1#include <unistd.h> 2#include <sys/types.h> 3#include <stdio.h> 4#include <stdlib.h> 5#include <string.h> 6#include <errno.h> 7#include <selinux/selinux.h> 8 9int main(int argc, char **argv) 10{ 11 struct av_decision avd; 12 security_class_t tclass; 13 int ret; 14 15 if (argc != 4) { 16 fprintf(stderr, "usage: %s scontext tcontext tclass\n", 17 argv[0]); 18 exit(1); 19 } 20 21 if (security_check_context(argv[1])) { 22 fprintf(stderr, "%s: invalid source context '%s'\n", argv[0], argv[1]); 23 exit(4); 24 } 25 26 if (security_check_context(argv[2])) { 27 fprintf(stderr, "%s: invalid target context '%s'\n", argv[0], argv[2]); 28 exit(5); 29 } 30 31 tclass = string_to_security_class(argv[3]); 32 if (!tclass) { 33 fprintf(stderr, "%s: invalid class '%s'\n", argv[0], argv[3]); 34 exit(2); 35 } 36 37 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd); 38 if (ret < 0) { 39 fprintf(stderr, "%s: security_compute_av failed: %s\n", argv[0], strerror(errno)); 40 exit(3); 41 } 42 43 printf("allowed="); 44 print_access_vector(tclass, avd.allowed); 45 printf("\n"); 46 47 if (avd.decided != ~0U) { 48 printf("decided="); 49 print_access_vector(tclass, avd.decided); 50 printf("\n"); 51 } 52 53 if (avd.auditallow) { 54 printf("auditallow="); 55 print_access_vector(tclass, avd.auditallow); 56 printf("\n"); 57 } 58 59 if (avd.auditdeny != ~0U) { 60 printf("auditdeny"); 61 print_access_vector(tclass, avd.auditdeny); 62 printf("\n"); 63 } 64 65 exit(EXIT_SUCCESS); 66} 67