Home
last modified time | relevance | path

Searched refs:setenforce (Results 1 – 14 of 14) sorted by relevance

/system/extras/runconuid/
Drunconuid.cpp51 static bool setenforce = false; variable
159 setenforce = true; in parse_arguments()
187 if (setenforce && is_selinux_enabled()) { in main()
233 if (setenforce && is_selinux_enabled()) { in main()
/system/chre/
Dload_android_sim.sh18 adb shell setenforce 0
/system/core/shell_and_utilities/
DREADME.md67 seq setenforce **setfattr** setsid sha1sum sha224sum sha256sum sha384sum
105 seq setenforce setfattr setsid sha1sum sha224sum sha256sum sha384sum
139 seq setenforce setfattr setsid sha1sum sha224sum sha256sum sha384sum
173 seq setenforce setfattr setsid sha1sum sha224sum sha256sum sha384sum
206 rev rfkill rm rmdir rmmod runcon sed sendevent seq setenforce setfattr
238 **rfkill** rm rmdir rmmod runcon sed sendevent seq setenforce **setfattr**
266 renice restorecon rm rmdir rmmod runcon sed sendevent seq setenforce
292 seq setenforce setprop setsid sha1sum **sha224sum** **sha256sum** **sha384sum**
315 rmmod route runcon sed seq setenforce setprop setsid sha1sum sleep sort
336 rmmod route runcon sed seq setenforce setprop setsid sha1sum sleep sort
[all …]
/system/sepolicy/microdroid/system/private/
Dsu.te3 # su is also permissive to permit setenforce.
Dkernel.te54 # Initial setenforce by init prior to switching to init domain.
57 dontaudit kernel self:security setenforce;
Ddomain.te316 # the init.rc, so the setenforce occurs while still in kernel. After
317 # switching domains, there is never any need to setenforce again by init.
318 neverallow * kernel:security setenforce;
Daccess_vectors358 setenforce # was avc_toggle in system class
/system/sepolicy/private/
Dkernel.te66 # Initial setenforce by init prior to switching to init domain.
69 dontaudit kernel self:security setenforce;
Dsu.te26 # su is also permissive to permit setenforce.
Daccess_vectors358 setenforce # was avc_toggle in system class
Ddomain.te631 # the init.rc, so the setenforce occurs while still in kernel. After
632 # switching domains, there is never any need to setenforce again by init.
633 neverallow * kernel:security setenforce;
/system/extras/simpleperf/doc/
Dandroid_platform_profiling.md47 1. Disable selinux by `adb shell setenforce 0`. Because selinux only allows simpleperf running
/system/sepolicy/microdroid/reqd_mask/
Daccess_vectors358 setenforce # was avc_toggle in system class
/system/sepolicy/reqd_mask/
Daccess_vectors358 setenforce # was avc_toggle in system class