| #include <unistd.h> |
| #include <sys/types.h> |
| #include <fcntl.h> |
| #include <stdlib.h> |
| #include <stdio.h> |
| #include <errno.h> |
| #include <string.h> |
| #include <limits.h> |
| #include "selinux_internal.h" |
| #include "policy.h" |
| #include "mapping.h" |
| |
| int security_compute_av(const security_context_t scon, |
| const security_context_t tcon, |
| security_class_t tclass, |
| access_vector_t requested, |
| struct av_decision *avd) |
| { |
| char path[PATH_MAX]; |
| char *buf; |
| size_t len; |
| int fd, ret; |
| |
| if (!selinux_mnt) { |
| errno = ENOENT; |
| return -1; |
| } |
| |
| snprintf(path, sizeof path, "%s/access", selinux_mnt); |
| fd = open(path, O_RDWR); |
| if (fd < 0) |
| return -1; |
| |
| len = selinux_page_size; |
| buf = malloc(len); |
| if (!buf) { |
| ret = -1; |
| goto out; |
| } |
| |
| snprintf(buf, len, "%s %s %hu %x", scon, tcon, |
| unmap_class(tclass), unmap_perm(tclass, requested)); |
| |
| ret = write(fd, buf, strlen(buf)); |
| if (ret < 0) |
| goto out2; |
| |
| memset(buf, 0, len); |
| ret = read(fd, buf, len - 1); |
| if (ret < 0) |
| goto out2; |
| |
| ret = sscanf(buf, "%x %x %x %x %u %x", |
| &avd->allowed, &avd->decided, |
| &avd->auditallow, &avd->auditdeny, |
| &avd->seqno, &avd->flags); |
| if (ret < 5) { |
| ret = -1; |
| goto out2; |
| } else if (ret < 6) |
| avd->flags = 0; |
| |
| map_decision(tclass, avd); |
| |
| ret = 0; |
| out2: |
| free(buf); |
| out: |
| close(fd); |
| return ret; |
| } |
| |