>By convention all domains are in the domain attribute so this: >$ seinfo -x -adomain sepolicy > domain
Oh, indeed, thank you very much! On Tue, Mar 3, 2015 at 9:52 AM, Joshua Brindle <[email protected]> wrote: > Elena Reshetova wrote: > >> Hi everyone, >> >> I have a bit of usual question for this forum. >> >> If one is analyzing a binary sepolicy (no access to sources), is there >> an easy way to find out what types are actually domains? >> >> Of course there are many heuristics, like checking subjects of allow >> rules, dropping all rules that involve attributes, then dropping also >> rules that would involve only types (like "filesystem associate"), and >> etc. But if there any easier way? >> >> Best Regards, >> Elena. >> > > By convention all domains are in the domain attribute so this: > > $ seinfo -x -adomain sepolicy > domain > ... > > > Should do it for you. >
_______________________________________________ Seandroid-list mailing list [email protected] To unsubscribe, send email to [email protected]. To get help, send an email containing "help" to [email protected].
