Searched refs:getcon (Results 1 – 9 of 9) sorted by relevance
31 if (getcon(&context) != 0) { in BenchmarkSuccess()
86 if (getcon(&ctx) == -1) { in GetSecurityContext()
51 if (getcon(&ctx) == -1) { in GetSecurityContext()
240 if (getcon(&ctx) == -1) { in GetSecurityContext()
84 if (getcon(&raw_con) == -1) { in ComputeContextFromExecutable()
235 pub fn getcon() -> Result<Context> { in getcon() function240 match unsafe { selinux::getcon(&mut con) } { in getcon()658 let context = getcon()?; in check_context()807 assert_eq!(getpidcon(std::process::id() as i32).unwrap(), getcon().unwrap()); in test_getpidcon()
37 use selinux::getcon;39 use tests::test_getcon as getcon;266 let target_context = getcon().context("check_keystore_permission: getcon failed.")?; in check_keystore_permission()289 Domain::APP => getcon().context("check_grant_permission: getcon failed.")?, in check_grant_permission()358 getcon().context(ks_err!("getcon failed."))? in check_key_permission()484 let context = selinux::getcon()?; in check_context()
360 run_as(selinux::getcon().unwrap().to_str().unwrap(), getuid(), getgid(), || { in test_run_as_panics_on_closure_panic()379 assert_eq!(TARGET_CTX, selinux::getcon().unwrap().to_str().unwrap()); in test_transition_to_untrusted_app()428 assert_eq!(TARGET_CTX, selinux::getcon().unwrap().to_str().unwrap()); in test_run_as_child()
43 if (getcon(&mSeContext) != 0) { in AccessControl()