Christian Göttsche <cgzones@xxxxxxxxxxxxxx> writes: > On Tue, 31 Aug 2021 at 13:51, Dominick Grift <dominick.grift@xxxxxxxxxxx> wrote: >> >> Dominick Grift <dominick.grift@xxxxxxxxxxx> writes: >> >> > We can get into a state where selinux is enabled without a policy. >> > > While testing a potential fix several questions came up: > > I. What are the expected/desired outcomes after the following > configuration setups: > > * invalid SELINUX=, valid SELINUXTYPE= (currently permissive, > except cmdline contains `enforcing=1` then system halt) Unspecified or invalid SELINUX defaults to enforce = 0. I guess it could help administrators during initial selinux setup - the system would boot even with a typo. `enforcing=1` on the kernel command line overrides value set in config file (in this case it is not set). If SELINUXTYPE is valid, the policy is loaded and systemd boots. If it's invalid, the systemd freeze, see bellow. > * valid SELINUX=, invalid SELINUXTYPE= (currently disabled if > SELINUX=disabled, system halt if SELINUX=enforcing or `enforcing=1`, > else zombie state) If systemd can't load policy it logs the problem and freeze in enforcing. The result of selinux_init_load_policy is ignored in permissive and systemd continue with boot, see bellow. if (enforce > 0) { if (!initialized) return log_emergency_errno(SYNTHETIC_ERRNO(EIO), "Failed to load SELinux policy."); log_warning("Failed to load new SELinux policy. Continuing with old policy."); } else log_debug("Unable to load SELinux policy. Ignoring."); } > > II. When does the kernel considers SELinux to be *enabled*? After the > mount of a selinuxfs or after the first policy load? My understanding is that internally in kernel is SELinux enabled during build process and it considers SELinux to be enabled unless selinux=0 is used on kernel command line. For userspace it's propagated as availability of /sys/fs/selinux. > With SELinux being unable to disable at runtime in the near future > and SELinux being initialized after a selinuxfs mounting, that > probably needs selinux_init_load_policy(3) to check for a valid > SELINUXTYPE= before mounting a selinuxfs. AFAIK whether /sys/fs/selinux is mounted or not doesn't say anything about status of SELinux inside kernel. It's just used as simple indicator for userspace whether it can use SELinux API or not. > Also selinux_init_load_policy(3) libselinux should probably reset its > state via `umount(selinux_mnt); fini_selinuxmnt();` after a > selinux_mkload_policy(3) failure.