#include "log.h"
#include "strv.h"
-#if HAVE_SELINUX
+#ifdef HAVE_SELINUX
#include <selinux/selinux.h>
#include <selinux/label.h>
int label_init(void) {
int r = 0;
-#if HAVE_SELINUX
+#ifdef HAVE_SELINUX
if (use_selinux()) {
label_hnd = selabel_open(SELABEL_CTX_FILE, NULL, 0);
if (!label_hnd) {
int label_fix(const char *path) {
int r = 0;
-#if HAVE_SELINUX
+#ifdef HAVE_SELINUX
struct stat st;
security_context_t fcon;
if (use_selinux()) {
void label_finish(void) {
-#if HAVE_SELINUX
+#ifdef HAVE_SELINUX
if (use_selinux())
selabel_close(label_hnd);
#endif
char **label) {
int r = 0;
-#if HAVE_SELINUX
+#ifdef HAVE_SELINUX
security_context_t mycon = NULL, fcon = NULL;
security_class_t sclass;
int label_fifofile_set(const char *label, const char *path) {
int r = 0;
-#if HAVE_SELINUX
+#ifdef HAVE_SELINUX
security_context_t filecon = NULL;
if (use_selinux() && label) {
if (((r = label_get_file_label_from_path(label, path, "fifo_file", &filecon)) == 0)) {
int label_socket_set(const char *label) {
-#if HAVE_SELINUX
+#ifdef HAVE_SELINUX
if (use_selinux() && setsockcreatecon((security_context_t) label) < 0) {
log_error("Failed to set SELinux context (%s) on socket: %m", label);
if (security_getenforce() == 1)
void label_file_clear(void) {
-#if HAVE_SELINUX
+#ifdef HAVE_SELINUX
if (use_selinux())
setfscreatecon(NULL);
#endif
void label_free(const char *label) {
-#if HAVE_SELINUX
+#ifdef HAVE_SELINUX
if (use_selinux())
freecon((security_context_t) label);
#endif
void label_socket_clear(void) {
-#if HAVE_SELINUX
+#ifdef HAVE_SELINUX
if (use_selinux())
setsockcreatecon(NULL);
#endif
const char *path,
mode_t mode) {
-#if HAVE_SELINUX
+#ifdef HAVE_SELINUX
int r;
security_context_t fcon = NULL;