]> git.proxmox.com Git - systemd.git/blame - src/core/selinux-setup.c
Imported Upstream version 220
[systemd.git] / src / core / selinux-setup.c
CommitLineData
663996b3
MS
1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
17
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
22#include <unistd.h>
23#include <stdio.h>
24#include <errno.h>
663996b3
MS
25
26#ifdef HAVE_SELINUX
27#include <selinux/selinux.h>
28#endif
29
30#include "selinux-setup.h"
31#include "selinux-util.h"
663996b3
MS
32#include "macro.h"
33#include "util.h"
34#include "log.h"
35
36#ifdef HAVE_SELINUX
37static int null_log(int type, const char *fmt, ...) {
38 return 0;
39}
40#endif
41
5eef597e 42int mac_selinux_setup(bool *loaded_policy) {
663996b3
MS
43
44#ifdef HAVE_SELINUX
60f067b4
JS
45 int enforce = 0;
46 usec_t before_load, after_load;
47 security_context_t con;
48 int r;
49 union selinux_callback cb;
50 bool initialized = false;
51
52 assert(loaded_policy);
53
54 /* Turn off all of SELinux' own logging, we want to do that */
55 cb.func_log = null_log;
56 selinux_set_callback(SELINUX_CB_LOG, cb);
57
58 /* Don't load policy in the initrd if we don't appear to have
59 * it. For the real root, we check below if we've already
60 * loaded policy, and return gracefully.
61 */
62 if (in_initrd() && access(selinux_path(), F_OK) < 0)
63 return 0;
64
65 /* Already initialized by somebody else? */
66 r = getcon_raw(&con);
67 if (r == 0) {
68 initialized = !streq(con, "kernel");
69 freecon(con);
70 }
71
72 /* Make sure we have no fds open while loading the policy and
73 * transitioning */
74 log_close();
75
76 /* Now load the policy */
77 before_load = now(CLOCK_MONOTONIC);
78 r = selinux_init_load_policy(&enforce);
79 if (r == 0) {
80 char timespan[FORMAT_TIMESPAN_MAX];
81 char *label;
82
5eef597e 83 mac_selinux_retest();
60f067b4
JS
84
85 /* Transition to the new context */
5eef597e 86 r = mac_selinux_get_create_label_from_exe(SYSTEMD_BINARY_PATH, &label);
60f067b4
JS
87 if (r < 0 || label == NULL) {
88 log_open();
89 log_error("Failed to compute init label, ignoring.");
90 } else {
91 r = setcon(label);
92
93 log_open();
94 if (r < 0)
95 log_error("Failed to transition into init label '%s', ignoring.", label);
96
5eef597e 97 mac_selinux_free(label);
60f067b4
JS
98 }
99
100 after_load = now(CLOCK_MONOTONIC);
101
102 log_info("Successfully loaded SELinux policy in %s.",
103 format_timespan(timespan, sizeof(timespan), after_load - before_load, 0));
104
105 *loaded_policy = true;
106
107 } else {
108 log_open();
109
110 if (enforce > 0) {
111 if (!initialized) {
f47781d8 112 log_emergency("Failed to load SELinux policy.");
60f067b4
JS
113 return -EIO;
114 }
115
116 log_warning("Failed to load new SELinux policy. Continuing with old policy.");
117 } else
118 log_debug("Unable to load SELinux policy. Ignoring.");
119 }
663996b3
MS
120#endif
121
60f067b4 122 return 0;
663996b3 123}