diff options
-rw-r--r-- | src/security/selinux/validate.jd | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/security/selinux/validate.jd b/src/security/selinux/validate.jd index 34199f52..7a3e6d01 100644 --- a/src/security/selinux/validate.jd +++ b/src/security/selinux/validate.jd @@ -74,7 +74,7 @@ run at the time the denial was generated. In this case, it’s a pretty good hin <p>And here is another example:</p> <pre> -$ adb shell su -c dmesg | grep 'avc: ' +$ adb shell su root dmesg | grep 'avc: ' <5> type=1400 audit: avc: denied { read write } for pid=177 comm="rmt_storage" name="mem" dev="tmpfs" ino=6004 scontext=u:r:rmt:s0 tcontext=u:object_r:kmem_device:s0 tclass=chr_file @@ -101,7 +101,7 @@ enforcing mode is enabled.</p> root issue:</p> <pre> -$ adb shell su -c setenforce 0 +$ adb shell su root setenforce 0 </pre> <p>Or at the kernel command line (during early device bring-up):</p> @@ -124,13 +124,13 @@ $ sudo apt-get install policycoreutils <p>To use it on Ubuntu 12.04, run:</p> <pre> -$ adb shell su -c dmesg | audit2allow +$ adb shell su root dmesg | audit2allow </pre> <p>On Ubuntu 14.04 and newer, audit2allow requires you to specify the Android policy using the -p option, e.g. <pre> -$ adb shell su -c dmesg | audit2allow -p out/target/product/<device>/root/sepolicy +$ adb shell su root dmesg | audit2allow -p out/target/product/<device>/root/sepolicy </pre> <p>Nevertheless, care must be taken to examine each potential addition for |