Home
last modified time | relevance | path

Searched refs:policy (Results 1 – 25 of 476) sorted by relevance

12345678910>>...20

/system/core/libprocessgroup/
Dsched_policy.cpp41 int set_cpuset_policy(int tid, SchedPolicy policy) { in set_cpuset_policy() argument
45 policy = _policy(policy); in set_cpuset_policy()
47 switch (policy) { in set_cpuset_policy()
67 int set_sched_policy(int tid, SchedPolicy policy) { in set_sched_policy() argument
71 policy = _policy(policy); in set_sched_policy()
96 switch (policy) { in set_sched_policy()
118 switch (policy) { in set_sched_policy()
168 static int get_sched_policy_from_group(const std::string& group, SchedPolicy* policy) { in get_sched_policy_from_group() argument
170 *policy = SP_FOREGROUND; in get_sched_policy_from_group()
172 *policy = SP_FOREGROUND; in get_sched_policy_from_group()
[all …]
/system/core/code_coverage/
DAndroid.bp7 name: "code_coverage.policy",
12 src: "empty_policy/code_coverage.arm.policy",
15 src: "seccomp_policy/code_coverage.arm.policy",
20 src: "empty_policy/code_coverage.arm64.policy",
23 src: "seccomp_policy/code_coverage.arm64.policy",
28 src: "empty_policy/code_coverage.riscv64.policy",
31 src: "seccomp_policy/code_coverage.riscv64.policy",
36 src: "empty_policy/code_coverage.x86.policy",
39 src: "seccomp_policy/code_coverage.x86.policy",
44 src: "empty_policy/code_coverage.x86_64.policy",
[all …]
/system/extras/libfscrypt/
Dfscrypt.cpp129 fscrypt_policy_v1 policy; in fscrypt_is_encrypted() local
134 return ioctl(fd, FS_IOC_GET_ENCRYPTION_POLICY, &policy) == 0 || errno == EINVAL; in fscrypt_is_encrypted()
276 static std::string PolicyDebugString(const EncryptionPolicy& policy) { in PolicyDebugString() argument
279 BytesToHex(policy.key_raw_ref, &ref_hex); in PolicyDebugString()
281 ss << " v" << policy.options.version; in PolicyDebugString()
282 ss << " modes " << policy.options.contents_mode << "/" << policy.options.filenames_mode; in PolicyDebugString()
283 ss << std::hex << " flags 0x" << policy.options.flags; in PolicyDebugString()
287 bool EnsurePolicy(const EncryptionPolicy& policy, const std::string& directory) { in EnsurePolicy() argument
294 switch (policy.options.version) { in EnsurePolicy()
296 if (policy.key_raw_ref.size() != FSCRYPT_KEY_DESCRIPTOR_SIZE) { in EnsurePolicy()
[all …]
/system/core/libprocessgroup/include/processgroup/
Dsched_policy.h56 extern int set_cpuset_policy(int tid, SchedPolicy policy);
64 extern int set_sched_policy(int tid, SchedPolicy policy);
70 extern int get_sched_policy(int tid, SchedPolicy* policy);
76 extern const char* get_sched_policy_name(SchedPolicy policy);
82 extern const char* get_cpuset_policy_profile_name(SchedPolicy policy);
88 extern const char* get_sched_policy_profile_name(SchedPolicy policy);
/system/core/debuggerd/seccomp_policy/
Dgenerate.sh7 $CPP -D__arm__ -o crash_dump.arm.policy
8 $CPP -D__aarch64__ -D__LP64__ -o crash_dump.arm64.policy
9 $CPP -D__riscv -D__LP64__ -o crash_dump.riscv64.policy
10 $CPP -D__i386__ -o crash_dump.x86.policy
11 $CPP -D__x86_64__ -D__LP64__ -o crash_dump.x86_64.policy
/system/bpfprogs/
Dtime_in_state_test.cpp28 int bpf_policy_freq_idx_map_update_elem(uint32_t* policy, uint8_t* index, uint64_t flags);
29 int bpf_policy_nr_active_map_update_elem(uint32_t* policy, uint32_t* active, uint64_t flags);
30 uint8_t* bpf_policy_freq_idx_map_lookup_elem(uint32_t* policy);
31 int bpf_policy_freq_idx_map_update_elem(uint32_t* policy, uint8_t* index, uint64_t flags);
67 static void initCpuPolicy(uint32_t policy, std::vector<uint32_t> cpuIds, in initCpuPolicy() argument
70 bpf_cpu_policy_map_update_elem(&cpuId, &policy, BPF_ANY); in initCpuPolicy()
84 freq_idx_key_t freqIdxKey{.policy = policy, .freq = frequencies[i]}; in initCpuPolicy()
89 bpf_policy_nr_active_map_update_elem(&policy, &zero, BPF_ANY); in initCpuPolicy()
129 ASSERT_EQ(expectedPolicy[i], value->policy[i]); in assertConcurrentTimes()
131 ASSERT_EQ(0, value->policy[i]); in assertConcurrentTimes()
[all …]
DtimeInState.c77 concurrent_val_t zero_val = {.active = {0}, .policy = {0}}; in update_uid()
87 concurrent_val_t zero_val = {.active = {0}, .policy = {0}}; in update_uid()
92 if (ct) ct->policy[policy_active % CPUS_PER_ENTRY] += delta; in update_uid()
127 uint32_t policy = *policyp; variable
129 uint32_t* policy_active = bpf_policy_nr_active_map_lookup_elem(&policy);
153 uint8_t* freq_idxp = bpf_policy_freq_idx_map_lookup_elem(&policy);
234 uint32_t policy = *policyp; variable
235 freq_idx_key_t key = {.policy = policy, .freq = new};
239 bpf_policy_freq_idx_map_update_elem(&policy, &idx, BPF_ANY);
/system/core/init/
Dfscrypt_init_extensions.cpp102 static bool LookupPolicy(const std::string& ref_basename, EncryptionPolicy* policy) { in LookupPolicy() argument
104 if (!android::base::ReadFileToString(ref_filename, &policy->key_raw_ref)) { in LookupPolicy()
115 if (!ParseOptions(options_string, &policy->options)) { in LookupPolicy()
122 static bool EnsurePolicyOrLog(const EncryptionPolicy& policy, const std::string& dir) { in EnsurePolicyOrLog() argument
123 if (!EnsurePolicy(policy, dir)) { in EnsurePolicyOrLog()
125 BytesToHex(policy.key_raw_ref, &ref_hex); in EnsurePolicyOrLog()
133 EncryptionPolicy policy; in SetPolicyOn() local
134 if (!LookupPolicy(ref_basename, &policy)) return false; in SetPolicyOn()
135 if (!EnsurePolicyOrLog(policy, dir)) return false; in SetPolicyOn()
/system/vold/
DKeyUtil.cpp219 static bool buildKeySpecifier(fscrypt_key_specifier* spec, const EncryptionPolicy& policy) { in buildKeySpecifier() argument
220 switch (policy.options.version) { in buildKeySpecifier()
222 if (policy.key_raw_ref.size() != FSCRYPT_KEY_DESCRIPTOR_SIZE) { in buildKeySpecifier()
224 << policy.key_raw_ref.size(); in buildKeySpecifier()
228 memcpy(spec->u.descriptor, policy.key_raw_ref.c_str(), FSCRYPT_KEY_DESCRIPTOR_SIZE); in buildKeySpecifier()
231 if (policy.key_raw_ref.size() != FSCRYPT_KEY_IDENTIFIER_SIZE) { in buildKeySpecifier()
233 << policy.key_raw_ref.size(); in buildKeySpecifier()
237 memcpy(spec->u.identifier, policy.key_raw_ref.c_str(), FSCRYPT_KEY_IDENTIFIER_SIZE); in buildKeySpecifier()
240 LOG(ERROR) << "Invalid encryption policy version: " << policy.options.version; in buildKeySpecifier()
274 const KeyBuffer& key, EncryptionPolicy* policy) { in installKey() argument
[all …]
DKeyUtil.h65 const KeyBuffer& key, android::fscrypt::EncryptionPolicy* policy);
73 bool evictKey(const std::string& mountpoint, const android::fscrypt::EncryptionPolicy& policy);
84 const android::fscrypt::EncryptionPolicy& policy);
/system/sepolicy/prebuilts/api/31.0/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
20 ; Unfortunately, we can't currently express this in module policy language:
24 ; Unfortunately, we can't currently express this in module policy language:
28 ; Unfortunately, we can't currently express this in module policy language:
33 ; Unfortunately, we can't currently express this in module policy language:
38 ; Unfortunately, we can't currently express this in module policy language:
43 ; Unfortunately, we can't currently express this in module policy language:
[all …]
/system/sepolicy/prebuilts/api/32.0/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
20 ; Unfortunately, we can't currently express this in module policy language:
24 ; Unfortunately, we can't currently express this in module policy language:
28 ; Unfortunately, we can't currently express this in module policy language:
33 ; Unfortunately, we can't currently express this in module policy language:
38 ; Unfortunately, we can't currently express this in module policy language:
43 ; Unfortunately, we can't currently express this in module policy language:
[all …]
/system/core/code_coverage/seccomp_policy/
Dgenerate.sh9 $CPP -D__arm__ -o code_coverage.arm.policy
10 $CPP -D__aarch64__ -D__LP64__ -o code_coverage.arm64.policy
11 $CPP -D__i386__ -o code_coverage.x86.policy
12 $CPP -D__x86_64__ -D__LP64__ -o code_coverage.x86_64.policy
/system/sepolicy/prebuilts/api/33.0/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
20 ; Unfortunately, we can't currently express this in module policy language:
24 ; Unfortunately, we can't currently express this in module policy language:
28 ; Unfortunately, we can't currently express this in module policy language:
33 ; Unfortunately, we can't currently express this in module policy language:
38 ; Unfortunately, we can't currently express this in module policy language:
43 ; Unfortunately, we can't currently express this in module policy language:
[all …]
/system/sepolicy/prebuilts/api/30.0/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
20 ; Unfortunately, we can't currently express this in module policy language:
24 ; Unfortunately, we can't currently express this in module policy language:
28 ; Unfortunately, we can't currently express this in module policy language:
33 ; Unfortunately, we can't currently express this in module policy language:
38 ; Unfortunately, we can't currently express this in module policy language:
43 ; Unfortunately, we can't currently express this in module policy language:
[all …]
/system/sepolicy/prebuilts/api/34.0/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
20 ; Unfortunately, we can't currently express this in module policy language:
24 ; Unfortunately, we can't currently express this in module policy language:
28 ; Unfortunately, we can't currently express this in module policy language:
33 ; Unfortunately, we can't currently express this in module policy language:
38 ; Unfortunately, we can't currently express this in module policy language:
43 ; Unfortunately, we can't currently express this in module policy language:
[all …]
/system/sepolicy/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
20 ; Unfortunately, we can't currently express this in module policy language:
24 ; Unfortunately, we can't currently express this in module policy language:
28 ; Unfortunately, we can't currently express this in module policy language:
33 ; Unfortunately, we can't currently express this in module policy language:
38 ; Unfortunately, we can't currently express this in module policy language:
43 ; Unfortunately, we can't currently express this in module policy language:
[all …]
/system/sepolicy/prebuilts/api/29.0/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
20 ; Unfortunately, we can't currently express this in module policy language:
24 ; Unfortunately, we can't currently express this in module policy language:
29 ; Unfortunately, we can't currently express this in module policy language:
34 ; Unfortunately, we can't currently express this in module policy language:
39 ; Unfortunately, we can't currently express this in module policy language:
44 ; Unfortunately, we can't currently express this in module policy language:
[all …]
/system/nvram/hal/
DAndroid.bp86 required: ["fake-nvram-seccomp.policy"],
89 // seccomp policy for fake_nvram.
91 name: "fake-nvram-seccomp.policy",
92 sub_dir: "policy",
95 src: "fake-nvram-seccomp-arm.policy",
98 src: "fake-nvram-seccomp-arm64.policy",
101 src: "fake-nvram-seccomp-riscv64.policy",
104 src: "fake-nvram-seccomp-x86.policy",
107 src: "fake-nvram-seccomp-x86_64.policy",
/system/sepolicy/tools/
Dsepolicy-check.c66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { in expand_and_check() argument
77 if (expand_avtab(policy, avtab, &exp_avtab)) { in expand_and_check()
116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { in check_rule() argument
131 src = hashtab_search(policy->p_types.table, s); in check_rule()
138 tgt = hashtab_search(policy->p_types.table, t); in check_rule()
145 cls = hashtab_search(policy->p_classes.table, c); in check_rule()
177 perm, policy, &policy->te_avtab); in check_rule()
185 perm, policy, &policy->te_cond_avtab); in check_rule()
235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; in main() local
266 policy = optarg; in main()
[all …]
/system/update_engine/
DUpdateEngine.conf19 <policy user="root">
22 </policy>
23 <policy user="chronos">
85 </policy>
86 <policy user="power">
90 </policy>
91 <policy user="dlcservice">
104 </policy>
/system/sepolicy/com.android.sepolicy/33/definitions/
Ddefinitions.cil2 ; The seamendc binary reads an amend SELinux policy as input in CIL format and applies its rules to
3 ; a binary SELinux policy. To parse the input correctly, we require the amend policy to be a valid
4 ; standalone policy. This file contains the preliminary statements(sid, sidorder, etc.) and
5 ; definitions (type, typeattribute, class, etc.) necessary to make the amend policy compile
/system/sepolicy/
DAndroid.bp96 // reqd_policy_mask - a policy.conf file which contains only the bare minimum
97 // policy necessary to use checkpolicy.
99 // This bare-minimum policy needs to be present in all policy.conf files, but
100 // should not necessarily be exported as part of the public policy.
103 // policy and subsequent removal of CIL policy that should not be exported.
117 // pub_policy - policy that will be exported to be a part of non-platform
118 // policy corresponding to this platform version.
120 // This is a limited subset of policy that would not compile in checkpolicy on
124 // policy, which will generate CIL policy that will then be filtered out by the
128 // - pub_policy.cil: exported 'product', 'system_ext' and 'system' policy.
[all …]
/system/libhidl/transport/
DHidlTransportSupport.cpp62 bool setMinSchedulerPolicy(const sp<IBase>& service, int policy, int priority) { in setMinSchedulerPolicy() argument
68 switch (policy) { in setMinSchedulerPolicy()
78 LOG(ERROR) << "Invalid priority for " << policy << " policy: " << priority; in setMinSchedulerPolicy()
83 LOG(ERROR) << "Invalid scheduler policy " << policy; in setMinSchedulerPolicy()
93 details::gServicePrioMap->setLocked(service, {policy, priority}); in setMinSchedulerPolicy()
/system/sepolicy/tools/sepolicy-analyze/
DREADME20 current policy may be overly permissive with respect to one or the
24 types may not yet be defined or may be unconfined in the policy
42 individual types may be directly represented in the source policy
44 -foo -bar is expanded to individual allow rules by the policy
51 Displays domains in the policy that are permissive, i.e. avc
59 Displays the boolean names in the policy (if any).
60 Policy booleans are forbidden in Android policy, so if there is any
61 output, the policy will fail CTS.
74 Displays all attributes in the policy.
82 statements in the same format as the SELinux policy.conf file, i.e. after
[all …]

12345678910>>...20