• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 #include <unistd.h>
2 #include <sys/types.h>
3 #include <stdio.h>
4 #include <stdlib.h>
5 #include <string.h>
6 #include <errno.h>
7 #include <selinux/selinux.h>
8 
main(int argc,char ** argv)9 int main(int argc, char **argv)
10 {
11 	struct av_decision avd;
12 	security_class_t tclass;
13 	int ret;
14 
15 	if (argc != 4) {
16 		fprintf(stderr, "usage:  %s scontext tcontext tclass\n",
17 			argv[0]);
18 		exit(1);
19 	}
20 
21 	if (security_check_context(argv[1])) {
22 		fprintf(stderr, "%s:  invalid source context '%s'\n", argv[0], argv[1]);
23 		exit(4);
24 	}
25 
26 	if (security_check_context(argv[2])) {
27 		fprintf(stderr, "%s:  invalid target context '%s'\n", argv[0], argv[2]);
28 		exit(5);
29 	}
30 
31 	tclass = string_to_security_class(argv[3]);
32 	if (!tclass) {
33 		fprintf(stderr, "%s:  invalid class '%s'\n", argv[0], argv[3]);
34 		exit(2);
35 	}
36 
37 	ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd);
38 	if (ret < 0) {
39 		fprintf(stderr, "%s:  security_compute_av failed:  %s\n", argv[0], strerror(errno));
40 		exit(3);
41 	}
42 
43 	printf("allowed=");
44 	print_access_vector(tclass, avd.allowed);
45 	printf("\n");
46 
47 	if (avd.decided != ~0U) {
48 		printf("decided=");
49 		print_access_vector(tclass, avd.decided);
50 		printf("\n");
51 	}
52 
53 	if (avd.auditallow) {
54 		printf("auditallow=");
55 		print_access_vector(tclass, avd.auditallow);
56 		printf("\n");
57 	}
58 
59 	if (avd.auditdeny != ~0U) {
60 		printf("auditdeny");
61 		print_access_vector(tclass, avd.auditdeny);
62 		printf("\n");
63 	}
64 
65 	exit(EXIT_SUCCESS);
66 }
67