#include <unistd.h>
#include <sys/types.h>
#include <fcntl.h>
#include <stdlib.h>
#include <stdio.h>
#include <errno.h>
#include <string.h>
#include <limits.h>
#include "selinux_internal.h"
#include "policy.h"
#include "mapping.h"
int security_compute_av(const security_context_t scon,
const security_context_t tcon,
security_class_t tclass,
access_vector_t requested,
struct av_decision *avd)
{
char path[PATH_MAX];
char *buf;
size_t len;
int fd, ret;
if (!selinux_mnt) {
errno = ENOENT;
return -1;
}
snprintf(path, sizeof path, "%s/access", selinux_mnt);
fd = open(path, O_RDWR);
if (fd < 0)
return -1;
len = selinux_page_size;
buf = malloc(len);
if (!buf) {
ret = -1;
goto out;
}
snprintf(buf, len, "%s %s %hu %x", scon, tcon,
unmap_class(tclass), unmap_perm(tclass, requested));
ret = write(fd, buf, strlen(buf));
if (ret < 0)
goto out2;
memset(buf, 0, len);
ret = read(fd, buf, len - 1);
if (ret < 0)
goto out2;
ret = sscanf(buf, "%x %x %x %x %u %x",
&avd->allowed, &avd->decided,
&avd->auditallow, &avd->auditdeny,
&avd->seqno, &avd->flags);
if (ret < 5) {
ret = -1;
goto out2;
} else if (ret < 6)
avd->flags = 0;
map_decision(tclass, avd);
ret = 0;
out2:
free(buf);
out:
close(fd);
return ret;
}