[T106][ZXW-22]7520V3SCV2.01.01.02P42U09_VEC_V0.8_AP_VEC origin source commit
Change-Id: Ic6e05d89ecd62fc34f82b23dcf306c93764aec4b
diff --git a/ap/app/busybox/src/selinux/setenforce.c b/ap/app/busybox/src/selinux/setenforce.c
new file mode 100644
index 0000000..c5bc0a5
--- /dev/null
+++ b/ap/app/busybox/src/selinux/setenforce.c
@@ -0,0 +1,47 @@
+/*
+ * setenforce
+ *
+ * Based on libselinux 1.33.1
+ * Port to BusyBox Hiroshi Shinji <shiroshi@my.email.ne.jp>
+ *
+ * Licensed under GPLv2, see file LICENSE in this source tree.
+ */
+
+//usage:#define setenforce_trivial_usage
+//usage: "[Enforcing | Permissive | 1 | 0]"
+//usage:#define setenforce_full_usage ""
+
+#include "libbb.h"
+
+/* These strings are arranged so that odd ones
+ * result in security_setenforce(1) being done,
+ * the rest will do security_setenforce(0) */
+static const char *const setenforce_cmd[] = {
+ "0",
+ "1",
+ "permissive",
+ "enforcing",
+ NULL,
+};
+
+int setenforce_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
+int setenforce_main(int argc UNUSED_PARAM, char **argv)
+{
+ int i, rc;
+
+ if (!argv[1] || argv[2])
+ bb_show_usage();
+
+ selinux_or_die();
+
+ for (i = 0; setenforce_cmd[i]; i++) {
+ if (strcasecmp(argv[1], setenforce_cmd[i]) != 0)
+ continue;
+ rc = security_setenforce(i & 1);
+ if (rc < 0)
+ bb_perror_msg_and_die("setenforce() failed");
+ return 0;
+ }
+
+ bb_show_usage();
+}