Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 25 of 129) sorted by relevance

123456

/system/core/logd/
DLogWriter.h26 LogWriter(uid_t uid, bool privileged) : uid_(uid), privileged_(privileged) {} in LogWriter() argument
36 bool privileged() const { return privileged_; } in privileged() function
DLogReader.cpp49 SocketLogWriter(LogReader* reader, SocketClient* client, bool privileged) in SocketLogWriter() argument
50 : LogWriter(client->getUid(), privileged), reader_(reader), client_(client) {} in SocketLogWriter()
161 bool privileged = clientHasLogCredentials(cli); in onDataAvailable() local
167 std::unique_ptr<LogWriter> socket_log_writer(new SocketLogWriter(this, cli, privileged)); in onDataAvailable()
/system/sepolicy/prebuilts/api/28.0/public/
Dwpantund.te14 # Generally, only privileged apps are able to register callbacks with
15 # wpantund, so we are limiting the scope for callbacks to only privileged
23 # setting interface state up/down and changing MTU are privileged ioctls
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/sepolicy/prebuilts/api/29.0/public/
Dwpantund.te14 # Generally, only privileged apps are able to register callbacks with
15 # wpantund, so we are limiting the scope for callbacks to only privileged
23 # setting interface state up/down and changing MTU are privileged ioctls
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/sepolicy/prebuilts/api/30.0/public/
Dwpantund.te14 # Generally, only privileged apps are able to register callbacks with
15 # wpantund, so we are limiting the scope for callbacks to only privileged
23 # setting interface state up/down and changing MTU are privileged ioctls
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/sepolicy/public/
Dwpantund.te14 # Generally, only privileged apps are able to register callbacks with
15 # wpantund, so we are limiting the scope for callbacks to only privileged
23 # setting interface state up/down and changing MTU are privileged ioctls
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/sepolicy/prebuilts/api/26.0/public/
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/sepolicy/prebuilts/api/27.0/public/
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
/system/sepolicy/prebuilts/api/30.0/private/
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm
49 # Allow privileged apps to interact with gpuservice
144 # allow privileged apps to use UDP sockets provided by the system server but not
153 # allow privileged data loader apps (e.g. com.android.vending) to read logs from Incremental File S…
178 # Do not allow privileged apps to register services.
183 # Do not allow privileged apps to connect to the property service
215 # Do not allow loading executable code from non-privileged
217 # is dangerous and allows a full compromise of a privileged process
/system/sepolicy/prebuilts/api/29.0/private/
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm
53 # Allow privileged apps to interact with gpuservice
141 # Allow privileged apps (e.g. GMS core) to generate unique hardware IDs
184 # allow privileged apps to use UDP sockets provided by the system server but not
209 # Do not allow privileged apps to register services.
214 # Do not allow privileged apps to connect to the property service
246 # Do not allow loading executable code from non-privileged
248 # is dangerous and allows a full compromise of a privileged process
Dtraceur_app.te19 # Allow to access traced's privileged consumer socket.
/system/sepolicy/private/
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm
139 # allow privileged apps to use UDP sockets provided by the system server but not
148 # allow privileged data loader apps (e.g. com.android.vending) to read logs from Incremental File S…
176 # Do not allow privileged apps to register services.
181 # Do not allow privileged apps to connect to the property service
213 # Do not allow loading executable code from non-privileged
215 # is dangerous and allows a full compromise of a privileged process
/system/sepolicy/prebuilts/api/26.0/private/
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm
122 # Allow privileged apps (e.g. GMS core) to generate unique hardware IDs
141 # Do not allow privileged apps to register services.
146 # Do not allow privileged apps to connect to the property service
/system/sepolicy/prebuilts/api/27.0/private/
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm
107 # Allow privileged apps (e.g. GMS core) to generate unique hardware IDs
132 # Do not allow privileged apps to register services.
137 # Do not allow privileged apps to connect to the property service
/system/sepolicy/prebuilts/api/28.0/private/
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm
126 # Allow privileged apps (e.g. GMS core) to generate unique hardware IDs
155 # allow privileged apps to use UDP sockets provided by the system server but not
174 # Do not allow privileged apps to register services.
179 # Do not allow privileged apps to connect to the property service

123456