summaryrefslogtreecommitdiffstats
path: root/loader2/selinux.c
blob: 41ecb84c844dd23b33a947893d09d7cd943f78c9 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
/*
 * selinux.c - Various SELinux related functionality needed for the loader.
 *
 * Jeremy Katz <katzj@redhat.com>
 * 
 * Copyright 2004 Red Hat, Inc.
 * Portions extracted from libselinux which was released as public domain
 *   software by the NSA.
 *
 * This software may be freely redistributed under the terms of the GNU
 * General Public License.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
 */

#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <fcntl.h>
#include <errno.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <string.h>

#include "loader.h"
#include "loadermisc.h"
#include "log.h"

static char * getpolicyver() {
    int fd;
    char * buf;

    fd = open("/selinux/policyvers", O_RDONLY);
    if (fd == -1) {
        return NULL;
    }

    buf = malloc(32);
    buf = memset(buf, 0, 32);
    if ((read(fd, buf, 32)) == -1) {
        logMessage("error getting policy version: %s", strerror(errno));
        free(buf);
        close(fd);
        return NULL;
    }

    close(fd);
    return buf;
}

int loadpolicy() {
    char * ver, * fn;
    char *paths[] = { "/tmp/updates", 
                      "/mnt/source/RHupdates",
                      "/mnt/runtime/etc/selinux/targeted/policy",
                      "/mnt/runtime/etc/security/selinux",
                      NULL };
    int i, pid, status;

    ver = getpolicyver();
    if (ver == NULL) {
        return -1;
    }

    fn = malloc(128);
    fn = memset(fn, 0, 128);
    for (i = 0; paths[i]; i++) {
        snprintf(fn, 128, "%s/policy.%s", (char *) paths[i], ver);
        if (!access(fn, R_OK)) {
            break;
        }
    }

    if (access(fn, R_OK)) {
        logMessage("Unable to load suitable SELinux policy");
        return -1;
    }

    logMessage("Loading SELinux policy from %s", fn);
    if (!(pid = fork())) {
        setenv("LD_LIBRARY_PATH", LIBPATH, 1);
        execl("/usr/sbin/load_policy", 
              "/usr/sbin/load_policy", "-q", fn, NULL);
        logMessage("exec of load_policy failed: %s", strerror(errno));
        exit(1);
    }

    waitpid(pid, &status, 0);
    free(fn);
    if (WIFEXITED(status) && (WEXITSTATUS(status) != 0))
        return 1;

    return 0;
}

/* set a context for execution, from libselinux */
int setexeccon(char * context) {
    int fd;
    ssize_t ret;
    
    fd = open("/proc/self/attr/exec", O_RDWR);
    if (fd < 0)
        return -1;
    if (context) 
        ret = write(fd, context, strlen(context)+1);
    else
        ret = write(fd, NULL, 0); /* clear */
    close(fd);
    if (ret < 0)
        return -1;
    else
        return 0;
}