Home
last modified time | relevance | path

Searched refs:permissive (Results 1 – 25 of 38) sorted by relevance

12

/system/sepolicy/prebuilts/api/30.0/private/
Dauditctl.te11 # Uncomment the line below to put this domain into permissive
13 # userdebug_or_eng(`permissive auditctl;')
Dsu.te19 # su is also permissive to permit setenforce.
20 permissive su;
Dgpuservice.te48 # userdebug_or_eng(`permissive gpuservice;')
/system/sepolicy/prebuilts/api/29.0/private/
Dauditctl.te11 # Uncomment the line below to put this domain into permissive
13 # userdebug_or_eng(`permissive auditctl;')
Dsu.te19 # su is also permissive to permit setenforce.
20 permissive su;
Dgpuservice.te41 # userdebug_or_eng(`permissive gpuservice;')
/system/sepolicy/private/
Dauditctl.te11 # Uncomment the line below to put this domain into permissive
13 # userdebug_or_eng(`permissive auditctl;')
Dsu.te19 # su is also permissive to permit setenforce.
20 permissive su;
Dgpuservice.te66 # userdebug_or_eng(`permissive gpuservice;')
/system/sepolicy/prebuilts/api/27.0/private/
Dsu.te16 # su is also permissive to permit setenforce.
17 permissive su;
Dattributes2 # Motivation: Domain is overly permissive. Start removing permissions
/system/sepolicy/prebuilts/api/26.0/private/
Dsu.te16 # su is also permissive to permit setenforce.
17 permissive su;
Dattributes2 # Motivation: Domain is overly permissive. Start removing permissions
/system/sepolicy/prebuilts/api/28.0/private/
Dsu.te19 # su is also permissive to permit setenforce.
20 permissive su;
/system/sepolicy/tools/sepolicy-analyze/
DREADME20 current policy may be overly permissive with respect to one or the
48 PERMISSIVE DOMAINS (permissive)
49 sepolicy-analyze out/target/product/<board>/root/sepolicy permissive
51 Displays domains in the policy that are permissive, i.e. avc
53 permissive domains can be helpful during development, they
Dsepolicy-analyze.c24 COMP(permissive),
/system/tools/aidl/tests/java_app/
DREADME10 5) Put selinux in permissive mode.
/system/sepolicy/prebuilts/api/28.0/public/
Dperformanced.te22 # These /proc accesses only show up in permissive mode but they
Dsu.te54 # VTS tests run in the permissive su domain on debug builds, but the HALs
/system/sepolicy/prebuilts/api/29.0/public/
Dperformanced.te22 # These /proc accesses only show up in permissive mode but they
/system/sepolicy/prebuilts/api/30.0/public/
Dperformanced.te22 # These /proc accesses only show up in permissive mode but they
Dsu.te57 # VTS tests run in the permissive su domain on debug builds, but the HALs
/system/sepolicy/public/
Dperformanced.te22 # These /proc accesses only show up in permissive mode but they
Dsu.te57 # VTS tests run in the permissive su domain on debug builds, but the HALs
/system/security/keystore/tests/
DMakefile35 -Werror=sign-compare -Wmissing-declarations -ftest-coverage -fno-permissive \

12