/system/core/libprocessgroup/ |
D | sched_policy.cpp | 41 int set_cpuset_policy(int tid, SchedPolicy policy) { in set_cpuset_policy() argument 45 policy = _policy(policy); in set_cpuset_policy() 47 switch (policy) { in set_cpuset_policy() 84 int set_sched_policy(int tid, SchedPolicy policy) { in set_sched_policy() argument 88 policy = _policy(policy); in set_sched_policy() 113 switch (policy) { in set_sched_policy() 135 switch (policy) { in set_sched_policy() 175 int get_sched_policy(int tid, SchedPolicy* policy) { in get_sched_policy() argument 190 *policy = SP_FOREGROUND; in get_sched_policy() 192 *policy = SP_FOREGROUND; in get_sched_policy() [all …]
|
/system/core/debuggerd/ |
D | Android.mk | 4 LOCAL_MODULE := crash_dump.policy 9 LOCAL_MODULE_STEM_32 := crash_dump.arm.policy 10 LOCAL_MODULE_STEM_64 := crash_dump.arm64.policy 14 LOCAL_MODULE_STEM_32 := crash_dump.x86.policy 15 LOCAL_MODULE_STEM_64 := crash_dump.x86_64.policy 19 LOCAL_SRC_FILES_arm := seccomp_policy/crash_dump.arm.policy 20 LOCAL_SRC_FILES_arm64 := seccomp_policy/crash_dump.arm64.policy 21 LOCAL_SRC_FILES_x86 := seccomp_policy/crash_dump.x86.policy 22 LOCAL_SRC_FILES_x86_64 := seccomp_policy/crash_dump.x86_64.policy
|
/system/update_engine/ |
D | UpdateEngine.conf | 4 <policy user="root"> 7 </policy> 8 <policy user="chronos"> 73 </policy> 74 <policy user="power"> 78 </policy> 79 <policy user="dlcservice"> 86 </policy>
|
D | system_state.h | 26 namespace policy { 63 virtual void set_device_policy(const policy::DevicePolicy* device_policy) = 0; 64 virtual const policy::DevicePolicy* device_policy() = 0;
|
D | real_system_state.h | 76 const policy::DevicePolicy* device_policy) override { in set_device_policy() 80 inline const policy::DevicePolicy* device_policy() override { in device_policy() 154 const policy::DevicePolicy* device_policy_{nullptr}; 190 policy::PolicyProvider policy_provider_;
|
/system/nvram/hal/ |
D | Android.mk | 40 LOCAL_REQUIRED_MODULES_arm := fake-nvram-seccomp.policy 41 LOCAL_REQUIRED_MODULES_arm64 := fake-nvram-seccomp.policy 42 LOCAL_REQUIRED_MODULES_x86 := fake-nvram-seccomp.policy 43 LOCAL_REQUIRED_MODULES_x86_64 := fake-nvram-seccomp.policy 50 LOCAL_MODULE := fake-nvram-seccomp.policy 52 LOCAL_MODULE_PATH := $(TARGET_OUT)/usr/share/policy/ 53 LOCAL_SRC_FILES := fake-nvram-seccomp-$(TARGET_ARCH).policy
|
/system/extras/libfscrypt/ |
D | fscrypt_init_extensions.cpp | 105 std::string policy; in set_system_de_policy_on() local 106 if (!android::base::ReadFileToString(ref_filename, &policy)) { in set_system_de_policy_on() 125 int result = fscrypt_policy_ensure(dir, policy.c_str(), policy.length(), in set_system_de_policy_on() 132 policy[0], policy[1], policy[2], policy[3], dir); in set_system_de_policy_on()
|
D | fscrypt.cpp | 83 static void policy_to_hex(const char* policy, char* hex) { in policy_to_hex() argument 85 hex[j++] = HEX_LOOKUP[(policy[i] & 0xF0) >> 4]; in policy_to_hex() 86 hex[j++] = HEX_LOOKUP[policy[i] & 0x0F]; in policy_to_hex() 138 static bool fscrypt_policy_set(const char *directory, const char *policy, in fscrypt_policy_set() argument 147 policy_to_hex(policy, policy_hex); in fscrypt_policy_set() 160 memcpy(fp.master_key_descriptor, policy, FS_KEY_DESCRIPTOR_SIZE); in fscrypt_policy_set() 174 static bool fscrypt_policy_get(const char *directory, char *policy, in fscrypt_policy_get() argument 207 memcpy(policy, fp.master_key_descriptor, FS_KEY_DESCRIPTOR_SIZE); in fscrypt_policy_get() 212 static bool fscrypt_policy_check(const char *directory, const char *policy, in fscrypt_policy_check() argument 228 if (memcmp(policy, existing_policy, FS_KEY_DESCRIPTOR_SIZE) != 0) { in fscrypt_policy_check() [all …]
|
/system/core/debuggerd/seccomp_policy/ |
D | generate.sh | 7 $CPP -D__arm__ -o crash_dump.arm.policy 8 $CPP -D__aarch64__ -D__LP64__ -o crash_dump.arm64.policy 9 $CPP -D__i386__ -o crash_dump.x86.policy 10 $CPP -D__x86_64__ -D__LP64__ -o crash_dump.x86_64.policy
|
/system/core/libprocessgroup/include/processgroup/ |
D | sched_policy.h | 56 extern int set_cpuset_policy(int tid, SchedPolicy policy); 64 extern int set_sched_policy(int tid, SchedPolicy policy); 70 extern int get_sched_policy(int tid, SchedPolicy* policy); 76 extern const char* get_sched_policy_name(SchedPolicy policy);
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 20 ; Unfortunately, we can't currently express this in module policy language: 24 ; Unfortunately, we can't currently express this in module policy language: 29 ; Unfortunately, we can't currently express this in module policy language: 34 ; Unfortunately, we can't currently express this in module policy language: 39 ; Unfortunately, we can't currently express this in module policy language: 44 ; Unfortunately, we can't currently express this in module policy language: [all …]
|
/system/sepolicy/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 20 ; Unfortunately, we can't currently express this in module policy language: 24 ; Unfortunately, we can't currently express this in module policy language: 29 ; Unfortunately, we can't currently express this in module policy language: 34 ; Unfortunately, we can't currently express this in module policy language: 39 ; Unfortunately, we can't currently express this in module policy language: 44 ; Unfortunately, we can't currently express this in module policy language: [all …]
|
/system/sepolicy/tools/ |
D | sepolicy-check.c | 66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { in expand_and_check() argument 77 if (expand_avtab(policy, avtab, &exp_avtab)) { in expand_and_check() 116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { in check_rule() argument 131 src = hashtab_search(policy->p_types.table, s); in check_rule() 138 tgt = hashtab_search(policy->p_types.table, t); in check_rule() 145 cls = hashtab_search(policy->p_classes.table, c); in check_rule() 177 perm, policy, &policy->te_avtab); in check_rule() 185 perm, policy, &policy->te_cond_avtab); in check_rule() 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; in main() local 266 policy = optarg; in main() [all …]
|
D | README | 1 This directory contains a number of tools related to policy, some of 2 which are used in building and validating the policy and others are 3 available for help in auditing and analyzing policy. The tools are 7 A tool to build SELinux policy for multiple targets in parallel. 17 property_contexts configuration file. Used as part of the policy 40 policy build process to merge and validate the configuration. 52 certs not already found in that policy. This becomes useful when a directory 54 policy not already explicitly listed. 61 -f POLICY, --file POLICY mac_permissions.xml policy file
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 21 ; Unfortunately, we can't currently express this in module policy language: 26 ; Unfortunately, we can't currently express this in module policy language: 31 ; Unfortunately, we can't currently express this in module policy language: 36 ; Unfortunately, we can't currently express this in module policy language:
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 21 ; Unfortunately, we can't currently express this in module policy language: 26 ; Unfortunately, we can't currently express this in module policy language: 31 ; Unfortunately, we can't currently express this in module policy language:
|
/system/bt/bta/sys/ |
D | bta_sys_conn.cc | 369 void bta_sys_set_policy(uint8_t id, uint8_t policy, in bta_sys_set_policy() argument 372 peer_addr.ToString().c_str(), id, policy); in bta_sys_set_policy() 374 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_SET, id, policy, peer_addr); in bta_sys_set_policy() 388 void bta_sys_clear_policy(uint8_t id, uint8_t policy, in bta_sys_clear_policy() argument 391 peer_addr.ToString().c_str(), id, policy); in bta_sys_clear_policy() 393 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_CLR, id, policy, peer_addr); in bta_sys_clear_policy() 407 void bta_sys_set_default_policy(uint8_t id, uint8_t policy) { in bta_sys_set_default_policy() argument 408 APPL_TRACE_DEBUG("%s: id:%d policy:0x%x", __func__, id, policy); in bta_sys_set_default_policy() 410 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_DEF_SET, id, policy, in bta_sys_set_default_policy() 425 void bta_sys_clear_default_policy(uint8_t id, uint8_t policy) { in bta_sys_clear_default_policy() argument [all …]
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 21 ; Unfortunately, we can't currently express this in module policy language: 26 ; Unfortunately, we can't currently express this in module policy language:
|
/system/update_engine/update_manager/ |
D | staging_utils.h | 30 using StagingSchedule = std::vector<policy::DevicePolicy::DayPercentagePair>; 55 int GetStagingSchedule(const policy::DevicePolicy* device_policy, 64 StagingCase CalculateStagingCase(const policy::DevicePolicy* device_policy,
|
/system/libhidl/transport/ |
D | HidlTransportSupport.cpp | 59 bool setMinSchedulerPolicy(const sp<IBase>& service, int policy, int priority) { in setMinSchedulerPolicy() argument 65 switch (policy) { in setMinSchedulerPolicy() 75 LOG(ERROR) << "Invalid priority for " << policy << " policy: " << priority; in setMinSchedulerPolicy() 80 LOG(ERROR) << "Invalid scheduler policy " << policy; in setMinSchedulerPolicy() 90 details::gServicePrioMap->setLocked(service, {policy, priority}); in setMinSchedulerPolicy()
|
/system/sepolicy/tests/ |
D | sepolicy_tests.py | 4 import policy 87 if not options.policy: 89 if not os.path.exists(options.policy): 90 sys.exit("Error: policy file " + options.policy + " does not exist\n" 100 pol = policy.Policy(options.policy, options.file_contexts, options.libpath)
|
D | searchpolicy.py | 4 import policy 30 if not args.policy: 38 pol = policy.Policy(args.policy, None, args.libpath)
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 20 current policy may be overly permissive with respect to one or the 24 types may not yet be defined or may be unconfined in the policy 42 individual types may be directly represented in the source policy 44 -foo -bar is expanded to individual allow rules by the policy 51 Displays domains in the policy that are permissive, i.e. avc 59 Displays the boolean names in the policy (if any). 60 Policy booleans are forbidden in Android policy, so if there is any 61 output, the policy will fail CTS. 74 Displays all attributes in the policy. 82 statements in the same format as the SELinux policy.conf file, i.e. after [all …]
|
D | sepolicy-analyze.c | 44 char *policy; in main() local 52 policy = argv[1]; in main() 53 if(load_policy(policy, &policydb, &pf)) in main()
|
/system/sepolicy/prebuilts/api/27.0/private/compat/26.0/ |
D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 30 ;; older policy, but that should not remain accessible to vendor policy.
|