1 #include <unistd.h>
2 #include <sys/types.h>
3 #include <stdio.h>
4 #include <stdlib.h>
5 #include <string.h>
6 #include <errno.h>
7 #include <selinux/selinux.h>
8
main(int argc,char ** argv)9 int main(int argc, char **argv)
10 {
11 struct av_decision avd;
12 security_class_t tclass;
13 int ret;
14
15 if (argc != 4) {
16 fprintf(stderr, "usage: %s scontext tcontext tclass\n",
17 argv[0]);
18 exit(1);
19 }
20
21 if (security_check_context(argv[1])) {
22 fprintf(stderr, "%s: invalid source context '%s'\n", argv[0], argv[1]);
23 exit(4);
24 }
25
26 if (security_check_context(argv[2])) {
27 fprintf(stderr, "%s: invalid target context '%s'\n", argv[0], argv[2]);
28 exit(5);
29 }
30
31 tclass = string_to_security_class(argv[3]);
32 if (!tclass) {
33 fprintf(stderr, "%s: invalid class '%s'\n", argv[0], argv[3]);
34 exit(2);
35 }
36
37 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd);
38 if (ret < 0) {
39 fprintf(stderr, "%s: security_compute_av failed: %s\n", argv[0], strerror(errno));
40 exit(3);
41 }
42
43 printf("allowed=");
44 print_access_vector(tclass, avd.allowed);
45 printf("\n");
46
47 if (avd.decided != ~0U) {
48 printf("decided=");
49 print_access_vector(tclass, avd.decided);
50 printf("\n");
51 }
52
53 if (avd.auditallow) {
54 printf("auditallow=");
55 print_access_vector(tclass, avd.auditallow);
56 printf("\n");
57 }
58
59 if (avd.auditdeny != ~0U) {
60 printf("auditdeny");
61 print_access_vector(tclass, avd.auditdeny);
62 printf("\n");
63 }
64
65 exit(EXIT_SUCCESS);
66 }
67