]>
Commit | Line | Data |
---|---|---|
53e1b683 | 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
c4dcdb9f | 2 | |
c4dcdb9f | 3 | #include <errno.h> |
07630cea LP |
4 | #include <stdio.h> |
5 | #include <unistd.h> | |
c4dcdb9f | 6 | |
349cc4a5 | 7 | #if HAVE_SELINUX |
c4dcdb9f LP |
8 | #include <selinux/selinux.h> |
9 | #endif | |
10 | ||
07630cea | 11 | #include "log.h" |
c4dcdb9f | 12 | #include "macro.h" |
cf0fbc49 | 13 | #include "selinux-setup.h" |
07630cea LP |
14 | #include "selinux-util.h" |
15 | #include "string-util.h" | |
ca78ad1d | 16 | #include "time-util.h" |
c4dcdb9f | 17 | #include "util.h" |
0b3325e7 | 18 | |
349cc4a5 | 19 | #if HAVE_SELINUX |
82613b14 | 20 | _printf_(2,3) |
dbc655d5 LP |
21 | static int null_log(int type, const char *fmt, ...) { |
22 | return 0; | |
23 | } | |
f8e9f2cc | 24 | #endif |
dbc655d5 | 25 | |
8a188de9 | 26 | int mac_selinux_setup(bool *loaded_policy) { |
c4dcdb9f | 27 | |
349cc4a5 | 28 | #if HAVE_SELINUX |
4ab72d6f WW |
29 | int enforce = 0; |
30 | usec_t before_load, after_load; | |
2ed96880 | 31 | char *con; |
4ab72d6f | 32 | int r; |
2062ada7 LP |
33 | static const union selinux_callback cb = { |
34 | .func_log = null_log, | |
35 | }; | |
36 | ||
68d3acac | 37 | bool initialized = false; |
4ab72d6f WW |
38 | |
39 | assert(loaded_policy); | |
40 | ||
41 | /* Turn off all of SELinux' own logging, we want to do that */ | |
4ab72d6f WW |
42 | selinux_set_callback(SELINUX_CB_LOG, cb); |
43 | ||
44 | /* Don't load policy in the initrd if we don't appear to have | |
45 | * it. For the real root, we check below if we've already | |
46 | * loaded policy, and return gracefully. | |
47 | */ | |
48 | if (in_initrd() && access(selinux_path(), F_OK) < 0) | |
49 | return 0; | |
50 | ||
51 | /* Already initialized by somebody else? */ | |
52 | r = getcon_raw(&con); | |
53 | if (r == 0) { | |
4ab72d6f WW |
54 | initialized = !streq(con, "kernel"); |
55 | freecon(con); | |
4ab72d6f WW |
56 | } |
57 | ||
58 | /* Make sure we have no fds open while loading the policy and | |
59 | * transitioning */ | |
60 | log_close(); | |
61 | ||
62 | /* Now load the policy */ | |
63 | before_load = now(CLOCK_MONOTONIC); | |
64 | r = selinux_init_load_policy(&enforce); | |
65 | if (r == 0) { | |
710a6b50 | 66 | _cleanup_(mac_selinux_freep) char *label = NULL; |
4ab72d6f | 67 | char timespan[FORMAT_TIMESPAN_MAX]; |
4ab72d6f | 68 | |
6baa7db0 | 69 | mac_selinux_retest(); |
4ab72d6f WW |
70 | |
71 | /* Transition to the new context */ | |
cc56fafe | 72 | r = mac_selinux_get_create_label_from_exe(SYSTEMD_BINARY_PATH, &label); |
710a6b50 | 73 | if (r < 0 || !label) { |
4ab72d6f WW |
74 | log_open(); |
75 | log_error("Failed to compute init label, ignoring."); | |
76 | } else { | |
a1d2de07 | 77 | r = setcon_raw(label); |
4ab72d6f WW |
78 | |
79 | log_open(); | |
80 | if (r < 0) | |
81 | log_error("Failed to transition into init label '%s', ignoring.", label); | |
4ab72d6f WW |
82 | } |
83 | ||
84 | after_load = now(CLOCK_MONOTONIC); | |
85 | ||
86 | log_info("Successfully loaded SELinux policy in %s.", | |
87 | format_timespan(timespan, sizeof(timespan), after_load - before_load, 0)); | |
88 | ||
89 | *loaded_policy = true; | |
90 | ||
91 | } else { | |
92 | log_open(); | |
93 | ||
94 | if (enforce > 0) { | |
68d3acac | 95 | if (!initialized) { |
cb6531be | 96 | log_emergency("Failed to load SELinux policy."); |
68d3acac WW |
97 | return -EIO; |
98 | } | |
99 | ||
100 | log_warning("Failed to load new SELinux policy. Continuing with old policy."); | |
4ab72d6f WW |
101 | } else |
102 | log_debug("Unable to load SELinux policy. Ignoring."); | |
103 | } | |
c4dcdb9f LP |
104 | #endif |
105 | ||
4ab72d6f | 106 | return 0; |
c4dcdb9f | 107 | } |