blob: 1a02a6b0c76f9917a617d22154d5bf7e85b819e3 [file] [log] [blame]
Denis Vlasenko705eaf82007-11-22 01:10:41 +00001/*
2 * sestatus -- displays the status of SELinux
3 *
4 * Ported to busybox: KaiGai Kohei <kaigai@ak.jp.nec.com>
5 *
6 * Copyright (C) KaiGai Kohei <kaigai@ak.jp.nec.com>
Denis Vlasenkodb12d1d2008-12-07 00:52:58 +00007 *
8 * Licensed under GPLv2, see file LICENSE in this tarball for details.
Denis Vlasenko705eaf82007-11-22 01:10:41 +00009 */
10
11#include "libbb.h"
12
13extern char *selinux_mnt;
14
15#define OPT_VERBOSE (1 << 0)
16#define OPT_BOOLEAN (1 << 1)
17
18#define COL_FMT "%-31s "
19
20static void display_boolean(void)
21{
22 char **bools;
23 int i, active, pending, nbool;
24
25 if (security_get_boolean_names(&bools, &nbool) < 0)
26 return;
27
28 puts("\nPolicy booleans:");
29
30 for (i = 0; i < nbool; i++) {
31 active = security_get_boolean_active(bools[i]);
32 if (active < 0)
33 goto skip;
34 pending = security_get_boolean_pending(bools[i]);
35 if (pending < 0)
36 goto skip;
37 printf(COL_FMT "%s",
38 bools[i], active == 0 ? "off" : "on");
39 if (active != pending)
40 printf(" (%sactivate pending)", pending == 0 ? "in" : "");
41 bb_putchar('\n');
42 skip:
43 if (ENABLE_FEATURE_CLEAN_UP)
44 free(bools[i]);
45 }
46 if (ENABLE_FEATURE_CLEAN_UP)
47 free(bools);
48}
49
50static void read_config(char **pc, int npc, char **fc, int nfc)
51{
Denis Vlasenkoa34f1ed2008-07-20 17:48:59 +000052 char *buf;
53 parser_t *parser;
Denis Vlasenko705eaf82007-11-22 01:10:41 +000054 int pc_ofs = 0, fc_ofs = 0, section = -1;
55
56 pc[0] = fc[0] = NULL;
57
Denis Vlasenkoa34f1ed2008-07-20 17:48:59 +000058 parser = config_open("/etc/sestatus.conf");
Denis Vlasenko084266e2008-07-26 23:08:31 +000059 while (config_read(parser, &buf, 1, 1, "# \t", PARSE_NORMAL)) {
Denis Vlasenko705eaf82007-11-22 01:10:41 +000060 if (strcmp(buf, "[process]") == 0) {
61 section = 1;
62 } else if (strcmp(buf, "[files]") == 0) {
63 section = 2;
64 } else {
65 if (section == 1 && pc_ofs < npc -1) {
Denis Vlasenkoc4523c22008-03-28 02:24:59 +000066 pc[pc_ofs++] = xstrdup(buf);
Denis Vlasenko705eaf82007-11-22 01:10:41 +000067 pc[pc_ofs] = NULL;
68 } else if (section == 2 && fc_ofs < nfc - 1) {
Denis Vlasenkoc4523c22008-03-28 02:24:59 +000069 fc[fc_ofs++] = xstrdup(buf);
Denis Vlasenko705eaf82007-11-22 01:10:41 +000070 fc[fc_ofs] = NULL;
71 }
72 }
73 }
Denis Vlasenkoa34f1ed2008-07-20 17:48:59 +000074 config_close(parser);
Denis Vlasenko705eaf82007-11-22 01:10:41 +000075}
76
77static void display_verbose(void)
78{
79 security_context_t con, _con;
80 char *fc[50], *pc[50], *cterm;
81 pid_t *pidList;
82 int i;
83
84 read_config(pc, ARRAY_SIZE(pc), fc, ARRAY_SIZE(fc));
85
86 /* process contexts */
87 puts("\nProcess contexts:");
88
89 /* current context */
90 if (getcon(&con) == 0) {
91 printf(COL_FMT "%s\n", "Current context:", con);
92 if (ENABLE_FEATURE_CLEAN_UP)
93 freecon(con);
94 }
95 /* /sbin/init context */
96 if (getpidcon(1, &con) == 0) {
97 printf(COL_FMT "%s\n", "Init context:", con);
98 if (ENABLE_FEATURE_CLEAN_UP)
99 freecon(con);
100 }
101
102 /* [process] context */
103 for (i = 0; pc[i] != NULL; i++) {
104 pidList = find_pid_by_name(bb_basename(pc[i]));
105 if (pidList[0] > 0 && getpidcon(pidList[0], &con) == 0) {
106 printf(COL_FMT "%s\n", pc[i], con);
107 if (ENABLE_FEATURE_CLEAN_UP)
108 freecon(con);
109 }
110 if (ENABLE_FEATURE_CLEAN_UP)
111 free(pidList);
112 }
113
114 /* files contexts */
115 puts("\nFile contexts:");
116
Denis Vlasenko4e12b1a2008-12-23 23:36:47 +0000117 cterm = xmalloc_ttyname(0);
118//FIXME: if cterm == NULL, we segfault!??
Denis Vlasenko705eaf82007-11-22 01:10:41 +0000119 puts(cterm);
120 if (cterm && lgetfilecon(cterm, &con) >= 0) {
121 printf(COL_FMT "%s\n", "Controlling term:", con);
122 if (ENABLE_FEATURE_CLEAN_UP)
123 freecon(con);
124 }
125
Denis Vlasenko4e12b1a2008-12-23 23:36:47 +0000126 for (i = 0; fc[i] != NULL; i++) {
Denis Vlasenko705eaf82007-11-22 01:10:41 +0000127 struct stat stbuf;
128
129 if (lgetfilecon(fc[i], &con) < 0)
130 continue;
131 if (lstat(fc[i], &stbuf) == 0) {
132 if (S_ISLNK(stbuf.st_mode)) {
133 if (getfilecon(fc[i], &_con) >= 0) {
134 printf(COL_FMT "%s -> %s\n", fc[i], _con, con);
135 if (ENABLE_FEATURE_CLEAN_UP)
136 freecon(_con);
137 }
138 } else {
139 printf(COL_FMT "%s\n", fc[i], con);
140 }
141 }
142 if (ENABLE_FEATURE_CLEAN_UP)
143 freecon(con);
144 }
145}
146
147int sestatus_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
Denis Vlasenkoa60f84e2008-07-05 09:18:54 +0000148int sestatus_main(int argc UNUSED_PARAM, char **argv)
Denis Vlasenko705eaf82007-11-22 01:10:41 +0000149{
150 unsigned opts;
151 const char *pol_path;
152 int rc;
153
154 opt_complementary = "?0"; /* no arguments are required. */
155 opts = getopt32(argv, "vb");
156
157 /* SELinux status: line */
158 rc = is_selinux_enabled();
159 if (rc < 0)
160 goto error;
161 printf(COL_FMT "%s\n", "SELinux status:",
162 rc == 1 ? "enabled" : "disabled");
163
164 /* SELinuxfs mount: line */
165 if (!selinux_mnt)
166 goto error;
167 printf(COL_FMT "%s\n", "SELinuxfs mount:",
168 selinux_mnt);
169
170 /* Current mode: line */
171 rc = security_getenforce();
172 if (rc < 0)
173 goto error;
174 printf(COL_FMT "%s\n", "Current mode:",
175 rc == 0 ? "permissive" : "enforcing");
176
177 /* Mode from config file: line */
178 if (selinux_getenforcemode(&rc) != 0)
179 goto error;
180 printf(COL_FMT "%s\n", "Mode from config file:",
181 rc < 0 ? "disabled" : (rc == 0 ? "permissive" : "enforcing"));
182
183 /* Policy version: line */
184 rc = security_policyvers();
185 if (rc < 0)
186 goto error;
187 printf(COL_FMT "%u\n", "Policy version:", rc);
188
189 /* Policy from config file: line */
190 pol_path = selinux_policy_root();
191 if (!pol_path)
192 goto error;
193 printf(COL_FMT "%s\n", "Policy from config file:",
194 bb_basename(pol_path));
195
196 if (opts & OPT_BOOLEAN)
197 display_boolean();
198 if (opts & OPT_VERBOSE)
199 display_verbose();
200
201 return 0;
202
203 error:
204 bb_perror_msg_and_die("libselinux returns unknown state");
205}