Remove dead selinux code
[project/make_ext4fs.git] / make_ext4fs.c
index 62a3f1a..fc1802b 100644 (file)
 #include <sys/stat.h>
 #include <sys/types.h>
 
-#ifdef USE_MINGW
-
-#include <winsock2.h>
-
-/* These match the Linux definitions of these flags.
-   L_xx is defined to avoid conflicting with the win32 versions.
-*/
-#define L_S_IRUSR 00400
-#define L_S_IWUSR 00200
-#define L_S_IXUSR 00100
-#define S_IRWXU (L_S_IRUSR | L_S_IWUSR | L_S_IXUSR)
-#define S_IRGRP 00040
-#define S_IWGRP 00020
-#define S_IXGRP 00010
-#define S_IRWXG (S_IRGRP | S_IWGRP | S_IXGRP)
-#define S_IROTH 00004
-#define S_IWOTH 00002
-#define S_IXOTH 00001
-#define S_IRWXO (S_IROTH | S_IWOTH | S_IXOTH)
-#define S_ISUID 0004000
-#define S_ISGID 0002000
-#define S_ISVTX 0001000
-
-#else
-
-#include <selinux/selinux.h>
-#include <selinux/label.h>
-#include <selinux/android.h>
-
-#define O_BINARY 0
-
-#endif
-
 /* TODO: Not implemented:
    Allocating blocks in the same block group as the file inode
    Hash or binary tree directories
-   Special files: sockets, devices, fifos
  */
 
 static int filter_dot(const struct dirent *d)
@@ -79,8 +45,7 @@ static int filter_dot(const struct dirent *d)
        return (strcmp(d->d_name, "..") && strcmp(d->d_name, "."));
 }
 
-static u32 build_default_directory_structure(const char *dir_path,
-                                            struct selabel_handle *sehnd)
+static u32 build_default_directory_structure(const char *dir_path)
 {
        u32 inode;
        u32 root_inode;
@@ -98,22 +63,6 @@ static u32 build_default_directory_structure(const char *dir_path,
        inode_set_permissions(inode, dentries.mode,
                dentries.uid, dentries.gid, dentries.mtime);
 
-#ifndef USE_MINGW
-       if (sehnd) {
-               char *path = NULL;
-               char *secontext = NULL;
-
-               asprintf(&path, "%slost+found", dir_path);
-               if (selabel_lookup(sehnd, &secontext, path, S_IFDIR) < 0) {
-                       error("cannot lookup security context for %s", path);
-               } else {
-                       inode_set_selinux(inode, secontext);
-                       freecon(secontext);
-               }
-               free(path);
-       }
-#endif
-
        return root_inode;
 }
 
@@ -127,7 +76,7 @@ static u32 build_default_directory_structure(const char *dir_path,
    if the image were mounted at the specified mount point */
 static u32 build_directory_structure(const char *full_path, const char *dir_path,
                u32 dir_inode, fs_config_func_t fs_config_func,
-               struct selabel_handle *sehnd, int verbose, time_t fixed_time)
+               int verbose, time_t fixed_time)
 {
        int entries = 0;
        struct dentry *dentries;
@@ -198,30 +147,17 @@ static u32 build_directory_structure(const char *full_path, const char *dir_path
                }
                uint64_t capabilities;
                if (fs_config_func != NULL) {
-#ifdef ANDROID
                        unsigned int mode = 0;
                        unsigned int uid = 0;
                        unsigned int gid = 0;
                        int dir = S_ISDIR(stat.st_mode);
-                       fs_config_func(dentries[i].path, dir, &uid, &gid, &mode, &capabilities);
-                       dentries[i].mode = mode;
-                       dentries[i].uid = uid;
-                       dentries[i].gid = gid;
-                       dentries[i].capabilities = capabilities;
-#else
-                       error("can't set android permissions - built without android support");
-#endif
-               }
-#ifndef USE_MINGW
-               if (sehnd) {
-                       if (selabel_lookup(sehnd, &dentries[i].secon, dentries[i].path, stat.st_mode) < 0) {
-                               error("cannot lookup security context for %s", dentries[i].path);
+                       if (fs_config_func(dentries[i].path, dir, &uid, &gid, &mode, &capabilities)) {
+                               dentries[i].mode = mode;
+                               dentries[i].uid = uid;
+                               dentries[i].gid = gid;
+                               dentries[i].capabilities = capabilities;
                        }
-
-                       if (dentries[i].secon && verbose)
-                               printf("Labeling %s as %s\n", dentries[i].path, dentries[i].secon);
                }
-#endif
 
                if (S_ISREG(stat.st_mode)) {
                        dentries[i].file_type = EXT4_FT_REG_FILE;
@@ -263,10 +199,6 @@ static u32 build_directory_structure(const char *full_path, const char *dir_path
                dentries[0].file_type = EXT4_FT_DIR;
                dentries[0].uid = 0;
                dentries[0].gid = 0;
-               if (sehnd) {
-                       if (selabel_lookup(sehnd, &dentries[0].secon, dentries[0].path, dentries[0].mode) < 0)
-                               error("cannot lookup security context for %s", dentries[0].path);
-               }
                entries++;
                dirs++;
        }
@@ -288,11 +220,16 @@ static u32 build_directory_structure(const char *full_path, const char *dir_path
                        if (ret < 0)
                                critical_error_errno("asprintf");
                        entry_inode = build_directory_structure(subdir_full_path,
-                                       subdir_dir_path, inode, fs_config_func, sehnd, verbose, fixed_time);
+                                       subdir_dir_path, inode, fs_config_func, verbose, fixed_time);
                        free(subdir_full_path);
                        free(subdir_dir_path);
                } else if (dentries[i].file_type == EXT4_FT_SYMLINK) {
                        entry_inode = make_link(dentries[i].link);
+               } else if (dentries[i].file_type == EXT4_FT_CHRDEV ||
+                          dentries[i].file_type == EXT4_FT_BLKDEV ||
+                          dentries[i].file_type == EXT4_FT_SOCK ||
+                          dentries[i].file_type == EXT4_FT_FIFO) {
+                       entry_inode = make_special(dentries[i].full_path);
                } else {
                        error("unknown file type on %s", dentries[i].path);
                        entry_inode = 0;
@@ -305,16 +242,6 @@ static u32 build_directory_structure(const char *full_path, const char *dir_path
                if (ret)
                        error("failed to set permissions on %s\n", dentries[i].path);
 
-               /*
-                * It's important to call inode_set_selinux() before
-                * inode_set_capabilities(). Extended attributes need to
-                * be stored sorted order, and we guarantee this by making
-                * the calls in the proper order.
-                * Please see xattr_assert_sane() in contents.c
-                */
-               ret = inode_set_selinux(entry_inode, dentries[i].secon);
-               if (ret)
-                       error("failed to set SELinux context on %s\n", dentries[i].path);
                ret = inode_set_capabilities(entry_inode, dentries[i].capabilities);
                if (ret)
                        error("failed to set capability on %s\n", dentries[i].path);
@@ -323,7 +250,6 @@ static u32 build_directory_structure(const char *full_path, const char *dir_path
                free(dentries[i].full_path);
                free(dentries[i].link);
                free((void *)dentries[i].filename);
-               free(dentries[i].secon);
        }
 
        free(dentries);
@@ -401,16 +327,16 @@ void reset_ext4fs_info() {
 }
 
 int make_ext4fs_sparse_fd(int fd, long long len,
-                               const char *mountpoint, struct selabel_handle *sehnd)
+                               const char *mountpoint)
 {
        reset_ext4fs_info();
        info.len = len;
 
-       return make_ext4fs_internal(fd, NULL, mountpoint, NULL, 0, 1, 0, 0, sehnd, 0, -1, NULL);
+       return make_ext4fs_internal(fd, NULL, mountpoint, NULL, 0, 1, 0, 0, 0, -1, NULL);
 }
 
 int make_ext4fs(const char *filename, long long len,
-                               const char *mountpoint, struct selabel_handle *sehnd)
+                               const char *mountpoint)
 {
        int fd;
        int status;
@@ -418,13 +344,13 @@ int make_ext4fs(const char *filename, long long len,
        reset_ext4fs_info();
        info.len = len;
 
-       fd = open(filename, O_WRONLY | O_CREAT | O_TRUNC | O_BINARY, 0644);
+       fd = open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0644);
        if (fd < 0) {
                error_errno("open");
                return EXIT_FAILURE;
        }
 
-       status = make_ext4fs_internal(fd, NULL, mountpoint, NULL, 0, 0, 0, 1, sehnd, 0, -1, NULL);
+       status = make_ext4fs_internal(fd, NULL, mountpoint, NULL, 0, 0, 0, 1, 0, -1, NULL);
        close(fd);
 
        return status;
@@ -493,7 +419,7 @@ static char *canonicalize_rel_slashes(const char *str)
 int make_ext4fs_internal(int fd, const char *_directory,
                                                 const char *_mountpoint, fs_config_func_t fs_config_func, int gzip,
                                                 int sparse, int crc, int wipe,
-                                                struct selabel_handle *sehnd, int verbose, time_t fixed_time,
+                                                int verbose, time_t fixed_time,
                                                 FILE* block_list_file)
 {
        u32 root_inode_num;
@@ -599,35 +525,18 @@ int make_ext4fs_internal(int fd, const char *_directory,
 #ifdef USE_MINGW
        // Windows needs only 'create an empty fs image' functionality
        assert(!directory);
-       root_inode_num = build_default_directory_structure(mountpoint, sehnd);
+       root_inode_num = build_default_directory_structure(mountpoint);
 #else
        if (directory)
                root_inode_num = build_directory_structure(directory, mountpoint, 0,
-                       fs_config_func, sehnd, verbose, fixed_time);
+                       fs_config_func, verbose, fixed_time);
        else
-               root_inode_num = build_default_directory_structure(mountpoint, sehnd);
+               root_inode_num = build_default_directory_structure(mountpoint);
 #endif
 
        root_mode = S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH;
        inode_set_permissions(root_inode_num, root_mode, 0, 0, 0);
 
-#ifndef USE_MINGW
-       if (sehnd) {
-               char *secontext = NULL;
-
-               if (selabel_lookup(sehnd, &secontext, mountpoint, S_IFDIR) < 0) {
-                       error("cannot lookup security context for %s", mountpoint);
-               }
-               if (secontext) {
-                       if (verbose) {
-                               printf("Labeling %s as %s\n", mountpoint, secontext);
-                       }
-                       inode_set_selinux(root_inode_num, secontext);
-               }
-               freecon(secontext);
-       }
-#endif
-
        ext4_update_free();
 
        ext4_queue_sb();