/system/core/libprocessgroup/ |
D | sched_policy.cpp | 41 int set_cpuset_policy(int tid, SchedPolicy policy) { in set_cpuset_policy() argument 45 policy = _policy(policy); in set_cpuset_policy() 47 switch (policy) { in set_cpuset_policy() 67 int set_sched_policy(int tid, SchedPolicy policy) { in set_sched_policy() argument 71 policy = _policy(policy); in set_sched_policy() 96 switch (policy) { in set_sched_policy() 118 switch (policy) { in set_sched_policy() 168 static int get_sched_policy_from_group(const std::string& group, SchedPolicy* policy) { in get_sched_policy_from_group() argument 170 *policy = SP_FOREGROUND; in get_sched_policy_from_group() 172 *policy = SP_FOREGROUND; in get_sched_policy_from_group() [all …]
|
/system/core/code_coverage/ |
D | Android.bp | 7 name: "code_coverage.policy", 12 src: "empty_policy/code_coverage.arm.policy", 15 src: "seccomp_policy/code_coverage.arm.policy", 20 src: "empty_policy/code_coverage.arm64.policy", 23 src: "seccomp_policy/code_coverage.arm64.policy", 28 src: "empty_policy/code_coverage.riscv64.policy", 31 src: "seccomp_policy/code_coverage.riscv64.policy", 36 src: "empty_policy/code_coverage.x86.policy", 39 src: "seccomp_policy/code_coverage.x86.policy", 44 src: "empty_policy/code_coverage.x86_64.policy", [all …]
|
/system/extras/libfscrypt/ |
D | fscrypt.cpp | 129 fscrypt_policy_v1 policy; in fscrypt_is_encrypted() local 134 return ioctl(fd, FS_IOC_GET_ENCRYPTION_POLICY, &policy) == 0 || errno == EINVAL; in fscrypt_is_encrypted() 276 static std::string PolicyDebugString(const EncryptionPolicy& policy) { in PolicyDebugString() argument 279 BytesToHex(policy.key_raw_ref, &ref_hex); in PolicyDebugString() 281 ss << " v" << policy.options.version; in PolicyDebugString() 282 ss << " modes " << policy.options.contents_mode << "/" << policy.options.filenames_mode; in PolicyDebugString() 283 ss << std::hex << " flags 0x" << policy.options.flags; in PolicyDebugString() 287 bool EnsurePolicy(const EncryptionPolicy& policy, const std::string& directory) { in EnsurePolicy() argument 294 switch (policy.options.version) { in EnsurePolicy() 296 if (policy.key_raw_ref.size() != FSCRYPT_KEY_DESCRIPTOR_SIZE) { in EnsurePolicy() [all …]
|
/system/core/libprocessgroup/include/processgroup/ |
D | sched_policy.h | 56 extern int set_cpuset_policy(int tid, SchedPolicy policy); 64 extern int set_sched_policy(int tid, SchedPolicy policy); 70 extern int get_sched_policy(int tid, SchedPolicy* policy); 76 extern const char* get_sched_policy_name(SchedPolicy policy); 82 extern const char* get_cpuset_policy_profile_name(SchedPolicy policy); 88 extern const char* get_sched_policy_profile_name(SchedPolicy policy);
|
/system/core/debuggerd/seccomp_policy/ |
D | generate.sh | 7 $CPP -D__arm__ -o crash_dump.arm.policy 8 $CPP -D__aarch64__ -D__LP64__ -o crash_dump.arm64.policy 9 $CPP -D__riscv -D__LP64__ -o crash_dump.riscv64.policy 10 $CPP -D__i386__ -o crash_dump.x86.policy 11 $CPP -D__x86_64__ -D__LP64__ -o crash_dump.x86_64.policy
|
/system/bpfprogs/ |
D | time_in_state_test.cpp | 28 int bpf_policy_freq_idx_map_update_elem(uint32_t* policy, uint8_t* index, uint64_t flags); 29 int bpf_policy_nr_active_map_update_elem(uint32_t* policy, uint32_t* active, uint64_t flags); 30 uint8_t* bpf_policy_freq_idx_map_lookup_elem(uint32_t* policy); 31 int bpf_policy_freq_idx_map_update_elem(uint32_t* policy, uint8_t* index, uint64_t flags); 67 static void initCpuPolicy(uint32_t policy, std::vector<uint32_t> cpuIds, in initCpuPolicy() argument 70 bpf_cpu_policy_map_update_elem(&cpuId, &policy, BPF_ANY); in initCpuPolicy() 84 freq_idx_key_t freqIdxKey{.policy = policy, .freq = frequencies[i]}; in initCpuPolicy() 89 bpf_policy_nr_active_map_update_elem(&policy, &zero, BPF_ANY); in initCpuPolicy() 129 ASSERT_EQ(expectedPolicy[i], value->policy[i]); in assertConcurrentTimes() 131 ASSERT_EQ(0, value->policy[i]); in assertConcurrentTimes() [all …]
|
D | timeInState.c | 77 concurrent_val_t zero_val = {.active = {0}, .policy = {0}}; in update_uid() 87 concurrent_val_t zero_val = {.active = {0}, .policy = {0}}; in update_uid() 92 if (ct) ct->policy[policy_active % CPUS_PER_ENTRY] += delta; in update_uid() 127 uint32_t policy = *policyp; variable 129 uint32_t* policy_active = bpf_policy_nr_active_map_lookup_elem(&policy); 153 uint8_t* freq_idxp = bpf_policy_freq_idx_map_lookup_elem(&policy); 234 uint32_t policy = *policyp; variable 235 freq_idx_key_t key = {.policy = policy, .freq = new}; 239 bpf_policy_freq_idx_map_update_elem(&policy, &idx, BPF_ANY);
|
/system/core/init/ |
D | fscrypt_init_extensions.cpp | 102 static bool LookupPolicy(const std::string& ref_basename, EncryptionPolicy* policy) { in LookupPolicy() argument 104 if (!android::base::ReadFileToString(ref_filename, &policy->key_raw_ref)) { in LookupPolicy() 115 if (!ParseOptions(options_string, &policy->options)) { in LookupPolicy() 122 static bool EnsurePolicyOrLog(const EncryptionPolicy& policy, const std::string& dir) { in EnsurePolicyOrLog() argument 123 if (!EnsurePolicy(policy, dir)) { in EnsurePolicyOrLog() 125 BytesToHex(policy.key_raw_ref, &ref_hex); in EnsurePolicyOrLog() 133 EncryptionPolicy policy; in SetPolicyOn() local 134 if (!LookupPolicy(ref_basename, &policy)) return false; in SetPolicyOn() 135 if (!EnsurePolicyOrLog(policy, dir)) return false; in SetPolicyOn()
|
/system/vold/ |
D | KeyUtil.cpp | 219 static bool buildKeySpecifier(fscrypt_key_specifier* spec, const EncryptionPolicy& policy) { in buildKeySpecifier() argument 220 switch (policy.options.version) { in buildKeySpecifier() 222 if (policy.key_raw_ref.size() != FSCRYPT_KEY_DESCRIPTOR_SIZE) { in buildKeySpecifier() 224 << policy.key_raw_ref.size(); in buildKeySpecifier() 228 memcpy(spec->u.descriptor, policy.key_raw_ref.c_str(), FSCRYPT_KEY_DESCRIPTOR_SIZE); in buildKeySpecifier() 231 if (policy.key_raw_ref.size() != FSCRYPT_KEY_IDENTIFIER_SIZE) { in buildKeySpecifier() 233 << policy.key_raw_ref.size(); in buildKeySpecifier() 237 memcpy(spec->u.identifier, policy.key_raw_ref.c_str(), FSCRYPT_KEY_IDENTIFIER_SIZE); in buildKeySpecifier() 240 LOG(ERROR) << "Invalid encryption policy version: " << policy.options.version; in buildKeySpecifier() 274 const KeyBuffer& key, EncryptionPolicy* policy) { in installKey() argument [all …]
|
D | KeyUtil.h | 65 const KeyBuffer& key, android::fscrypt::EncryptionPolicy* policy); 73 bool evictKey(const std::string& mountpoint, const android::fscrypt::EncryptionPolicy& policy); 84 const android::fscrypt::EncryptionPolicy& policy);
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 20 ; Unfortunately, we can't currently express this in module policy language: 24 ; Unfortunately, we can't currently express this in module policy language: 28 ; Unfortunately, we can't currently express this in module policy language: 33 ; Unfortunately, we can't currently express this in module policy language: 38 ; Unfortunately, we can't currently express this in module policy language: 43 ; Unfortunately, we can't currently express this in module policy language: [all …]
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 20 ; Unfortunately, we can't currently express this in module policy language: 24 ; Unfortunately, we can't currently express this in module policy language: 28 ; Unfortunately, we can't currently express this in module policy language: 33 ; Unfortunately, we can't currently express this in module policy language: 38 ; Unfortunately, we can't currently express this in module policy language: 43 ; Unfortunately, we can't currently express this in module policy language: [all …]
|
/system/core/code_coverage/seccomp_policy/ |
D | generate.sh | 9 $CPP -D__arm__ -o code_coverage.arm.policy 10 $CPP -D__aarch64__ -D__LP64__ -o code_coverage.arm64.policy 11 $CPP -D__i386__ -o code_coverage.x86.policy 12 $CPP -D__x86_64__ -D__LP64__ -o code_coverage.x86_64.policy
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 20 ; Unfortunately, we can't currently express this in module policy language: 24 ; Unfortunately, we can't currently express this in module policy language: 28 ; Unfortunately, we can't currently express this in module policy language: 33 ; Unfortunately, we can't currently express this in module policy language: 38 ; Unfortunately, we can't currently express this in module policy language: 43 ; Unfortunately, we can't currently express this in module policy language: [all …]
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 20 ; Unfortunately, we can't currently express this in module policy language: 24 ; Unfortunately, we can't currently express this in module policy language: 28 ; Unfortunately, we can't currently express this in module policy language: 33 ; Unfortunately, we can't currently express this in module policy language: 38 ; Unfortunately, we can't currently express this in module policy language: 43 ; Unfortunately, we can't currently express this in module policy language: [all …]
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 20 ; Unfortunately, we can't currently express this in module policy language: 24 ; Unfortunately, we can't currently express this in module policy language: 28 ; Unfortunately, we can't currently express this in module policy language: 33 ; Unfortunately, we can't currently express this in module policy language: 38 ; Unfortunately, we can't currently express this in module policy language: 43 ; Unfortunately, we can't currently express this in module policy language: [all …]
|
/system/sepolicy/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 20 ; Unfortunately, we can't currently express this in module policy language: 24 ; Unfortunately, we can't currently express this in module policy language: 28 ; Unfortunately, we can't currently express this in module policy language: 33 ; Unfortunately, we can't currently express this in module policy language: 38 ; Unfortunately, we can't currently express this in module policy language: 43 ; Unfortunately, we can't currently express this in module policy language: [all …]
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 20 ; Unfortunately, we can't currently express this in module policy language: 24 ; Unfortunately, we can't currently express this in module policy language: 29 ; Unfortunately, we can't currently express this in module policy language: 34 ; Unfortunately, we can't currently express this in module policy language: 39 ; Unfortunately, we can't currently express this in module policy language: 44 ; Unfortunately, we can't currently express this in module policy language: [all …]
|
/system/nvram/hal/ |
D | Android.bp | 86 required: ["fake-nvram-seccomp.policy"], 89 // seccomp policy for fake_nvram. 91 name: "fake-nvram-seccomp.policy", 92 sub_dir: "policy", 95 src: "fake-nvram-seccomp-arm.policy", 98 src: "fake-nvram-seccomp-arm64.policy", 101 src: "fake-nvram-seccomp-riscv64.policy", 104 src: "fake-nvram-seccomp-x86.policy", 107 src: "fake-nvram-seccomp-x86_64.policy",
|
/system/sepolicy/tools/ |
D | sepolicy-check.c | 66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { in expand_and_check() argument 77 if (expand_avtab(policy, avtab, &exp_avtab)) { in expand_and_check() 116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { in check_rule() argument 131 src = hashtab_search(policy->p_types.table, s); in check_rule() 138 tgt = hashtab_search(policy->p_types.table, t); in check_rule() 145 cls = hashtab_search(policy->p_classes.table, c); in check_rule() 177 perm, policy, &policy->te_avtab); in check_rule() 185 perm, policy, &policy->te_cond_avtab); in check_rule() 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; in main() local 266 policy = optarg; in main() [all …]
|
/system/update_engine/ |
D | UpdateEngine.conf | 19 <policy user="root"> 22 </policy> 23 <policy user="chronos"> 85 </policy> 86 <policy user="power"> 90 </policy> 91 <policy user="dlcservice"> 104 </policy>
|
/system/sepolicy/com.android.sepolicy/33/definitions/ |
D | definitions.cil | 2 ; The seamendc binary reads an amend SELinux policy as input in CIL format and applies its rules to 3 ; a binary SELinux policy. To parse the input correctly, we require the amend policy to be a valid 4 ; standalone policy. This file contains the preliminary statements(sid, sidorder, etc.) and 5 ; definitions (type, typeattribute, class, etc.) necessary to make the amend policy compile
|
/system/sepolicy/ |
D | Android.bp | 96 // reqd_policy_mask - a policy.conf file which contains only the bare minimum 97 // policy necessary to use checkpolicy. 99 // This bare-minimum policy needs to be present in all policy.conf files, but 100 // should not necessarily be exported as part of the public policy. 103 // policy and subsequent removal of CIL policy that should not be exported. 117 // pub_policy - policy that will be exported to be a part of non-platform 118 // policy corresponding to this platform version. 120 // This is a limited subset of policy that would not compile in checkpolicy on 124 // policy, which will generate CIL policy that will then be filtered out by the 128 // - pub_policy.cil: exported 'product', 'system_ext' and 'system' policy. [all …]
|
/system/libhidl/transport/ |
D | HidlTransportSupport.cpp | 62 bool setMinSchedulerPolicy(const sp<IBase>& service, int policy, int priority) { in setMinSchedulerPolicy() argument 68 switch (policy) { in setMinSchedulerPolicy() 78 LOG(ERROR) << "Invalid priority for " << policy << " policy: " << priority; in setMinSchedulerPolicy() 83 LOG(ERROR) << "Invalid scheduler policy " << policy; in setMinSchedulerPolicy() 93 details::gServicePrioMap->setLocked(service, {policy, priority}); in setMinSchedulerPolicy()
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 20 current policy may be overly permissive with respect to one or the 24 types may not yet be defined or may be unconfined in the policy 42 individual types may be directly represented in the source policy 44 -foo -bar is expanded to individual allow rules by the policy 51 Displays domains in the policy that are permissive, i.e. avc 59 Displays the boolean names in the policy (if any). 60 Policy booleans are forbidden in Android policy, so if there is any 61 output, the policy will fail CTS. 74 Displays all attributes in the policy. 82 statements in the same format as the SELinux policy.conf file, i.e. after [all …]
|