Home
last modified time | relevance | path

Searched refs:setcon (Results 1 – 14 of 14) sorted by relevance

/system/sepolicy/private/
Dsystem_server_startup.te14 # Allow system_server_startup to run setcon() and enter the
Drunas.te33 allow runas non_system_app_set:process dyntransition; # setcon
Dsimpleperf_app_runner.te24 …phemeral_app isolated_app platform_app priv_app untrusted_app_all }:process dyntransition; # setcon
Dwebview_zygote.te107 # Only setcon() transitions, no exec() based transitions, except for crash_dump.
Dapp_zygote.te107 # Only setcon() transitions, no exec() based transitions, except for crash_dump.
Dvendor_init.te344 # init domain, never via setcon().
Dadbd.te16 # switches into shell domain using setcon() because the shell executable
Dzygote.te281 # setcon (dyntransition) to any types other than those associated
Dinit.te788 # kernel domain, never via setcon().
Ddomain.te630 # init starts in kernel domain and switches to init domain via setcon in
/system/security/keystore2/src/fuzzers/
Dkeystore2_unsafe_fuzzer.rs29 use keystore2_selinux::{check_access, getpidcon, setcon, Backend, Context, KeystoreKeyBackend};
233 let _res = setcon(&CString::new(get_valid_cstring_data(set_target)).unwrap());
/system/security/keystore2/selinux/src/
Dlib.rs329 pub fn setcon(target: &CStr) -> std::io::Result<()> { in setcon() function
333 if unsafe { selinux::setcon(target.as_ptr()) } != 0 { in setcon()
/system/security/keystore2/test_utils/
Drun_as.rs45 selinux::setcon(&se_context) in transition()
/system/sepolicy/microdroid/system/private/
Ddomain.te315 # init starts in kernel domain and switches to init domain via setcon in