Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 19 of 19) sorted by relevance

/system/sepolicy/public/
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
Dmediadrmserver.te32 # do not allow privileged socket ioctl commands
Dwificond.te15 # setting interface state up/down is a privileged ioctl
Dcrash_dump.te12 # crash_dump might inherit CAP_SYS_PTRACE from a privileged process,
Dhal_drm.te59 # do not allow privileged socket ioctl commands
Dhal_neverallows.te1 # only HALs responsible for network hardware should have privileged
Dshell.te126 # Make sure strace works for the non-privileged shell user
171 # Do not allow privileged socket ioctl commands
Dmediaserver.te149 # do not allow privileged socket ioctl commands
/system/core/logd/
DLogTimes.cpp132 bool privileged = FlushCommand::hasReadLogs(client); in threadStart() local
156 logbuf.flushTo(client, start, nullptr, privileged, security, in threadStart()
160 start = logbuf.flushTo(client, start, me->mLastTid, privileged, in threadStart()
DLogBufferElement.h103 log_time flushTo(SocketClient* writer, LogBuffer* parent, bool privileged,
DLogBufferElement.cpp208 bool privileged, bool lastSame) { in flushTo() argument
213 entry.hdr_size = privileged ? sizeof(struct logger_entry_v4) in flushTo()
DLogBuffer.h123 bool privileged, bool security,
DLogBuffer.cpp1086 pid_t* lastTid, bool privileged, bool security, in flushTo() argument
1139 if (!privileged && (element->getUid() != uid)) { in flushTo()
1177 max = element->flushTo(reader, this, privileged, sameTid); in flushTo()
/system/sepolicy/private/
Dpriv_app.te2 ### A domain for further sandboxing privileged apps.
14 # Used by: https://play.privileged.com/store/apps/details?id=jackpal.androidterm
122 # Allow privileged apps (e.g. GMS core) to generate unique hardware IDs
141 # Do not allow privileged apps to register services.
146 # Do not allow privileged apps to connect to the property service
Dsystem_app.te3 ### com.android.settings. These are not as privileged as the system
Dapp_neverallows.te55 # Restrict socket ioctls. Either 1. disallow privileged ioctls, 2. disallow the
115 # against privileged system components
Dapp.te114 # Allow apps access to /vendor/app except for privileged
Dsystem_server.te54 # to use privileged ioctls commands. Needed to set up VPNs.