aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJeff Vander Stoep <jeffv@google.com>2015-06-18 23:34:00 +0000
committerAndroid (Google) Code Review <android-gerrit@google.com>2015-06-18 23:34:00 +0000
commit7d48e4a4a2c77a7cbb8f74af34c85563c2c1d81c (patch)
tree582ea2c2fc0b5232c2b3f6e832614b5708c73031
parentf33298730c2535fc791a8908f79dacad8b28b1d8 (diff)
parent0222ca0742188189fb1ab8b700be7bd210e2f3f7 (diff)
downloadselinux-marshmallow-dr1.6-release.tar.gz
-rwxr-xr-xprebuilts/bin/seinfo10
-rwxr-xr-xprebuilts/bin/seinfo.py298
2 files changed, 308 insertions, 0 deletions
diff --git a/prebuilts/bin/seinfo b/prebuilts/bin/seinfo
new file mode 100755
index 00000000..7d8e9187
--- /dev/null
+++ b/prebuilts/bin/seinfo
@@ -0,0 +1,10 @@
+#!/bin/sh
+
+unamestr=`uname`
+if [ "$unamestr" = "Linux" -o "$unamestr" = "linux" ]; then
+ export LD_LIBRARY_PATH=$ANDROID_BUILD_TOP/external/selinux/prebuilts/lib
+ export PYTHONPATH=$ANDROID_BUILD_TOP/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages
+ exec python $ANDROID_BUILD_TOP/external/selinux/prebuilts/bin/seinfo.py "$@"
+else
+ echo "seinfo is only supported on linux"
+fi
diff --git a/prebuilts/bin/seinfo.py b/prebuilts/bin/seinfo.py
new file mode 100755
index 00000000..c682d995
--- /dev/null
+++ b/prebuilts/bin/seinfo.py
@@ -0,0 +1,298 @@
+#!/usr/bin/python
+# Copyright 2014-2015, Tresys Technology, LLC
+#
+# This file is part of SETools.
+#
+# SETools is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 2 of the License, or
+# (at your option) any later version.
+#
+# SETools is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with SETools. If not, see <http://www.gnu.org/licenses/>.
+#
+
+from __future__ import print_function
+import setools
+import argparse
+import sys
+import logging
+
+
+def expand_attr(attr):
+ """Render type and role attributes."""
+ items = "\n\t".join(sorted(str(i) for i in attr.expand()))
+ contents = items if items else "<empty set>"
+ return "{0}\n\t{1}".format(attr.statement(), contents)
+
+parser = argparse.ArgumentParser(
+ description="SELinux policy information tool.")
+parser.add_argument("--version", action="version", version=setools.__version__)
+parser.add_argument("policy", help="Path to the SELinux policy to query.", nargs="?")
+parser.add_argument("-x", "--expand", action="store_true",
+ help="Print additional information about the specified components.")
+parser.add_argument("--flat", help="Print without item count nor indentation.",
+ dest="flat", default=False, action="store_true")
+parser.add_argument("-v", "--verbose", action="store_true",
+ help="Print extra informational messages")
+parser.add_argument("--debug", action="store_true", dest="debug", help="Enable debugging.")
+
+queries = parser.add_argument_group("Component Queries")
+queries.add_argument("-a", "--attribute", help="Print type attributes.", dest="typeattrquery",
+ nargs='?', const=True, metavar="ATTR")
+queries.add_argument("-b", "--bool", help="Print Booleans.", dest="boolquery",
+ nargs='?', const=True, metavar="BOOL")
+queries.add_argument("-c", "--class", help="Print object classes.", dest="classquery",
+ nargs='?', const=True, metavar="CLASS")
+queries.add_argument("-r", "--role", help="Print roles.", dest="rolequery",
+ nargs='?', const=True, metavar="ROLE")
+queries.add_argument("-t", "--type", help="Print types.", dest="typequery",
+ nargs='?', const=True, metavar="TYPE")
+queries.add_argument("-u", "--user", help="Print users.", dest="userquery",
+ nargs='?', const=True, metavar="USER")
+queries.add_argument("--category", help="Print MLS categories.", dest="mlscatsquery",
+ nargs='?', const=True, metavar="CAT")
+queries.add_argument("--common", help="Print common permission set.", dest="commonquery",
+ nargs='?', const=True, metavar="COMMON")
+queries.add_argument("--constrain", help="Print constraints.", dest="constraintquery",
+ nargs='?', const=True, metavar="CLASS")
+queries.add_argument("--fs_use", help="Print fs_use statements.", dest="fsusequery",
+ nargs='?', const=True, metavar="FS_TYPE")
+queries.add_argument("--genfscon", help="Print genfscon statements.", dest="genfsconquery",
+ nargs='?', const=True, metavar="FS_TYPE")
+queries.add_argument("--initialsid", help="Print initial SIDs (contexts).", dest="initialsidquery",
+ nargs='?', const=True, metavar="NAME")
+queries.add_argument("--netifcon", help="Print netifcon statements.", dest="netifconquery",
+ nargs='?', const=True, metavar="DEVICE")
+queries.add_argument("--nodecon", help="Print nodecon statements.", dest="nodeconquery",
+ nargs='?', const=True, metavar="ADDR")
+queries.add_argument("--permissive", help="Print permissive types.", dest="permissivequery",
+ nargs='?', const=True, metavar="TYPE")
+queries.add_argument("--polcap", help="Print policy capabilities.", dest="polcapquery",
+ nargs='?', const=True, metavar="NAME")
+queries.add_argument("--portcon", help="Print portcon statements.", dest="portconquery",
+ nargs='?', const=True, metavar="PORTNUM[-PORTNUM]")
+queries.add_argument("--sensitivity", help="Print MLS sensitivities.", dest="mlssensquery",
+ nargs='?', const=True, metavar="SENS")
+queries.add_argument("--validatetrans", help="Print validatetrans.", dest="validatetransquery",
+ nargs='?', const=True, metavar="CLASS")
+queries.add_argument("--all", help="Print all of the above.",
+ dest="all", default=False, action="store_true")
+
+args = parser.parse_args()
+
+if args.debug:
+ logging.basicConfig(level=logging.DEBUG,
+ format='%(asctime)s|%(levelname)s|%(name)s|%(message)s')
+elif args.verbose:
+ logging.basicConfig(level=logging.INFO, format='%(message)s')
+else:
+ logging.basicConfig(level=logging.WARNING, format='%(message)s')
+
+try:
+ p = setools.SELinuxPolicy(args.policy)
+ components = []
+
+ if args.boolquery or args.all:
+ q = setools.BoolQuery(p)
+ if isinstance(args.boolquery, str):
+ q.name = args.boolquery
+
+ components.append(("Booleans", q, lambda x: x.statement()))
+
+ if args.mlscatsquery or args.all:
+ q = setools.CategoryQuery(p)
+ if isinstance(args.mlscatsquery, str):
+ q.name = args.mlscatsquery
+
+ components.append(("Categories", q, lambda x: x.statement()))
+
+ if args.classquery or args.all:
+ q = setools.ObjClassQuery(p)
+ if isinstance(args.classquery, str):
+ q.name = args.classquery
+
+ components.append(("Classes", q, lambda x: x.statement()))
+
+ if args.commonquery or args.all:
+ q = setools.CommonQuery(p)
+ if isinstance(args.commonquery, str):
+ q.name = args.commonquery
+
+ components.append(("Commons", q, lambda x: x.statement()))
+
+ if args.constraintquery or args.all:
+ q = setools.ConstraintQuery(p, ruletype=["constrain", "mlsconstrain"])
+ if isinstance(args.constraintquery, str):
+ q.tclass = [args.constraintquery]
+
+ components.append(("Constraints", q, lambda x: x.statement()))
+
+ if args.fsusequery or args.all:
+ q = setools.FSUseQuery(p)
+ if isinstance(args.fsusequery, str):
+ q.fs = args.fsusequery
+
+ components.append(("Fs_use", q, lambda x: x.statement()))
+
+ if args.genfsconquery or args.all:
+ q = setools.GenfsconQuery(p)
+ if isinstance(args.genfsconquery, str):
+ q.fs = args.genfsconquery
+
+ components.append(("Genfscon", q, lambda x: x.statement()))
+
+ if args.initialsidquery or args.all:
+ q = setools.InitialSIDQuery(p)
+ if isinstance(args.initialsidquery, str):
+ q.name = args.initialsidquery
+
+ components.append(("Initial SIDs", q, lambda x: x.statement()))
+
+ if args.netifconquery or args.all:
+ q = setools.NetifconQuery(p)
+ if isinstance(args.netifconquery, str):
+ q.name = args.netifconquery
+
+ components.append(("Netifcon", q, lambda x: x.statement()))
+
+ if args.nodeconquery or args.all:
+ q = setools.NodeconQuery(p)
+ if isinstance(args.nodeconquery, str):
+ q.network = args.nodeconquery
+
+ components.append(("Nodecon", q, lambda x: x.statement()))
+
+ if args.permissivequery or args.all:
+ q = setools.TypeQuery(p, permissive=True, match_permissive=True)
+ if isinstance(args.permissivequery, str):
+ q.name = args.permissivequery
+
+ components.append(("Permissive Types", q, lambda x: x.statement()))
+
+ if args.polcapquery or args.all:
+ q = setools.PolCapQuery(p)
+ if isinstance(args.polcapquery, str):
+ q.name = args.polcapquery
+
+ components.append(("Polcap", q, lambda x: x.statement()))
+
+ if args.portconquery or args.all:
+ q = setools.PortconQuery(p)
+ if isinstance(args.portconquery, str):
+ try:
+ ports = [int(i) for i in args.portconquery.split("-")]
+ except ValueError:
+ parser.error("Enter a port number or range, e.g. 22 or 6000-6020")
+
+ if len(ports) == 2:
+ q.ports = ports
+ elif len(ports) == 1:
+ q.ports = (ports[0], ports[0])
+ else:
+ parser.error("Enter a port number or range, e.g. 22 or 6000-6020")
+
+ components.append(("Portcon", q, lambda x: x.statement()))
+
+ if args.rolequery or args.all:
+ q = setools.RoleQuery(p)
+ if isinstance(args.rolequery, str):
+ q.name = args.rolequery
+
+ components.append(("Roles", q, lambda x: x.statement()))
+
+ if args.mlssensquery or args.all:
+ q = setools.SensitivityQuery(p)
+ if isinstance(args.mlssensquery, str):
+ q.name = args.mlssensquery
+
+ components.append(("Sensitivities", q, lambda x: x.statement()))
+
+ if args.typequery or args.all:
+ q = setools.TypeQuery(p)
+ if isinstance(args.typequery, str):
+ q.name = args.typequery
+
+ components.append(("Types", q, lambda x: x.statement()))
+
+ if args.typeattrquery or args.all:
+ q = setools.TypeAttributeQuery(p)
+ if isinstance(args.typeattrquery, str):
+ q.name = args.typeattrquery
+
+ components.append(("Type Attributes", q, expand_attr))
+
+ if args.userquery or args.all:
+ q = setools.UserQuery(p)
+ if isinstance(args.userquery, str):
+ q.name = args.userquery
+
+ components.append(("Users", q, lambda x: x.statement()))
+
+ if args.validatetransquery or args.all:
+ q = setools.ConstraintQuery(p, ruletype=["validatetrans", "mlsvalidatetrans"])
+ if isinstance(args.validatetransquery, str):
+ q.tclass = [args.validatetransquery]
+
+ components.append(("Validatetrans", q, lambda x: x.statement()))
+
+ if (not components or args.all) and not args.flat:
+ mls = "enabled" if p.mls else "disabled"
+
+ print("Statistics for policy file: {0}".format(p))
+ print("Policy Version: {0} (MLS {1})".format(p.version, mls))
+ print(" Classes: {0:7} Permissions: {1:7}".format(
+ p.class_count, p.permission_count))
+ print(" Sensitivities: {0:7} Categories: {1:7}".format(
+ p.level_count, p.category_count))
+ print(" Types: {0:7} Attributes: {1:7}".format(
+ p.type_count, p.type_attribute_count))
+ print(" Users: {0:7} Roles: {1:7}".format(
+ p.user_count, p.role_count))
+ print(" Booleans: {0:7} Cond. Expr.: {1:7}".format(
+ p.boolean_count, p.conditional_count))
+ print(" Allow: {0:7} Neverallow: {1:7}".format(
+ p.allow_count, p.neverallow_count))
+ print(" Auditallow: {0:7} Dontaudit: {1:7}".format(
+ p.auditallow_count, p.dontaudit_count))
+ print(" Type_trans: {0:7} Type_change: {1:7}".format(
+ p.type_transition_count, p.type_change_count))
+ print(" Type_member: {0:7} Range_trans: {1:7}".format(
+ p.type_member_count, p.range_transition_count))
+ print(" Role allow: {0:7} Role_trans: {1:7}".format(
+ p.role_allow_count, p.role_transition_count))
+ print(" Constraints: {0:7} Validatetrans: {1:7}".format(
+ p.constraint_count, p.validatetrans_count))
+ print(" MLS Constrain: {0:7} MLS Val. Tran: {1:7}".format(
+ p.mlsconstraint_count, p.mlsvalidatetrans_count))
+ print(" Initial SIDs: {0:7} Fs_use: {1:7}".format(
+ p.initialsids_count, p.fs_use_count))
+ print(" Genfscon: {0:7} Portcon: {1:7}".format(
+ p.genfscon_count, p.portcon_count))
+ print(" Netifcon: {0:7} Nodecon: {1:7}".format(
+ p.netifcon_count, p.nodecon_count))
+ print(" Permissives: {0:7} Polcap: {1:7}".format(
+ p.permissives_count, p.polcap_count))
+
+ for desc, component, expander in components:
+ results = sorted(component.results())
+ if not args.flat:
+ print("\n{0}: {1}".format(desc, len(results)))
+ for item in results:
+ result = expander(item) if args.expand else item
+ strfmt = " {0}" if not args.flat else "{0}"
+ print(strfmt.format(result))
+
+except Exception as err:
+ if args.debug:
+ import traceback
+ traceback.print_exc()
+ else:
+ print(err)
+
+ sys.exit(-1)