/* * dpkg - main program for package management * selinux.c - SE Linux support * * Copyright © 2007-2015 Guillem Jover * * This is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ #include #include #include #include #include #include #include #include #include #ifdef WITH_LIBSELINUX #include #include #include #endif #include "main.h" #ifdef WITH_LIBSELINUX static struct selabel_handle *sehandle; #endif void dpkg_selabel_load(void) { #ifdef WITH_LIBSELINUX static int selinux_enabled = -1; if (selinux_enabled < 0) { int rc; /* Set selinux_enabled if it is not already set (singleton). */ selinux_enabled = (is_selinux_enabled() > 0); if (!selinux_enabled) return; /* Open the SELinux status notification channel, with fallback * enabled for older kernels. */ rc = selinux_status_open(1); if (rc < 0) ohshit(_("cannot open security status notification channel")); /* XXX: We could use selinux_set_callback() to redirect the * errors from the other SELinux calls, but that does not seem * worth it right now. */ } else if (selinux_enabled && selinux_status_updated()) { /* The SELinux policy got updated in the kernel, usually after * upgrading the package shipping it, we need to reload. */ selabel_close(sehandle); } else { /* SELinux is either disabled or it does not need a reload. */ return; } sehandle = selabel_open(SELABEL_CTX_FILE, NULL, 0); if (sehandle == NULL && security_getenforce() == 1) ohshite(_("cannot get security labeling handle")); #endif } void dpkg_selabel_set_context(const char *matchpath, const char *path, mode_t mode) { #ifdef WITH_LIBSELINUX security_context_t scontext = NULL; int ret; /* If SELinux is not enabled just do nothing. */ if (sehandle == NULL) return; /* * We use the _raw function variants here so that no translation * happens from computer to human readable forms, to avoid issues * when mcstransd has disappeared during the unpack process. */ /* Do nothing if we can't figure out what the context is, or if it has * no context; in which case the default context shall be applied. */ ret = selabel_lookup_raw(sehandle, &scontext, matchpath, mode & S_IFMT); if (ret == -1 || (ret == 0 && scontext == NULL)) return; ret = lsetfilecon_raw(path, scontext); if (ret < 0 && errno != ENOTSUP) ohshite(_("cannot set security context for file object '%s'"), path); freecon(scontext); #endif /* WITH_LIBSELINUX */ } void dpkg_selabel_close(void) { #ifdef WITH_LIBSELINUX if (sehandle == NULL) return; selinux_status_close(); selabel_close(sehandle); sehandle = NULL; #endif }