mirror of
https://git.hardenedbsd.org/hardenedbsd/HardenedBSD.git
synced 2024-11-14 14:21:18 +01:00
2dfa4b66b3
This is addressing cases such as fts_read(3) encountering an [EIO] from fchdir(2) when FTS_NOCHDIR is not set. That would otherwise be seen as a successful traversal in some of these cases while silently discarding expected work. As noted in r264201, fts_read() does not set errno to 0 on a successful EOF so it needs to be set before calling it. Otherwise we might see a random error from one of the iterations. gzip is ignoring most errors and could be improved separately. Reviewed by: vangyzen Sponsored by: Dell EMC Differential Revision: https://reviews.freebsd.org/D27184
310 lines
7.5 KiB
C
310 lines
7.5 KiB
C
/* $NetBSD: verify.c,v 1.44 2013/02/03 19:15:17 christos Exp $ */
|
|
|
|
/*-
|
|
* Copyright (c) 1990, 1993
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#if HAVE_NBTOOL_CONFIG_H
|
|
#include "nbtool_config.h"
|
|
#endif
|
|
|
|
#include <sys/cdefs.h>
|
|
#if defined(__RCSID) && !defined(lint)
|
|
#if 0
|
|
static char sccsid[] = "@(#)verify.c 8.1 (Berkeley) 6/6/93";
|
|
#else
|
|
__RCSID("$NetBSD: verify.c,v 1.44 2013/02/03 19:15:17 christos Exp $");
|
|
#endif
|
|
#endif /* not lint */
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/stat.h>
|
|
|
|
#if ! HAVE_NBTOOL_CONFIG_H
|
|
#include <dirent.h>
|
|
#endif
|
|
|
|
#include <errno.h>
|
|
#include <fnmatch.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
|
|
#include "extern.h"
|
|
|
|
static NODE *root;
|
|
static char path[MAXPATHLEN];
|
|
|
|
static void miss(NODE *, char *);
|
|
static int vwalk(void);
|
|
|
|
int
|
|
verify(FILE *fi)
|
|
{
|
|
int rval;
|
|
|
|
root = spec(fi);
|
|
rval = vwalk();
|
|
miss(root, path);
|
|
return (rval);
|
|
}
|
|
|
|
static int
|
|
vwalk(void)
|
|
{
|
|
FTS *t;
|
|
FTSENT *p;
|
|
NODE *ep, *level;
|
|
int specdepth, rval;
|
|
char *argv[2];
|
|
char dot[] = ".";
|
|
argv[0] = dot;
|
|
argv[1] = NULL;
|
|
|
|
if ((t = fts_open(argv, ftsoptions, NULL)) == NULL)
|
|
mtree_err("fts_open: %s", strerror(errno));
|
|
level = root;
|
|
specdepth = rval = 0;
|
|
while (errno = 0, (p = fts_read(t)) != NULL) {
|
|
if (check_excludes(p->fts_name, p->fts_path)) {
|
|
fts_set(t, p, FTS_SKIP);
|
|
continue;
|
|
}
|
|
if (!find_only(p->fts_path)) {
|
|
fts_set(t, p, FTS_SKIP);
|
|
continue;
|
|
}
|
|
switch(p->fts_info) {
|
|
case FTS_D:
|
|
case FTS_SL:
|
|
break;
|
|
case FTS_DP:
|
|
if (specdepth > p->fts_level) {
|
|
for (level = level->parent; level->prev;
|
|
level = level->prev)
|
|
continue;
|
|
--specdepth;
|
|
}
|
|
continue;
|
|
case FTS_DNR:
|
|
case FTS_ERR:
|
|
case FTS_NS:
|
|
warnx("%s: %s", RP(p), strerror(p->fts_errno));
|
|
continue;
|
|
default:
|
|
if (dflag)
|
|
continue;
|
|
}
|
|
|
|
if (specdepth != p->fts_level)
|
|
goto extra;
|
|
for (ep = level; ep; ep = ep->next)
|
|
if ((ep->flags & F_MAGIC &&
|
|
!fnmatch(ep->name, p->fts_name, FNM_PATHNAME)) ||
|
|
!strcmp(ep->name, p->fts_name)) {
|
|
ep->flags |= F_VISIT;
|
|
if ((ep->flags & F_NOCHANGE) == 0 &&
|
|
compare(ep, p))
|
|
rval = MISMATCHEXIT;
|
|
if (!(ep->flags & F_IGN) &&
|
|
ep->type == F_DIR &&
|
|
p->fts_info == FTS_D) {
|
|
if (ep->child) {
|
|
level = ep->child;
|
|
++specdepth;
|
|
}
|
|
} else
|
|
fts_set(t, p, FTS_SKIP);
|
|
break;
|
|
}
|
|
|
|
if (ep)
|
|
continue;
|
|
extra:
|
|
if (!eflag && !(dflag && p->fts_info == FTS_SL)) {
|
|
printf("extra: %s", RP(p));
|
|
if (rflag) {
|
|
if ((S_ISDIR(p->fts_statp->st_mode)
|
|
? rmdir : unlink)(p->fts_accpath)) {
|
|
printf(", not removed: %s",
|
|
strerror(errno));
|
|
} else
|
|
printf(", removed");
|
|
}
|
|
putchar('\n');
|
|
}
|
|
fts_set(t, p, FTS_SKIP);
|
|
}
|
|
if (errno != 0)
|
|
mtree_err("fts_read: %s", strerror(errno));
|
|
fts_close(t);
|
|
if (sflag)
|
|
warnx("%s checksum: %u", fullpath, crc_total);
|
|
return (rval);
|
|
}
|
|
|
|
static void
|
|
miss(NODE *p, char *tail)
|
|
{
|
|
int create;
|
|
char *tp;
|
|
const char *type;
|
|
u_int32_t flags;
|
|
|
|
for (; p; p = p->next) {
|
|
if (p->flags & F_OPT && !(p->flags & F_VISIT))
|
|
continue;
|
|
if (p->type != F_DIR && (dflag || p->flags & F_VISIT))
|
|
continue;
|
|
strcpy(tail, p->name);
|
|
if (!(p->flags & F_VISIT)) {
|
|
/* Don't print missing message if file exists as a
|
|
symbolic link and the -q flag is set. */
|
|
struct stat statbuf;
|
|
|
|
if (qflag && stat(path, &statbuf) == 0 &&
|
|
S_ISDIR(statbuf.st_mode))
|
|
p->flags |= F_VISIT;
|
|
else
|
|
(void)printf("%s missing", path);
|
|
}
|
|
switch (p->type) {
|
|
case F_BLOCK:
|
|
case F_CHAR:
|
|
type = "device";
|
|
break;
|
|
case F_DIR:
|
|
type = "directory";
|
|
break;
|
|
case F_LINK:
|
|
type = "symlink";
|
|
break;
|
|
default:
|
|
putchar('\n');
|
|
continue;
|
|
}
|
|
|
|
create = 0;
|
|
if (!(p->flags & F_VISIT) && uflag) {
|
|
if (mtree_Wflag || p->type == F_LINK)
|
|
goto createit;
|
|
if (!(p->flags & (F_UID | F_UNAME)))
|
|
printf(
|
|
" (%s not created: user not specified)", type);
|
|
else if (!(p->flags & (F_GID | F_GNAME)))
|
|
printf(
|
|
" (%s not created: group not specified)", type);
|
|
else if (!(p->flags & F_MODE))
|
|
printf(
|
|
" (%s not created: mode not specified)", type);
|
|
else
|
|
createit:
|
|
switch (p->type) {
|
|
case F_BLOCK:
|
|
case F_CHAR:
|
|
if (mtree_Wflag)
|
|
continue;
|
|
if (!(p->flags & F_DEV))
|
|
printf(
|
|
" (%s not created: device not specified)",
|
|
type);
|
|
else if (mknod(path,
|
|
p->st_mode | nodetoino(p->type),
|
|
p->st_rdev) == -1)
|
|
printf(" (%s not created: %s)\n",
|
|
type, strerror(errno));
|
|
else
|
|
create = 1;
|
|
break;
|
|
case F_LINK:
|
|
if (!(p->flags & F_SLINK))
|
|
printf(
|
|
" (%s not created: link not specified)\n",
|
|
type);
|
|
else if (symlink(p->slink, path))
|
|
printf(
|
|
" (%s not created: %s)\n",
|
|
type, strerror(errno));
|
|
else
|
|
create = 1;
|
|
break;
|
|
case F_DIR:
|
|
if (mkdir(path, S_IRWXU|S_IRWXG|S_IRWXO))
|
|
printf(" (not created: %s)",
|
|
strerror(errno));
|
|
else
|
|
create = 1;
|
|
break;
|
|
default:
|
|
mtree_err("can't create create %s",
|
|
nodetype(p->type));
|
|
}
|
|
}
|
|
if (create)
|
|
printf(" (created)");
|
|
if (p->type == F_DIR) {
|
|
if (!(p->flags & F_VISIT))
|
|
putchar('\n');
|
|
for (tp = tail; *tp; ++tp)
|
|
continue;
|
|
*tp = '/';
|
|
miss(p->child, tp + 1);
|
|
*tp = '\0';
|
|
} else
|
|
putchar('\n');
|
|
|
|
if (!create || mtree_Wflag)
|
|
continue;
|
|
if ((p->flags & (F_UID | F_UNAME)) &&
|
|
(p->flags & (F_GID | F_GNAME)) &&
|
|
(lchown(path, p->st_uid, p->st_gid))) {
|
|
printf("%s: user/group/mode not modified: %s\n",
|
|
path, strerror(errno));
|
|
printf("%s: warning: file mode %snot set\n", path,
|
|
(p->flags & F_FLAGS) ? "and file flags " : "");
|
|
continue;
|
|
}
|
|
if (p->flags & F_MODE) {
|
|
if (lchmod(path, p->st_mode))
|
|
printf("%s: permissions not set: %s\n",
|
|
path, strerror(errno));
|
|
}
|
|
#if HAVE_STRUCT_STAT_ST_FLAGS
|
|
if ((p->flags & F_FLAGS) && p->st_flags) {
|
|
if (iflag)
|
|
flags = p->st_flags;
|
|
else
|
|
flags = p->st_flags & ~SP_FLGS;
|
|
if (lchflags(path, flags))
|
|
printf("%s: file flags not set: %s\n",
|
|
path, strerror(errno));
|
|
}
|
|
#endif /* HAVE_STRUCT_STAT_ST_FLAGS */
|
|
}
|
|
}
|