Searched refs:policy (Results 1 - 25 of 75) sorted by relevance

123

/system/tpm/trunks/
H A Dcom.android.Trunks.conf5 <policy user="system">
7 </policy>
9 <policy context="default">
14 </policy>
H A Dorg.chromium.Trunks.conf5 <policy user="trunks">
7 </policy>
9 <policy context="default">
14 </policy>
/system/tpm/tpm_manager/server/
H A Dorg.chromium.TpmManager.conf5 <policy user="tpm_manager">
8 </policy>
9 <policy user="root">
12 </policy>
13 <policy context="default">
18 </policy>
H A Dmock_tpm_nvram.cc49 NvramSpacePolicy policy) {
62 ns.policy = policy;
148 NvramSpacePolicy* policy) {
157 *policy = space.policy;
44 FakeDefineSpace( uint32_t index, size_t size, const std::vector<NvramSpaceAttribute>& attributes, const std::string& authorization_value, NvramSpacePolicy policy) argument
142 FakeGetSpaceInfo( uint32_t index, size_t* size, bool* is_read_locked, bool* is_write_locked, std::vector<NvramSpaceAttribute>* attributes, NvramSpacePolicy* policy) argument
/system/tpm/attestation/server/
H A Dorg.chromium.Attestation.conf5 <policy user="attestation">
8 </policy>
9 <policy context="default">
14 </policy>
/system/libhidl/transport/
H A DHidlTransportSupport.cpp32 int policy, int priority) {
34 ALOGE("Can't set scheduler policy on remote service.");
38 if (policy != SCHED_NORMAL && policy != SCHED_FIFO && policy != SCHED_RR) {
39 ALOGE("Invalid scheduler policy %d", policy);
43 if (policy == SCHED_NORMAL && (priority < -20 || priority > 19)) {
47 ALOGE("Invalid priority for real-time policy: %d", priority);
51 details::gServicePrioMap.set(service, { policy, priorit
31 setMinSchedulerPolicy(const sp<::android::hidl::base::V1_0::IBase>& service, int policy, int priority) argument
[all...]
/system/core/include/cutils/
H A Dsched_policy.h56 extern int set_cpuset_policy(int tid, SchedPolicy policy);
58 /* Assign thread tid to the cgroup associated with the specified policy.
64 extern int set_sched_policy(int tid, SchedPolicy policy);
66 /* Return the policy associated with the cgroup of thread tid via policy pointer.
70 extern int get_sched_policy(int tid, SchedPolicy *policy);
72 /* Return a displayable string corresponding to policy.
76 extern const char *get_sched_policy_name(SchedPolicy policy);
/system/core/libcutils/include/cutils/
H A Dsched_policy.h56 extern int set_cpuset_policy(int tid, SchedPolicy policy);
58 /* Assign thread tid to the cgroup associated with the specified policy.
64 extern int set_sched_policy(int tid, SchedPolicy policy);
66 /* Return the policy associated with the cgroup of thread tid via policy pointer.
70 extern int get_sched_policy(int tid, SchedPolicy *policy);
72 /* Return a displayable string corresponding to policy.
76 extern const char *get_sched_policy_name(SchedPolicy policy);
/system/core/libcutils/include_vndk/cutils/
H A Dsched_policy.h56 extern int set_cpuset_policy(int tid, SchedPolicy policy);
58 /* Assign thread tid to the cgroup associated with the specified policy.
64 extern int set_sched_policy(int tid, SchedPolicy policy);
66 /* Return the policy associated with the cgroup of thread tid via policy pointer.
70 extern int get_sched_policy(int tid, SchedPolicy *policy);
72 /* Return a displayable string corresponding to policy.
76 extern const char *get_sched_policy_name(SchedPolicy policy);
/system/sepolicy/
H A Ddefinitions.mk1 # Command to turn collection of policy files into a policy.conf file to be
3 define transform-policy-to-conf
15 .KATI_READONLY := transform-policy-to-conf
H A DAndroid.mk9 # thus designed not to work with any shipping vendor policy. This is similar in
30 # SELinux policy version.
57 # public - policy exported on which non-platform policy developers may write
58 # additional policy. types and attributes are versioned and included in
59 # delivered non-platform policy, which is to be combined with platform policy.
60 # private - platform-only policy required for platform functionality but which
61 # is not exported to vendor policy developers and as such may not be assumed
63 # vendor - vendor-only policy require
[all...]
/system/update_engine/
H A DUpdateEngine.conf4 <policy user="root">
7 </policy>
8 <policy user="chronos">
70 </policy>
71 <policy user="power">
75 </policy>
H A Dsystem_state.h28 namespace policy { namespace
32 } // namespace policy
62 // Sets or gets the latest device policy.
63 virtual void set_device_policy(const policy::DevicePolicy* device_policy) = 0;
64 virtual const policy::DevicePolicy* device_policy() = 0;
H A Dreal_system_state.h26 #include <policy/device_policy.h>
75 const policy::DevicePolicy* device_policy) override {
79 inline const policy::DevicePolicy* device_policy() override {
146 // The latest device policy object from the policy provider.
147 const policy::DevicePolicy* device_policy_{nullptr};
183 policy::PolicyProvider policy_provider_;
/system/nvram/hal/
H A DAndroid.mk39 LOCAL_REQUIRED_MODULES := fake-nvram-seccomp.policy
43 # seccomp policy for fake_nvram.
45 LOCAL_MODULE := fake-nvram-seccomp.policy
47 LOCAL_MODULE_PATH := $(TARGET_OUT)/usr/share/policy/
48 LOCAL_SRC_FILES := fake-nvram-seccomp-$(TARGET_ARCH).policy
/system/extras/ext4_utils/
H A Dext4_crypt_init_extensions.cpp69 // Try to set policy on this directory, but if it is non-empty this may fail.
74 // Only set policy on first level /data directories
75 // To make this less restrictive, consider using a policy file.
76 // However this is overkill for as long as the policy is simply
77 // to apply a global policy to all /data folders created via makedir
95 LOG(INFO) << "Not setting policy on " << dir;
104 std::string policy; local
105 if (!android::base::ReadFileToString(ref_filename, &policy)) {
106 LOG(ERROR) << "Unable to read system policy to set on " << dir;
123 LOG(INFO) << "Setting policy o
[all...]
H A Dext4_crypt.cpp33 #define XATTR_NAME_ENCRYPTION_POLICY "encryption.policy"
73 static void policy_to_hex(const char* policy, char* hex) { argument
75 hex[j++] = HEX_LOOKUP[(policy[i] & 0xF0) >> 4];
76 hex[j++] = HEX_LOOKUP[policy[i] & 0x0F];
126 static bool e4crypt_policy_set(const char *directory, const char *policy, argument
145 memcpy(eep.master_key_descriptor, policy, EXT4_KEY_DESCRIPTOR_SIZE);
147 PLOG(ERROR) << "Failed to set encryption policy for " << directory;
154 policy_to_hex(policy, policy_hex);
159 static bool e4crypt_policy_get(const char *directory, char *policy, argument
177 PLOG(ERROR) << "Failed to get encryption policy fo
196 e4crypt_policy_check(const char *directory, const char *policy, size_t policy_length, int contents_encryption_mode, int filenames_encryption_mode) argument
224 e4crypt_policy_ensure(const char *directory, const char *policy, size_t policy_length, const char *contents_encryption_mode, const char *filenames_encryption_mode) argument
[all...]
/system/core/libcutils/
H A Dsched_policy.cpp31 /* Re-map SP_DEFAULT to the system default policy, and leave other values unchanged.
33 * Returns the possibly re-mapped policy.
68 /* Add tid to the scheduling group defined by the policy */
246 int get_sched_policy(int tid, SchedPolicy *policy) argument
263 *policy = SP_FOREGROUND;
265 *policy = SP_FOREGROUND;
267 *policy = SP_SYSTEM;
269 *policy = SP_BACKGROUND;
271 *policy = SP_TOP_APP;
279 int set_cpuset_policy(int tid, SchedPolicy policy) argument
357 set_sched_policy(int tid, SchedPolicy policy) argument
452 get_sched_policy(int tid UNUSED, SchedPolicy *policy) argument
460 get_sched_policy_name(SchedPolicy policy) argument
[all...]
/system/extras/ext4_utils/include/ext4_utils/
H A Dext4_crypt.h28 int e4crypt_policy_ensure(const char *directory, const char *policy,
/system/update_engine/update_manager/
H A Dstate_factory.h37 policy::PolicyProvider* policy_provider,
H A Dreal_device_policy_provider.h26 #include <policy/libpolicy.h>
43 policy::PolicyProvider* policy_provider)
47 explicit RealDevicePolicyProvider(policy::PolicyProvider* policy_provider)
114 // Schedules a call to periodically refresh the device policy.
117 // Reloads the device policy and updates all the exposed variables.
124 bool (policy::DevicePolicy::*getter_method)(T*) const);
143 // Used for fetching information about the device policy.
144 policy::PolicyProvider* policy_provider_;
146 // Used to schedule refreshes of the device policy.
156 // Variable exposing whether the policy i
[all...]
/system/sepolicy/tools/
H A Dsepolicy-check.c18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0);
66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) {
77 if (expand_avtab(policy, avtab, &exp_avtab)) {
116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { argument
131 src = hashtab_search(policy->p_types.table, s);
138 tgt = hashtab_search(policy->p_types.table, t);
145 cls = hashtab_search(policy->p_classes.table, c);
177 perm, policy, &policy->te_avtab);
185 perm, policy,
63 expand_and_check(int s_op, uint32_t source_type, int t_op, uint32_t target_type, int c_op, uint32_t target_class, perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) argument
235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local
[all...]
/system/sepolicy/tests/
H A Dsepolicy_tests.py4 import policy namespace
43 usage +="plat_file_contexts -p policy [--test test] [--help]"
47 parser.add_option("-p", "--policy", dest="policy", metavar="FILE")
60 if not options.policy:
61 sys.exit("Must specify monolithic policy file\n" + parser.usage)
62 if not os.path.exists(options.policy):
63 sys.exit("Error: policy file " + options.policy + " does not exist\n"
73 pol = policy
[all...]
/system/sepolicy/tools/sepolicy-analyze/
H A Dsepolicy-analyze.c34 fprintf(stderr, "%s must be called on a policy file with a component and the appropriate arguments specified\n", arg0);
35 fprintf(stderr, "%s <policy-file>:\n", arg0);
44 char *policy; local
52 policy = argv[1];
53 if(load_policy(policy, &policydb, &pf))
/system/core/libcutils/tests/
H A Dsched_policy_test.cpp69 // A measureable effect of scheduling policy is that the kernel has 800x
87 SchedPolicy policy; local
88 ASSERT_EQ(0, get_sched_policy(0, &policy));
90 const char *policyName = get_sched_policy_name(policy);

Completed in 629 milliseconds

123