]>
Commit | Line | Data |
---|---|---|
53e1b683 | 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
c4dcdb9f | 2 | |
c4dcdb9f | 3 | #include <errno.h> |
07630cea LP |
4 | #include <stdio.h> |
5 | #include <unistd.h> | |
c4dcdb9f | 6 | |
349cc4a5 | 7 | #if HAVE_SELINUX |
c4dcdb9f LP |
8 | #include <selinux/selinux.h> |
9 | #endif | |
10 | ||
07630cea | 11 | #include "log.h" |
c4dcdb9f | 12 | #include "macro.h" |
cf0fbc49 | 13 | #include "selinux-setup.h" |
07630cea LP |
14 | #include "selinux-util.h" |
15 | #include "string-util.h" | |
c4dcdb9f | 16 | #include "util.h" |
0b3325e7 | 17 | |
349cc4a5 | 18 | #if HAVE_SELINUX |
82613b14 | 19 | _printf_(2,3) |
dbc655d5 LP |
20 | static int null_log(int type, const char *fmt, ...) { |
21 | return 0; | |
22 | } | |
f8e9f2cc | 23 | #endif |
dbc655d5 | 24 | |
8a188de9 | 25 | int mac_selinux_setup(bool *loaded_policy) { |
c4dcdb9f | 26 | |
349cc4a5 | 27 | #if HAVE_SELINUX |
4ab72d6f WW |
28 | int enforce = 0; |
29 | usec_t before_load, after_load; | |
2ed96880 | 30 | char *con; |
4ab72d6f | 31 | int r; |
2062ada7 LP |
32 | static const union selinux_callback cb = { |
33 | .func_log = null_log, | |
34 | }; | |
35 | ||
68d3acac | 36 | bool initialized = false; |
4ab72d6f WW |
37 | |
38 | assert(loaded_policy); | |
39 | ||
40 | /* Turn off all of SELinux' own logging, we want to do that */ | |
4ab72d6f WW |
41 | selinux_set_callback(SELINUX_CB_LOG, cb); |
42 | ||
43 | /* Don't load policy in the initrd if we don't appear to have | |
44 | * it. For the real root, we check below if we've already | |
45 | * loaded policy, and return gracefully. | |
46 | */ | |
47 | if (in_initrd() && access(selinux_path(), F_OK) < 0) | |
48 | return 0; | |
49 | ||
50 | /* Already initialized by somebody else? */ | |
51 | r = getcon_raw(&con); | |
52 | if (r == 0) { | |
4ab72d6f WW |
53 | initialized = !streq(con, "kernel"); |
54 | freecon(con); | |
4ab72d6f WW |
55 | } |
56 | ||
57 | /* Make sure we have no fds open while loading the policy and | |
58 | * transitioning */ | |
59 | log_close(); | |
60 | ||
61 | /* Now load the policy */ | |
62 | before_load = now(CLOCK_MONOTONIC); | |
63 | r = selinux_init_load_policy(&enforce); | |
64 | if (r == 0) { | |
710a6b50 | 65 | _cleanup_(mac_selinux_freep) char *label = NULL; |
4ab72d6f | 66 | char timespan[FORMAT_TIMESPAN_MAX]; |
4ab72d6f | 67 | |
6baa7db0 | 68 | mac_selinux_retest(); |
4ab72d6f WW |
69 | |
70 | /* Transition to the new context */ | |
cc56fafe | 71 | r = mac_selinux_get_create_label_from_exe(SYSTEMD_BINARY_PATH, &label); |
710a6b50 | 72 | if (r < 0 || !label) { |
4ab72d6f WW |
73 | log_open(); |
74 | log_error("Failed to compute init label, ignoring."); | |
75 | } else { | |
a1d2de07 | 76 | r = setcon_raw(label); |
4ab72d6f WW |
77 | |
78 | log_open(); | |
79 | if (r < 0) | |
80 | log_error("Failed to transition into init label '%s', ignoring.", label); | |
4ab72d6f WW |
81 | } |
82 | ||
83 | after_load = now(CLOCK_MONOTONIC); | |
84 | ||
85 | log_info("Successfully loaded SELinux policy in %s.", | |
86 | format_timespan(timespan, sizeof(timespan), after_load - before_load, 0)); | |
87 | ||
88 | *loaded_policy = true; | |
89 | ||
90 | } else { | |
91 | log_open(); | |
92 | ||
93 | if (enforce > 0) { | |
68d3acac | 94 | if (!initialized) { |
cb6531be | 95 | log_emergency("Failed to load SELinux policy."); |
68d3acac WW |
96 | return -EIO; |
97 | } | |
98 | ||
99 | log_warning("Failed to load new SELinux policy. Continuing with old policy."); | |
4ab72d6f WW |
100 | } else |
101 | log_debug("Unable to load SELinux policy. Ignoring."); | |
102 | } | |
c4dcdb9f LP |
103 | #endif |
104 | ||
4ab72d6f | 105 | return 0; |
c4dcdb9f | 106 | } |