Searched refs:privileged (Results 1 – 19 of 19) sorted by relevance
/system/sepolicy/public/ |
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps.
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
D | mediadrmserver.te | 32 # do not allow privileged socket ioctl commands
|
D | wificond.te | 15 # setting interface state up/down is a privileged ioctl
|
D | crash_dump.te | 12 # crash_dump might inherit CAP_SYS_PTRACE from a privileged process,
|
D | hal_drm.te | 59 # do not allow privileged socket ioctl commands
|
D | hal_neverallows.te | 1 # only HALs responsible for network hardware should have privileged
|
D | shell.te | 126 # Make sure strace works for the non-privileged shell user 171 # Do not allow privileged socket ioctl commands
|
D | mediaserver.te | 149 # do not allow privileged socket ioctl commands
|
/system/core/logd/ |
D | LogTimes.cpp | 132 bool privileged = FlushCommand::hasReadLogs(client); in threadStart() local 156 logbuf.flushTo(client, start, nullptr, privileged, security, in threadStart() 160 start = logbuf.flushTo(client, start, me->mLastTid, privileged, in threadStart()
|
D | LogBufferElement.h | 103 log_time flushTo(SocketClient* writer, LogBuffer* parent, bool privileged,
|
D | LogBufferElement.cpp | 208 bool privileged, bool lastSame) { in flushTo() argument 213 entry.hdr_size = privileged ? sizeof(struct logger_entry_v4) in flushTo()
|
D | LogBuffer.h | 123 bool privileged, bool security,
|
D | LogBuffer.cpp | 1086 pid_t* lastTid, bool privileged, bool security, in flushTo() argument 1139 if (!privileged && (element->getUid() != uid)) { in flushTo() 1177 max = element->flushTo(reader, this, privileged, sameTid); in flushTo()
|
/system/sepolicy/private/ |
D | priv_app.te | 2 ### A domain for further sandboxing privileged apps. 14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm 122 # Allow privileged apps (e.g. GMS core) to generate unique hardware IDs 141 # Do not allow privileged apps to register services. 146 # Do not allow privileged apps to connect to the property service
|
D | system_app.te | 3 ### com.android.settings. These are not as privileged as the system
|
D | app_neverallows.te | 55 # Restrict socket ioctls. Either 1. disallow privileged ioctls, 2. disallow the 115 # against privileged system components
|
D | app.te | 114 # Allow apps access to /vendor/app except for privileged
|
D | system_server.te | 54 # to use privileged ioctls commands. Needed to set up VPNs.
|