Home
last modified time | relevance | path

Searched refs:policy (Results 1 – 25 of 160) sorted by relevance

1234567

/system/core/libcutils/
Dsched_policy.cpp246 int get_sched_policy(int tid, SchedPolicy *policy) in get_sched_policy() argument
263 *policy = SP_FOREGROUND; in get_sched_policy()
265 *policy = SP_FOREGROUND; in get_sched_policy()
267 *policy = SP_SYSTEM; in get_sched_policy()
269 *policy = SP_BACKGROUND; in get_sched_policy()
271 *policy = SP_TOP_APP; in get_sched_policy()
279 int set_cpuset_policy(int tid, SchedPolicy policy) in set_cpuset_policy() argument
283 return set_sched_policy(tid, policy); in set_cpuset_policy()
289 policy = _policy(policy); in set_cpuset_policy()
294 switch (policy) { in set_cpuset_policy()
[all …]
/system/tpm/tpm_manager/server/
Dorg.chromium.TpmManager.conf5 <policy user="tpm_manager">
8 </policy>
9 <policy user="root">
12 </policy>
13 <policy context="default">
18 </policy>
Dmock_tpm_nvram.cc49 NvramSpacePolicy policy) { in FakeDefineSpace() argument
62 ns.policy = policy; in FakeDefineSpace()
148 NvramSpacePolicy* policy) { in FakeGetSpaceInfo() argument
157 *policy = space.policy; in FakeGetSpaceInfo()
/system/extras/ext4_utils/
Dext4_crypt_init_extensions.cpp104 std::string policy; in set_system_de_policy_on() local
105 if (!android::base::ReadFileToString(ref_filename, &policy)) { in set_system_de_policy_on()
124 int result = e4crypt_policy_ensure(dir, policy.c_str(), policy.length(), in set_system_de_policy_on()
131 policy[0], policy[1], policy[2], policy[3], dir); in set_system_de_policy_on()
Dext4_crypt.cpp73 static void policy_to_hex(const char* policy, char* hex) { in policy_to_hex() argument
75 hex[j++] = HEX_LOOKUP[(policy[i] & 0xF0) >> 4]; in policy_to_hex()
76 hex[j++] = HEX_LOOKUP[policy[i] & 0x0F]; in policy_to_hex()
126 static bool e4crypt_policy_set(const char *directory, const char *policy, in e4crypt_policy_set() argument
145 memcpy(eep.master_key_descriptor, policy, EXT4_KEY_DESCRIPTOR_SIZE); in e4crypt_policy_set()
154 policy_to_hex(policy, policy_hex); in e4crypt_policy_set()
159 static bool e4crypt_policy_get(const char *directory, char *policy, in e4crypt_policy_get() argument
191 memcpy(policy, eep.master_key_descriptor, EXT4_KEY_DESCRIPTOR_SIZE); in e4crypt_policy_get()
196 static bool e4crypt_policy_check(const char *directory, const char *policy, in e4crypt_policy_check() argument
212 if (memcmp(policy, existing_policy, EXT4_KEY_DESCRIPTOR_SIZE) != 0) { in e4crypt_policy_check()
[all …]
/system/libhidl/transport/
DHidlTransportSupport.cpp48 int policy, int priority) { in setMinSchedulerPolicy() argument
54 if (policy != SCHED_NORMAL && policy != SCHED_FIFO && policy != SCHED_RR) { in setMinSchedulerPolicy()
55 ALOGE("Invalid scheduler policy %d", policy); in setMinSchedulerPolicy()
59 if (policy == SCHED_NORMAL && (priority < -20 || priority > 19)) { in setMinSchedulerPolicy()
67 details::gServicePrioMap.set(service, { policy, priority }); in setMinSchedulerPolicy()
/system/tpm/trunks/
Dcom.android.Trunks.conf5 <policy user="system">
7 </policy>
9 <policy context="default">
14 </policy>
Dorg.chromium.Trunks.conf5 <policy user="trunks">
7 </policy>
9 <policy context="default">
14 </policy>
/system/tpm/attestation/server/
Dorg.chromium.Attestation.conf5 <policy user="attestation">
8 </policy>
9 <policy context="default">
14 </policy>
/system/update_engine/
DUpdateEngine.conf4 <policy user="root">
7 </policy>
8 <policy user="chronos">
70 </policy>
71 <policy user="power">
75 </policy>
Dsystem_state.h28 namespace policy {
63 virtual void set_device_policy(const policy::DevicePolicy* device_policy) = 0;
64 virtual const policy::DevicePolicy* device_policy() = 0;
/system/sepolicy/tools/
Dsepolicy-check.c66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { in expand_and_check() argument
77 if (expand_avtab(policy, avtab, &exp_avtab)) { in expand_and_check()
116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { in check_rule() argument
131 src = hashtab_search(policy->p_types.table, s); in check_rule()
138 tgt = hashtab_search(policy->p_types.table, t); in check_rule()
145 cls = hashtab_search(policy->p_classes.table, c); in check_rule()
177 perm, policy, &policy->te_avtab); in check_rule()
185 perm, policy, &policy->te_cond_avtab); in check_rule()
235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; in main() local
266 policy = optarg; in main()
[all …]
DREADME1 This directory contains a number of tools related to policy, some of
2 which are used in building and validating the policy and others are
3 available for help in auditing and analyzing policy. The tools are
8 property_contexts configuration file. Used as part of the policy
31 policy build process to merge and validate the configuration.
43 certs not already found in that policy. This becomes useful when a directory
45 policy not already explicitly listed.
52 -f POLICY, --file POLICY mac_permissions.xml policy file
/system/core/libcutils/include_vndk/cutils/
Dsched_policy.h56 extern int set_cpuset_policy(int tid, SchedPolicy policy);
64 extern int set_sched_policy(int tid, SchedPolicy policy);
70 extern int get_sched_policy(int tid, SchedPolicy *policy);
76 extern const char *get_sched_policy_name(SchedPolicy policy);
/system/core/libcutils/include/cutils/
Dsched_policy.h56 extern int set_cpuset_policy(int tid, SchedPolicy policy);
64 extern int set_sched_policy(int tid, SchedPolicy policy);
70 extern int get_sched_policy(int tid, SchedPolicy *policy);
76 extern const char *get_sched_policy_name(SchedPolicy policy);
/system/sepolicy/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
21 ; Unfortunately, we can't currently express this in module policy language:
26 ; Unfortunately, we can't currently express this in module policy language:
31 ; Unfortunately, we can't currently express this in module policy language:
/system/sepolicy/tests/
DAndroid.bp16 name: "policy.py",
17 srcs: ["policy.py"],
26 required: ["mini_parser.py", "policy.py"],
33 required: ["policy.py"],
Dsepolicy_tests.py4 import policy
60 if not options.policy:
62 if not os.path.exists(options.policy):
63 sys.exit("Error: policy file " + options.policy + " does not exist\n"
73 pol = policy.Policy(options.policy, options.file_contexts, options.libpath)
Dtreble_sepolicy_tests.py5 import policy
6 from policy import MatchPathPrefix
307 if not options.policy:
309 if not os.path.exists(options.policy):
310 sys.exit("Error: policy file " + options.policy + " does not exist\n"
320 pol = policy.Policy(options.policy, options.file_contexts, options.libpath)
322 basepol = policy.Policy(options.basepolicy, None, options.libpath)
323 oldpol = policy.Policy(options.oldpolicy, None, options.libpath)
/system/nvram/hal/
DAndroid.mk39 LOCAL_REQUIRED_MODULES := fake-nvram-seccomp.policy
45 LOCAL_MODULE := fake-nvram-seccomp.policy
47 LOCAL_MODULE_PATH := $(TARGET_OUT)/usr/share/policy/
48 LOCAL_SRC_FILES := fake-nvram-seccomp-$(TARGET_ARCH).policy
/system/sepolicy/prebuilts/api/26.0/private/
Dtechnical_debt.cil1 ; THIS IS A WORKAROUND for the current limitations of the module policy language
6 ; NOTE: This file has no effect on recovery policy.
9 ; Unfortunately, we can't currently express this in module policy language:
16 ; Unfortunately, we can't currently express this in module policy language:
21 ; Unfortunately, we can't currently express this in module policy language:
26 ; Unfortunately, we can't currently express this in module policy language:
/system/sepolicy/tools/sepolicy-analyze/
DREADME20 current policy may be overly permissive with respect to one or the
24 types may not yet be defined or may be unconfined in the policy
42 individual types may be directly represented in the source policy
44 -foo -bar is expanded to individual allow rules by the policy
51 Displays domains in the policy that are permissive, i.e. avc
59 Displays the boolean names in the policy (if any).
60 Policy booleans are forbidden in Android policy, so if there is any
61 output, the policy will fail CTS.
74 Displays all attributes in the policy.
82 statements in the same format as the SELinux policy.conf file, i.e. after
[all …]
Dsepolicy-analyze.c44 char *policy; in main() local
52 policy = argv[1]; in main()
53 if(load_policy(policy, &policydb, &pf)) in main()
/system/bt/bta/sys/
Dbta_sys_conn.cc367 void bta_sys_set_policy(uint8_t id, uint8_t policy, in bta_sys_set_policy() argument
370 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_SET, id, policy, &peer_addr); in bta_sys_set_policy()
384 void bta_sys_clear_policy(uint8_t id, uint8_t policy, in bta_sys_clear_policy() argument
387 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_CLR, id, policy, &peer_addr); in bta_sys_clear_policy()
401 void bta_sys_set_default_policy(uint8_t id, uint8_t policy) { in bta_sys_set_default_policy() argument
403 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_DEF_SET, id, policy, NULL); in bta_sys_set_default_policy()
417 void bta_sys_clear_default_policy(uint8_t id, uint8_t policy) { in bta_sys_clear_default_policy() argument
419 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_DEF_CLR, id, policy, NULL); in bta_sys_clear_default_policy()
/system/sepolicy/private/compat/26.0/
D26.0.ignore.cil2 ;; analogue in older policy. Thus, we do not need to map these types to
30 ;; older policy, but that should not remain accessible to vendor policy.

1234567