dst. If dst already exists then
   1188  * overwrite it. If source doesn't exist then return success.
   1189  * Returns 0 on success, -1 on error. */
   1190 static int copy_file_if_exists(const char *src, const char *dst, mode_t mode){
   1191 	int rc = semanage_copy_file(src, dst, mode);
   1192 	return (rc < 0 && errno != ENOENT) ? rc : 0;
   1193 }
   1194 
   1195 /********************* direct API functions ********************/
   1196 
   1197 /* Commits all changes in sandbox to the actual kernel policy.
   1198  * Returns commit number on success, -1 on error.
   1199  */
   1200 static int semanage_direct_commit(semanage_handle_t * sh)
   1201 {
   1202 	char **mod_filenames = NULL;
   1203 	char *fc_buffer = NULL;
   1204 	size_t fc_buffer_len = 0;
   1205 	const char *ofilename = NULL;
   1206 	const char *path;
   1207 	int retval = -1, num_modinfos = 0, i;
   1208 	sepol_policydb_t *out = NULL;
   1209 	struct cil_db *cildb = NULL;
   1210 	semanage_module_info_t *modinfos = NULL;
   1211 	mode_t mask = umask(0077);
   1212 	struct stat sb;
   1213 
   1214 	int do_rebuild, do_write_kernel, do_install;
   1215 	int fcontexts_modified, ports_modified, seusers_modified,
   1216 		disable_dontaudit, preserve_tunables, ibpkeys_modified,
   1217 		ibendports_modified;
   1218 	dbase_config_t *users = semanage_user_dbase_local(sh);
   1219 	dbase_config_t *users_base = semanage_user_base_dbase_local(sh);
   1220 	dbase_config_t *pusers_base = semanage_user_base_dbase_policy(sh);
   1221 	dbase_config_t *pusers_extra = semanage_user_extra_dbase_policy(sh);
   1222 	dbase_config_t *ports = semanage_port_dbase_local(sh);
   1223 	dbase_config_t *pports = semanage_port_dbase_policy(sh);
   1224 	dbase_config_t *ibpkeys = semanage_ibpkey_dbase_local(sh);
   1225 	dbase_config_t *pibpkeys = semanage_ibpkey_dbase_policy(sh);
   1226 	dbase_config_t *ibendports = semanage_ibendport_dbase_local(sh);
   1227 	dbase_config_t *pibendports = semanage_ibendport_dbase_policy(sh);
   1228 	dbase_config_t *bools = semanage_bool_dbase_local(sh);
   1229 	dbase_config_t *pbools = semanage_bool_dbase_policy(sh);
   1230 	dbase_config_t *ifaces = semanage_iface_dbase_local(sh);
   1231 	dbase_config_t *pifaces = semanage_iface_dbase_policy(sh);
   1232 	dbase_config_t *nodes = semanage_node_dbase_local(sh);
   1233 	dbase_config_t *pnodes = semanage_node_dbase_policy(sh);
   1234 	dbase_config_t *fcontexts = semanage_fcontext_dbase_local(sh);
   1235 	dbase_config_t *pfcontexts = semanage_fcontext_dbase_policy(sh);
   1236 	dbase_config_t *seusers = semanage_seuser_dbase_local(sh);
   1237 	dbase_config_t *pseusers = semanage_seuser_dbase_policy(sh);
   1238 
   1239 	/* Modified flags that we need to use more than once. */
   1240 	ports_modified = ports->dtable->is_modified(ports->dbase);
   1241 	ibpkeys_modified = ibpkeys->dtable->is_modified(ibpkeys->dbase);
   1242 	ibendports_modified = ibendports->dtable->is_modified(ibendports->dbase);
   1243 	seusers_modified = seusers->dtable->is_modified(seusers->dbase);
   1244 	fcontexts_modified = fcontexts->dtable->is_modified(fcontexts->dbase);
   1245 
   1246 	/* Rebuild if explicitly requested or any module changes occurred. */
   1247 	do_rebuild = sh->do_rebuild | sh->modules_modified;
   1248 
   1249 	/* Create or remove the disable_dontaudit flag file. */
   1250 	path = semanage_path(SEMANAGE_TMP, SEMANAGE_DISABLE_DONTAUDIT);
   1251 	if (stat(path, &sb) == 0)
   1252 		do_rebuild |= !(sepol_get_disable_dontaudit(sh->sepolh) == 1);
   1253 	else if (errno == ENOENT) {
   1254 		/* The file does not exist */
   1255 		do_rebuild |= (sepol_get_disable_dontaudit(sh->sepolh) == 1);
   1256 	} else {
   1257 		ERR(sh, "Unable to access %s: %s\n", path, strerror(errno));
   1258 		retval = -1;
   1259 		goto cleanup;
   1260 	}
   1261 	if (sepol_get_disable_dontaudit(sh->sepolh) == 1) {
   1262 		FILE *touch;
   1263 		touch = fopen(path, "w");
   1264 		if (touch != NULL) {
   1265 			if (fclose(touch) != 0) {
   1266 				ERR(sh, "Error attempting to create disable_dontaudit flag.");
   1267 				goto cleanup;
   1268 			}
   1269 		} else {
   1270 			ERR(sh, "Error attempting to create disable_dontaudit flag.");
   1271 			goto cleanup;
   1272 		}
   1273 	} else {
   1274 		if (remove(path) == -1 && errno != ENOENT) {
   1275 			ERR(sh, "Error removing the disable_dontaudit flag.");
   1276 			goto cleanup;
   1277 		}
   1278 	}
   1279 
   1280 	/* Create or remove the preserve_tunables flag file. */
   1281 	path = semanage_path(SEMANAGE_TMP, SEMANAGE_PRESERVE_TUNABLES);
   1282 	if (stat(path, &sb) == 0)
   1283 		do_rebuild |= !(sepol_get_preserve_tunables(sh->sepolh) == 1);
   1284 	else if (errno == ENOENT) {
   1285 		/* The file does not exist */
   1286 		do_rebuild |= (sepol_get_preserve_tunables(sh->sepolh) == 1);
   1287 	} else {
   1288 		ERR(sh, "Unable to access %s: %s\n", path, strerror(errno));
   1289 		retval = -1;
   1290 		goto cleanup;
   1291 	}
   1292 
   1293 	if (sepol_get_preserve_tunables(sh->sepolh) == 1) {
   1294 		FILE *touch;
   1295 		touch = fopen(path, "w");
   1296 		if (touch != NULL) {
   1297 			if (fclose(touch) != 0) {
   1298 				ERR(sh, "Error attempting to create preserve_tunable flag.");
   1299 				goto cleanup;
   1300 			}
   1301 		} else {
   1302 			ERR(sh, "Error attempting to create preserve_tunable flag.");
   1303 			goto cleanup;
   1304 		}
   1305 	} else {
   1306 		if (remove(path) == -1 && errno != ENOENT) {
   1307 			ERR(sh, "Error removing the preserve_tunables flag.");
   1308 			goto cleanup;
   1309 		}
   1310 	}
   1311 
   1312 	/* Before we do anything else, flush the join to its component parts.
   1313 	 * This *does not* flush to disk automatically */
   1314 	if (users->dtable->is_modified(users->dbase)) {
   1315 		retval = users->dtable->flush(sh, users->dbase);
   1316 		if (retval < 0)
   1317 			goto cleanup;
   1318 	}
   1319 
   1320 	/*
   1321 	 * This is for systems that have already migrated with an older version
   1322 	 * of semanage_migrate_store. The older version did not copy
   1323 	 * policy.kern so the policy binary must be rebuilt here.
   1324 	 * This also ensures that any linked files that are required
   1325 	 * in order to skip re-linking are present; otherwise, we force
   1326 	 * a rebuild.
   1327 	 */
   1328 	if (!do_rebuild) {
   1329 		int files[] = {SEMANAGE_STORE_KERNEL,
   1330 					   SEMANAGE_STORE_FC,
   1331 					   SEMANAGE_STORE_SEUSERS,
   1332 					   SEMANAGE_LINKED,
   1333 					   SEMANAGE_SEUSERS_LINKED,
   1334 					   SEMANAGE_USERS_EXTRA_LINKED};
   1335 
   1336 		for (i = 0; i < (int) ARRAY_SIZE(files); i++) {
   1337 			path = semanage_path(SEMANAGE_TMP, files[i]);
   1338 			if (stat(path, &sb) != 0) {
   1339 				if (errno != ENOENT) {
   1340 					ERR(sh, "Unable to access %s: %s\n", path, strerror(errno));
   1341 					retval = -1;
   1342 					goto cleanup;
   1343 				}
   1344 
   1345 				do_rebuild = 1;
   1346 				goto rebuild;
   1347 			}
   1348 		}
   1349 	}
   1350 
   1351 rebuild:
   1352 	/*
   1353 	 * Now that we know whether or not a rebuild is required,
   1354 	 * we can determine what else needs to be done.
   1355 	 * We need to write the kernel policy if we are rebuilding
   1356 	 * or if any other policy component that lives in the kernel
   1357 	 * policy has been modified.
   1358 	 * We need to install the policy files if any of the managed files
   1359 	 * that live under /etc/selinux (kernel policy, seusers, file contexts)
   1360 	 * will be modified.
   1361 	 */
   1362 	do_write_kernel = do_rebuild | ports_modified | ibpkeys_modified |
   1363 		ibendports_modified |
   1364 		bools->dtable->is_modified(bools->dbase) |
   1365 		ifaces->dtable->is_modified(ifaces->dbase) |
   1366 		nodes->dtable->is_modified(nodes->dbase) |
   1367 		users->dtable->is_modified(users_base->dbase);
   1368 	do_install = do_write_kernel | seusers_modified | fcontexts_modified;
   1369 
   1370 	/*
   1371 	 * If there were policy changes, or explicitly requested, or
   1372 	 * any required files are missing, rebuild the policy.
   1373 	 */
   1374 	if (do_rebuild) {
   1375 		/* =================== Module expansion =============== */
   1376 
   1377 		retval = semanage_get_active_modules(sh, &modinfos, &num_modinfos);
   1378 		if (retval < 0) {
   1379 			goto cleanup;
   1380 		}
   1381 
   1382 		if (num_modinfos == 0) {
   1383 			goto cleanup;
   1384 		}
   1385 
   1386 		retval = semanage_compile_hll_modules(sh, modinfos, num_modinfos);
   1387 		if (retval < 0) {
   1388 			ERR(sh, "Failed to compile hll files into cil files.\n");
   1389 			goto cleanup;
   1390 		}
   1391 
   1392 		retval = semanage_get_cil_paths(sh, modinfos, num_modinfos, &mod_filenames);
   1393 		if (retval < 0)
   1394 			goto cleanup;
   1395 
   1396 		retval = semanage_verify_modules(sh, mod_filenames, num_modinfos);
   1397 		if (retval < 0)
   1398 			goto cleanup;
   1399 
   1400 		cil_db_init(&cildb);
   1401 
   1402 		disable_dontaudit = sepol_get_disable_dontaudit(sh->sepolh);
   1403 		preserve_tunables = sepol_get_preserve_tunables(sh->sepolh);
   1404 		cil_set_disable_dontaudit(cildb, disable_dontaudit);
   1405 		cil_set_disable_neverallow(cildb, !(sh->conf->expand_check));
   1406 		cil_set_preserve_tunables(cildb, preserve_tunables);
   1407 		cil_set_target_platform(cildb, sh->conf->target_platform);
   1408 		cil_set_policy_version(cildb, sh->conf->policyvers);
   1409 
   1410 		if (sh->conf->handle_unknown != -1) {
   1411 			cil_set_handle_unknown(cildb, sh->conf->handle_unknown);
   1412 		}
   1413 
   1414 		retval = semanage_load_files(sh, cildb, mod_filenames, num_modinfos);
   1415 		if (retval < 0) {
   1416 			goto cleanup;
   1417 		}
   1418 
   1419 		retval = cil_compile(cildb);
   1420 		if (retval < 0)
   1421 			goto cleanup;
   1422 
   1423 		retval = cil_build_policydb(cildb, &out);
   1424 		if (retval < 0)
   1425 			goto cleanup;
   1426 
   1427 		/* File Contexts */
   1428 		retval = cil_filecons_to_string(cildb, &fc_buffer, &fc_buffer_len);
   1429 		if (retval < 0)
   1430 			goto cleanup;
   1431 
   1432 		/* Write the contexts (including template contexts) to a single file. */
   1433 		ofilename = semanage_path(SEMANAGE_TMP, SEMANAGE_FC_TMPL);
   1434 		if (ofilename == NULL) {
   1435 			retval = -1;
   1436 			goto cleanup;
   1437 		}
   1438 		retval = write_file(sh, ofilename, fc_buffer, fc_buffer_len);
   1439 		if (retval < 0)
   1440 			goto cleanup;
   1441 
   1442 		/* Split complete and template file contexts into their separate files. */
   1443 		retval = semanage_split_fc(sh);
   1444 		if (retval < 0)
   1445 			goto cleanup;
   1446 
   1447 		/* remove FC_TMPL now that it is now longer needed */
   1448 		unlink(semanage_path(SEMANAGE_TMP, SEMANAGE_FC_TMPL));
   1449 
   1450 		pfcontexts->dtable->drop_cache(pfcontexts->dbase);
   1451 
   1452 		/* SEUsers */
   1453 		retval = semanage_direct_update_seuser(sh, cildb);
   1454 		if (retval < 0)
   1455 			goto cleanup;
   1456 
   1457 		/* User Extra */
   1458 		retval = semanage_direct_update_user_extra(sh, cildb);
   1459 		if (retval < 0)
   1460 			goto cleanup;
   1461 
   1462 		cil_db_destroy(&cildb);
   1463 
   1464 		/* Write the linked policy before merging local changes. */
   1465 		retval = semanage_write_policydb(sh, out,
   1466 						 SEMANAGE_LINKED);
   1467 		if (retval < 0)
   1468 			goto cleanup;
   1469 	} else {
   1470 		/* Load the existing linked policy, w/o local changes */
   1471 		retval = sepol_policydb_create(&out);
   1472 		if (retval < 0)
   1473 			goto cleanup;
   1474 
   1475 		retval = semanage_read_policydb(sh, out, SEMANAGE_LINKED);
   1476 		if (retval < 0)
   1477 			goto cleanup;
   1478 
   1479 		path = semanage_path(SEMANAGE_TMP, SEMANAGE_SEUSERS_LINKED);
   1480 		if (stat(path, &sb) == 0) {
   1481 			retval = semanage_copy_file(path,
   1482 						    semanage_path(SEMANAGE_TMP,
   1483 								  SEMANAGE_STORE_SEUSERS),
   1484 						    0);
   1485 			if (retval < 0)
   1486 				goto cleanup;
   1487 			pseusers->dtable->drop_cache(pseusers->dbase);
   1488 		} else if (errno == ENOENT) {
   1489 			/* The file does not exist */
   1490 			pseusers->dtable->clear(sh, pseusers->dbase);
   1491 		} else {
   1492 			ERR(sh, "Unable to access %s: %s\n", path, strerror(errno));
   1493 			retval = -1;
   1494 			goto cleanup;
   1495 		}
   1496 
   1497 		path = semanage_path(SEMANAGE_TMP, SEMANAGE_USERS_EXTRA_LINKED);
   1498 		if (stat(path, &sb) == 0) {
   1499 			retval = semanage_copy_file(path,
   1500 						    semanage_path(SEMANAGE_TMP,
   1501 								  SEMANAGE_USERS_EXTRA),
   1502 						    0);
   1503 			if (retval < 0)
   1504 				goto cleanup;
   1505 			pusers_extra->dtable->drop_cache(pusers_extra->dbase);
   1506 		} else if (errno == ENOENT) {
   1507 			/* The file does not exist */
   1508 			pusers_extra->dtable->clear(sh, pusers_extra->dbase);
   1509 		} else {
   1510 			ERR(sh, "Unable to access %s: %s\n", path, strerror(errno));
   1511 			retval = -1;
   1512 			goto cleanup;
   1513 		}
   1514 	}
   1515 
   1516 	/* Attach our databases to the policydb we just created or loaded. */
   1517 	dbase_policydb_attach((dbase_policydb_t *) pusers_base->dbase, out);
   1518 	dbase_policydb_attach((dbase_policydb_t *) pports->dbase, out);
   1519 	dbase_policydb_attach((dbase_policydb_t *) pibpkeys->dbase, out);
   1520 	dbase_policydb_attach((dbase_policydb_t *) pibendports->dbase, out);
   1521 	dbase_policydb_attach((dbase_policydb_t *) pifaces->dbase, out);
   1522 	dbase_policydb_attach((dbase_policydb_t *) pbools->dbase, out);
   1523 	dbase_policydb_attach((dbase_policydb_t *) pnodes->dbase, out);
   1524 
   1525 	/* Merge local changes */
   1526 	retval = semanage_base_merge_components(sh);
   1527 	if (retval < 0)
   1528 		goto cleanup;
   1529 
   1530 	if (do_write_kernel) {
   1531 		/* Write new kernel policy. */
   1532 		retval = semanage_write_policydb(sh, out,
   1533 						 SEMANAGE_STORE_KERNEL);
   1534 		if (retval < 0)
   1535 			goto cleanup;
   1536 
   1537 		/* Run the kernel policy verifier, if any. */
   1538 		retval = semanage_verify_kernel(sh);
   1539 		if (retval < 0)
   1540 			goto cleanup;
   1541 	}
   1542 
   1543 	/* ======= Post-process: Validate non-policydb components ===== */
   1544 
   1545 	/* Validate local modifications to file contexts.
   1546 	 * Note: those are still cached, even though they've been
   1547 	 * merged into the main file_contexts. We won't check the
   1548 	 * large file_contexts - checked at compile time */
   1549 	if (do_rebuild || fcontexts_modified) {
   1550 		retval = semanage_fcontext_validate_local(sh, out);
   1551 		if (retval < 0)
   1552 			goto cleanup;
   1553 	}
   1554 
   1555 	/* Validate local seusers against policy */
   1556 	if (do_rebuild || seusers_modified) {
   1557 		retval = semanage_seuser_validate_local(sh, out);
   1558 		if (retval < 0)
   1559 			goto cleanup;
   1560 	}
   1561 
   1562 	/* Validate local ports for overlap */
   1563 	if (do_rebuild || ports_modified) {
   1564 		retval = semanage_port_validate_local(sh);
   1565 		if (retval < 0)
   1566 			goto cleanup;
   1567 	}
   1568 
   1569 	/* Validate local ibpkeys for overlap */
   1570 	if (do_rebuild || ibpkeys_modified) {
   1571 		retval = semanage_ibpkey_validate_local(sh);
   1572 		if (retval < 0)
   1573 			goto cleanup;
   1574 	}
   1575 
   1576 	/* Validate local ibendports */
   1577 	if (do_rebuild || ibendports_modified) {
   1578 		retval = semanage_ibendport_validate_local(sh);
   1579 		if (retval < 0)
   1580 			goto cleanup;
   1581 	}
   1582 	/* ================== Write non-policydb components ========= */
   1583 
   1584 	/* Commit changes to components */
   1585 	retval = semanage_commit_components(sh);
   1586 	if (retval < 0)
   1587 		goto cleanup;
   1588 
   1589 	retval = semanage_copy_file(semanage_path(SEMANAGE_TMP, SEMANAGE_STORE_KERNEL),
   1590 			semanage_final_path(SEMANAGE_FINAL_TMP, SEMANAGE_KERNEL),
   1591 			sh->conf->file_mode);
   1592 	if (retval < 0) {
   1593 		goto cleanup;
   1594 	}
   1595 
   1596 	retval = copy_file_if_exists(semanage_path(SEMANAGE_TMP, SEMANAGE_STORE_FC_LOCAL),
   1597 						semanage_final_path(SEMANAGE_FINAL_TMP, SEMANAGE_FC_LOCAL),
   1598 						sh->conf->file_mode);
   1599 	if (retval < 0) {
   1600 		goto cleanup;
   1601 	}
   1602 
   1603 	retval = copy_file_if_exists(semanage_path(SEMANAGE_TMP, SEMANAGE_STORE_FC),
   1604 						semanage_final_path(SEMANAGE_FINAL_TMP, SEMANAGE_FC),
   1605 						sh->conf->file_mode);
   1606 	if (retval < 0) {
   1607 		goto cleanup;
   1608 	}
   1609 
   1610 	retval = copy_file_if_exists(semanage_path(SEMANAGE_TMP, SEMANAGE_STORE_SEUSERS),
   1611 						semanage_final_path(SEMANAGE_FINAL_TMP, SEMANAGE_SEUSERS),
   1612 						sh->conf->file_mode);
   1613 	if (retval < 0) {
   1614 		goto cleanup;
   1615 	}
   1616 
   1617 	/* run genhomedircon if its enabled, this should be the last operation
   1618 	 * which requires the out policydb */
   1619 	if (!sh->conf->disable_genhomedircon) {
   1620 		if (out){
   1621 			if ((retval = semanage_genhomedircon(sh, out, sh->conf->usepasswd,
   1622 								sh->conf->ignoredirs)) != 0) {
   1623 				ERR(sh, "semanage_genhomedircon returned error code %d.", retval);
   1624 				goto cleanup;
   1625 			}
   1626 			/* file_contexts.homedirs was created in SEMANAGE_TMP store */
   1627 			retval = semanage_copy_file(
   1628 						semanage_path(SEMANAGE_TMP, SEMANAGE_STORE_FC_HOMEDIRS),
   1629 						semanage_final_path(SEMANAGE_FINAL_TMP,	SEMANAGE_FC_HOMEDIRS),
   1630 						sh->conf->file_mode);
   1631 			if (retval < 0) {
   1632 				goto cleanup;
   1633 			}
   1634 		}
   1635 	} else {
   1636 		WARN(sh, "WARNING: genhomedircon is disabled. \
   1637                                See /etc/selinux/semanage.conf if you need to enable it.");
   1638         }
   1639 
   1640 	/* free out, if we don't free it before calling semanage_install_sandbox
   1641 	 * then fork() may fail on low memory machines */
   1642 	sepol_policydb_free(out);
   1643 	out = NULL;
   1644 
   1645 	if (do_install)
   1646 		retval = semanage_install_sandbox(sh);
   1647 
   1648 cleanup:
   1649 	for (i = 0; i < num_modinfos; i++) {
   1650 		semanage_module_info_destroy(sh, &modinfos[i]);
   1651 	}
   1652 	free(modinfos);
   1653 
   1654 	for (i = 0; mod_filenames != NULL && i < num_modinfos; i++) {
   1655 		free(mod_filenames[i]);
   1656 	}
   1657 
   1658 	/* Detach from policydb, so it can be freed */
   1659 	dbase_policydb_detach((dbase_policydb_t *) pusers_base->dbase);
   1660 	dbase_policydb_detach((dbase_policydb_t *) pports->dbase);
   1661 	dbase_policydb_detach((dbase_policydb_t *) pibpkeys->dbase);
   1662 	dbase_policydb_detach((dbase_policydb_t *) pibendports->dbase);
   1663 	dbase_policydb_detach((dbase_policydb_t *) pifaces->dbase);
   1664 	dbase_policydb_detach((dbase_policydb_t *) pnodes->dbase);
   1665 	dbase_policydb_detach((dbase_policydb_t *) pbools->dbase);
   1666 
   1667 	free(mod_filenames);
   1668 	sepol_policydb_free(out);
   1669 	cil_db_destroy(&cildb);
   1670 
   1671 	free(fc_buffer);
   1672 
   1673 	/* Set commit_err so other functions can detect any errors. Note that
   1674 	 * retval > 0 will be the commit number.
   1675 	 */
   1676 	if (retval < 0)
   1677 		sh->commit_err = retval;
   1678 
   1679 	if (semanage_remove_tmps(sh) != 0)
   1680 		retval = -1;
   1681 
   1682 	semanage_release_trans_lock(sh);
   1683 	umask(mask);
   1684 
   1685 	return retval;
   1686 }
   1687 
   1688 /* Writes a module to the sandbox's module directory, overwriting any
   1689  * previous module stored within.  Note that module data are not
   1690  * free()d by this function; caller is responsible for deallocating it
   1691  * if necessary.  Returns 0 on success, -1 if out of memory, -2 if the
   1692  * data does not represent a valid module file, -3 if error while
   1693  * writing file. */
   1694 static int semanage_direct_install(semanage_handle_t * sh,
   1695 				   char *data, size_t data_len,
   1696 				   const char *module_name, const char *lang_ext)
   1697 {
   1698 	int status = 0;
   1699 	int ret = 0;
   1700 
   1701 	semanage_module_info_t modinfo;
   1702 	ret = semanage_module_info_init(sh, &modinfo);
   1703 	if (ret != 0) {
   1704 		status = -1;
   1705 		goto cleanup;
   1706 	}
   1707 
   1708 	ret = semanage_module_info_set_priority(sh, &modinfo, sh->priority);
   1709 	if (ret != 0) {
   1710 		status = -1;
   1711 		goto cleanup;
   1712 	}
   1713 
   1714 	ret = semanage_module_info_set_name(sh, &modinfo, module_name);
   1715 	if (ret != 0) {
   1716 		status = -1;
   1717 		goto cleanup;
   1718 	}
   1719 
   1720 	ret = semanage_module_info_set_lang_ext(sh, &modinfo, lang_ext);
   1721 	if (ret != 0) {
   1722 		status = -1;
   1723 		goto cleanup;
   1724 	}
   1725 
   1726 	ret = semanage_module_info_set_enabled(sh, &modinfo, -1);
   1727 	if (ret != 0) {
   1728 		status = -1;
   1729 		goto cleanup;
   1730 	}
   1731 
   1732 	status = semanage_direct_install_info(sh, &modinfo, data, data_len);
   1733 
   1734 cleanup:
   1735 
   1736 	semanage_module_info_destroy(sh, &modinfo);
   1737 
   1738 	return status;
   1739 }
   1740 
   1741 /* Attempts to link a module to the sandbox's module directory, unlinking any
   1742  * previous module stored within.  Returns 0 on success, -1 if out of memory, -2 if the
   1743  * data does not represent a valid module file, -3 if error while
   1744  * writing file. */
   1745 
   1746 static int semanage_direct_install_file(semanage_handle_t * sh,
   1747 					const char *install_filename)
   1748 {
   1749 
   1750 	int retval = -1;
   1751 	char *data = NULL;
   1752 	ssize_t data_len = 0;
   1753 	int compressed = 0;
   1754 	char *path = NULL;
   1755 	char *filename;
   1756 	char *lang_ext = NULL;
   1757 	char *module_name = NULL;
   1758 	char *separator;
   1759 	char *version = NULL;
   1760 
   1761 	if ((data_len = map_file(sh, install_filename, &data, &compressed)) <= 0) {
   1762 		ERR(sh, "Unable to read file %s\n", install_filename);
   1763 		retval = -1;
   1764 		goto cleanup;
   1765 	}
   1766 
   1767 	path = strdup(install_filename);
   1768 	if (path == NULL) {
   1769 		ERR(sh, "No memory available for strdup.\n");
   1770 		retval = -1;
   1771 		goto cleanup;
   1772 	}
   1773 
   1774 	filename = basename(path);
   1775 
   1776 	if (compressed) {
   1777 		separator = strrchr(filename, '.');
   1778 		if (separator == NULL) {
   1779 			ERR(sh, "Compressed module does not have a valid extension.");
   1780 			retval = -1;
   1781 			goto cleanup;
   1782 		}
   1783 		*separator = '\0';
   1784 		lang_ext = separator + 1;
   1785 	}
   1786 
   1787 	separator = strrchr(filename, '.');
   1788 	if (separator == NULL) {
   1789 		if (lang_ext == NULL) {
   1790 			ERR(sh, "Module does not have a valid extension.");
   1791 			retval = -1;
   1792 			goto cleanup;
   1793 		}
   1794 	} else {
   1795 		*separator = '\0';
   1796 		lang_ext = separator + 1;
   1797 	}
   1798 
   1799 	if (strcmp(lang_ext, "pp") == 0) {
   1800 		retval = parse_module_headers(sh, data, data_len, &module_name, &version);
   1801 		free(version);
   1802 		if (retval != 0)
   1803 			goto cleanup;
   1804 	}
   1805 
   1806 	if (module_name == NULL) {
   1807 		module_name = strdup(filename);
   1808 		if (module_name == NULL) {
   1809 			ERR(sh, "No memory available for module_name.\n");
   1810 			retval = -1;
   1811 			goto cleanup;
   1812 		}
   1813 	} else if (strcmp(module_name, filename) != 0) {
   1814 		fprintf(stderr, "Warning: SELinux userspace will refer to the module from %s as %s rather than %s\n", install_filename, module_name, filename);
   1815 	}
   1816 
   1817 	retval = semanage_direct_install(sh, data, data_len, module_name, lang_ext);
   1818 
   1819 cleanup:
   1820 	if (data_len > 0) munmap(data, data_len);
   1821 	free(module_name);
   1822 	free(path);
   1823 
   1824 	return retval;
   1825 }
   1826 
   1827 static int semanage_direct_extract(semanage_handle_t * sh,
   1828 				   semanage_module_key_t *modkey,
   1829 				   int extract_cil,
   1830 				   void **mapped_data,
   1831 				   size_t *data_len,
   1832 				   semanage_module_info_t **modinfo)
   1833 {
   1834 	char module_path[PATH_MAX];
   1835 	char input_file[PATH_MAX];
   1836 	enum semanage_module_path_type file_type;
   1837 	int rc = -1;
   1838 	semanage_module_info_t *_modinfo = NULL;
   1839 	ssize_t _data_len;
   1840 	char *_data;
   1841 	int compressed;
   1842 	struct stat sb;
   1843 
   1844 	/* get path of module */
   1845 	rc = semanage_module_get_path(
   1846 			sh,
   1847 			(const semanage_module_info_t *)modkey,
   1848 			SEMANAGE_MODULE_PATH_NAME,
   1849 			module_path,
   1850 			sizeof(module_path));
   1851 	if (rc != 0) {
   1852 		goto cleanup;
   1853 	}
   1854 
   1855 	if (stat(module_path, &sb) != 0) {
   1856 		ERR(sh, "Unable to access %s: %s\n", module_path, strerror(errno));
   1857 		rc = -1;
   1858 		goto cleanup;
   1859 	}
   1860 
   1861 	rc = semanage_module_get_module_info(sh,
   1862 			modkey,
   1863 			&_modinfo);
   1864 	if (rc != 0) {
   1865 		goto cleanup;
   1866 	}
   1867 
   1868 	if (extract_cil || strcmp(_modinfo->lang_ext, "cil") == 0) {
   1869 		file_type = SEMANAGE_MODULE_PATH_CIL;
   1870 	} else {
   1871 		file_type = SEMANAGE_MODULE_PATH_HLL;
   1872 	}
   1873 
   1874 	/* get path of what to extract */
   1875 	rc = semanage_module_get_path(
   1876 			sh,
   1877 			_modinfo,
   1878 			file_type,
   1879 			input_file,
   1880 			sizeof(input_file));
   1881 	if (rc != 0) {
   1882 		goto cleanup;
   1883 	}
   1884 
   1885 	if (extract_cil == 1 && strcmp(_modinfo->lang_ext, "cil") && stat(input_file, &sb) != 0) {
   1886 		if (errno != ENOENT) {
   1887 			ERR(sh, "Unable to access %s: %s\n", input_file, strerror(errno));
   1888 			rc = -1;
   1889 			goto cleanup;
   1890 		}
   1891 
   1892 		rc = semanage_compile_module(sh, _modinfo);
   1893 		if (rc < 0) {
   1894 			goto cleanup;
   1895 		}
   1896 	}
   1897 
   1898 	_data_len = map_file(sh, input_file, &_data, &compressed);
   1899 	if (_data_len <= 0) {
   1900 		ERR(sh, "Error mapping file: %s", input_file);
   1901 		rc = -1;
   1902 		goto cleanup;
   1903 	}
   1904 
   1905 	*modinfo = _modinfo;
   1906 	*data_len = (size_t)_data_len;
   1907 	*mapped_data = _data;
   1908 
   1909 cleanup:
   1910 	if (rc != 0) {
   1911 		semanage_module_info_destroy(sh, _modinfo);
   1912 		free(_modinfo);
   1913 	}
   1914 
   1915 	return rc;
   1916 }
   1917 
   1918 /* Removes a module from the sandbox.  Returns 0 on success, -1 if out
   1919  * of memory, -2 if module not found or could not be removed. */
   1920 static int semanage_direct_remove(semanage_handle_t * sh, char *module_name)
   1921 {
   1922 	int status = 0;
   1923 	int ret = 0;
   1924 
   1925 	semanage_module_key_t modkey;
   1926 	ret = semanage_module_key_init(sh, &modkey);
   1927 	if (ret != 0) {
   1928 		status = -1;
   1929 		goto cleanup;
   1930 	}
   1931 
   1932 	ret = semanage_module_key_set_priority(sh, &modkey, sh->priority);
   1933 	if (ret != 0) {
   1934 		status = -1;
   1935 		goto cleanup;
   1936 	}
   1937 
   1938 	ret = semanage_module_key_set_name(sh, &modkey, module_name);
   1939 	if (ret != 0) {
   1940 		status = -1;
   1941 		goto cleanup;
   1942 	}
   1943 
   1944 	status = semanage_direct_remove_key(sh, &modkey);
   1945 
   1946 cleanup:
   1947 	return status;
   1948 }
   1949 
   1950 /* Allocate an array of module_info structures for each readable
   1951  * module within the store.  Note that if the calling program has
   1952  * already begun a transaction then this function will get a list of
   1953  * modules within the sandbox.	The caller is responsible for calling
   1954  * semanage_module_info_datum_destroy() on each element of the array
   1955  * as well as free()ing the entire list.
   1956  */
   1957 static int semanage_direct_list(semanage_handle_t * sh,
   1958 				semanage_module_info_t ** modinfo,
   1959 				int *num_modules)
   1960 {
   1961 	int i, retval = -1;
   1962 	*modinfo = NULL;
   1963 	*num_modules = 0;
   1964 
   1965 	/* get the read lock when reading from the active
   1966 	   (non-transaction) directory */
   1967 	if (!sh->is_in_transaction)
   1968 		if (semanage_get_active_lock(sh) < 0)
   1969 			return -1;
   1970 
   1971 	if (semanage_get_active_modules(sh, modinfo, num_modules) == -1) {
   1972 		goto cleanup;
   1973 	}
   1974 
   1975 	if (num_modules == 0) {
   1976 		retval = semanage_direct_get_serial(sh);
   1977 		goto cleanup;
   1978 	}
   1979 
   1980 	retval = semanage_direct_get_serial(sh);
   1981 
   1982       cleanup:
   1983 	if (retval < 0) {
   1984 		for (i = 0; i < *num_modules; i++) {
   1985 			semanage_module_info_destroy(sh, &(*modinfo[i]));
   1986 			modinfo[i] = NULL;
   1987 		}
   1988 		free(*modinfo);
   1989 		*modinfo = NULL;
   1990 	}
   1991 
   1992 	if (!sh->is_in_transaction) {
   1993 		semanage_release_active_lock(sh);
   1994 	}
   1995 	return retval;
   1996 }
   1997 
   1998 static int semanage_direct_get_enabled(semanage_handle_t *sh,
   1999 				       const semanage_module_key_t *modkey,
   2000 				       int *enabled)
   2001 {
   2002 	assert(sh);
   2003 	assert(modkey);
   2004 	assert(enabled);
   2005 
   2006 	int status = 0;
   2007 	int ret = 0;
   2008 
   2009 	char path[PATH_MAX];
   2010 	struct stat sb;
   2011 	semanage_module_info_t *modinfo = NULL;
   2012 
   2013 	/* get module info */
   2014 	ret = semanage_module_get_module_info(
   2015 			sh,
   2016 			modkey,
   2017 			&modinfo);
   2018 	if (ret != 0) {
   2019 		status = -1;
   2020 		goto cleanup;
   2021 	}
   2022 
   2023 	/* get disabled file path */
   2024 	ret = semanage_module_get_path(
   2025 			sh,
   2026 			modinfo,
   2027 			SEMANAGE_MODULE_PATH_DISABLED,
   2028 			path,
   2029 			sizeof(path));
   2030 	if (ret != 0) {
   2031 		status = -1;
   2032 		goto cleanup;
   2033 	}
   2034 
   2035 	if (stat(path, &sb) < 0) {
   2036 		if (errno != ENOENT) {
   2037 			ERR(sh, "Unable to access %s: %s\n", path, strerror(errno));
   2038 			status = -1;
   2039 			goto cleanup;
   2040 		}
   2041 
   2042 		*enabled = 1;
   2043 	}
   2044 	else {
   2045 		*enabled = 0;
   2046 	}
   2047 
   2048 cleanup:
   2049 	semanage_module_info_destroy(sh, modinfo);
   2050 	free(modinfo);
   2051 
   2052 	return status;
   2053 }
   2054 
   2055 static int semanage_direct_set_enabled(semanage_handle_t *sh,
   2056 				       const semanage_module_key_t *modkey,
   2057 				       int enabled)
   2058 {
   2059 	assert(sh);
   2060 	assert(modkey);
   2061 
   2062 	int status = 0;
   2063 	int ret = 0;
   2064 
   2065 	char fn[PATH_MAX];
   2066 	const char *path = NULL;
   2067 	FILE *fp = NULL;
   2068 	semanage_module_info_t *modinfo = NULL;
   2069 	mode_t mask;
   2070 
   2071 	/* check transaction */
   2072 	if (!sh->is_in_transaction) {
   2073 		if (semanage_begin_transaction(sh) < 0) {
   2074 			status = -1;
   2075 			goto cleanup;
   2076 		}
   2077 	}
   2078 
   2079 	/* validate name */
   2080 	ret = semanage_module_validate_name(modkey->name);
   2081 	if (ret != 0) {
   2082 		errno = 0;
   2083 		ERR(sh, "Name %s is invalid.", modkey->name);
   2084 		status = -1;
   2085 		goto cleanup;
   2086 	}
   2087 
   2088 	/* validate enabled */
   2089 	ret = semanage_module_validate_enabled(enabled);
   2090 	if (ret != 0) {
   2091 		errno = 0;
   2092 		ERR(sh, "Enabled status %d is invalid.", enabled);
   2093 		status = -1;
   2094 		goto cleanup;
   2095 	}
   2096 
   2097 	/* check for disabled path, create if missing */
   2098 	path = semanage_path(SEMANAGE_TMP, SEMANAGE_MODULES_DISABLED);
   2099 
   2100 	ret = semanage_mkdir(sh, path);
   2101 	if (ret != 0) {
   2102 		status = -1;
   2103 		goto cleanup;
   2104 	}
   2105 
   2106 	/* get module info */
   2107 	ret = semanage_module_get_module_info(
   2108 			sh,
   2109 			modkey,
   2110 			&modinfo);
   2111 	if (ret != 0) {
   2112 		status = -1;
   2113 		goto cleanup;
   2114 	}
   2115 
   2116 	/* get module disabled file */
   2117 	ret = semanage_module_get_path(
   2118 			sh,
   2119 			modinfo,
   2120 			SEMANAGE_MODULE_PATH_DISABLED,
   2121 			fn,
   2122 			sizeof(fn));
   2123 	if (ret != 0) {
   2124 		status = -1;
   2125 		goto cleanup;
   2126 	}
   2127 
   2128 	switch (enabled) {
   2129 		case 0: /* disable the module */
   2130 			mask = umask(0077);
   2131 			fp = fopen(fn, "w");
   2132 			umask(mask);
   2133 
   2134 			if (fp == NULL) {
   2135 				ERR(sh,
   2136 				    "Unable to disable module %s",
   2137 				    modkey->name);
   2138 				status = -1;
   2139 				goto cleanup;
   2140 			}
   2141 
   2142 			if (fclose(fp) != 0) {
   2143 				ERR(sh,
   2144 				    "Unable to close disabled file for module %s",
   2145 				    modkey->name);
   2146 				status = -1;
   2147 				goto cleanup;
   2148 			}
   2149 
   2150 			fp = NULL;
   2151 
   2152 			break;
   2153 		case 1: /* enable the module */
   2154 			if (unlink(fn) < 0) {
   2155 				if (errno != ENOENT) {
   2156 					ERR(sh,
   2157 					    "Unable to enable module %s",
   2158 					    modkey->name);
   2159 					status = -1;
   2160 					goto cleanup;
   2161 				}
   2162 				else {
   2163 					/* module already enabled */
   2164 					errno = 0;
   2165 				}
   2166 			}
   2167 
   2168 			break;
   2169 		case -1: /* warn about ignored setting to default */
   2170 			WARN(sh,
   2171 			     "Setting module %s to 'default' state has no effect",
   2172 			     modkey->name);
   2173 			break;
   2174 	}
   2175 
   2176 cleanup:
   2177 	semanage_module_info_destroy(sh, modinfo);
   2178 	free(modinfo);
   2179 
   2180 	if (fp != NULL) fclose(fp);
   2181 	return status;
   2182 }
   2183 
   2184 int semanage_direct_access_check(semanage_handle_t * sh)
   2185 {
   2186 	if (semanage_check_init(sh, sh->conf->store_root_path))
   2187 		return -1;
   2188 
   2189 	return semanage_store_access_check();
   2190 }
   2191 
   2192 int semanage_direct_mls_enabled(semanage_handle_t * sh)
   2193 {
   2194 	sepol_policydb_t *p = NULL;
   2195 	int retval;
   2196 
   2197 	retval = sepol_policydb_create(&p);
   2198 	if (retval < 0)
   2199 		goto cleanup;
   2200 
   2201 	retval = semanage_read_policydb(sh, p, SEMANAGE_STORE_KERNEL);
   2202 	if (retval < 0)
   2203 		goto cleanup;
   2204 
   2205 	retval = sepol_policydb_mls_enabled(p);
   2206 cleanup:
   2207 	sepol_policydb_free(p);
   2208 	return retval;
   2209 }
   2210 
   2211 static int semanage_direct_get_module_info(semanage_handle_t *sh,
   2212 					   const semanage_module_key_t *modkey,
   2213 					   semanage_module_info_t **modinfo)
   2214 {
   2215 	assert(sh);
   2216 	assert(modkey);
   2217 	assert(modinfo);
   2218 
   2219 	int status = 0;
   2220 	int ret = 0;
   2221 
   2222 	char fn[PATH_MAX];
   2223 	FILE *fp = NULL;
   2224 	size_t size = 0;
   2225 	struct stat sb;
   2226 	char *tmp = NULL;
   2227 
   2228 	int i = 0;
   2229 
   2230 	semanage_module_info_t *modinfos = NULL;
   2231 	int modinfos_len = 0;
   2232 	semanage_module_info_t *highest = NULL;
   2233 
   2234 	/* check module name */
   2235 	ret = semanage_module_validate_name(modkey->name);
   2236 	if (ret < 0) {
   2237 		errno = 0;
   2238 		ERR(sh, "Name %s is invalid.", modkey->name);
   2239 		status = -1;
   2240 		goto cleanup;
   2241 	}
   2242 
   2243 	/* if priority == 0, then find the highest priority available */
   2244 	if (modkey->priority == 0) {
   2245 		ret = semanage_direct_list_all(sh, &modinfos, &modinfos_len);
   2246 		if (ret != 0) {
   2247 			status = -1;
   2248 			goto cleanup;
   2249 		}
   2250 
   2251 		for (i = 0; i < modinfos_len; i++) {
   2252 			ret = strcmp(modinfos[i].name, modkey->name);
   2253 			if (ret == 0) {
   2254 				highest = &modinfos[i];
   2255 				break;
   2256 			}
   2257 		}
   2258 
   2259 		if (highest == NULL) {
   2260 			status = -1;
   2261 			goto cleanup;
   2262 		}
   2263 
   2264 		ret = semanage_module_info_create(sh, modinfo);
   2265 		if (ret != 0) {
   2266 			status = -1;
   2267 			goto cleanup;
   2268 		}
   2269 
   2270 		ret = semanage_module_info_clone(sh, highest, *modinfo);
   2271 		if (ret != 0) {
   2272 			status = -1;
   2273 		}
   2274 
   2275 		/* skip to cleanup, module was found */
   2276 		goto cleanup;
   2277 	}
   2278 
   2279 	/* check module priority */
   2280 	ret = semanage_module_validate_priority(modkey->priority);
   2281 	if (ret != 0) {
   2282 		errno = 0;
   2283 		ERR(sh, "Priority %d is invalid.", modkey->priority);
   2284 		status = -1;
   2285 		goto cleanup;
   2286 	}
   2287 
   2288 	/* copy in key values */
   2289 	ret = semanage_module_info_create(sh, modinfo);
   2290 	if (ret != 0) {
   2291 		status = -1;
   2292 		goto cleanup;
   2293 	}
   2294 
   2295 	ret = semanage_module_info_set_priority(sh, *modinfo, modkey->priority);
   2296 	if (ret != 0) {
   2297 		status = -1;
   2298 		goto cleanup;
   2299 	}
   2300 
   2301 	ret = semanage_module_info_set_name(sh, *modinfo, modkey->name);
   2302 	if (ret != 0) {
   2303 		status = -1;
   2304 		goto cleanup;
   2305 	}
   2306 
   2307 	/* lookup module ext */
   2308 	ret = semanage_module_get_path(sh,
   2309 				       *modinfo,
   2310 				       SEMANAGE_MODULE_PATH_LANG_EXT,
   2311 				       fn,
   2312 				       sizeof(fn));
   2313 	if (ret != 0) {
   2314 		status = -1;
   2315 		goto cleanup;
   2316 	}
   2317 
   2318 	fp = fopen(fn, "r");
   2319 
   2320 	if (fp == NULL) {
   2321 		ERR(sh,
   2322 		    "Unable to open %s module lang ext file at %s.",
   2323 		    (*modinfo)->name, fn);
   2324 		status = -1;
   2325 		goto cleanup;
   2326 	}
   2327 
   2328 	/* set module ext */
   2329 	if (getline(&tmp, &size, fp) < 0) {
   2330 		ERR(sh,
   2331 		    "Unable to read %s module lang ext file.",
   2332 		    (*modinfo)->name);
   2333 		status = -1;
   2334 		goto cleanup;
   2335 	}
   2336 
   2337 	ret = semanage_module_info_set_lang_ext(sh, *modinfo, tmp);
   2338 	if (ret != 0) {
   2339 		status = -1;
   2340 		goto cleanup;
   2341 	}
   2342 	free(tmp);
   2343 	tmp = NULL;
   2344 
   2345 	if (fclose(fp) != 0) {
   2346 		ERR(sh,
   2347 		    "Unable to close %s module lang ext file.",
   2348 		    (*modinfo)->name);
   2349 		status = -1;
   2350 		goto cleanup;
   2351 	}
   2352 
   2353 	fp = NULL;
   2354 
   2355 	/* lookup enabled/disabled status */
   2356 	ret = semanage_module_get_path(sh,
   2357 				       *modinfo,
   2358 				       SEMANAGE_MODULE_PATH_DISABLED,
   2359 				       fn,
   2360 				       sizeof(fn));
   2361 	if (ret != 0) {
   2362 		status = -1;
   2363 		goto cleanup;
   2364 	}
   2365 
   2366 	/* set enabled/disabled status */
   2367 	if (stat(fn, &sb) < 0) {
   2368 		if (errno != ENOENT) {
   2369 			ERR(sh, "Unable to access %s: %s\n", fn, strerror(errno));
   2370 			status = -1;
   2371 			goto cleanup;
   2372 		}
   2373 
   2374 		ret = semanage_module_info_set_enabled(sh, *modinfo, 1);
   2375 		if (ret != 0) {
   2376 			status = -1;
   2377 			goto cleanup;
   2378 		}
   2379 	}
   2380 	else {
   2381 		ret = semanage_module_info_set_enabled(sh, *modinfo, 0);
   2382 		if (ret != 0) {
   2383 			status = -1;
   2384 			goto cleanup;
   2385 		}
   2386 	}
   2387 
   2388 cleanup:
   2389 	free(tmp);
   2390 
   2391 	if (modinfos != NULL) {
   2392 		for (i = 0; i < modinfos_len; i++) {
   2393 			semanage_module_info_destroy(sh, &modinfos[i]);
   2394 		}
   2395 		free(modinfos);
   2396 	}
   2397 
   2398 	if (fp != NULL) fclose(fp);
   2399 	return status;
   2400 }
   2401 
   2402 static int semanage_direct_set_module_info(semanage_handle_t *sh,
   2403 					   const semanage_module_info_t *modinfo)
   2404 {
   2405 	int status = 0;
   2406 	int ret = 0;
   2407 
   2408 	char fn[PATH_MAX];
   2409 	const char *path = NULL;
   2410 	int enabled = 0;
   2411 	semanage_module_info_t *modinfo_tmp = NULL;
   2412 
   2413 	semanage_module_key_t modkey;
   2414 	ret = semanage_module_key_init(sh, &modkey);
   2415 	if (ret != 0) {
   2416 		status = -1;
   2417 		goto cleanup;
   2418 	}
   2419 
   2420 	/* check transaction */
   2421 	if (!sh->is_in_transaction) {
   2422 		if (semanage_begin_transaction(sh) < 0) {
   2423 			status = -1;
   2424 			goto cleanup;
   2425 		}
   2426 	}
   2427 
   2428 	/* validate module */
   2429 	ret = semanage_module_info_validate(modinfo);
   2430 	if (ret != 0) {
   2431 		status = -1;
   2432 		goto cleanup;
   2433 	}
   2434 
   2435 	sh->modules_modified = 1;
   2436 
   2437 	/* check for modules path, create if missing */
   2438 	path = semanage_path(SEMANAGE_TMP, SEMANAGE_MODULES);
   2439 
   2440 	ret = semanage_mkdir(sh, path);
   2441 	if (ret != 0) {
   2442 		status = -1;
   2443 		goto cleanup;
   2444 	}
   2445 
   2446 	/* write priority */
   2447 	ret = semanage_module_get_path(sh,
   2448 				       modinfo,
   2449 				       SEMANAGE_MODULE_PATH_PRIORITY,
   2450 				       fn,
   2451 				       sizeof(fn));
   2452 	if (ret != 0) {
   2453 		status = -1;
   2454 		goto cleanup;
   2455 	}
   2456 
   2457 	ret = semanage_mkdir(sh, fn);
   2458 	if (ret != 0) {
   2459 		status = -1;
   2460 		goto cleanup;
   2461 	}
   2462 
   2463 	/* write name */
   2464 	ret = semanage_module_get_path(sh,
   2465 				       modinfo,
   2466 				       SEMANAGE_MODULE_PATH_NAME,
   2467 				       fn,
   2468 				       sizeof(fn));
   2469 	if (ret != 0) {
   2470 		status = -1;
   2471 		goto cleanup;
   2472 	}
   2473 
   2474 	ret = semanage_mkdir(sh, fn);
   2475 	if (ret != 0) {
   2476 		status = -1;
   2477 		goto cleanup;
   2478 	}
   2479 
   2480 	/* write ext */
   2481 	ret = semanage_direct_write_langext(sh, modinfo->lang_ext, modinfo);
   2482 	if (ret != 0) {
   2483 		status = -1;
   2484 		goto cleanup;
   2485 	}
   2486 
   2487 	/* write enabled/disabled status */
   2488 
   2489 	/* check for disabled path, create if missing */
   2490 	path = semanage_path(SEMANAGE_TMP, SEMANAGE_MODULES_DISABLED);
   2491 
   2492 	ret = semanage_mkdir(sh, path);
   2493 	if (ret != 0) {
   2494 		status = -1;
   2495 		goto cleanup;
   2496 	}
   2497 
   2498 	ret = semanage_module_get_path(sh,
   2499 				       modinfo,
   2500 				       SEMANAGE_MODULE_PATH_DISABLED,
   2501 				       fn,
   2502 				       sizeof(fn));
   2503 	if (ret != 0) {
   2504 		status = -1;
   2505 		goto cleanup;
   2506 	}
   2507 
   2508 	ret = semanage_module_key_set_name(sh, &modkey, modinfo->name);
   2509 	if (ret != 0) {
   2510 		status = -1;
   2511 		goto cleanup;
   2512 	}
   2513 
   2514 	if (modinfo->enabled == -1) {
   2515 		/* default to enabled */
   2516 		enabled = 1;
   2517 
   2518 		/* check if a module is already installed */
   2519 		ret = semanage_module_get_module_info(sh,
   2520 						      &modkey,
   2521 						      &modinfo_tmp);
   2522 		if (ret == 0) {
   2523 			/* set enabled status to current one */
   2524 			enabled = modinfo_tmp->enabled;
   2525 		}
   2526 	}
   2527 	else {
   2528 		enabled = modinfo->enabled;
   2529 	}
   2530 
   2531 	ret = semanage_module_set_enabled(sh, &modkey, enabled);
   2532 	if (ret != 0) {
   2533 		status = -1;
   2534 		goto cleanup;
   2535 	}
   2536 
   2537 cleanup:
   2538 	semanage_module_key_destroy(sh, &modkey);
   2539 
   2540 	semanage_module_info_destroy(sh, modinfo_tmp);
   2541 	free(modinfo_tmp);
   2542 
   2543 	return status;
   2544 }
   2545 
   2546 static int semanage_priorities_filename_select(const struct dirent *d)
   2547 {
   2548 	if (d->d_name[0] == '.' ||
   2549 	    strcmp(d->d_name, "disabled") == 0)
   2550 		return 0;
   2551 	return 1;
   2552 }
   2553 
   2554 static int semanage_modules_filename_select(const struct dirent *d)
   2555 {
   2556 	if (d->d_name[0] == '.')
   2557 		return 0;
   2558 	return 1;
   2559 }
   2560 
   2561 static int semanage_direct_list_all(semanage_handle_t *sh,
   2562 				    semanage_module_info_t **modinfos,
   2563 				    int *modinfos_len)
   2564 {
   2565 	assert(sh);
   2566 	assert(modinfos);
   2567 	assert(modinfos_len);
   2568 
   2569 	int status = 0;
   2570 	int ret = 0;
   2571 
   2572 	int i = 0;
   2573 	int j = 0;
   2574 
   2575 	*modinfos = NULL;
   2576 	*modinfos_len = 0;
   2577 	void *tmp = NULL;
   2578 
   2579 	const char *toplevel = NULL;
   2580 
   2581 	struct dirent **priorities = NULL;
   2582 	int priorities_len = 0;
   2583 	char priority_path[PATH_MAX];
   2584 
   2585 	struct dirent **modules = NULL;
   2586 	int modules_len = 0;
   2587 
   2588 	uint16_t priority = 0;
   2589 
   2590 	semanage_module_info_t *modinfo_tmp = NULL;
   2591 
   2592 	semanage_module_info_t modinfo;
   2593 	ret = semanage_module_info_init(sh, &modinfo);
   2594 	if (ret != 0) {
   2595 		status = -1;
   2596 		goto cleanup;
   2597 	}
   2598 
   2599 	if (sh->is_in_transaction) {
   2600 		toplevel = semanage_path(SEMANAGE_TMP, SEMANAGE_MODULES);
   2601 	} else {
   2602 		toplevel = semanage_path(SEMANAGE_ACTIVE, SEMANAGE_MODULES);
   2603 	}
   2604 
   2605 	/* find priorities */
   2606 	priorities_len = scandir(toplevel,
   2607 				 &priorities,
   2608 				 semanage_priorities_filename_select,
   2609 				 versionsort);
   2610 	if (priorities_len == -1) {
   2611 		ERR(sh, "Error while scanning directory %s.", toplevel);
   2612 		status = -1;
   2613 		goto cleanup;
   2614 	}
   2615 
   2616 	/* for each priority directory */
   2617 	/* loop through in reverse so that highest priority is first */
   2618 	for (i = priorities_len - 1; i >= 0; i--) {
   2619 		/* convert priority string to uint16_t */
   2620 		ret = semanage_string_to_priority(priorities[i]->d_name,
   2621 						  &priority);
   2622 		if (ret != 0) {
   2623 			status = -1;
   2624 			goto cleanup;
   2625 		}
   2626 
   2627 		/* set our priority */
   2628 		ret = semanage_module_info_set_priority(sh,
   2629 							&modinfo,
   2630 							priority);
   2631 		if (ret != 0) {
   2632 			status = -1;
   2633 			goto cleanup;
   2634 		}
   2635 
   2636 		/* get the priority path */
   2637 		ret = semanage_module_get_path(sh,
   2638 					       &modinfo,
   2639 					       SEMANAGE_MODULE_PATH_PRIORITY,
   2640 					       priority_path,
   2641 					       sizeof(priority_path));
   2642 		if (ret != 0) {
   2643 			status = -1;
   2644 			goto cleanup;
   2645 		}
   2646 
   2647 		/* cleanup old modules */
   2648 		if (modules != NULL) {
   2649 			for (j = 0; j < modules_len; j++) {
   2650 				free(modules[j]);
   2651 				modules[j] = NULL;
   2652 			}
   2653 			free(modules);
   2654 			modules = NULL;
   2655 			modules_len = 0;
   2656 		}
   2657 
   2658 		/* find modules at this priority */
   2659 		modules_len = scandir(priority_path,
   2660 				      &modules,
   2661 				      semanage_modules_filename_select,
   2662 				      versionsort);
   2663 		if (modules_len == -1) {
   2664 			ERR(sh,
   2665 			    "Error while scanning directory %s.",
   2666 			    priority_path);
   2667 			status = -1;
   2668 			goto cleanup;
   2669 		}
   2670 
   2671 		if (modules_len == 0) continue;
   2672 
   2673 		/* add space for modules */
   2674 		tmp = realloc(*modinfos,
   2675 			      sizeof(semanage_module_info_t) *
   2676 				(*modinfos_len + modules_len));
   2677 		if (tmp == NULL) {
   2678 			ERR(sh, "Error allocating memory for module array.");
   2679 			status = -1;
   2680 			goto cleanup;
   2681 		}
   2682 		*modinfos = tmp;
   2683 
   2684 		/* for each module directory */
   2685 		for(j = 0; j < modules_len; j++) {
   2686 			/* set module name */
   2687 			ret = semanage_module_info_set_name(
   2688 					sh,
   2689 					&modinfo,
   2690 					modules[j]->d_name);
   2691 			if (ret != 0) {
   2692 				status = -1;
   2693 				goto cleanup;
   2694 			}
   2695 
   2696 			/* get module values */
   2697 			ret = semanage_direct_get_module_info(
   2698 					sh,
   2699 					(const semanage_module_key_t *)
   2700 						(&modinfo),
   2701 					&modinfo_tmp);
   2702 			if (ret != 0) {
   2703 				status = -1;
   2704 				goto cleanup;
   2705 			}
   2706 
   2707 			/* copy into array */
   2708 			ret = semanage_module_info_init(
   2709 					sh,
   2710 					&((*modinfos)[*modinfos_len]));
   2711 			if (ret != 0) {
   2712 				status = -1;
   2713 				goto cleanup;
   2714 			}
   2715 
   2716 			ret = semanage_module_info_clone(
   2717 					sh,
   2718 					modinfo_tmp,
   2719 					&((*modinfos)[*modinfos_len]));
   2720 			if (ret != 0) {
   2721 				status = -1;
   2722 				goto cleanup;
   2723 			}
   2724 
   2725 			semanage_module_info_destroy(sh, modinfo_tmp);
   2726 			free(modinfo_tmp);
   2727 			modinfo_tmp = NULL;
   2728 
   2729 			*modinfos_len += 1;
   2730 		}
   2731 	}
   2732 
   2733 cleanup:
   2734 	semanage_module_info_destroy(sh, &modinfo);
   2735 
   2736 	if (priorities != NULL) {
   2737 		for (i = 0; i < priorities_len; i++) {
   2738 			free(priorities[i]);
   2739 		}
   2740 		free(priorities);
   2741 	}
   2742 
   2743 	if (modules != NULL) {
   2744 		for (i = 0; i < modules_len; i++) {
   2745 			free(modules[i]);
   2746 		}
   2747 		free(modules);
   2748 	}
   2749 
   2750 	semanage_module_info_destroy(sh, modinfo_tmp);
   2751 	free(modinfo_tmp);
   2752 	modinfo_tmp = NULL;
   2753 
   2754 	if (status != 0) {
   2755 		if (modinfos != NULL) {
   2756 			for (i = 0; i < *modinfos_len; i++) {
   2757 				semanage_module_info_destroy(
   2758 						sh,
   2759 						&(*modinfos)[i]);
   2760 			}
   2761 			free(*modinfos);
   2762 			*modinfos = NULL;
   2763 			*modinfos_len = 0;
   2764 		}
   2765 	}
   2766 
   2767 	return status;
   2768 }
   2769 
   2770 static int semanage_direct_install_info(semanage_handle_t *sh,
   2771 					const semanage_module_info_t *modinfo,
   2772 					char *data,
   2773 					size_t data_len)
   2774 {
   2775 	assert(sh);
   2776 	assert(modinfo);
   2777 	assert(data);
   2778 
   2779 	int status = 0;
   2780 	int ret = 0;
   2781 	int type;
   2782 	struct stat sb;
   2783 
   2784 	char path[PATH_MAX];
   2785 	mode_t mask = umask(0077);
   2786 
   2787 	semanage_module_info_t *higher_info = NULL;
   2788 	semanage_module_key_t higher_key;
   2789 	ret = semanage_module_key_init(sh, &higher_key);
   2790 	if (ret != 0) {
   2791 		status = -1;
   2792 		goto cleanup;
   2793 	}
   2794 
   2795 	/* validate module info */
   2796 	ret = semanage_module_info_validate(modinfo);
   2797 	if (ret != 0) {
   2798 		ERR(sh, "%s failed module validation.\n", modinfo->name);
   2799 		status = -2;
   2800 		goto cleanup;
   2801 	}
   2802 
   2803 	/* Check for higher priority module and warn if there is one as
   2804 	 * it will override the module currently being installed.
   2805 	 */
   2806 	ret = semanage_module_key_set_name(sh, &higher_key, modinfo->name);
   2807 	if (ret != 0) {
   2808 		status = -1;
   2809 		goto cleanup;
   2810 	}
   2811 
   2812 	ret = semanage_direct_get_module_info(sh, &higher_key, &higher_info);
   2813 	if (ret == 0) {
   2814 		if (higher_info->priority > modinfo->priority) {
   2815 			errno = 0;
   2816 			WARN(sh,
   2817 			     "A higher priority %s module exists at priority %d and will override the module currently being installed at priority %d.",
   2818 			     modinfo->name,
   2819 			     higher_info->priority,
   2820 			     modinfo->priority);
   2821 		}
   2822 		else if (higher_info->priority < modinfo->priority) {
   2823 			errno = 0;
   2824 			INFO(sh,
   2825 			     "Overriding %s module at lower priority %d with module at priority %d.",
   2826 			     modinfo->name,
   2827 			     higher_info->priority,
   2828 			     modinfo->priority);
   2829 		}
   2830 
   2831 		if (higher_info->enabled == 0 && modinfo->enabled == -1) {
   2832 			errno = 0;
   2833 			WARN(sh,
   2834 			     "%s module will be disabled after install as there is a disabled instance of this module present in the system.",
   2835 			     modinfo->name);
   2836 		}
   2837 	}
   2838 
   2839 	/* set module meta data */
   2840 	ret = semanage_direct_set_module_info(sh, modinfo);
   2841 	if (ret != 0) {
   2842 		status = -2;
   2843 		goto cleanup;
   2844 	}
   2845 
   2846 	/* install module source file */
   2847 	if (!strcasecmp(modinfo->lang_ext, "cil")) {
   2848 		type = SEMANAGE_MODULE_PATH_CIL;
   2849 	} else {
   2850 		type = SEMANAGE_MODULE_PATH_HLL;
   2851 	}
   2852 	ret = semanage_module_get_path(
   2853 			sh,
   2854 			modinfo,
   2855 			type,
   2856 			path,
   2857 			sizeof(path));
   2858 	if (ret != 0) {
   2859 		status = -3;
   2860 		goto cleanup;
   2861 	}
   2862 
   2863 	ret = bzip(sh, path, data, data_len);
   2864 	if (ret <= 0) {
   2865 		ERR(sh, "Error while writing to %s.", path);
   2866 		status = -3;
   2867 		goto cleanup;
   2868 	}
   2869 
   2870 	/* if this is an HLL, delete the CIL cache if it exists so it will get recompiled */
   2871 	if (type == SEMANAGE_MODULE_PATH_HLL) {
   2872 		ret = semanage_module_get_path(
   2873 				sh,
   2874 				modinfo,
   2875 				SEMANAGE_MODULE_PATH_CIL,
   2876 				path,
   2877 				sizeof(path));
   2878 		if (ret != 0) {
   2879 			status = -3;
   2880 			goto cleanup;
   2881 		}
   2882 
   2883 		if (stat(path, &sb) == 0) {
   2884 			ret = unlink(path);
   2885 			if (ret != 0) {
   2886 				ERR(sh, "Error while removing cached CIL file %s: %s", path, strerror(errno));
   2887 				status = -3;
   2888 				goto cleanup;
   2889 			}
   2890 		}
   2891 	}
   2892 
   2893 cleanup:
   2894 	semanage_module_key_destroy(sh, &higher_key);
   2895 	semanage_module_info_destroy(sh, higher_info);
   2896 	free(higher_info);
   2897 	umask(mask);
   2898 
   2899 	return status;
   2900 }
   2901 
   2902 static int semanage_direct_remove_key(semanage_handle_t *sh,
   2903 				      const semanage_module_key_t *modkey)
   2904 {
   2905 	assert(sh);
   2906 	assert(modkey);
   2907 
   2908 	int status = 0;
   2909 	int ret = 0;
   2910 
   2911 	char path[PATH_MAX];
   2912 	semanage_module_info_t *modinfo = NULL;
   2913 
   2914 	semanage_module_key_t modkey_tmp;
   2915 	ret = semanage_module_key_init(sh, &modkey_tmp);
   2916 	if (ret != 0) {
   2917 		status = -1;
   2918 		goto cleanup;
   2919 	}
   2920 
   2921 	/* validate module key */
   2922 	ret = semanage_module_validate_priority(modkey->priority);
   2923 	if (ret != 0) {
   2924 		errno = 0;
   2925 		ERR(sh, "Priority %d is invalid.", modkey->priority);
   2926 		status = -1;
   2927 		goto cleanup;
   2928 	}
   2929 
   2930 	ret = semanage_module_validate_name(modkey->name);
   2931 	if (ret != 0) {
   2932 		errno = 0;
   2933 		ERR(sh, "Name %s is invalid.", modkey->name);
   2934 		status = -1;
   2935 		goto cleanup;
   2936 	}
   2937 
   2938 	ret = semanage_module_key_set_name(sh, &modkey_tmp, modkey->name);
   2939 	if (ret != 0) {
   2940 		status = -1;
   2941 		goto cleanup;
   2942 	}
   2943 
   2944 	/* get module path */
   2945 	ret = semanage_module_get_path(
   2946 			sh,
   2947 			(const semanage_module_info_t *)modkey,
   2948 			SEMANAGE_MODULE_PATH_NAME,
   2949 			path,
   2950 			sizeof(path));
   2951 	if (ret != 0) {
   2952 		status = -2;
   2953 		goto cleanup;
   2954 	}
   2955 
   2956 	/* remove directory */
   2957 	ret = semanage_remove_directory(path);
   2958 	if (ret != 0) {
   2959 		ERR(sh, "Unable to remove module %s at priority %d.", modkey->name, modkey->priority);
   2960 		status = -2;
   2961 		goto cleanup;
   2962 	}
   2963 
   2964 	/* check if its the last module at any priority */
   2965 	ret = semanage_module_get_module_info(sh, &modkey_tmp, &modinfo);
   2966 	if (ret != 0) {
   2967 		/* info that no other module will override */
   2968 		errno = 0;
   2969 		INFO(sh,
   2970 		     "Removing last %s module (no other %s module exists at another priority).",
   2971 		     modkey->name,
   2972 		     modkey->name);
   2973 
   2974 		/* remove disabled status file */
   2975 		ret = semanage_module_get_path(
   2976 				sh,
   2977 				(const semanage_module_info_t *)modkey,
   2978 				SEMANAGE_MODULE_PATH_DISABLED,
   2979 				path,
   2980 				sizeof(path));
   2981 		if (ret != 0) {
   2982 			status = -1;
   2983 			goto cleanup;
   2984 		}
   2985 
   2986 		struct stat sb;
   2987 		if (stat(path, &sb) == 0) {
   2988 			ret = unlink(path);
   2989 			if (ret != 0) {
   2990 				status = -1;
   2991 				goto cleanup;
   2992 			}
   2993 		}
   2994 	}
   2995 	else {
   2996 		/* if a lower priority module is going to become active */
   2997 		if (modkey->priority > modinfo->priority) {
   2998 			/* inform what the new active module will be */
   2999 			errno = 0;
   3000 			INFO(sh,
   3001 			     "%s module at priority %d is now active.",
   3002 			     modinfo->name,
   3003 			     modinfo->priority);
   3004 		}
   3005 	}
   3006 
   3007 cleanup:
   3008 	semanage_module_key_destroy(sh, &modkey_tmp);
   3009 
   3010 	semanage_module_info_destroy(sh, modinfo);
   3011 	free(modinfo);
   3012 
   3013 	return status;
   3014 }
   3015 
   3016