NetBSD/sbin/veriexecctl/veriexecctl.c

353 lines
8.0 KiB
C
Raw Normal View History

2006-11-21 03:22:04 +03:00
/* $NetBSD: veriexecctl.c,v 1.24 2006/11/21 00:22:04 elad Exp $ */
/*-
2006-11-21 03:22:04 +03:00
* Copyright 2005 Elad Efrat <elad@NetBSD.org>
* Copyright 2005 Brett Lymn <blymn@netbsd.org>
*
* All rights reserved.
*
* This code has been donated to The NetBSD Foundation by the Author.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. The name of the author may not be used to endorse or promote products
* derived from this software withough specific prior written permission
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
*
*/
#include <sys/ioctl.h>
#include <sys/param.h>
#include <sys/queue.h>
#include <sys/verified_exec.h>
#include <sys/statvfs.h>
#include <stdio.h>
2002-12-06 05:26:14 +03:00
#include <stdlib.h>
#include <string.h>
#include <fcntl.h>
#include <unistd.h>
2004-03-06 14:57:14 +03:00
#include <err.h>
#include <errno.h>
#include "veriexecctl.h"
#define VERIEXEC_DEVICE "/dev/veriexec"
2004-03-06 14:57:14 +03:00
extern struct veriexec_params params; /* in veriexecctl_parse.y */
extern char *filename; /* in veriexecctl_conf.l */
extern int yynerrs;
2005-05-21 00:06:34 +04:00
int gfd, verbose = 0, phase;
size_t line;
/*
* Prototypes
*/
static FILE *openlock(const char *);
static void phase1_preload(void);
static int fingerprint_load(char*);
static void usage(void) __attribute__((__noreturn__));
static FILE *
openlock(const char *path)
{
int lfd;
if ((lfd = open(path, O_RDONLY|O_EXLOCK, 0)) == -1)
return NULL;
return fdopen(lfd, "r");
}
2005-05-21 00:06:34 +04:00
struct veriexec_up *
dev_lookup(char *vfs)
{
2005-05-21 00:06:34 +04:00
struct veriexec_up *p;
CIRCLEQ_FOREACH(p, &params_list, vu_list)
if (strcmp(p->vu_param.file, vfs) == 0)
return (p);
return NULL;
}
2005-05-21 00:06:34 +04:00
struct veriexec_up *
dev_add(char *vfs)
{
2005-05-21 00:06:34 +04:00
struct veriexec_up *up;
if ((up = calloc((size_t)1, sizeof(*up))) == NULL)
err(1, "No memory");
up->vu_param.hash_size = 1;
strlcpy(up->vu_param.file, vfs, sizeof(up->vu_param.file));
CIRCLEQ_INSERT_TAIL(&params_list, up, vu_list);
return up;
}
/* Load all devices, get rid of the list. */
static void
phase1_preload(void)
{
if (verbose)
printf("Phase 1: Calculating hash table sizes:\n");
while (!CIRCLEQ_EMPTY(&params_list)) {
2005-05-21 00:06:34 +04:00
struct veriexec_up *vup;
struct statvfs sv;
vup = CIRCLEQ_FIRST(&params_list);
if (statvfs(vup->vu_param.file, &sv) != 0)
err(1, "Can't statvfs() `%s'", vup->vu_param.file);
if (ioctl(gfd, VERIEXEC_TABLESIZE, &(vup->vu_param)) == -1) {
if (errno != EEXIST)
err(1, "Error in phase 1: Can't "
"set hash table size for mount `%s'",
sv.f_mntonname);
}
if (verbose) {
printf(" => Hash table sizing successful for mount "
"`%s'. (%zu entries)\n", sv.f_mntonname,
vup->vu_param.hash_size);
}
CIRCLEQ_REMOVE(&params_list, vup, vu_list);
free(vup);
}
}
/*
* Load the fingerprint. Assumes that the fingerprint pseudo-device is
* opened and the file handle is in gfd.
*/
void
phase2_load(void)
{
/*
* If there's no access type specified, use the default.
*/
if (!(params.type & (VERIEXEC_DIRECT|VERIEXEC_INDIRECT|VERIEXEC_FILE)))
params.type |= VERIEXEC_DIRECT;
if (ioctl(gfd, VERIEXEC_LOAD, &params) == -1)
warn("Cannot load params from `%s'", params.file);
free(params.fingerprint);
}
/*
* Fingerprint load handling.
*/
static int
fingerprint_load(char *ifile)
{
CIRCLEQ_INIT(&params_list);
memset(&params, 0, sizeof(params));
if ((yyin = openlock(ifile)) == NULL)
err(1, "Cannot open `%s'", ifile);
/*
* Phase 1: Scan all config files, creating the list of devices
* we have fingerprinted files on, and the amount of
* files per device. Lock all files to maintain sync.
*/
phase = 1;
if (verbose) {
(void)printf("Phase 1: Building hash table information:\n");
(void)printf("=> Parsing \"%s\"\n", ifile);
}
line = 1;
yyparse();
if (yynerrs)
return -1;
phase1_preload();
/*
* Phase 2: After we have a circular queue containing all the
* devices we care about and the sizes for the hash
* tables, do a rescan, this time actually loading the
* file data.
*/
rewind(yyin);
phase = 2;
if (verbose) {
(void)printf("Phase 2: Loading per-file fingerprints.\n");
(void)printf("=> Parsing \"%s\"\n", ifile);
}
line = 1;
yyparse();
(void)fclose(yyin);
return 0;
}
static void
usage(void)
{
2005-06-01 22:29:16 +04:00
(void)fprintf(stderr, "Usage: %s [-v] [load <signature_file>]\n",
getprogname());
exit(1);
}
static void
print_flags(unsigned char flags)
{
char buf[64];
if (!flags) {
printf("<none>\n");
return;
}
memset(buf, 0, sizeof(buf));
while (flags) {
if (*buf)
strlcat(buf, ", ", sizeof(buf));
if (flags & VERIEXEC_DIRECT) {
strlcat(buf, "direct", sizeof(buf));
flags &= ~VERIEXEC_DIRECT;
continue;
}
if (flags & VERIEXEC_INDIRECT) {
strlcat(buf, "indirect", sizeof(buf));
flags &= ~VERIEXEC_INDIRECT;
continue;
}
if (flags & VERIEXEC_FILE) {
strlcat(buf, "file", sizeof(buf));
flags &= ~VERIEXEC_FILE;
continue;
}
if (flags & VERIEXEC_UNTRUSTED) {
strlcat(buf, "untrusted", sizeof(buf));
flags &= ~VERIEXEC_UNTRUSTED;
continue;
}
}
printf("%s\n", buf);
}
static void
print_query(struct veriexec_query_params *qp, char *file)
{
struct statvfs sv;
int i;
if (statvfs(file, &sv) != 0)
err(1, "Can't statvfs() `%s'\n", file);
printf("Filename: %s\n", file);
printf("Mount: %s\n", sv.f_mntonname);
printf("Entry flags: ");
print_flags(qp->type);
printf("Entry status: %s\n", STATUS_STRING(qp->status));
printf("Hashing algorithm: %s\n", qp->fp_type);
printf("Fingerprint: ");
for (i = 0; i < qp->hash_len; i++)
printf("%02x", qp->fp[i]);
printf("\n");
}
int
main(int argc, char **argv)
{
int c;
setprogname(argv[0]);
while ((c = getopt(argc, argv, "v")) != -1)
switch (c) {
case 'v':
verbose = 1;
break;
default:
usage();
}
argc -= optind;
argv += optind;
if ((gfd = open(VERIEXEC_DEVICE, O_RDWR, 0)) == -1)
err(1, "Cannot open `%s'", VERIEXEC_DEVICE);
/*
* Handle the different commands we can do.
*/
if (argc == 2 && strcasecmp(argv[0], "load") == 0) {
filename = argv[1];
fingerprint_load(argv[1]);
} else if (argc == 2 && strcasecmp(argv[0], "delete") == 0) {
struct veriexec_delete_params dp;
struct stat sb;
if (stat(argv[1], &sb) == -1)
err(1, "Can't stat `%s'", argv[1]);
strlcpy(dp.file, argv[1], sizeof(dp.file));
/*
* If it's a regular file, remove it. If it's a directory,
* remove the entire table. If it's neither, abort.
*/
if (!S_ISDIR(sb.st_mode) && !S_ISREG(sb.st_mode))
errx(1, "`%s' is not a regular file or directory.", argv[1]);
if (ioctl(gfd, VERIEXEC_DELETE, &dp) == -1)
err(1, "Error deleting `%s'", argv[1]);
} else if (argc == 2 && strcasecmp(argv[0], "query") == 0) {
struct veriexec_query_params qp;
struct stat sb;
char fp[512]; /* XXX */
memset(&qp, 0, sizeof(qp));
qp.uaddr = &qp;
if (stat(argv[1], &sb) == -1)
err(1, "Can't stat `%s'", argv[1]);
if (!S_ISREG(sb.st_mode))
errx(1, "`%s' is not a regular file.", argv[1]);
strlcpy(qp.file, argv[1], sizeof(qp.file));
memset(fp, 0, sizeof(fp));
qp.fp = &fp[0];
qp.fp_bufsize = sizeof(fp);
if (ioctl(gfd, VERIEXEC_QUERY, &qp) == -1)
err(1, "Error querying `%s'", argv[1]);
print_query(&qp, argv[1]);
} else
usage();
(void)close(gfd);
return 0;
}