return getpidcon_raw(pid, context);
}
-int setcon_raw(const char *context)
-{
- if (!is_selinux_enabled()) {
- errno = EINVAL;
- return -1;
- }
- return g_setenv("FAKE_SELINUX_CONTEXT", context, TRUE) == TRUE ? 0 : -1;
-}
-
-int setcon(const char *context)
-{
- return setcon_raw(context);
-}
-
-
int setfilecon_raw(const char *path, const char *con)
{
const char *constr = con;
return getenv("FAKE_SELINUX_DISABLED") == NULL;
}
-int security_disable(void)
-{
- if (!is_selinux_enabled()) {
- errno = ENOENT;
- return -1;
- }
-
- return g_setenv("FAKE_SELINUX_DISABLED", "1", TRUE) == TRUE ? 0 : -1;
-}
-
int security_getenforce(void)
{
if (!is_selinux_enabled()) {
if (virTestRun("Labelling " # name, testSELinuxLabeling, name) < 0) \
ret = -1;
- setcon("system_r:system_u:libvirtd_t:s0:c0.c1023");
+ if (!g_setenv("FAKE_SELINUX_CONTEXT", "system_r:system_u:libvirtd_t:s0:c0.c1023", TRUE)) {
+ perror("Cannot set process security context");
+ return EXIT_FAILURE;
+ }
DO_TEST_LABELING("disks");
DO_TEST_LABELING("kernel");
context_t con = NULL;
context_t imgcon = NULL;
- if (setcon_raw(data->pidcon) < 0) {
+ if (!g_setenv("FAKE_SELINUX_CONTEXT", data->pidcon, TRUE)) {
perror("Cannot set process security context");
return -1;
}
static int testSetFakeSELinuxContext(const void *data G_GNUC_UNUSED)
{
#if WITH_SELINUX
- return setcon_raw(data);
+ return g_setenv("FAKE_SELINUX_CONTEXT", data, TRUE) == TRUE ? 0 : -1;
#else
VIR_DEBUG("libvirt not compiled with SELinux, skipping this test");
return EXIT_AM_SKIP;
static int testDisableFakeSELinux(const void *data G_GNUC_UNUSED)
{
#if WITH_SELINUX
- return security_disable();
+ return g_setenv("FAKE_SELINUX_DISABLED", "1", TRUE) == TRUE ? 0 : -1;
#else
VIR_DEBUG("libvirt not compiled with SELinux, skipping this test");
return EXIT_AM_SKIP;