]>
Commit | Line | Data |
---|---|---|
52ad194e | 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
663996b3 MS |
2 | /*** |
3 | This file is part of systemd. | |
4 | ||
5 | Copyright 2010 Lennart Poettering | |
6 | ||
7 | systemd is free software; you can redistribute it and/or modify it | |
8 | under the terms of the GNU Lesser General Public License as published by | |
9 | the Free Software Foundation; either version 2.1 of the License, or | |
10 | (at your option) any later version. | |
11 | ||
12 | systemd is distributed in the hope that it will be useful, but | |
13 | WITHOUT ANY WARRANTY; without even the implied warranty of | |
14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
15 | Lesser General Public License for more details. | |
16 | ||
17 | You should have received a copy of the GNU Lesser General Public License | |
18 | along with systemd; If not, see <http://www.gnu.org/licenses/>. | |
19 | ***/ | |
20 | ||
663996b3 | 21 | #include <errno.h> |
db2df898 MP |
22 | #include <stdio.h> |
23 | #include <unistd.h> | |
663996b3 | 24 | |
f5e65279 | 25 | #if HAVE_SELINUX |
663996b3 MS |
26 | #include <selinux/selinux.h> |
27 | #endif | |
28 | ||
db2df898 MP |
29 | #include "log.h" |
30 | #include "macro.h" | |
663996b3 MS |
31 | #include "selinux-setup.h" |
32 | #include "selinux-util.h" | |
db2df898 | 33 | #include "string-util.h" |
663996b3 | 34 | #include "util.h" |
663996b3 | 35 | |
f5e65279 | 36 | #if HAVE_SELINUX |
d9dfd233 | 37 | _printf_(2,3) |
663996b3 MS |
38 | static int null_log(int type, const char *fmt, ...) { |
39 | return 0; | |
40 | } | |
41 | #endif | |
42 | ||
5eef597e | 43 | int mac_selinux_setup(bool *loaded_policy) { |
663996b3 | 44 | |
f5e65279 | 45 | #if HAVE_SELINUX |
60f067b4 JS |
46 | int enforce = 0; |
47 | usec_t before_load, after_load; | |
5a920b42 | 48 | char *con; |
60f067b4 JS |
49 | int r; |
50 | union selinux_callback cb; | |
51 | bool initialized = false; | |
52 | ||
53 | assert(loaded_policy); | |
54 | ||
55 | /* Turn off all of SELinux' own logging, we want to do that */ | |
56 | cb.func_log = null_log; | |
57 | selinux_set_callback(SELINUX_CB_LOG, cb); | |
58 | ||
59 | /* Don't load policy in the initrd if we don't appear to have | |
60 | * it. For the real root, we check below if we've already | |
61 | * loaded policy, and return gracefully. | |
62 | */ | |
63 | if (in_initrd() && access(selinux_path(), F_OK) < 0) | |
64 | return 0; | |
65 | ||
66 | /* Already initialized by somebody else? */ | |
67 | r = getcon_raw(&con); | |
68 | if (r == 0) { | |
69 | initialized = !streq(con, "kernel"); | |
70 | freecon(con); | |
71 | } | |
72 | ||
73 | /* Make sure we have no fds open while loading the policy and | |
74 | * transitioning */ | |
75 | log_close(); | |
76 | ||
77 | /* Now load the policy */ | |
78 | before_load = now(CLOCK_MONOTONIC); | |
79 | r = selinux_init_load_policy(&enforce); | |
80 | if (r == 0) { | |
6300502b | 81 | _cleanup_(mac_selinux_freep) char *label = NULL; |
60f067b4 | 82 | char timespan[FORMAT_TIMESPAN_MAX]; |
60f067b4 | 83 | |
5eef597e | 84 | mac_selinux_retest(); |
60f067b4 JS |
85 | |
86 | /* Transition to the new context */ | |
5eef597e | 87 | r = mac_selinux_get_create_label_from_exe(SYSTEMD_BINARY_PATH, &label); |
6300502b | 88 | if (r < 0 || !label) { |
60f067b4 JS |
89 | log_open(); |
90 | log_error("Failed to compute init label, ignoring."); | |
91 | } else { | |
aa27b158 | 92 | r = setcon_raw(label); |
60f067b4 JS |
93 | |
94 | log_open(); | |
95 | if (r < 0) | |
96 | log_error("Failed to transition into init label '%s', ignoring.", label); | |
60f067b4 JS |
97 | } |
98 | ||
99 | after_load = now(CLOCK_MONOTONIC); | |
100 | ||
101 | log_info("Successfully loaded SELinux policy in %s.", | |
102 | format_timespan(timespan, sizeof(timespan), after_load - before_load, 0)); | |
103 | ||
104 | *loaded_policy = true; | |
105 | ||
106 | } else { | |
107 | log_open(); | |
108 | ||
109 | if (enforce > 0) { | |
110 | if (!initialized) { | |
f47781d8 | 111 | log_emergency("Failed to load SELinux policy."); |
60f067b4 JS |
112 | return -EIO; |
113 | } | |
114 | ||
115 | log_warning("Failed to load new SELinux policy. Continuing with old policy."); | |
116 | } else | |
117 | log_debug("Unable to load SELinux policy. Ignoring."); | |
118 | } | |
663996b3 MS |
119 | #endif |
120 | ||
60f067b4 | 121 | return 0; |
663996b3 | 122 | } |