Magisk/sepolicy-inject.h

63 lines
1.7 KiB
C
Raw Normal View History

2017-01-31 17:51:45 +01:00
#ifndef SEPOLICY_INJECT_H
#define SEPOLICY_INJECT_H
#define ALL NULL
#include <getopt.h>
#include <unistd.h>
#include <stdlib.h>
#include <sys/mman.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <stdio.h>
2017-02-03 18:58:15 +01:00
#include <limits.h>
#include <string.h>
2017-01-31 17:51:45 +01:00
#include <sepol/debug.h>
#include <sepol/policydb/policydb.h>
#include <sepol/policydb/expand.h>
#include <sepol/policydb/link.h>
#include <sepol/policydb/services.h>
#include <sepol/policydb/avrule_block.h>
#include <sepol/policydb/conditional.h>
#include <sepol/policydb/constraint.h>
// Global policydb
policydb_t *policy;
// sepolicy manipulation functions
int load_policy(char *filename, policydb_t *policydb, struct policy_file *pf);
void create_domain(char *d);
int add_file_transition(char *srcS, char *origS, char *tgtS, char *c, char* filename);
int add_transition(char *srcS, char *origS, char *tgtS, char *c);
2017-02-03 18:58:15 +01:00
int add_typeattribute(char *domainS, char *typeS);
2017-01-31 17:51:45 +01:00
int add_rule(char *s, char *t, char *c, char *p, int effect, int not);
int add_typerule(char *s, char *targetAttribute, char **minusses, char *c, char *p, int effect, int not);
int live_patch();
// Handy functions
void allow(char *s, char *t, char *c, char *p);
void deny(char *s, char *t, char *c, char *p);
void auditallow(char *s, char *t, char *c, char *p);
void auditdeny(char *s, char *t, char *c, char *p);
void permissive(char *s);
void enforce(char *s);
void attradd(char *s, char *a);
int exists(char *source);
2017-02-03 18:58:15 +01:00
// Vector of char*
struct vector {
size_t size;
size_t cap;
char **data;
};
void vec_init(struct vector *v);
void vec_push_back(struct vector *v, char* s);
void vec_destroy(struct vector *v);
2017-01-31 17:51:45 +01:00
// Built in rules
void su_rules();
2017-02-01 16:07:37 +01:00
void min_rules();
2017-01-31 17:51:45 +01:00
#endif