/system/core/libcutils/ |
D | sched_policy.cpp | 246 int get_sched_policy(int tid, SchedPolicy *policy) in get_sched_policy() argument 263 *policy = SP_FOREGROUND; in get_sched_policy() 265 *policy = SP_FOREGROUND; in get_sched_policy() 267 *policy = SP_SYSTEM; in get_sched_policy() 269 *policy = SP_BACKGROUND; in get_sched_policy() 271 *policy = SP_TOP_APP; in get_sched_policy() 279 int set_cpuset_policy(int tid, SchedPolicy policy) in set_cpuset_policy() argument 283 return set_sched_policy(tid, policy); in set_cpuset_policy() 289 policy = _policy(policy); in set_cpuset_policy() 294 switch (policy) { in set_cpuset_policy() [all …]
|
/system/tpm/tpm_manager/server/ |
D | org.chromium.TpmManager.conf | 5 <policy user="tpm_manager"> 8 </policy> 9 <policy user="root"> 12 </policy> 13 <policy context="default"> 18 </policy>
|
D | mock_tpm_nvram.cc | 49 NvramSpacePolicy policy) { in FakeDefineSpace() argument 62 ns.policy = policy; in FakeDefineSpace() 148 NvramSpacePolicy* policy) { in FakeGetSpaceInfo() argument 157 *policy = space.policy; in FakeGetSpaceInfo()
|
/system/extras/ext4_utils/ |
D | ext4_crypt_init_extensions.cpp | 104 std::string policy; in set_system_de_policy_on() local 105 if (!android::base::ReadFileToString(ref_filename, &policy)) { in set_system_de_policy_on() 124 int result = e4crypt_policy_ensure(dir, policy.c_str(), policy.length(), in set_system_de_policy_on() 131 policy[0], policy[1], policy[2], policy[3], dir); in set_system_de_policy_on()
|
D | ext4_crypt.cpp | 73 static void policy_to_hex(const char* policy, char* hex) { in policy_to_hex() argument 75 hex[j++] = HEX_LOOKUP[(policy[i] & 0xF0) >> 4]; in policy_to_hex() 76 hex[j++] = HEX_LOOKUP[policy[i] & 0x0F]; in policy_to_hex() 126 static bool e4crypt_policy_set(const char *directory, const char *policy, in e4crypt_policy_set() argument 145 memcpy(eep.master_key_descriptor, policy, EXT4_KEY_DESCRIPTOR_SIZE); in e4crypt_policy_set() 154 policy_to_hex(policy, policy_hex); in e4crypt_policy_set() 159 static bool e4crypt_policy_get(const char *directory, char *policy, in e4crypt_policy_get() argument 191 memcpy(policy, eep.master_key_descriptor, EXT4_KEY_DESCRIPTOR_SIZE); in e4crypt_policy_get() 196 static bool e4crypt_policy_check(const char *directory, const char *policy, in e4crypt_policy_check() argument 212 if (memcmp(policy, existing_policy, EXT4_KEY_DESCRIPTOR_SIZE) != 0) { in e4crypt_policy_check() [all …]
|
/system/libhidl/transport/ |
D | HidlTransportSupport.cpp | 48 int policy, int priority) { in setMinSchedulerPolicy() argument 54 if (policy != SCHED_NORMAL && policy != SCHED_FIFO && policy != SCHED_RR) { in setMinSchedulerPolicy() 55 ALOGE("Invalid scheduler policy %d", policy); in setMinSchedulerPolicy() 59 if (policy == SCHED_NORMAL && (priority < -20 || priority > 19)) { in setMinSchedulerPolicy() 67 details::gServicePrioMap.set(service, { policy, priority }); in setMinSchedulerPolicy()
|
/system/tpm/trunks/ |
D | com.android.Trunks.conf | 5 <policy user="system"> 7 </policy> 9 <policy context="default"> 14 </policy>
|
D | org.chromium.Trunks.conf | 5 <policy user="trunks"> 7 </policy> 9 <policy context="default"> 14 </policy>
|
/system/tpm/attestation/server/ |
D | org.chromium.Attestation.conf | 5 <policy user="attestation"> 8 </policy> 9 <policy context="default"> 14 </policy>
|
/system/update_engine/ |
D | UpdateEngine.conf | 4 <policy user="root"> 7 </policy> 8 <policy user="chronos"> 70 </policy> 71 <policy user="power"> 75 </policy>
|
D | system_state.h | 28 namespace policy { 63 virtual void set_device_policy(const policy::DevicePolicy* device_policy) = 0; 64 virtual const policy::DevicePolicy* device_policy() = 0;
|
/system/sepolicy/tools/ |
D | sepolicy-check.c | 66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { in expand_and_check() argument 77 if (expand_avtab(policy, avtab, &exp_avtab)) { in expand_and_check() 116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { in check_rule() argument 131 src = hashtab_search(policy->p_types.table, s); in check_rule() 138 tgt = hashtab_search(policy->p_types.table, t); in check_rule() 145 cls = hashtab_search(policy->p_classes.table, c); in check_rule() 177 perm, policy, &policy->te_avtab); in check_rule() 185 perm, policy, &policy->te_cond_avtab); in check_rule() 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; in main() local 266 policy = optarg; in main() [all …]
|
D | README | 1 This directory contains a number of tools related to policy, some of 2 which are used in building and validating the policy and others are 3 available for help in auditing and analyzing policy. The tools are 8 property_contexts configuration file. Used as part of the policy 31 policy build process to merge and validate the configuration. 43 certs not already found in that policy. This becomes useful when a directory 45 policy not already explicitly listed. 52 -f POLICY, --file POLICY mac_permissions.xml policy file
|
/system/core/libcutils/include_vndk/cutils/ |
D | sched_policy.h | 56 extern int set_cpuset_policy(int tid, SchedPolicy policy); 64 extern int set_sched_policy(int tid, SchedPolicy policy); 70 extern int get_sched_policy(int tid, SchedPolicy *policy); 76 extern const char *get_sched_policy_name(SchedPolicy policy);
|
/system/core/libcutils/include/cutils/ |
D | sched_policy.h | 56 extern int set_cpuset_policy(int tid, SchedPolicy policy); 64 extern int set_sched_policy(int tid, SchedPolicy policy); 70 extern int get_sched_policy(int tid, SchedPolicy *policy); 76 extern const char *get_sched_policy_name(SchedPolicy policy);
|
/system/sepolicy/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 21 ; Unfortunately, we can't currently express this in module policy language: 26 ; Unfortunately, we can't currently express this in module policy language: 31 ; Unfortunately, we can't currently express this in module policy language:
|
/system/sepolicy/tests/ |
D | Android.bp | 16 name: "policy.py", 17 srcs: ["policy.py"], 26 required: ["mini_parser.py", "policy.py"], 33 required: ["policy.py"],
|
D | sepolicy_tests.py | 4 import policy 60 if not options.policy: 62 if not os.path.exists(options.policy): 63 sys.exit("Error: policy file " + options.policy + " does not exist\n" 73 pol = policy.Policy(options.policy, options.file_contexts, options.libpath)
|
D | treble_sepolicy_tests.py | 5 import policy 6 from policy import MatchPathPrefix 307 if not options.policy: 309 if not os.path.exists(options.policy): 310 sys.exit("Error: policy file " + options.policy + " does not exist\n" 320 pol = policy.Policy(options.policy, options.file_contexts, options.libpath) 322 basepol = policy.Policy(options.basepolicy, None, options.libpath) 323 oldpol = policy.Policy(options.oldpolicy, None, options.libpath)
|
/system/nvram/hal/ |
D | Android.mk | 39 LOCAL_REQUIRED_MODULES := fake-nvram-seccomp.policy 45 LOCAL_MODULE := fake-nvram-seccomp.policy 47 LOCAL_MODULE_PATH := $(TARGET_OUT)/usr/share/policy/ 48 LOCAL_SRC_FILES := fake-nvram-seccomp-$(TARGET_ARCH).policy
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 21 ; Unfortunately, we can't currently express this in module policy language: 26 ; Unfortunately, we can't currently express this in module policy language:
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 20 current policy may be overly permissive with respect to one or the 24 types may not yet be defined or may be unconfined in the policy 42 individual types may be directly represented in the source policy 44 -foo -bar is expanded to individual allow rules by the policy 51 Displays domains in the policy that are permissive, i.e. avc 59 Displays the boolean names in the policy (if any). 60 Policy booleans are forbidden in Android policy, so if there is any 61 output, the policy will fail CTS. 74 Displays all attributes in the policy. 82 statements in the same format as the SELinux policy.conf file, i.e. after [all …]
|
D | sepolicy-analyze.c | 44 char *policy; in main() local 52 policy = argv[1]; in main() 53 if(load_policy(policy, &policydb, &pf)) in main()
|
/system/bt/bta/sys/ |
D | bta_sys_conn.cc | 367 void bta_sys_set_policy(uint8_t id, uint8_t policy, in bta_sys_set_policy() argument 370 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_SET, id, policy, &peer_addr); in bta_sys_set_policy() 384 void bta_sys_clear_policy(uint8_t id, uint8_t policy, in bta_sys_clear_policy() argument 387 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_CLR, id, policy, &peer_addr); in bta_sys_clear_policy() 401 void bta_sys_set_default_policy(uint8_t id, uint8_t policy) { in bta_sys_set_default_policy() argument 403 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_DEF_SET, id, policy, NULL); in bta_sys_set_default_policy() 417 void bta_sys_clear_default_policy(uint8_t id, uint8_t policy) { in bta_sys_clear_default_policy() argument 419 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_DEF_CLR, id, policy, NULL); in bta_sys_clear_default_policy()
|
/system/sepolicy/private/compat/26.0/ |
D | 26.0.ignore.cil | 2 ;; analogue in older policy. Thus, we do not need to map these types to 30 ;; older policy, but that should not remain accessible to vendor policy.
|