/system/tpm/trunks/ |
H A D | com.android.Trunks.conf | 5 <policy user="system"> 7 </policy> 9 <policy context="default"> 14 </policy>
|
H A D | org.chromium.Trunks.conf | 5 <policy user="trunks"> 7 </policy> 9 <policy context="default"> 14 </policy>
|
/system/tpm/tpm_manager/server/ |
H A D | org.chromium.TpmManager.conf | 5 <policy user="tpm_manager"> 8 </policy> 9 <policy user="root"> 12 </policy> 13 <policy context="default"> 18 </policy>
|
H A D | mock_tpm_nvram.cc | 49 NvramSpacePolicy policy) { 62 ns.policy = policy; 148 NvramSpacePolicy* policy) { 157 *policy = space.policy; 44 FakeDefineSpace( uint32_t index, size_t size, const std::vector<NvramSpaceAttribute>& attributes, const std::string& authorization_value, NvramSpacePolicy policy) argument 142 FakeGetSpaceInfo( uint32_t index, size_t* size, bool* is_read_locked, bool* is_write_locked, std::vector<NvramSpaceAttribute>* attributes, NvramSpacePolicy* policy) argument
|
/system/tpm/attestation/server/ |
H A D | org.chromium.Attestation.conf | 5 <policy user="attestation"> 8 </policy> 9 <policy context="default"> 14 </policy>
|
/system/libhidl/transport/ |
H A D | HidlTransportSupport.cpp | 32 int policy, int priority) { 34 ALOGE("Can't set scheduler policy on remote service."); 38 if (policy != SCHED_NORMAL && policy != SCHED_FIFO && policy != SCHED_RR) { 39 ALOGE("Invalid scheduler policy %d", policy); 43 if (policy == SCHED_NORMAL && (priority < -20 || priority > 19)) { 47 ALOGE("Invalid priority for real-time policy: %d", priority); 51 details::gServicePrioMap.set(service, { policy, priorit 31 setMinSchedulerPolicy(const sp<::android::hidl::base::V1_0::IBase>& service, int policy, int priority) argument [all...] |
/system/core/include/cutils/ |
H A D | sched_policy.h | 56 extern int set_cpuset_policy(int tid, SchedPolicy policy); 58 /* Assign thread tid to the cgroup associated with the specified policy. 64 extern int set_sched_policy(int tid, SchedPolicy policy); 66 /* Return the policy associated with the cgroup of thread tid via policy pointer. 70 extern int get_sched_policy(int tid, SchedPolicy *policy); 72 /* Return a displayable string corresponding to policy. 76 extern const char *get_sched_policy_name(SchedPolicy policy);
|
/system/core/libcutils/include/cutils/ |
H A D | sched_policy.h | 56 extern int set_cpuset_policy(int tid, SchedPolicy policy); 58 /* Assign thread tid to the cgroup associated with the specified policy. 64 extern int set_sched_policy(int tid, SchedPolicy policy); 66 /* Return the policy associated with the cgroup of thread tid via policy pointer. 70 extern int get_sched_policy(int tid, SchedPolicy *policy); 72 /* Return a displayable string corresponding to policy. 76 extern const char *get_sched_policy_name(SchedPolicy policy);
|
/system/core/libcutils/include_vndk/cutils/ |
H A D | sched_policy.h | 56 extern int set_cpuset_policy(int tid, SchedPolicy policy); 58 /* Assign thread tid to the cgroup associated with the specified policy. 64 extern int set_sched_policy(int tid, SchedPolicy policy); 66 /* Return the policy associated with the cgroup of thread tid via policy pointer. 70 extern int get_sched_policy(int tid, SchedPolicy *policy); 72 /* Return a displayable string corresponding to policy. 76 extern const char *get_sched_policy_name(SchedPolicy policy);
|
/system/sepolicy/ |
H A D | definitions.mk | 1 # Command to turn collection of policy files into a policy.conf file to be 3 define transform-policy-to-conf 15 .KATI_READONLY := transform-policy-to-conf
|
H A D | Android.mk | 9 # thus designed not to work with any shipping vendor policy. This is similar in 30 # SELinux policy version. 57 # public - policy exported on which non-platform policy developers may write 58 # additional policy. types and attributes are versioned and included in 59 # delivered non-platform policy, which is to be combined with platform policy. 60 # private - platform-only policy required for platform functionality but which 61 # is not exported to vendor policy developers and as such may not be assumed 63 # vendor - vendor-only policy require [all...] |
/system/update_engine/ |
H A D | UpdateEngine.conf | 4 <policy user="root"> 7 </policy> 8 <policy user="chronos"> 70 </policy> 71 <policy user="power"> 75 </policy>
|
H A D | system_state.h | 28 namespace policy { namespace 32 } // namespace policy 62 // Sets or gets the latest device policy. 63 virtual void set_device_policy(const policy::DevicePolicy* device_policy) = 0; 64 virtual const policy::DevicePolicy* device_policy() = 0;
|
H A D | real_system_state.h | 26 #include <policy/device_policy.h> 75 const policy::DevicePolicy* device_policy) override { 79 inline const policy::DevicePolicy* device_policy() override { 146 // The latest device policy object from the policy provider. 147 const policy::DevicePolicy* device_policy_{nullptr}; 183 policy::PolicyProvider policy_provider_;
|
/system/nvram/hal/ |
H A D | Android.mk | 39 LOCAL_REQUIRED_MODULES := fake-nvram-seccomp.policy 43 # seccomp policy for fake_nvram. 45 LOCAL_MODULE := fake-nvram-seccomp.policy 47 LOCAL_MODULE_PATH := $(TARGET_OUT)/usr/share/policy/ 48 LOCAL_SRC_FILES := fake-nvram-seccomp-$(TARGET_ARCH).policy
|
/system/extras/ext4_utils/ |
H A D | ext4_crypt_init_extensions.cpp | 69 // Try to set policy on this directory, but if it is non-empty this may fail. 74 // Only set policy on first level /data directories 75 // To make this less restrictive, consider using a policy file. 76 // However this is overkill for as long as the policy is simply 77 // to apply a global policy to all /data folders created via makedir 95 LOG(INFO) << "Not setting policy on " << dir; 104 std::string policy; local 105 if (!android::base::ReadFileToString(ref_filename, &policy)) { 106 LOG(ERROR) << "Unable to read system policy to set on " << dir; 123 LOG(INFO) << "Setting policy o [all...] |
H A D | ext4_crypt.cpp | 33 #define XATTR_NAME_ENCRYPTION_POLICY "encryption.policy" 73 static void policy_to_hex(const char* policy, char* hex) { argument 75 hex[j++] = HEX_LOOKUP[(policy[i] & 0xF0) >> 4]; 76 hex[j++] = HEX_LOOKUP[policy[i] & 0x0F]; 126 static bool e4crypt_policy_set(const char *directory, const char *policy, argument 145 memcpy(eep.master_key_descriptor, policy, EXT4_KEY_DESCRIPTOR_SIZE); 147 PLOG(ERROR) << "Failed to set encryption policy for " << directory; 154 policy_to_hex(policy, policy_hex); 159 static bool e4crypt_policy_get(const char *directory, char *policy, argument 177 PLOG(ERROR) << "Failed to get encryption policy fo 196 e4crypt_policy_check(const char *directory, const char *policy, size_t policy_length, int contents_encryption_mode, int filenames_encryption_mode) argument 224 e4crypt_policy_ensure(const char *directory, const char *policy, size_t policy_length, const char *contents_encryption_mode, const char *filenames_encryption_mode) argument [all...] |
/system/core/libcutils/ |
H A D | sched_policy.cpp | 31 /* Re-map SP_DEFAULT to the system default policy, and leave other values unchanged. 33 * Returns the possibly re-mapped policy. 68 /* Add tid to the scheduling group defined by the policy */ 246 int get_sched_policy(int tid, SchedPolicy *policy) argument 263 *policy = SP_FOREGROUND; 265 *policy = SP_FOREGROUND; 267 *policy = SP_SYSTEM; 269 *policy = SP_BACKGROUND; 271 *policy = SP_TOP_APP; 279 int set_cpuset_policy(int tid, SchedPolicy policy) argument 357 set_sched_policy(int tid, SchedPolicy policy) argument 452 get_sched_policy(int tid UNUSED, SchedPolicy *policy) argument 460 get_sched_policy_name(SchedPolicy policy) argument [all...] |
/system/extras/ext4_utils/include/ext4_utils/ |
H A D | ext4_crypt.h | 28 int e4crypt_policy_ensure(const char *directory, const char *policy,
|
/system/update_engine/update_manager/ |
H A D | state_factory.h | 37 policy::PolicyProvider* policy_provider,
|
H A D | real_device_policy_provider.h | 26 #include <policy/libpolicy.h> 43 policy::PolicyProvider* policy_provider) 47 explicit RealDevicePolicyProvider(policy::PolicyProvider* policy_provider) 114 // Schedules a call to periodically refresh the device policy. 117 // Reloads the device policy and updates all the exposed variables. 124 bool (policy::DevicePolicy::*getter_method)(T*) const); 143 // Used for fetching information about the device policy. 144 policy::PolicyProvider* policy_provider_; 146 // Used to schedule refreshes of the device policy. 156 // Variable exposing whether the policy i [all...] |
/system/sepolicy/tools/ |
H A D | sepolicy-check.c | 18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0); 66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { 77 if (expand_avtab(policy, avtab, &exp_avtab)) { 116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { argument 131 src = hashtab_search(policy->p_types.table, s); 138 tgt = hashtab_search(policy->p_types.table, t); 145 cls = hashtab_search(policy->p_classes.table, c); 177 perm, policy, &policy->te_avtab); 185 perm, policy, 63 expand_and_check(int s_op, uint32_t source_type, int t_op, uint32_t target_type, int c_op, uint32_t target_class, perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) argument 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local [all...] |
/system/sepolicy/tests/ |
H A D | sepolicy_tests.py | 4 import policy namespace 43 usage +="plat_file_contexts -p policy [--test test] [--help]" 47 parser.add_option("-p", "--policy", dest="policy", metavar="FILE") 60 if not options.policy: 61 sys.exit("Must specify monolithic policy file\n" + parser.usage) 62 if not os.path.exists(options.policy): 63 sys.exit("Error: policy file " + options.policy + " does not exist\n" 73 pol = policy [all...] |
/system/sepolicy/tools/sepolicy-analyze/ |
H A D | sepolicy-analyze.c | 34 fprintf(stderr, "%s must be called on a policy file with a component and the appropriate arguments specified\n", arg0); 35 fprintf(stderr, "%s <policy-file>:\n", arg0); 44 char *policy; local 52 policy = argv[1]; 53 if(load_policy(policy, &policydb, &pf))
|
/system/core/libcutils/tests/ |
H A D | sched_policy_test.cpp | 69 // A measureable effect of scheduling policy is that the kernel has 800x 87 SchedPolicy policy; local 88 ASSERT_EQ(0, get_sched_policy(0, &policy)); 90 const char *policyName = get_sched_policy_name(policy);
|