dcavalca / rpms / systemd

Forked from rpms/systemd 3 months ago
Clone
aed857
From 1707b9959e67e5e73987e1ff8a72189d24656fa0 Mon Sep 17 00:00:00 2001
aed857
From: Krzysztof Nowicki <krzysztof.a.nowicki+github@gmail.com>
aed857
Date: Wed, 28 Mar 2018 13:36:33 +0200
aed857
Subject: [PATCH] core: dont't remount /sys/fs/cgroup for relabel if not needed
aed857
 (#8595)
aed857
aed857
The initial fix for relabelling the cgroup filesystem for
aed857
SELinux delivered in commit 8739f23e3 was based on the assumption that
aed857
the cgroup filesystem is already populated once mount_setup() is
aed857
executed, which was true for my system. What I wasn't aware is that this
aed857
is the case only when another instance of systemd was running before
aed857
this one, which can happen if systemd is used in the initrd (for ex. by
aed857
dracut).
aed857
aed857
In case of a clean systemd start-up the cgroup filesystem is actually
aed857
being populated after mount_setup() and does not need relabelling as at
aed857
that moment the SELinux policy is already loaded. Since however the root
aed857
cgroup filesystem was remounted read-only in the meantime this operation
aed857
will now fail.
aed857
aed857
To fix this check for the filesystem mount flags before relabelling and
aed857
only remount ro->rw->ro if necessary and leave the filesystem read-write
aed857
otherwise.
aed857
aed857
Fixes #7901.
aed857
aed857
(cherry picked from commit 6f7729c1767998110c4460c85c94435c5782a613)
aed857
---
aed857
 src/core/mount-setup.c | 35 ++++++++++++++++++++++++++++++-----
aed857
 1 file changed, 30 insertions(+), 5 deletions(-)
aed857
aed857
diff --git a/src/core/mount-setup.c b/src/core/mount-setup.c
c62b8e
index 7a2cae4a39..ed493cbe36 100644
aed857
--- a/src/core/mount-setup.c
aed857
+++ b/src/core/mount-setup.c
aed857
@@ -25,6 +25,8 @@
aed857
 #include <stdlib.h>
aed857
 #include <string.h>
aed857
 #include <assert.h>
aed857
+#include <sys/statfs.h>
aed857
+#include <sys/statvfs.h>
aed857
 #include <unistd.h>
aed857
 #include <ftw.h>
aed857
 
aed857
@@ -337,6 +339,31 @@ static int nftw_cb(
aed857
 
aed857
         return FTW_CONTINUE;
aed857
 };
aed857
+
aed857
+static int relabel_cgroup_filesystems(void) {
aed857
+        int r;
aed857
+        struct statfs st;
aed857
+
aed857
+        /* Temporarily remount the root cgroup filesystem to give it a proper label. Do this
aed857
+           only when the filesystem has been already populated by a previous instance of systemd
aed857
+           running from initrd. Otherwise don't remount anything and leave the filesystem read-write
aed857
+           for the cgroup filesystems to be mounted inside. */
aed857
+        r = statfs("/sys/fs/cgroup", &st);
aed857
+        if (r < 0) {
aed857
+                return log_error_errno(errno, "Failed to determine mount flags for /sys/fs/cgroup: %m");
aed857
+        }
aed857
+
aed857
+        if (st.f_flags & ST_RDONLY)
aed857
+                (void) mount(NULL, "/sys/fs/cgroup", NULL, MS_REMOUNT, NULL);
aed857
+
aed857
+        (void) label_fix("/sys/fs/cgroup", false, false);
aed857
+        nftw("/sys/fs/cgroup", nftw_cb, 64, FTW_MOUNT|FTW_PHYS|FTW_ACTIONRETVAL);
aed857
+
aed857
+        if (st.f_flags & ST_RDONLY)
aed857
+                (void) mount(NULL, "/sys/fs/cgroup", NULL, MS_REMOUNT|MS_RDONLY, NULL);
aed857
+
aed857
+        return 0;
aed857
+}
aed857
 #endif
aed857
 
aed857
 int mount_setup(bool loaded_policy) {
aed857
@@ -369,11 +396,9 @@ int mount_setup(bool loaded_policy) {
aed857
                 nftw("/dev", nftw_cb, 64, FTW_MOUNT|FTW_PHYS|FTW_ACTIONRETVAL);
aed857
                 nftw("/run", nftw_cb, 64, FTW_MOUNT|FTW_PHYS|FTW_ACTIONRETVAL);
aed857
 
aed857
-                /* Temporarily remount the root cgroup filesystem to give it a proper label. */
aed857
-                (void) mount(NULL, "/sys/fs/cgroup", NULL, MS_REMOUNT, NULL);
aed857
-                label_fix("/sys/fs/cgroup", false, false);
aed857
-                nftw("/sys/fs/cgroup", nftw_cb, 64, FTW_MOUNT|FTW_PHYS|FTW_ACTIONRETVAL);
aed857
-                (void) mount(NULL, "/sys/fs/cgroup", NULL, MS_REMOUNT|MS_RDONLY, NULL);
aed857
+                r = relabel_cgroup_filesystems();
aed857
+                if (r < 0)
aed857
+                        return r;
aed857
 
aed857
                 after_relabel = now(CLOCK_MONOTONIC);
aed857