Home
last modified time | relevance | path

Searched refs:pol (Results 1 – 4 of 4) sorted by relevance

/system/sepolicy/tests/
Dsepolicy_tests.py11 def TestDataTypeViolations(pol): argument
12 return pol.AssertPathTypesHaveAttr(["/data/"], [], "data_file_type")
14 def TestSystemTypeViolations(pol): argument
15 return pol.AssertPathTypesHaveAttr(["/system/"], [], "system_file_type")
17 def TestProcTypeViolations(pol): argument
18 return pol.AssertGenfsFilesystemTypesHaveAttr("proc", "proc_type")
20 def TestSysfsTypeViolations(pol): argument
21 ret = pol.AssertGenfsFilesystemTypesHaveAttr("sysfs", "sysfs_type")
22 ret += pol.AssertPathTypesHaveAttr(["/sys/"], ["/sys/kernel/debug/",
26 def TestDebugfsTypeViolations(pol): argument
[all …]
Dtreble_sepolicy_tests.py56 pol = None variable
67 def GetAllDomains(pol): argument
69 for result in pol.QueryTypeAttribute("domain", True):
128 def GetDomainEntrypoints(pol): argument
130 for x in pol.QueryExpandedTERule(tclass=set(["file"]), perms=set(["entrypoint"])):
140 entrypointpath = pol.QueryFc(x.tctx)
147 def GetAttributes(pol): argument
150 for result in pol.QueryTypeAttribute(domain, False):
153 def GetAllTypes(pol, oldpol): argument
156 alltypes = pol.GetAllTypes(False)
[all …]
Dsearchpolicy.py38 pol = policy.Policy(args.policy, None, args.libpath) variable
57 TERules = pol.QueryTERule(scontext=scontext,
/system/sepolicy/tools/
Dcheck_seapp.c170 static policy_info pol = { variable
392 if (!pol.policy_file) { in validate_selinux_type()
396 if(!check_type(pol.db, value)) { in validate_selinux_type()
410 if (!pol.policy_file) { in validate_selinux_level()
414 int ret = sepol_mls_check(pol.handle, pol.db, value); in validate_selinux_level()
884 if (pol.policy_file_name) { in init()
885 log_info("Opening policy file: %s\n", pol.policy_file_name); in init()
886 pol.policy_file = fopen(pol.policy_file_name, "rb"); in init()
887 if (!pol.policy_file) { in init()
889 pol.policy_file_name, strerror(errno)); in init()
[all …]