#include #include #include #include "selinux_internal.h" #include #include #include #include #include #include "policy.h" int is_selinux_enabled(void) { int enabled = 0; security_context_t con; /* init_selinuxmnt() gets called before this function. We * will assume that if a selinux file system is mounted, then * selinux is enabled. */ if (selinux_mnt) { /* Since a file system is mounted, we consider selinux * enabled. If getcon_raw fails, selinux is still enabled. * We only consider it disabled if no policy is loaded. */ enabled = 1; if (getcon_raw(&con) == 0) { if (!strcmp(con, "kernel")) enabled = 0; freecon(con); } } return enabled; } hidden_def(is_selinux_enabled) /* * Function: is_selinux_mls_enabled() * Return: 1 on success * 0 on failure */ int is_selinux_mls_enabled(void) { char buf[20], path[PATH_MAX]; int fd, ret, enabled = 0; if (!selinux_mnt) return enabled; snprintf(path, sizeof path, "%s/mls", selinux_mnt); fd = open(path, O_RDONLY); if (fd < 0) return enabled; memset(buf, 0, sizeof buf); do { ret = read(fd, buf, sizeof buf - 1); } while (ret < 0 && errno == EINTR); close(fd); if (ret < 0) return enabled; if (!strcmp(buf, "1")) enabled = 1; return enabled; } hidden_def(is_selinux_mls_enabled)