123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219 |
- /*
- * sestatus -- displays the status of SELinux
- *
- * Ported to busybox: KaiGai Kohei <kaigai@ak.jp.nec.com>
- *
- * Copyright (C) KaiGai Kohei <kaigai@ak.jp.nec.com>
- */
- #include "libbb.h"
- extern char *selinux_mnt;
- #define OPT_VERBOSE (1 << 0)
- #define OPT_BOOLEAN (1 << 1)
- #define COL_FMT "%-31s "
- static void display_boolean(void)
- {
- char **bools;
- int i, active, pending, nbool;
- if (security_get_boolean_names(&bools, &nbool) < 0)
- return;
- puts("\nPolicy booleans:");
- for (i = 0; i < nbool; i++) {
- active = security_get_boolean_active(bools[i]);
- if (active < 0)
- goto skip;
- pending = security_get_boolean_pending(bools[i]);
- if (pending < 0)
- goto skip;
- printf(COL_FMT "%s",
- bools[i], active == 0 ? "off" : "on");
- if (active != pending)
- printf(" (%sactivate pending)", pending == 0 ? "in" : "");
- bb_putchar('\n');
- skip:
- if (ENABLE_FEATURE_CLEAN_UP)
- free(bools[i]);
- }
- if (ENABLE_FEATURE_CLEAN_UP)
- free(bools);
- }
- static void read_config(char **pc, int npc, char **fc, int nfc)
- {
- char buf[256];
- FILE *fp;
- int pc_ofs = 0, fc_ofs = 0, section = -1;
- pc[0] = fc[0] = NULL;
- fp = fopen("/etc/sestatus.conf", "rb");
- if (fp == NULL)
- return;
- while (fgets(buf, sizeof(buf), fp) != NULL) {
- int i, c;
- /* kills comments */
- for (i = 0; (c = buf[i]) != '\0'; i++) {
- if (c == '#') {
- buf[i] = '\0';
- break;
- }
- }
- trim(buf);
- if (buf[0] == '\0')
- continue;
- if (strcmp(buf, "[process]") == 0) {
- section = 1;
- } else if (strcmp(buf, "[files]") == 0) {
- section = 2;
- } else {
- if (section == 1 && pc_ofs < npc -1) {
- pc[pc_ofs++] = xstrdup(buf);
- pc[pc_ofs] = NULL;
- } else if (section == 2 && fc_ofs < nfc - 1) {
- fc[fc_ofs++] = xstrdup(buf);
- fc[fc_ofs] = NULL;
- }
- }
- }
- fclose(fp);
- }
- static void display_verbose(void)
- {
- security_context_t con, _con;
- char *fc[50], *pc[50], *cterm;
- pid_t *pidList;
- int i;
- read_config(pc, ARRAY_SIZE(pc), fc, ARRAY_SIZE(fc));
- /* process contexts */
- puts("\nProcess contexts:");
- /* current context */
- if (getcon(&con) == 0) {
- printf(COL_FMT "%s\n", "Current context:", con);
- if (ENABLE_FEATURE_CLEAN_UP)
- freecon(con);
- }
- /* /sbin/init context */
- if (getpidcon(1, &con) == 0) {
- printf(COL_FMT "%s\n", "Init context:", con);
- if (ENABLE_FEATURE_CLEAN_UP)
- freecon(con);
- }
- /* [process] context */
- for (i = 0; pc[i] != NULL; i++) {
- pidList = find_pid_by_name(bb_basename(pc[i]));
- if (pidList[0] > 0 && getpidcon(pidList[0], &con) == 0) {
- printf(COL_FMT "%s\n", pc[i], con);
- if (ENABLE_FEATURE_CLEAN_UP)
- freecon(con);
- }
- if (ENABLE_FEATURE_CLEAN_UP)
- free(pidList);
- }
- /* files contexts */
- puts("\nFile contexts:");
- cterm = ttyname(0);
- puts(cterm);
- if (cterm && lgetfilecon(cterm, &con) >= 0) {
- printf(COL_FMT "%s\n", "Controlling term:", con);
- if (ENABLE_FEATURE_CLEAN_UP)
- freecon(con);
- }
- for (i=0; fc[i] != NULL; i++) {
- struct stat stbuf;
- if (lgetfilecon(fc[i], &con) < 0)
- continue;
- if (lstat(fc[i], &stbuf) == 0) {
- if (S_ISLNK(stbuf.st_mode)) {
- if (getfilecon(fc[i], &_con) >= 0) {
- printf(COL_FMT "%s -> %s\n", fc[i], _con, con);
- if (ENABLE_FEATURE_CLEAN_UP)
- freecon(_con);
- }
- } else {
- printf(COL_FMT "%s\n", fc[i], con);
- }
- }
- if (ENABLE_FEATURE_CLEAN_UP)
- freecon(con);
- }
- }
- int sestatus_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
- int sestatus_main(int argc ATTRIBUTE_UNUSED, char **argv)
- {
- unsigned opts;
- const char *pol_path;
- int rc;
- opt_complementary = "?0"; /* no arguments are required. */
- opts = getopt32(argv, "vb");
- /* SELinux status: line */
- rc = is_selinux_enabled();
- if (rc < 0)
- goto error;
- printf(COL_FMT "%s\n", "SELinux status:",
- rc == 1 ? "enabled" : "disabled");
- /* SELinuxfs mount: line */
- if (!selinux_mnt)
- goto error;
- printf(COL_FMT "%s\n", "SELinuxfs mount:",
- selinux_mnt);
- /* Current mode: line */
- rc = security_getenforce();
- if (rc < 0)
- goto error;
- printf(COL_FMT "%s\n", "Current mode:",
- rc == 0 ? "permissive" : "enforcing");
- /* Mode from config file: line */
- if (selinux_getenforcemode(&rc) != 0)
- goto error;
- printf(COL_FMT "%s\n", "Mode from config file:",
- rc < 0 ? "disabled" : (rc == 0 ? "permissive" : "enforcing"));
- /* Policy version: line */
- rc = security_policyvers();
- if (rc < 0)
- goto error;
- printf(COL_FMT "%u\n", "Policy version:", rc);
- /* Policy from config file: line */
- pol_path = selinux_policy_root();
- if (!pol_path)
- goto error;
- printf(COL_FMT "%s\n", "Policy from config file:",
- bb_basename(pol_path));
- if (opts & OPT_BOOLEAN)
- display_boolean();
- if (opts & OPT_VERBOSE)
- display_verbose();
- return 0;
- error:
- bb_perror_msg_and_die("libselinux returns unknown state");
- }
|