Searched refs:pol (Results 1 – 4 of 4) sorted by relevance
/system/sepolicy/tests/ |
D | sepolicy_tests.py | 11 def TestDataTypeViolations(pol): argument 12 return pol.AssertPathTypesHaveAttr(["/data/"], [], "data_file_type") 14 def TestSystemTypeViolations(pol): argument 15 return pol.AssertPathTypesHaveAttr(["/system/"], [], "system_file_type") 17 def TestProcTypeViolations(pol): argument 18 return pol.AssertGenfsFilesystemTypesHaveAttr("proc", "proc_type") 20 def TestSysfsTypeViolations(pol): argument 21 ret = pol.AssertGenfsFilesystemTypesHaveAttr("sysfs", "sysfs_type") 22 ret += pol.AssertPathTypesHaveAttr(["/sys/"], ["/sys/kernel/debug/", 26 def TestDebugfsTypeViolations(pol): argument [all …]
|
D | treble_sepolicy_tests.py | 56 pol = None variable 67 def GetAllDomains(pol): argument 69 for result in pol.QueryTypeAttribute("domain", True): 128 def GetDomainEntrypoints(pol): argument 130 for x in pol.QueryExpandedTERule(tclass=set(["file"]), perms=set(["entrypoint"])): 140 entrypointpath = pol.QueryFc(x.tctx) 147 def GetAttributes(pol): argument 150 for result in pol.QueryTypeAttribute(domain, False): 153 def GetAllTypes(pol, oldpol): argument 156 alltypes = pol.GetAllTypes(False) [all …]
|
D | searchpolicy.py | 38 pol = policy.Policy(args.policy, None, args.libpath) variable 57 TERules = pol.QueryTERule(scontext=scontext,
|
/system/sepolicy/tools/ |
D | check_seapp.c | 170 static policy_info pol = { variable 392 if (!pol.policy_file) { in validate_selinux_type() 396 if(!check_type(pol.db, value)) { in validate_selinux_type() 410 if (!pol.policy_file) { in validate_selinux_level() 414 int ret = sepol_mls_check(pol.handle, pol.db, value); in validate_selinux_level() 884 if (pol.policy_file_name) { in init() 885 log_info("Opening policy file: %s\n", pol.policy_file_name); in init() 886 pol.policy_file = fopen(pol.policy_file_name, "rb"); in init() 887 if (!pol.policy_file) { in init() 889 pol.policy_file_name, strerror(errno)); in init() [all …]
|