/system/tpm/trunks/ |
H A D | com.android.Trunks.conf | 5 <policy user="system"> 7 </policy> 9 <policy context="default"> 14 </policy>
|
H A D | org.chromium.Trunks.conf | 5 <policy user="trunks"> 7 </policy> 9 <policy context="default"> 14 </policy>
|
H A D | Android.mk | 17 # trunksd-seccomp.policy 20 LOCAL_MODULE := trunksd-seccomp.policy 22 LOCAL_MODULE_PATH := $(TARGET_OUT)/usr/share/policy/ 23 LOCAL_SRC_FILES := trunksd-seccomp-$(TARGET_ARCH).policy
|
/system/tpm/tpm_manager/server/ |
H A D | org.chromium.TpmManager.conf | 5 <policy user="tpm_manager"> 8 </policy> 9 <policy user="root"> 12 </policy> 13 <policy context="default"> 18 </policy>
|
/system/core/debuggerd/seccomp_policy/ |
H A D | generate.sh | 6 CPP='cpp -undef -E -P crash_dump.policy.def' 7 $CPP -D__arm__ -o crash_dump.arm.policy 8 $CPP -D__aarch64__ -D__LP64__ -o crash_dump.arm64.policy 9 $CPP -D__i386__ -o crash_dump.x86.policy 10 $CPP -D__x86_64__ -D__LP64__ -o crash_dump.x86_64.policy
|
/system/tpm/attestation/server/ |
H A D | org.chromium.Attestation.conf | 5 <policy user="attestation"> 8 </policy> 9 <policy context="default"> 14 </policy>
|
/system/core/debuggerd/ |
H A D | Android.mk | 4 LOCAL_MODULE := crash_dump.policy 9 LOCAL_MODULE_STEM_32 := crash_dump.arm.policy 10 LOCAL_MODULE_STEM_64 := crash_dump.arm64.policy 14 LOCAL_MODULE_STEM_32 := crash_dump.x86.policy 15 LOCAL_MODULE_STEM_64 := crash_dump.x86_64.policy 19 LOCAL_SRC_FILES_arm := seccomp_policy/crash_dump.arm.policy 20 LOCAL_SRC_FILES_arm64 := seccomp_policy/crash_dump.arm64.policy 21 LOCAL_SRC_FILES_x86 := seccomp_policy/crash_dump.x86.policy 22 LOCAL_SRC_FILES_x86_64 := seccomp_policy/crash_dump.x86_64.policy
|
/system/core/include/cutils/ |
H A D | sched_policy.h | 57 extern int set_cpuset_policy(int tid, SchedPolicy policy); 59 /* Assign thread tid to the cgroup associated with the specified policy. 65 extern int set_sched_policy(int tid, SchedPolicy policy); 67 /* Return the policy associated with the cgroup of thread tid via policy pointer. 71 extern int get_sched_policy(int tid, SchedPolicy *policy); 73 /* Return a displayable string corresponding to policy. 77 extern const char *get_sched_policy_name(SchedPolicy policy);
|
/system/core/libcutils/include/cutils/ |
H A D | sched_policy.h | 57 extern int set_cpuset_policy(int tid, SchedPolicy policy); 59 /* Assign thread tid to the cgroup associated with the specified policy. 65 extern int set_sched_policy(int tid, SchedPolicy policy); 67 /* Return the policy associated with the cgroup of thread tid via policy pointer. 71 extern int get_sched_policy(int tid, SchedPolicy *policy); 73 /* Return a displayable string corresponding to policy. 77 extern const char *get_sched_policy_name(SchedPolicy policy);
|
/system/core/libcutils/include_vndk/cutils/ |
H A D | sched_policy.h | 57 extern int set_cpuset_policy(int tid, SchedPolicy policy); 59 /* Assign thread tid to the cgroup associated with the specified policy. 65 extern int set_sched_policy(int tid, SchedPolicy policy); 67 /* Return the policy associated with the cgroup of thread tid via policy pointer. 71 extern int get_sched_policy(int tid, SchedPolicy *policy); 73 /* Return a displayable string corresponding to policy. 77 extern const char *get_sched_policy_name(SchedPolicy policy);
|
/system/libhidl/transport/ |
H A D | HidlTransportSupport.cpp | 42 int policy, int priority) { 44 ALOGE("Can't set scheduler policy on remote service."); 48 if (policy != SCHED_NORMAL && policy != SCHED_FIFO && policy != SCHED_RR) { 49 ALOGE("Invalid scheduler policy %d", policy); 53 if (policy == SCHED_NORMAL && (priority < -20 || priority > 19)) { 57 ALOGE("Invalid priority for real-time policy: %d", priority); 61 details::gServicePrioMap.set(service, { policy, priorit 41 setMinSchedulerPolicy(const sp<::android::hidl::base::V1_0::IBase>& service, int policy, int priority) argument [all...] |
/system/sepolicy/ |
H A D | definitions.mk | 1 # Command to turn collection of policy files into a policy.conf file to be 3 define transform-policy-to-conf 16 .KATI_READONLY := transform-policy-to-conf
|
/system/nvram/hal/ |
H A D | Android.mk | 40 LOCAL_REQUIRED_MODULES_arm := fake-nvram-seccomp.policy 41 LOCAL_REQUIRED_MODULES_arm64 := fake-nvram-seccomp.policy 42 LOCAL_REQUIRED_MODULES_x86 := fake-nvram-seccomp.policy 43 LOCAL_REQUIRED_MODULES_x86_64 := fake-nvram-seccomp.policy 48 # seccomp policy for fake_nvram. 50 LOCAL_MODULE := fake-nvram-seccomp.policy 52 LOCAL_MODULE_PATH := $(TARGET_OUT)/usr/share/policy/ 53 LOCAL_SRC_FILES := fake-nvram-seccomp-$(TARGET_ARCH).policy
|
/system/update_engine/ |
H A D | UpdateEngine.conf | 4 <policy user="root"> 7 </policy> 8 <policy user="chronos"> 70 </policy> 71 <policy user="power"> 75 </policy>
|
H A D | system_state.h | 26 namespace policy { namespace 30 } // namespace policy 61 // Sets or gets the latest device policy. 62 virtual void set_device_policy(const policy::DevicePolicy* device_policy) = 0; 63 virtual const policy::DevicePolicy* device_policy() = 0;
|
H A D | real_system_state.h | 25 #include <policy/device_policy.h> 75 const policy::DevicePolicy* device_policy) override { 79 inline const policy::DevicePolicy* device_policy() override { 144 // The latest device policy object from the policy provider. 145 const policy::DevicePolicy* device_policy_{nullptr}; 181 policy::PolicyProvider policy_provider_;
|
/system/extras/ext4_utils/ |
H A D | ext4_crypt_init_extensions.cpp | 69 // Try to set policy on this directory, but if it is non-empty this may fail. 74 // Only set policy on first level /data directories 75 // To make this less restrictive, consider using a policy file. 76 // However this is overkill for as long as the policy is simply 77 // to apply a global policy to all /data folders created via makedir 96 LOG(INFO) << "Not setting policy on " << dir; 105 std::string policy; local 106 if (!android::base::ReadFileToString(ref_filename, &policy)) { 107 LOG(ERROR) << "Unable to read system policy to set on " << dir; 124 LOG(INFO) << "Setting policy o [all...] |
H A D | ext4_crypt.cpp | 37 #define XATTR_NAME_ENCRYPTION_POLICY "encryption.policy" 100 static void policy_to_hex(const char* policy, char* hex) { argument 102 hex[j++] = HEX_LOOKUP[(policy[i] & 0xF0) >> 4]; 103 hex[j++] = HEX_LOOKUP[policy[i] & 0x0F]; 150 static bool e4crypt_policy_set(const char *directory, const char *policy, argument 159 policy_to_hex(policy, policy_hex); 172 memcpy(eep.master_key_descriptor, policy, EXT4_KEY_DESCRIPTOR_SIZE); 174 PLOG(ERROR) << "Failed to set encryption policy for " << directory << " to " << policy_hex 186 static bool e4crypt_policy_get(const char *directory, char *policy, argument 204 PLOG(ERROR) << "Failed to get encryption policy fo 224 e4crypt_policy_check(const char *directory, const char *policy, size_t policy_length, int contents_encryption_mode, int filenames_encryption_mode) argument 253 e4crypt_policy_ensure(const char *directory, const char *policy, size_t policy_length, const char *contents_encryption_mode, const char *filenames_encryption_mode) argument [all...] |
/system/core/libcutils/ |
H A D | sched_policy.cpp | 30 /* Re-map SP_DEFAULT to the system default policy, and leave other values unchanged. 32 * Returns the possibly re-mapped policy. 68 /* Add tid to the scheduling group defined by the policy */ 248 int get_sched_policy(int tid, SchedPolicy *policy) argument 265 *policy = SP_FOREGROUND; 267 *policy = SP_FOREGROUND; 269 *policy = SP_SYSTEM; 271 *policy = SP_BACKGROUND; 273 *policy = SP_TOP_APP; 281 int set_cpuset_policy(int tid, SchedPolicy policy) argument 362 set_sched_policy(int tid, SchedPolicy policy) argument 456 get_sched_policy(int , SchedPolicy* policy) argument 463 get_sched_policy_name(SchedPolicy policy) argument [all...] |
/system/extras/ext4_utils/include/ext4_utils/ |
H A D | ext4_crypt.h | 28 int e4crypt_policy_ensure(const char *directory, const char *policy,
|
/system/update_engine/update_manager/ |
H A D | state_factory.h | 37 policy::PolicyProvider* policy_provider,
|
/system/sepolicy/tools/ |
H A D | sepolicy-check.c | 18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0); 66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { 77 if (expand_avtab(policy, avtab, &exp_avtab)) { 116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { argument 131 src = hashtab_search(policy->p_types.table, s); 138 tgt = hashtab_search(policy->p_types.table, t); 145 cls = hashtab_search(policy->p_classes.table, c); 177 perm, policy, &policy->te_avtab); 185 perm, policy, 63 expand_and_check(int s_op, uint32_t source_type, int t_op, uint32_t target_type, int c_op, uint32_t target_class, perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) argument 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local [all...] |
/system/sepolicy/tests/ |
H A D | searchpolicy.py | 4 import policy namespace 7 description="SELinux policy rule search tool. Intended to have a similar " 9 parser.add_argument("policy", help="Path to the SELinux policy to search.", nargs="?") 30 if not args.policy: 31 parser.error("Must include path to policy") 38 pol = policy.Policy(args.policy, None, args.libpath)
|
/system/bt/bta/sys/ |
H A D | bta_sys_conn.cc | 52 * Description Called by BTA DM to register link policy change callbacks 364 * policy to peer device should be set 369 void bta_sys_set_policy(uint8_t id, uint8_t policy, argument 371 APPL_TRACE_DEBUG("%s: peer %s id:%d policy:0x%x", __func__, 372 peer_addr.ToString().c_str(), id, policy); 374 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_SET, id, policy, peer_addr); 383 * policy to peer device should be clear 388 void bta_sys_clear_policy(uint8_t id, uint8_t policy, argument 390 APPL_TRACE_DEBUG("%s: peer %s id:%d policy:0x%x", __func__, 391 peer_addr.ToString().c_str(), id, policy); 407 bta_sys_set_default_policy(uint8_t id, uint8_t policy) argument 425 bta_sys_clear_default_policy(uint8_t id, uint8_t policy) argument [all...] |
/system/sepolicy/tools/sepolicy-analyze/ |
H A D | sepolicy-analyze.c | 34 fprintf(stderr, "%s must be called on a policy file with a component and the appropriate arguments specified\n", arg0); 35 fprintf(stderr, "%s <policy-file>:\n", arg0); 44 char *policy; local 52 policy = argv[1]; 53 if(load_policy(policy, &policydb, &pf))
|