Magisk/api.c

46 lines
1011 B
C
Raw Normal View History

2017-03-18 08:52:38 +00:00
#include "magiskpolicy.h"
2017-04-15 11:26:29 +00:00
#include "sepolicy.h"
2017-01-31 16:51:45 +00:00
2017-04-15 11:26:29 +00:00
int sepol_allow(char *s, char *t, char *c, char *p) {
return add_rule(s, t, c, p, AVTAB_ALLOWED, 0);
2017-01-31 16:51:45 +00:00
}
2017-04-15 11:26:29 +00:00
int sepol_deny(char *s, char *t, char *c, char *p) {
return add_rule(s, t, c, p, AVTAB_ALLOWED, 1);
2017-01-31 16:51:45 +00:00
}
2017-04-15 11:26:29 +00:00
int sepol_auditallow(char *s, char *t, char *c, char *p) {
return add_rule(s, t, c, p, AVTAB_AUDITALLOW, 0);
2017-01-31 16:51:45 +00:00
}
2017-04-15 11:26:29 +00:00
int sepol_auditdeny(char *s, char *t, char *c, char *p) {
return add_rule(s, t, c, p, AVTAB_AUDITDENY, 0);
2017-01-31 16:51:45 +00:00
}
2017-04-15 11:26:29 +00:00
int sepol_typetrans(char *s, char *t, char *c, char *d, char *o) {
if (o == NULL)
return add_transition(s, t, c, d);
else
return add_file_transition(s, t, c, d, o);
2017-01-31 16:51:45 +00:00
}
2017-04-15 11:26:29 +00:00
int sepol_permissive(char *s) {
return set_domain_state(s, 1);
2017-01-31 16:51:45 +00:00
}
2017-04-15 11:26:29 +00:00
int sepol_enforce(char *s) {
return set_domain_state(s, 0);
}
2017-04-15 11:26:29 +00:00
int sepol_create(char *s) {
return create_domain(s);
}
2017-04-15 11:26:29 +00:00
int sepol_attradd(char *s, char *a) {
return add_typeattribute(s, a);
2017-01-31 16:51:45 +00:00
}
2017-04-15 11:26:29 +00:00
int sepol_exists(char* source) {
2017-01-31 16:51:45 +00:00
return !! hashtab_search(policy->p_types.table, source);
}