1 /* 2 * restorecond 3 * 4 * Copyright (C) 2006-2009 Red Hat 5 * see file 'COPYING' for use and warranty information 6 * 7 * This program is free software; you can redistribute it and/or 8 * modify it under the terms of the GNU General Public License as 9 * published by the Free Software Foundation; either version 2 of 10 * the License, or (at your option) any later version. 11 * 12 * This program is distributed in the hope that it will be useful, 13 * but WITHOUT ANY WARRANTY; without even the implied warranty of 14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 15 * GNU General Public License for more details. 16 .* 17 * You should have received a copy of the GNU General Public License 18 * along with this program; if not, write to the Free Software 19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 20 * 02111-1307 USA 21 * 22 * Authors: 23 * Dan Walsh <dwalsh (at) redhat.com> 24 * 25 */ 26 27 /* 28 * PURPOSE: 29 * This daemon program watches for the creation of files listed in a config file 30 * and makes sure that there security context matches the systems defaults 31 * 32 * USAGE: 33 * restorecond [-d] [-u] [-v] [-f restorecond_file ] 34 * 35 * -d Run in debug mode 36 * -f Use alternative restorecond_file 37 * -u Run in user mode 38 * -v Run in verbose mode (Report missing files) 39 * 40 * EXAMPLE USAGE: 41 * restorecond 42 * 43 */ 44 45 #define _GNU_SOURCE 46 #include <sys/inotify.h> 47 #include <errno.h> 48 #include <stdio.h> 49 #include <stdlib.h> 50 #include <signal.h> 51 #include <string.h> 52 #include <unistd.h> 53 #include "../setfiles/restore.h" 54 #include <sys/types.h> 55 #include <syslog.h> 56 #include <limits.h> 57 #include <pwd.h> 58 #include <sys/stat.h> 59 #include <string.h> 60 #include <stdio.h> 61 #include <fcntl.h> 62 #include "restorecond.h" 63 #include "utmpwatcher.h" 64 65 const char *homedir; 66 static int master_fd = -1; 67 68 static const char *server_watch_file = "/etc/selinux/restorecond.conf"; 69 static const char *user_watch_file = "/etc/selinux/restorecond_user.conf"; 70 static const char *watch_file; 71 static struct restore_opts r_opts; 72 73 #include <selinux/selinux.h> 74 75 int debug_mode = 0; 76 int terminate = 0; 77 int master_wd = -1; 78 int run_as_user = 0; 79 80 static void done(void) { 81 watch_list_free(master_fd); 82 close(master_fd); 83 utmpwatcher_free(); 84 matchpathcon_fini(); 85 } 86 87 static const char *pidfile = "/var/run/restorecond.pid"; 88 89 static int write_pid_file(void) 90 { 91 int pidfd, len; 92 char val[16]; 93 94 len = snprintf(val, sizeof(val), "%u\n", getpid()); 95 if (len < 0) { 96 syslog(LOG_ERR, "Pid error (%s)", strerror(errno)); 97 pidfile = 0; 98 return 1; 99 } 100 pidfd = open(pidfile, O_CREAT | O_TRUNC | O_NOFOLLOW | O_WRONLY, 0644); 101 if (pidfd < 0) { 102 syslog(LOG_ERR, "Unable to set pidfile (%s)", strerror(errno)); 103 pidfile = 0; 104 return 1; 105 } 106 (void)write(pidfd, val, (unsigned int)len); 107 close(pidfd); 108 return 0; 109 } 110 111 /* 112 * SIGTERM handler 113 */ 114 static void term_handler(int s __attribute__ ((unused))) 115 { 116 terminate = 1; 117 /* trigger a failure in the watch */ 118 close(master_fd); 119 } 120 121 static void usage(char *program) 122 { 123 printf("%s [-d] [-f restorecond_file ] [-u] [-v] \n", program); 124 } 125 126 void exitApp(const char *msg) 127 { 128 perror(msg); 129 exit(-1); 130 } 131 132 /* 133 Add a file to the watch list. We are watching for file creation, so we actually 134 put the watch on the directory and then examine all files created in that directory 135 to see if it is one that we are watching. 136 */ 137 138 int main(int argc, char **argv) 139 { 140 int opt; 141 struct sigaction sa; 142 143 memset(&r_opts, 0, sizeof(r_opts)); 144 145 r_opts.progress = 0; 146 r_opts.count = 0; 147 r_opts.debug = 0; 148 r_opts.change = 1; 149 r_opts.verbose = 0; 150 r_opts.logging = 0; 151 r_opts.rootpath = NULL; 152 r_opts.rootpathlen = 0; 153 r_opts.outfile = NULL; 154 r_opts.force = 0; 155 r_opts.hard_links = 0; 156 r_opts.abort_on_error = 0; 157 r_opts.add_assoc = 0; 158 r_opts.expand_realpath = 0; 159 r_opts.fts_flags = FTS_PHYSICAL; 160 r_opts.selabel_opt_validate = NULL; 161 r_opts.selabel_opt_path = NULL; 162 r_opts.ignore_enoent = 1; 163 164 restore_init(&r_opts); 165 /* If we are not running SELinux then just exit */ 166 if (is_selinux_enabled() != 1) return 0; 167 168 /* Register sighandlers */ 169 sa.sa_flags = 0; 170 sa.sa_handler = term_handler; 171 sigemptyset(&sa.sa_mask); 172 sigaction(SIGTERM, &sa, NULL); 173 174 set_matchpathcon_flags(MATCHPATHCON_NOTRANS); 175 176 exclude_non_seclabel_mounts(); 177 atexit( done ); 178 while ((opt = getopt(argc, argv, "hdf:uv")) > 0) { 179 switch (opt) { 180 case 'd': 181 debug_mode = 1; 182 break; 183 case 'f': 184 watch_file = optarg; 185 break; 186 case 'u': 187 run_as_user = 1; 188 break; 189 case 'h': 190 usage(argv[0]); 191 exit(0); 192 break; 193 case 'v': 194 r_opts.verbose++; 195 break; 196 case '?': 197 usage(argv[0]); 198 exit(-1); 199 } 200 } 201 202 master_fd = inotify_init(); 203 if (master_fd < 0) 204 exitApp("inotify_init"); 205 206 uid_t uid = getuid(); 207 struct passwd *pwd = getpwuid(uid); 208 if (!pwd) 209 exitApp("getpwuid"); 210 211 homedir = pwd->pw_dir; 212 if (uid != 0) { 213 if (run_as_user) 214 return server(master_fd, user_watch_file); 215 if (start() != 0) 216 return server(master_fd, user_watch_file); 217 return 0; 218 } 219 220 watch_file = server_watch_file; 221 read_config(master_fd, watch_file); 222 223 if (!debug_mode) 224 daemon(0, 0); 225 226 write_pid_file(); 227 228 while (watch(master_fd, watch_file) == 0) { 229 }; 230 231 watch_list_free(master_fd); 232 close(master_fd); 233 matchpathcon_fini(); 234 if (pidfile) 235 unlink(pidfile); 236 237 return 0; 238 } 239