| /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/ |
| |
| /*** |
| This file is part of systemd. |
| |
| Copyright 2010 Lennart Poettering |
| |
| systemd is free software; you can redistribute it and/or modify it |
| under the terms of the GNU General Public License as published by |
| the Free Software Foundation; either version 2 of the License, or |
| (at your option) any later version. |
| |
| systemd is distributed in the hope that it will be useful, but |
| WITHOUT ANY WARRANTY; without even the implied warranty of |
| MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| General Public License for more details. |
| |
| You should have received a copy of the GNU General Public License |
| along with systemd; If not, see <http://www.gnu.org/licenses/>. |
| ***/ |
| |
| #include <unistd.h> |
| #include <stdio.h> |
| #include <errno.h> |
| #include <string.h> |
| #include <stdlib.h> |
| |
| #ifdef HAVE_SELINUX |
| #include <selinux/selinux.h> |
| #endif |
| |
| #include "selinux-setup.h" |
| #include "mount-setup.h" |
| #include "macro.h" |
| #include "util.h" |
| #include "log.h" |
| #include "label.h" |
| |
| int selinux_setup(bool *loaded_policy) { |
| |
| #ifdef HAVE_SELINUX |
| int enforce = 0; |
| usec_t before_load, after_load; |
| security_context_t con; |
| int r; |
| |
| assert(loaded_policy); |
| |
| /* Make sure getcon() works, which needs /proc and /sys */ |
| mount_setup_early(); |
| |
| /* Already initialized by somebody else? */ |
| r = getcon_raw(&con); |
| if (r == 0) { |
| bool initialized; |
| |
| initialized = !streq(con, "kernel"); |
| freecon(con); |
| |
| if (initialized) |
| return 0; |
| } |
| |
| /* Make sure we have no fds open while loading the policy and |
| * transitioning */ |
| log_close(); |
| |
| /* Now load the policy */ |
| before_load = now(CLOCK_MONOTONIC); |
| r = selinux_init_load_policy(&enforce); |
| |
| if (r == 0) { |
| char timespan[FORMAT_TIMESPAN_MAX]; |
| char *label; |
| |
| /* Transition to the new context */ |
| r = label_get_create_label_from_exe(SYSTEMD_BINARY_PATH, &label); |
| if (r < 0 || label == NULL) { |
| log_open(); |
| log_error("Failed to compute init label, ignoring."); |
| } else { |
| r = setcon(label); |
| |
| log_open(); |
| if (r < 0) |
| log_error("Failed to transition into init label '%s', ignoring.", label); |
| |
| label_free(label); |
| } |
| |
| after_load = now(CLOCK_MONOTONIC); |
| |
| log_info("Successfully loaded SELinux policy in %s.", |
| format_timespan(timespan, sizeof(timespan), after_load - before_load)); |
| |
| *loaded_policy = true; |
| |
| } else { |
| if (enforce > 0) { |
| log_error("Failed to load SELinux policy."); |
| return -EIO; |
| } else |
| log_debug("Unable to load SELinux policy."); |
| } |
| #endif |
| |
| return 0; |
| } |