Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 12 of 12) sorted by relevance

/system/core/logd/
DLogTimes.cpp128 bool privileged = FlushCommand::hasReadLogs(client); in threadStart() local
154 logbuf.flushTo(client, start, privileged, security, FilterFirstPass, me); in threadStart()
157 start = logbuf.flushTo(client, start, privileged, security, FilterSecondPass, me); in threadStart()
DLogBufferElement.h83 uint64_t flushTo(SocketClient *writer, LogBuffer *parent, bool privileged);
DLogBufferElement.cpp203 bool privileged) { in flushTo() argument
208 entry.hdr_size = privileged ? in flushTo()
DLogBuffer.h114 bool privileged, bool security,
DLogBuffer.cpp911 bool privileged, bool security, in flushTo() argument
938 if (!privileged && (element->getUid() != uid)) { in flushTo()
964 max = element->flushTo(reader, this, privileged); in flushTo()
/system/sepolicy/
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
22 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm
113 # Do not allow privileged apps to register services.
118 # Do not allow privileged apps to connect to the property service
Dsystem_app.te3 # com.android.settings. These are not as privileged as the system
Dmediadrmserver.te65 # do not allow privileged socket ioctl commands
Dshell.te123 # Make sure strace works for the non-privileged shell user
151 # Do not allow privileged socket ioctl commands
Disolated_app.te66 # Restrict socket ioctls. Either 1. disallow privileged ioctls, 2. disallow the
Dmediaserver.te134 # do not allow privileged socket ioctl commands
Duntrusted_app.te154 # Restrict socket ioctls. Either 1. disallow privileged ioctls, 2. disallow the