Searched refs:privileged (Results 1 – 12 of 12) sorted by relevance
/system/core/logd/ |
D | LogTimes.cpp | 128 bool privileged = FlushCommand::hasReadLogs(client); in threadStart() local 154 logbuf.flushTo(client, start, privileged, security, FilterFirstPass, me); in threadStart() 157 start = logbuf.flushTo(client, start, privileged, security, FilterSecondPass, me); in threadStart()
|
D | LogBufferElement.h | 83 uint64_t flushTo(SocketClient *writer, LogBuffer *parent, bool privileged);
|
D | LogBufferElement.cpp | 203 bool privileged) { in flushTo() argument 208 entry.hdr_size = privileged ? in flushTo()
|
D | LogBuffer.h | 114 bool privileged, bool security,
|
D | LogBuffer.cpp | 911 bool privileged, bool security, in flushTo() argument 938 if (!privileged && (element->getUid() != uid)) { in flushTo() 964 max = element->flushTo(reader, this, privileged); in flushTo()
|
/system/sepolicy/ |
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps. 22 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm 113 # Do not allow privileged apps to register services. 118 # Do not allow privileged apps to connect to the property service
|
D | system_app.te | 3 # com.android.settings. These are not as privileged as the system
|
D | mediadrmserver.te | 65 # do not allow privileged socket ioctl commands
|
D | shell.te | 123 # Make sure strace works for the non-privileged shell user 151 # Do not allow privileged socket ioctl commands
|
D | isolated_app.te | 66 # Restrict socket ioctls. Either 1. disallow privileged ioctls, 2. disallow the
|
D | mediaserver.te | 134 # do not allow privileged socket ioctl commands
|
D | untrusted_app.te | 154 # Restrict socket ioctls. Either 1. disallow privileged ioctls, 2. disallow the
|