Searched refs:setcon (Results 1 – 14 of 14) sorted by relevance
/system/sepolicy/private/ |
D | system_server_startup.te | 14 # Allow system_server_startup to run setcon() and enter the
|
D | runas.te | 33 allow runas non_system_app_set:process dyntransition; # setcon
|
D | simpleperf_app_runner.te | 24 …phemeral_app isolated_app platform_app priv_app untrusted_app_all }:process dyntransition; # setcon
|
D | webview_zygote.te | 107 # Only setcon() transitions, no exec() based transitions, except for crash_dump.
|
D | app_zygote.te | 107 # Only setcon() transitions, no exec() based transitions, except for crash_dump.
|
D | vendor_init.te | 344 # init domain, never via setcon().
|
D | adbd.te | 16 # switches into shell domain using setcon() because the shell executable
|
D | zygote.te | 281 # setcon (dyntransition) to any types other than those associated
|
D | init.te | 788 # kernel domain, never via setcon().
|
D | domain.te | 630 # init starts in kernel domain and switches to init domain via setcon in
|
/system/security/keystore2/src/fuzzers/ |
D | keystore2_unsafe_fuzzer.rs | 29 use keystore2_selinux::{check_access, getpidcon, setcon, Backend, Context, KeystoreKeyBackend}; 233 let _res = setcon(&CString::new(get_valid_cstring_data(set_target)).unwrap());
|
/system/security/keystore2/selinux/src/ |
D | lib.rs | 329 pub fn setcon(target: &CStr) -> std::io::Result<()> { in setcon() function 333 if unsafe { selinux::setcon(target.as_ptr()) } != 0 { in setcon()
|
/system/security/keystore2/test_utils/ |
D | run_as.rs | 45 selinux::setcon(&se_context) in transition()
|
/system/sepolicy/microdroid/system/private/ |
D | domain.te | 315 # init starts in kernel domain and switches to init domain via setcon in
|