Searched refs:setenforce (Results 1 – 14 of 14) sorted by relevance
51 static bool setenforce = false; variable159 setenforce = true; in parse_arguments()187 if (setenforce && is_selinux_enabled()) { in main()233 if (setenforce && is_selinux_enabled()) { in main()
18 adb shell setenforce 0
67 seq setenforce **setfattr** setsid sha1sum sha224sum sha256sum sha384sum105 seq setenforce setfattr setsid sha1sum sha224sum sha256sum sha384sum139 seq setenforce setfattr setsid sha1sum sha224sum sha256sum sha384sum173 seq setenforce setfattr setsid sha1sum sha224sum sha256sum sha384sum206 rev rfkill rm rmdir rmmod runcon sed sendevent seq setenforce setfattr238 **rfkill** rm rmdir rmmod runcon sed sendevent seq setenforce **setfattr**266 renice restorecon rm rmdir rmmod runcon sed sendevent seq setenforce292 seq setenforce setprop setsid sha1sum **sha224sum** **sha256sum** **sha384sum**315 rmmod route runcon sed seq setenforce setprop setsid sha1sum sleep sort336 rmmod route runcon sed seq setenforce setprop setsid sha1sum sleep sort[all …]
3 # su is also permissive to permit setenforce.
54 # Initial setenforce by init prior to switching to init domain.57 dontaudit kernel self:security setenforce;
316 # the init.rc, so the setenforce occurs while still in kernel. After317 # switching domains, there is never any need to setenforce again by init.318 neverallow * kernel:security setenforce;
358 setenforce # was avc_toggle in system class
66 # Initial setenforce by init prior to switching to init domain.69 dontaudit kernel self:security setenforce;
26 # su is also permissive to permit setenforce.
631 # the init.rc, so the setenforce occurs while still in kernel. After632 # switching domains, there is never any need to setenforce again by init.633 neverallow * kernel:security setenforce;
47 1. Disable selinux by `adb shell setenforce 0`. Because selinux only allows simpleperf running