summaryrefslogtreecommitdiffstats
path: root/src/mkfifo.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/mkfifo.c')
-rw-r--r--src/mkfifo.c187
1 files changed, 187 insertions, 0 deletions
diff --git a/src/mkfifo.c b/src/mkfifo.c
new file mode 100644
index 0000000..85c7050
--- /dev/null
+++ b/src/mkfifo.c
@@ -0,0 +1,187 @@
+/* mkfifo -- make fifo's (named pipes)
+ Copyright (C) 1990-2022 Free Software Foundation, Inc.
+
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <https://www.gnu.org/licenses/>. */
+
+/* David MacKenzie <djm@ai.mit.edu> */
+
+#include <config.h>
+#include <stdio.h>
+#include <getopt.h>
+#include <sys/types.h>
+#include <selinux/label.h>
+
+#include "system.h"
+#include "die.h"
+#include "error.h"
+#include "modechange.h"
+#include "quote.h"
+#include "selinux.h"
+#include "smack.h"
+
+/* The official name of this program (e.g., no 'g' prefix). */
+#define PROGRAM_NAME "mkfifo"
+
+#define AUTHORS proper_name ("David MacKenzie")
+
+static struct option const longopts[] =
+{
+ {GETOPT_SELINUX_CONTEXT_OPTION_DECL},
+ {"mode", required_argument, NULL, 'm'},
+ {GETOPT_HELP_OPTION_DECL},
+ {GETOPT_VERSION_OPTION_DECL},
+ {NULL, 0, NULL, 0}
+};
+
+void
+usage (int status)
+{
+ if (status != EXIT_SUCCESS)
+ emit_try_help ();
+ else
+ {
+ printf (_("Usage: %s [OPTION]... NAME...\n"), program_name);
+ fputs (_("\
+Create named pipes (FIFOs) with the given NAMEs.\n\
+"), stdout);
+
+ emit_mandatory_arg_note ();
+
+ fputs (_("\
+ -m, --mode=MODE set file permission bits to MODE, not a=rw - umask\n\
+"), stdout);
+ fputs (_("\
+ -Z set the SELinux security context to default type\n\
+ --context[=CTX] like -Z, or if CTX is specified then set the SELinux\n\
+ or SMACK security context to CTX\n\
+"), stdout);
+ fputs (HELP_OPTION_DESCRIPTION, stdout);
+ fputs (VERSION_OPTION_DESCRIPTION, stdout);
+ emit_ancillary_info (PROGRAM_NAME);
+ }
+ exit (status);
+}
+
+int
+main (int argc, char **argv)
+{
+ mode_t newmode;
+ char const *specified_mode = NULL;
+ int exit_status = EXIT_SUCCESS;
+ int optc;
+ char const *scontext = NULL;
+ struct selabel_handle *set_security_context = NULL;
+
+ initialize_main (&argc, &argv);
+ set_program_name (argv[0]);
+ setlocale (LC_ALL, "");
+ bindtextdomain (PACKAGE, LOCALEDIR);
+ textdomain (PACKAGE);
+
+ atexit (close_stdout);
+
+ while ((optc = getopt_long (argc, argv, "m:Z", longopts, NULL)) != -1)
+ {
+ switch (optc)
+ {
+ case 'm':
+ specified_mode = optarg;
+ break;
+ case 'Z':
+ if (is_smack_enabled ())
+ {
+ /* We don't yet support -Z to restore context with SMACK. */
+ scontext = optarg;
+ }
+ else if (is_selinux_enabled () > 0)
+ {
+ if (optarg)
+ scontext = optarg;
+ else
+ {
+ set_security_context = selabel_open (SELABEL_CTX_FILE,
+ NULL, 0);
+ if (! set_security_context)
+ error (0, errno, _("warning: ignoring --context"));
+ }
+ }
+ else if (optarg)
+ {
+ error (0, 0,
+ _("warning: ignoring --context; "
+ "it requires an SELinux/SMACK-enabled kernel"));
+ }
+ break;
+ case_GETOPT_HELP_CHAR;
+ case_GETOPT_VERSION_CHAR (PROGRAM_NAME, AUTHORS);
+ default:
+ usage (EXIT_FAILURE);
+ }
+ }
+
+ if (optind == argc)
+ {
+ error (0, 0, _("missing operand"));
+ usage (EXIT_FAILURE);
+ }
+
+ if (scontext)
+ {
+ int ret = 0;
+ if (is_smack_enabled ())
+ ret = smack_set_label_for_self (scontext);
+ else
+ ret = setfscreatecon (scontext);
+
+ if (ret < 0)
+ die (EXIT_FAILURE, errno,
+ _("failed to set default file creation context to %s"),
+ quote (scontext));
+ }
+
+ newmode = MODE_RW_UGO;
+ if (specified_mode)
+ {
+ mode_t umask_value;
+ struct mode_change *change = mode_compile (specified_mode);
+ if (!change)
+ die (EXIT_FAILURE, 0, _("invalid mode"));
+ umask_value = umask (0);
+ umask (umask_value);
+ newmode = mode_adjust (newmode, false, umask_value, change, NULL);
+ free (change);
+ if (newmode & ~S_IRWXUGO)
+ die (EXIT_FAILURE, 0,
+ _("mode must specify only file permission bits"));
+ }
+
+ for (; optind < argc; ++optind)
+ {
+ if (set_security_context)
+ defaultcon (set_security_context, argv[optind], S_IFIFO);
+ if (mkfifo (argv[optind], newmode) != 0)
+ {
+ error (0, errno, _("cannot create fifo %s"), quoteaf (argv[optind]));
+ exit_status = EXIT_FAILURE;
+ }
+ else if (specified_mode && lchmod (argv[optind], newmode) != 0)
+ {
+ error (0, errno, _("cannot set permissions of %s"),
+ quoteaf (argv[optind]));
+ exit_status = EXIT_FAILURE;
+ }
+ }
+
+ return exit_status;
+}