selinux/libsepol/utils/sepol_compute_av.c

67 lines
1.6 KiB
C

#include <errno.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sepol/policydb/services.h>
#include <sepol/sepol.h>
int main(int argc, char *argv[])
{
FILE *fp;
sepol_security_id_t ssid, tsid;
sepol_security_class_t tclass;
struct sepol_av_decision avd;
int rc;
if (argc != 5) {
printf("usage: %s policy scontext tcontext tclass\n", argv[0]);
return 1;
}
fp = fopen(argv[1], "r");
if (!fp) {
fprintf(stderr, "Can't open policy %s: %s\n", argv[1], strerror(errno));
return 1;
}
if (sepol_set_policydb_from_file(fp) < 0) {
fprintf(stderr, "Error while processing policy %s: %s\n", argv[1], strerror(errno));
fclose(fp);
return 1;
}
fclose(fp);
if (sepol_context_to_sid(argv[2], strlen(argv[2]), &ssid) < 0) {
fprintf(stderr, "Invalid source context %s\n", argv[2]);
return 1;
}
if (sepol_context_to_sid(argv[3], strlen(argv[3]), &tsid) < 0) {
fprintf(stderr, "Invalid target context %s\n", argv[3]);
return 1;
}
if (sepol_string_to_security_class(argv[4], &tclass) < 0) {
fprintf(stderr, "Invalid security class %s\n", argv[4]);
return 1;
}
rc = sepol_compute_av(ssid, tsid, tclass, 0, &avd);
switch (rc) {
case 0:
printf("allowed: %s\n", sepol_av_perm_to_string(tclass, avd.allowed));
printf("decided: %s\n", sepol_av_perm_to_string(tclass, avd.decided));
printf("auditallow: %s\n", sepol_av_perm_to_string(tclass, avd.auditallow));
printf("auditdeny: %s\n", sepol_av_perm_to_string(tclass, avd.auditdeny));
break;
case -EINVAL:
printf("Invalid request\n");
break;
default:
printf("Failed to compute av decision: %d\n", rc);
}
return rc != 0;
}