1sesearch(1) SETools: SELinux Policy Analysis Tools sesearch(1)
2
3
4
6 sesearch - SELinux policy query tool
7
8
10 sesearch [OPTIONS] [OPTIONS] [EXPRESSION] [POLICY]
11
12
14 sesearch allows the user to search the rules in a SELinux policy.
15
16
18 A single file containing a binary policy. This file is usually named by
19 version on Linux systems, for example, policy.30. This file is usually
20 named sepolicy on Android systems. If no policy file is provided,
21 sesearch will search for the policy running on the current system. If
22 no policy can be found, sesearch will print an error message and exit.
23
24
26 The user may specify an expression containing values for a given
27 field(s) in a rule. If no expression is specified or if none of the
28 specified fields apply to a given rule type, all rules of that type are
29 considered to match the expression.
30
31
32 Type Enforcement Rule Types
33 -A Find allow and allowxperm rules.
34
35 --allow
36 Find allow rules.
37
38 --auditallow
39 Find auditallow rules.
40
41 --dontaudit
42 Find dontaudit rules.
43
44 --neverallow
45 Find neverallow rules.
46
47 --allowxperm
48 Find allowxperm rules.
49
50 --auditallowxperm
51 Find auditallowxperm rules.
52
53 --dontauditxperm
54 Find dontauditxperm rules.
55
56 --neverallowxperm
57 Find neverallowxperm rules.
58
59 -T, --type_trans
60 Find type_transition rules.
61
62 --type_member
63 Find type_member rules.
64
65 --type_change
66 Find type_change rules.
67
68
69 RBAC Rule Types
70 --role_allow
71 Find role allow rules.
72
73 --role_trans
74 Find role_transition rules.
75
76
77 MLS Rule Types
78 --range_trans
79 Find range_transition rules.
80
81
82 Rule Fields
83 -s NAME, --source NAME
84 Find rules with NAME as their source type/role.
85
86 -t NAME, --target NAME
87 Find rules with NAME as their target type/role.
88
89 -D NAME, --default NAME
90 Find rules with NAME as their default type/role/level.
91
92 -c NAME, --class NAME
93 Find rules with NAME as their object class.
94
95 -p P1[,P2,...] --perm P1[,P2...]
96 Find rules with at least one of the specified permissions. Mul‐
97 tiple permissions may be specified as a comma-separated list.
98
99 -b BOOL[,B2,...], --bool BOOL[,B2,...]
100 Find conditional rules with the named Boolean in their condi‐
101 tional expression. Multiple Booleans may be specified as a
102 comma-separated list. This option will include rules in both
103 the true and false lists of the conditional.
104
105
106 Search Options
107 The following additional options modify how the search is performed.
108
109 -ds A matching rule must have the specified source
110 attribute/type/role explicitly, instead of matching by attribute
111 contents.
112
113 -dt A matching rule must have the specified target
114 attribute/type/role explicitly, instead of matching by attribute
115 contents.
116
117 -eb A matching rule must have all specified Booleans, instead of
118 matching any of the specified Boolean.
119
120 -ep A matching rule must have all specified permissions, instead of
121 matching any of the specified permission.
122
123 -rs Use regular expression for matching the source type/role.
124
125 -rt Use regular expression for matching the target type/role.
126
127 -rc Use regular expression for matching the object class.
128
129 -rd Use regular expression for matching the default type/role.
130
131 -rb Use regular expression for matching Booleans.
132
133
135 -h, --help
136 Print help information and exit.
137
138 --version
139 Print version information and exit.
140
141 -v, --verbose
142 Print additional informational messages.
143
144 --debug
145 Enable debugging output.
146
147
149 Chris PeBenito <pebenito@ieee.org>
150
151
153 Please report bugs via the SETools bug tracker,
154 https://github.com/SELinuxProject/setools/issues
155
156
158 apol(1), sediff(1), sedta(1), seinfo(1), seinfoflow(1)
159
160
161
162SELinux Project 2016-02-20 sesearch(1)