/system/core/logd/ |
D | LogWriter.h | 26 LogWriter(uid_t uid, bool privileged) : uid_(uid), privileged_(privileged) {} in LogWriter() argument 36 bool privileged() const { return privileged_; } in privileged() function
|
D | LogReader.cpp | 49 SocketLogWriter(LogReader* reader, SocketClient* client, bool privileged) in SocketLogWriter() argument 50 : LogWriter(client->getUid(), privileged), reader_(reader), client_(client) {} in SocketLogWriter() 161 bool privileged = clientHasLogCredentials(cli); in onDataAvailable() local 167 std::unique_ptr<LogWriter> socket_log_writer(new SocketLogWriter(this, cli, privileged)); in onDataAvailable()
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | wpantund.te | 14 # Generally, only privileged apps are able to register callbacks with 15 # wpantund, so we are limiting the scope for callbacks to only privileged 23 # setting interface state up/down and changing MTU are privileged ioctls
|
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps.
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | wpantund.te | 14 # Generally, only privileged apps are able to register callbacks with 15 # wpantund, so we are limiting the scope for callbacks to only privileged 23 # setting interface state up/down and changing MTU are privileged ioctls
|
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps.
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | wpantund.te | 14 # Generally, only privileged apps are able to register callbacks with 15 # wpantund, so we are limiting the scope for callbacks to only privileged 23 # setting interface state up/down and changing MTU are privileged ioctls
|
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps.
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
/system/sepolicy/public/ |
D | wpantund.te | 14 # Generally, only privileged apps are able to register callbacks with 15 # wpantund, so we are limiting the scope for callbacks to only privileged 23 # setting interface state up/down and changing MTU are privileged ioctls
|
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps.
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps.
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps.
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps. 14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm 49 # Allow privileged apps to interact with gpuservice 144 # allow privileged apps to use UDP sockets provided by the system server but not 153 # allow privileged data loader apps (e.g. com.android.vending) to read logs from Incremental File S… 178 # Do not allow privileged apps to register services. 183 # Do not allow privileged apps to connect to the property service 215 # Do not allow loading executable code from non-privileged 217 # is dangerous and allows a full compromise of a privileged process
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps. 14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm 53 # Allow privileged apps to interact with gpuservice 141 # Allow privileged apps (e.g. GMS core) to generate unique hardware IDs 184 # allow privileged apps to use UDP sockets provided by the system server but not 209 # Do not allow privileged apps to register services. 214 # Do not allow privileged apps to connect to the property service 246 # Do not allow loading executable code from non-privileged 248 # is dangerous and allows a full compromise of a privileged process
|
D | traceur_app.te | 19 # Allow to access traced's privileged consumer socket.
|
/system/sepolicy/private/ |
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps. 14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm 139 # allow privileged apps to use UDP sockets provided by the system server but not 148 # allow privileged data loader apps (e.g. com.android.vending) to read logs from Incremental File S… 176 # Do not allow privileged apps to register services. 181 # Do not allow privileged apps to connect to the property service 213 # Do not allow loading executable code from non-privileged 215 # is dangerous and allows a full compromise of a privileged process
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps. 14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm 122 # Allow privileged apps (e.g. GMS core) to generate unique hardware IDs 141 # Do not allow privileged apps to register services. 146 # Do not allow privileged apps to connect to the property service
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps. 14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm 107 # Allow privileged apps (e.g. GMS core) to generate unique hardware IDs 132 # Do not allow privileged apps to register services. 137 # Do not allow privileged apps to connect to the property service
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps. 14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm 126 # Allow privileged apps (e.g. GMS core) to generate unique hardware IDs 155 # allow privileged apps to use UDP sockets provided by the system server but not 174 # Do not allow privileged apps to register services. 179 # Do not allow privileged apps to connect to the property service
|