#include #include #include #include #include #include int main(int argc, char *argv[]) { FILE *fp; sepol_security_id_t ssid, tsid; sepol_security_class_t tclass; struct sepol_av_decision avd; int rc; if (argc != 5) { printf("usage: %s policy scontext tcontext tclass\n", argv[0]); return 1; } fp = fopen(argv[1], "r"); if (!fp) { fprintf(stderr, "Can't open policy %s: %s\n", argv[1], strerror(errno)); return 1; } if (sepol_set_policydb_from_file(fp) < 0) { fprintf(stderr, "Error while processing policy %s: %s\n", argv[1], strerror(errno)); fclose(fp); return 1; } fclose(fp); if (sepol_context_to_sid(argv[2], strlen(argv[2]), &ssid) < 0) { fprintf(stderr, "Invalid source context %s\n", argv[2]); return 1; } if (sepol_context_to_sid(argv[3], strlen(argv[3]), &tsid) < 0) { fprintf(stderr, "Invalid target context %s\n", argv[3]); return 1; } if (sepol_string_to_security_class(argv[4], &tclass) < 0) { fprintf(stderr, "Invalid security class %s\n", argv[4]); return 1; } rc = sepol_compute_av(ssid, tsid, tclass, 0, &avd); switch (rc) { case 0: printf("allowed: %s\n", sepol_av_perm_to_string(tclass, avd.allowed)); printf("decided: %s\n", sepol_av_perm_to_string(tclass, avd.decided)); printf("auditallow: %s\n", sepol_av_perm_to_string(tclass, avd.auditallow)); printf("auditdeny: %s\n", sepol_av_perm_to_string(tclass, avd.auditdeny)); break; case -EINVAL: printf("Invalid request\n"); break; default: printf("Failed to compute av decision: %d\n", rc); } return rc != 0; }