>By convention all domains are in the domain attribute so this:

>$ seinfo -x -adomain sepolicy
>   domain


Oh, indeed, thank you very much!

On Tue, Mar 3, 2015 at 9:52 AM, Joshua Brindle <[email protected]>
wrote:

> Elena Reshetova wrote:
>
>> Hi everyone,
>>
>> I have a bit of usual question for this forum.
>>
>> If one is analyzing a binary sepolicy (no access to sources), is there
>> an easy way to find out what types are actually domains?
>>
>> Of course there are many heuristics, like checking subjects of allow
>> rules, dropping all rules that involve attributes, then dropping also
>> rules that would involve only types (like "filesystem associate"), and
>> etc. But if there any easier way?
>>
>> Best Regards,
>> Elena.
>>
>
> By convention all domains are in the domain attribute so this:
>
> $ seinfo -x -adomain sepolicy
>    domain
> ...
>
>
> Should do it for you.
>
_______________________________________________
Seandroid-list mailing list
[email protected]
To unsubscribe, send email to [email protected].
To get help, send an email containing "help" to 
[email protected].

Reply via email to