Home
last modified time | relevance | path

Searched refs:policy (Results 1 – 25 of 280) sorted by relevance

12345678910>>...12

/system/core/libprocessgroup/
Dsched_policy.cpp41 int set_cpuset_policy(int tid, SchedPolicy policy) { in set_cpuset_policy() argument
45 policy = _policy(policy); in set_cpuset_policy()
47 switch (policy) { in set_cpuset_policy()
84 int set_sched_policy(int tid, SchedPolicy policy) { in set_sched_policy() argument
88 policy = _policy(policy); in set_sched_policy()
113 switch (policy) { in set_sched_policy()
135 switch (policy) { in set_sched_policy()
175 int get_sched_policy(int tid, SchedPolicy* policy) { in get_sched_policy() argument
190 *policy = SP_FOREGROUND; in get_sched_policy()
192 *policy = SP_FOREGROUND; in get_sched_policy()
[all …]
/system/core/debuggerd/
DAndroid.mk4 LOCAL_MODULE := crash_dump.policy
9 LOCAL_MODULE_STEM_32 := crash_dump.arm.policy
10 LOCAL_MODULE_STEM_64 := crash_dump.arm64.policy
14 LOCAL_MODULE_STEM_32 := crash_dump.x86.policy
15 LOCAL_MODULE_STEM_64 := crash_dump.x86_64.policy
19 LOCAL_SRC_FILES_arm := seccomp_policy/crash_dump.arm.policy
20 LOCAL_SRC_FILES_arm64 := seccomp_policy/crash_dump.arm64.policy
21 LOCAL_SRC_FILES_x86 := seccomp_policy/crash_dump.x86.policy
22 LOCAL_SRC_FILES_x86_64 := seccomp_policy/crash_dump.x86_64.policy
/system/update_engine/
DUpdateEngine.conf4 <policy user="root">
7 </policy>
8 <policy user="chronos">
73 </policy>
74 <policy user="power">
78 </policy>
79 <policy user="dlcservice">
86 </policy>
Dsystem_state.h26 namespace policy {
63 virtual void set_device_policy(const policy::DevicePolicy* device_policy) = 0;
64 virtual const policy::DevicePolicy* device_policy() = 0;
Dreal_system_state.h76 const policy::DevicePolicy* device_policy) override { in set_device_policy()
80 inline const policy::DevicePolicy* device_policy() override { in device_policy()
154 const policy::DevicePolicy* device_policy_{nullptr};
190 policy::PolicyProvider policy_provider_;
/system/nvram/hal/
DAndroid.mk40 LOCAL_REQUIRED_MODULES_arm := fake-nvram-seccomp.policy
41 LOCAL_REQUIRED_MODULES_arm64 := fake-nvram-seccomp.policy
42 LOCAL_REQUIRED_MODULES_x86 := fake-nvram-seccomp.policy
43 LOCAL_REQUIRED_MODULES_x86_64 := fake-nvram-seccomp.policy
50 LOCAL_MODULE := fake-nvram-seccomp.policy
52 LOCAL_MODULE_PATH := $(TARGET_OUT)/usr/share/policy/
53 LOCAL_SRC_FILES := fake-nvram-seccomp-$(TARGET_ARCH).policy
/system/extras/libfscrypt/
Dfscrypt_init_extensions.cpp105 std::string policy; in set_system_de_policy_on() local
106 if (!android::base::ReadFileToString(ref_filename, &policy)) { in set_system_de_policy_on()
125 int result = fscrypt_policy_ensure(dir, policy.c_str(), policy.length(), in set_system_de_policy_on()
132 policy[0], policy[1], policy[2], policy[3], dir); in set_system_de_policy_on()
Dfscrypt.cpp83 static void policy_to_hex(const char* policy, char* hex) { in policy_to_hex() argument
85 hex[j++] = HEX_LOOKUP[(policy[i] & 0xF0) >> 4]; in policy_to_hex()
86 hex[j++] = HEX_LOOKUP[policy[i] & 0x0F]; in policy_to_hex()
138 static bool fscrypt_policy_set(const char *directory, const char *policy, in fscrypt_policy_set() argument
147 policy_to_hex(policy, policy_hex); in fscrypt_policy_set()
160 memcpy(fp.master_key_descriptor, policy, FS_KEY_DESCRIPTOR_SIZE); in fscrypt_policy_set()
174 static bool fscrypt_policy_get(const char *directory, char *policy, in fscrypt_policy_get() argument
207 memcpy(policy, fp.master_key_descriptor, FS_KEY_DESCRIPTOR_SIZE); in fscrypt_policy_get()
212 static bool fscrypt_policy_check(const char *directory, const char *policy, in fscrypt_policy_check() argument
228 if (memcmp(policy, existing_policy, FS_KEY_DESCRIPTOR_SIZE) != 0) { in fscrypt_policy_check()
[all …]
/system/core/debuggerd/seccomp_policy/
Dgenerate.sh7 $CPP -D__arm__ -o crash_dump.arm.policy
8 $CPP -D__aarch64__ -D__LP64__ -o crash_dump.arm64.policy
9 $CPP -D__i386__ -o crash_dump.x86.policy
10 $CPP -D__x86_64__ -D__LP64__ -o crash_dump.x86_64.policy
/system/core/libprocessgroup/include/processgroup/
Dsched_policy.h56 extern int set_cpuset_policy(int tid, SchedPolicy policy);
64 extern int set_sched_policy(int tid, SchedPolicy policy);
70 extern int get_sched_policy(int tid, SchedPolicy* policy);
76 extern const char* get_sched_policy_name(SchedPolicy policy);
/system/sepolicy/prebuilts/api/29.0/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
20 ; Unfortunately, we can't currently express this in module policy language:
24 ; Unfortunately, we can't currently express this in module policy language:
29 ; Unfortunately, we can't currently express this in module policy language:
34 ; Unfortunately, we can't currently express this in module policy language:
39 ; Unfortunately, we can't currently express this in module policy language:
44 ; Unfortunately, we can't currently express this in module policy language:
[all …]
/system/sepolicy/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
20 ; Unfortunately, we can't currently express this in module policy language:
24 ; Unfortunately, we can't currently express this in module policy language:
29 ; Unfortunately, we can't currently express this in module policy language:
34 ; Unfortunately, we can't currently express this in module policy language:
39 ; Unfortunately, we can't currently express this in module policy language:
44 ; Unfortunately, we can't currently express this in module policy language:
[all …]
/system/sepolicy/tools/
Dsepolicy-check.c66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { in expand_and_check() argument
77 if (expand_avtab(policy, avtab, &exp_avtab)) { in expand_and_check()
116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { in check_rule() argument
131 src = hashtab_search(policy->p_types.table, s); in check_rule()
138 tgt = hashtab_search(policy->p_types.table, t); in check_rule()
145 cls = hashtab_search(policy->p_classes.table, c); in check_rule()
177 perm, policy, &policy->te_avtab); in check_rule()
185 perm, policy, &policy->te_cond_avtab); in check_rule()
235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; in main() local
266 policy = optarg; in main()
[all …]
DREADME1 This directory contains a number of tools related to policy, some of
2 which are used in building and validating the policy and others are
3 available for help in auditing and analyzing policy. The tools are
7 A tool to build SELinux policy for multiple targets in parallel.
17 property_contexts configuration file. Used as part of the policy
40 policy build process to merge and validate the configuration.
52 certs not already found in that policy. This becomes useful when a directory
54 policy not already explicitly listed.
61 -f POLICY, --file POLICY mac_permissions.xml policy file
/system/sepolicy/prebuilts/api/28.0/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
21 ; Unfortunately, we can't currently express this in module policy language:
26 ; Unfortunately, we can't currently express this in module policy language:
31 ; Unfortunately, we can't currently express this in module policy language:
36 ; Unfortunately, we can't currently express this in module policy language:
/system/sepolicy/prebuilts/api/27.0/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
21 ; Unfortunately, we can't currently express this in module policy language:
26 ; Unfortunately, we can't currently express this in module policy language:
31 ; Unfortunately, we can't currently express this in module policy language:
/system/bt/bta/sys/
Dbta_sys_conn.cc369 void bta_sys_set_policy(uint8_t id, uint8_t policy, in bta_sys_set_policy() argument
372 peer_addr.ToString().c_str(), id, policy); in bta_sys_set_policy()
374 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_SET, id, policy, peer_addr); in bta_sys_set_policy()
388 void bta_sys_clear_policy(uint8_t id, uint8_t policy, in bta_sys_clear_policy() argument
391 peer_addr.ToString().c_str(), id, policy); in bta_sys_clear_policy()
393 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_CLR, id, policy, peer_addr); in bta_sys_clear_policy()
407 void bta_sys_set_default_policy(uint8_t id, uint8_t policy) { in bta_sys_set_default_policy() argument
408 APPL_TRACE_DEBUG("%s: id:%d policy:0x%x", __func__, id, policy); in bta_sys_set_default_policy()
410 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_DEF_SET, id, policy, in bta_sys_set_default_policy()
425 void bta_sys_clear_default_policy(uint8_t id, uint8_t policy) { in bta_sys_clear_default_policy() argument
[all …]
/system/sepolicy/prebuilts/api/26.0/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
21 ; Unfortunately, we can't currently express this in module policy language:
26 ; Unfortunately, we can't currently express this in module policy language:
/system/update_engine/update_manager/
Dstaging_utils.h30 using StagingSchedule = std::vector<policy::DevicePolicy::DayPercentagePair>;
55 int GetStagingSchedule(const policy::DevicePolicy* device_policy,
64 StagingCase CalculateStagingCase(const policy::DevicePolicy* device_policy,
/system/libhidl/transport/
DHidlTransportSupport.cpp59 bool setMinSchedulerPolicy(const sp<IBase>& service, int policy, int priority) { in setMinSchedulerPolicy() argument
65 switch (policy) { in setMinSchedulerPolicy()
75 LOG(ERROR) << "Invalid priority for " << policy << " policy: " << priority; in setMinSchedulerPolicy()
80 LOG(ERROR) << "Invalid scheduler policy " << policy; in setMinSchedulerPolicy()
90 details::gServicePrioMap->setLocked(service, {policy, priority}); in setMinSchedulerPolicy()
/system/sepolicy/tests/
Dsepolicy_tests.py4 import policy
87 if not options.policy:
89 if not os.path.exists(options.policy):
90 sys.exit("Error: policy file " + options.policy + " does not exist\n"
100 pol = policy.Policy(options.policy, options.file_contexts, options.libpath)
Dsearchpolicy.py4 import policy
30 if not args.policy:
38 pol = policy.Policy(args.policy, None, args.libpath)
/system/sepolicy/tools/sepolicy-analyze/
DREADME20 current policy may be overly permissive with respect to one or the
24 types may not yet be defined or may be unconfined in the policy
42 individual types may be directly represented in the source policy
44 -foo -bar is expanded to individual allow rules by the policy
51 Displays domains in the policy that are permissive, i.e. avc
59 Displays the boolean names in the policy (if any).
60 Policy booleans are forbidden in Android policy, so if there is any
61 output, the policy will fail CTS.
74 Displays all attributes in the policy.
82 statements in the same format as the SELinux policy.conf file, i.e. after
[all …]
Dsepolicy-analyze.c44 char *policy; in main() local
52 policy = argv[1]; in main()
53 if(load_policy(policy, &policydb, &pf)) in main()
/system/sepolicy/prebuilts/api/27.0/private/compat/26.0/
D26.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
30 ;; older policy, but that should not remain accessible to vendor policy.

12345678910>>...12