]> git.proxmox.com Git - systemd.git/blame - src/core/selinux-setup.c
New upstream version 236
[systemd.git] / src / core / selinux-setup.c
CommitLineData
52ad194e 1/* SPDX-License-Identifier: LGPL-2.1+ */
663996b3
MS
2/***
3 This file is part of systemd.
4
5 Copyright 2010 Lennart Poettering
6
7 systemd is free software; you can redistribute it and/or modify it
8 under the terms of the GNU Lesser General Public License as published by
9 the Free Software Foundation; either version 2.1 of the License, or
10 (at your option) any later version.
11
12 systemd is distributed in the hope that it will be useful, but
13 WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 Lesser General Public License for more details.
16
17 You should have received a copy of the GNU Lesser General Public License
18 along with systemd; If not, see <http://www.gnu.org/licenses/>.
19***/
20
663996b3 21#include <errno.h>
db2df898
MP
22#include <stdio.h>
23#include <unistd.h>
663996b3 24
f5e65279 25#if HAVE_SELINUX
663996b3
MS
26#include <selinux/selinux.h>
27#endif
28
db2df898
MP
29#include "log.h"
30#include "macro.h"
663996b3
MS
31#include "selinux-setup.h"
32#include "selinux-util.h"
db2df898 33#include "string-util.h"
663996b3 34#include "util.h"
663996b3 35
f5e65279 36#if HAVE_SELINUX
d9dfd233 37_printf_(2,3)
663996b3
MS
38static int null_log(int type, const char *fmt, ...) {
39 return 0;
40}
41#endif
42
5eef597e 43int mac_selinux_setup(bool *loaded_policy) {
663996b3 44
f5e65279 45#if HAVE_SELINUX
60f067b4
JS
46 int enforce = 0;
47 usec_t before_load, after_load;
5a920b42 48 char *con;
60f067b4
JS
49 int r;
50 union selinux_callback cb;
51 bool initialized = false;
52
53 assert(loaded_policy);
54
55 /* Turn off all of SELinux' own logging, we want to do that */
56 cb.func_log = null_log;
57 selinux_set_callback(SELINUX_CB_LOG, cb);
58
59 /* Don't load policy in the initrd if we don't appear to have
60 * it. For the real root, we check below if we've already
61 * loaded policy, and return gracefully.
62 */
63 if (in_initrd() && access(selinux_path(), F_OK) < 0)
64 return 0;
65
66 /* Already initialized by somebody else? */
67 r = getcon_raw(&con);
68 if (r == 0) {
69 initialized = !streq(con, "kernel");
70 freecon(con);
71 }
72
73 /* Make sure we have no fds open while loading the policy and
74 * transitioning */
75 log_close();
76
77 /* Now load the policy */
78 before_load = now(CLOCK_MONOTONIC);
79 r = selinux_init_load_policy(&enforce);
80 if (r == 0) {
6300502b 81 _cleanup_(mac_selinux_freep) char *label = NULL;
60f067b4 82 char timespan[FORMAT_TIMESPAN_MAX];
60f067b4 83
5eef597e 84 mac_selinux_retest();
60f067b4
JS
85
86 /* Transition to the new context */
5eef597e 87 r = mac_selinux_get_create_label_from_exe(SYSTEMD_BINARY_PATH, &label);
6300502b 88 if (r < 0 || !label) {
60f067b4
JS
89 log_open();
90 log_error("Failed to compute init label, ignoring.");
91 } else {
aa27b158 92 r = setcon_raw(label);
60f067b4
JS
93
94 log_open();
95 if (r < 0)
96 log_error("Failed to transition into init label '%s', ignoring.", label);
60f067b4
JS
97 }
98
99 after_load = now(CLOCK_MONOTONIC);
100
101 log_info("Successfully loaded SELinux policy in %s.",
102 format_timespan(timespan, sizeof(timespan), after_load - before_load, 0));
103
104 *loaded_policy = true;
105
106 } else {
107 log_open();
108
109 if (enforce > 0) {
110 if (!initialized) {
f47781d8 111 log_emergency("Failed to load SELinux policy.");
60f067b4
JS
112 return -EIO;
113 }
114
115 log_warning("Failed to load new SELinux policy. Continuing with old policy.");
116 } else
117 log_debug("Unable to load SELinux policy. Ignoring.");
118 }
663996b3
MS
119#endif
120
60f067b4 121 return 0;
663996b3 122}