1 /* chcon -- change security context of files
2 Copyright (C) 2005-2008 Free Software Foundation, Inc.
4 This program is free software: you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation, either version 3 of the License, or
7 (at your option) any later version.
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
14 You should have received a copy of the GNU General Public License
15 along with this program. If not, see <http://www.gnu.org/licenses/>. */
19 #include <sys/types.h>
27 #include "root-dev-ino.h"
28 #include "selinux-at.h"
31 /* The official name of this program (e.g., no `g' prefix). */
32 #define PROGRAM_NAME "chcon"
35 proper_name ("Russell Coker"), \
36 proper_name ("Jim Meyering")
43 CH_NO_CHANGE_REQUESTED
48 /* Print a message for each file that is processed. */
51 /* Print a message for each file whose attributes we change. */
54 /* Do not be verbose. This is the default. */
58 /* If nonzero, and the systems has support for it, change the context
59 of symbolic links rather than any files they point to. */
60 static bool affect_symlink_referent;
62 /* If true, change the modes of directories recursively. */
65 /* Level of verbosity. */
68 /* Pointer to the device and inode numbers of `/', when --recursive.
70 static struct dev_ino *root_dev_ino;
72 /* The name of the context file is being given. */
73 static char const *specified_context;
75 /* Specific components of the context */
76 static char const *specified_user;
77 static char const *specified_role;
78 static char const *specified_range;
79 static char const *specified_type;
81 /* For long options that have no equivalent short option, use a
82 non-character as a pseudo short option, starting with CHAR_MAX + 1. */
85 DEREFERENCE_OPTION = CHAR_MAX + 1,
91 static struct option const long_options[] =
93 {"recursive", no_argument, NULL, 'R'},
94 {"dereference", no_argument, NULL, DEREFERENCE_OPTION},
95 {"no-dereference", no_argument, NULL, 'h'},
96 {"no-preserve-root", no_argument, NULL, NO_PRESERVE_ROOT},
97 {"preserve-root", no_argument, NULL, PRESERVE_ROOT},
98 {"reference", required_argument, NULL, REFERENCE_FILE_OPTION},
99 {"user", required_argument, NULL, 'u'},
100 {"role", required_argument, NULL, 'r'},
101 {"type", required_argument, NULL, 't'},
102 {"range", required_argument, NULL, 'l'},
103 {"verbose", no_argument, NULL, 'v'},
104 {GETOPT_HELP_OPTION_DECL},
105 {GETOPT_VERSION_OPTION_DECL},
109 /* Given a security context, CONTEXT, derive a context_t (*RET),
110 setting any portions selected via the global variables, specified_user,
111 specified_role, etc. */
113 compute_context_from_mask (security_context_t context, context_t *ret)
116 context_t new_context = context_new (context);
119 error (0, errno, _("failed to create security context: %s"),
120 quotearg_colon (context));
124 #define SET_COMPONENT(C, comp) \
127 if (specified_ ## comp \
128 && context_ ## comp ## _set ((C), specified_ ## comp)) \
131 _("failed to set %s security context component to %s"), \
132 #comp, quote (specified_ ## comp)); \
138 SET_COMPONENT (new_context, user);
139 SET_COMPONENT (new_context, range);
140 SET_COMPONENT (new_context, role);
141 SET_COMPONENT (new_context, type);
145 int saved_errno = errno;
146 context_free (new_context);
155 /* Change the context of FILE, using specified components.
156 If it is a directory and -R is given, recurse.
157 Return 0 if successful, 1 if errors occurred. */
160 change_file_context (int fd, char const *file)
162 security_context_t file_context = NULL;
164 security_context_t context_string;
167 if (specified_context == NULL)
169 int status = (affect_symlink_referent
170 ? getfileconat (fd, file, &file_context)
171 : lgetfileconat (fd, file, &file_context));
173 if (status < 0 && errno != ENODATA)
175 error (0, errno, _("failed to get security context of %s"),
180 /* If the file doesn't have a context, and we're not setting all of
181 the context components, there isn't really an obvious default.
182 Thus, we just give up. */
183 if (file_context == NULL)
185 error (0, 0, _("can't apply partial context to unlabeled file %s"),
190 if (compute_context_from_mask (file_context, &context))
195 /* FIXME: this should be done exactly once, in main. */
196 context = context_new (specified_context);
201 context_string = context_str (context);
203 if (file_context == NULL || ! STREQ (context_string, file_context))
205 int fail = (affect_symlink_referent
206 ? setfileconat (fd, file, context_string)
207 : lsetfileconat (fd, file, context_string));
212 error (0, errno, _("failed to change context of %s to %s"),
213 quote_n (0, file), quote_n (1, context_string));
217 context_free (context);
218 freecon (file_context);
223 /* Change the context of FILE.
224 Return true if successful. This function is called
225 once for every file system object that fts encounters. */
228 process_file (FTS *fts, FTSENT *ent)
230 char const *file_full_name = ent->fts_path;
231 char const *file = ent->fts_accpath;
232 const struct stat *file_stats = ent->fts_statp;
235 switch (ent->fts_info)
240 if (ROOT_DEV_INO_CHECK (root_dev_ino, ent->fts_statp))
242 /* This happens e.g., with "chcon -R --preserve-root ... /"
243 and with "chcon -RH --preserve-root ... symlink-to-root". */
244 ROOT_DEV_INO_WARN (file_full_name);
245 /* Tell fts not to traverse into this hierarchy. */
246 fts_set (fts, ent, FTS_SKIP);
247 /* Ensure that we do not process "/" on the second visit. */
248 ent = fts_read (fts);
261 /* For a top-level file or directory, this FTS_NS (stat failed)
262 indicator is determined at the time of the initial fts_open call.
263 With programs like chmod, chown, and chgrp, that modify
264 permissions, it is possible that the file in question is
265 accessible when control reaches this point. So, if this is
266 the first time we've seen the FTS_NS for this file, tell
267 fts_read to stat it "again". */
268 if (ent->fts_level == 0 && ent->fts_number == 0)
271 fts_set (fts, ent, FTS_AGAIN);
274 error (0, ent->fts_errno, _("cannot access %s"), quote (file_full_name));
279 error (0, ent->fts_errno, _("%s"), quote (file_full_name));
284 error (0, ent->fts_errno, _("cannot read directory %s"),
285 quote (file_full_name));
293 if (ent->fts_info == FTS_DP
294 && ok && ROOT_DEV_INO_CHECK (root_dev_ino, file_stats))
296 ROOT_DEV_INO_WARN (file_full_name);
303 printf (_("changing security context of %s"),
304 quote (file_full_name));
306 if (change_file_context (fts->fts_cwd_fd, file) != 0)
311 fts_set (fts, ent, FTS_SKIP);
316 /* Recursively operate on the specified FILES (the last entry
317 of which is NULL). BIT_FLAGS controls how fts works.
318 Return true if successful. */
321 process_files (char **files, int bit_flags)
325 FTS *fts = xfts_open (files, bit_flags, NULL);
331 ent = fts_read (fts);
336 /* FIXME: try to give a better message */
337 error (0, errno, _("fts_read failed"));
343 ok &= process_file (fts, ent);
346 /* Ignore failure, since the only way it can do so is in failing to
347 return to the original directory, and since we're about to exit,
348 that doesn't matter. */
357 if (status != EXIT_SUCCESS)
358 fprintf (stderr, _("Try `%s --help' for more information.\n"),
363 Usage: %s [OPTION]... CONTEXT FILE...\n\
364 or: %s [OPTION]... [-u USER] [-r ROLE] [-l RANGE] [-t TYPE] FILE...\n\
365 or: %s [OPTION]... --reference=RFILE FILE...\n\
367 program_name, program_name, program_name);
369 Change the security context of each FILE to CONTEXT.\n\
370 With --reference, change the security context of each FILE to that of RFILE.\n\
372 -c, --changes like verbose but report only when a change is made\n\
373 -h, --no-dereference affect symbolic links instead of any referenced file\n\
376 --reference=RFILE use RFILE's security context rather than specifying\n\
378 -R, --recursive operate on files and directories recursively\n\
379 -v, --verbose output a diagnostic for every file processed\n\
382 -u, --user=USER set user USER in the target security context\n\
383 -r, --role=ROLE set role ROLE in the target security context\n\
384 -t, --type=TYPE set type TYPE in the target security context\n\
385 -l, --range=RANGE set range RANGE in the target security context\n\
389 The following options modify how a hierarchy is traversed when the -R\n\
390 option is also specified. If more than one is specified, only the final\n\
393 -H if a command line argument is a symbolic link\n\
394 to a directory, traverse it\n\
395 -L traverse every symbolic link to a directory\n\
397 -P do not traverse any symbolic links (default)\n\
400 fputs (HELP_OPTION_DESCRIPTION, stdout);
401 fputs (VERSION_OPTION_DESCRIPTION, stdout);
402 emit_bug_reporting_address ();
408 main (int argc, char **argv)
410 security_context_t ref_context = NULL;
412 /* Bit flags that control how fts works. */
413 int bit_flags = FTS_PHYSICAL;
415 /* 1 if --dereference, 0 if --no-dereference, -1 if neither has been
417 int dereference = -1;
420 bool preserve_root = false;
421 bool component_specified = false;
422 char *reference_file = NULL;
425 initialize_main (&argc, &argv);
426 set_program_name (argv[0]);
427 setlocale (LC_ALL, "");
428 bindtextdomain (PACKAGE, LOCALEDIR);
429 textdomain (PACKAGE);
431 atexit (close_stdout);
433 while ((optc = getopt_long (argc, argv, "HLPRchvu:r:t:l:", long_options, NULL))
438 case 'H': /* Traverse command-line symlinks-to-directories. */
439 bit_flags = FTS_COMFOLLOW | FTS_PHYSICAL;
442 case 'L': /* Traverse all symlinks-to-directories. */
443 bit_flags = FTS_LOGICAL;
446 case 'P': /* Traverse no symlinks-to-directories. */
447 bit_flags = FTS_PHYSICAL;
450 case 'h': /* --no-dereference: affect symlinks */
454 case DEREFERENCE_OPTION: /* --dereference: affect the referent
459 case NO_PRESERVE_ROOT:
460 preserve_root = false;
464 preserve_root = true;
467 case REFERENCE_FILE_OPTION:
468 reference_file = optarg;
484 specified_user = optarg;
485 component_specified = true;
489 specified_role = optarg;
490 component_specified = true;
494 specified_type = optarg;
495 component_specified = true;
499 specified_range = optarg;
500 component_specified = true;
503 case_GETOPT_HELP_CHAR;
504 case_GETOPT_VERSION_CHAR (PROGRAM_NAME, AUTHORS);
506 usage (EXIT_FAILURE);
512 if (bit_flags == FTS_PHYSICAL)
514 if (dereference == 1)
515 error (EXIT_FAILURE, 0,
516 _("-R --dereference requires either -H or -L"));
517 affect_symlink_referent = false;
521 if (dereference == 0)
522 error (EXIT_FAILURE, 0, _("-R -h requires -P"));
523 affect_symlink_referent = true;
528 bit_flags = FTS_PHYSICAL;
529 affect_symlink_referent = (dereference != 0);
532 if (argc - optind < (reference_file || component_specified ? 1 : 2))
535 error (0, 0, _("missing operand"));
537 error (0, 0, _("missing operand after %s"), quote (argv[argc - 1]));
538 usage (EXIT_FAILURE);
543 if (getfilecon (reference_file, &ref_context) < 0)
544 error (EXIT_FAILURE, errno, _("failed to get security context of %s"),
545 quote (reference_file));
547 specified_context = ref_context;
549 else if (component_specified)
551 /* FIXME: it's already null, so this is a no-op. */
552 specified_context = NULL;
557 specified_context = argv[optind++];
558 context = context_new (specified_context);
560 error (EXIT_FAILURE, 0, _("invalid context: %s"),
561 quotearg_colon (specified_context));
562 context_free (context);
565 if (reference_file && component_specified)
567 error (0, 0, _("conflicting security context specifiers given"));
571 if (recurse & preserve_root)
573 static struct dev_ino dev_ino_buf;
574 root_dev_ino = get_root_dev_ino (&dev_ino_buf);
575 if (root_dev_ino == NULL)
576 error (EXIT_FAILURE, errno, _("failed to get attributes of %s"),
584 ok = process_files (argv + optind, bit_flags | FTS_NOSTAT);
586 exit (ok ? EXIT_SUCCESS : EXIT_FAILURE);