Searched refs:policy (Results 1 - 25 of 80) sorted by relevance

1234

/system/tpm/trunks/
H A Dcom.android.Trunks.conf5 <policy user="system">
7 </policy>
9 <policy context="default">
14 </policy>
H A Dorg.chromium.Trunks.conf5 <policy user="trunks">
7 </policy>
9 <policy context="default">
14 </policy>
H A DAndroid.mk17 # trunksd-seccomp.policy
20 LOCAL_MODULE := trunksd-seccomp.policy
22 LOCAL_MODULE_PATH := $(TARGET_OUT)/usr/share/policy/
23 LOCAL_SRC_FILES := trunksd-seccomp-$(TARGET_ARCH).policy
/system/tpm/tpm_manager/server/
H A Dorg.chromium.TpmManager.conf5 <policy user="tpm_manager">
8 </policy>
9 <policy user="root">
12 </policy>
13 <policy context="default">
18 </policy>
/system/core/debuggerd/seccomp_policy/
H A Dgenerate.sh6 CPP='cpp -undef -E -P crash_dump.policy.def'
7 $CPP -D__arm__ -o crash_dump.arm.policy
8 $CPP -D__aarch64__ -D__LP64__ -o crash_dump.arm64.policy
9 $CPP -D__i386__ -o crash_dump.x86.policy
10 $CPP -D__x86_64__ -D__LP64__ -o crash_dump.x86_64.policy
/system/tpm/attestation/server/
H A Dorg.chromium.Attestation.conf5 <policy user="attestation">
8 </policy>
9 <policy context="default">
14 </policy>
/system/core/debuggerd/
H A DAndroid.mk4 LOCAL_MODULE := crash_dump.policy
9 LOCAL_MODULE_STEM_32 := crash_dump.arm.policy
10 LOCAL_MODULE_STEM_64 := crash_dump.arm64.policy
14 LOCAL_MODULE_STEM_32 := crash_dump.x86.policy
15 LOCAL_MODULE_STEM_64 := crash_dump.x86_64.policy
19 LOCAL_SRC_FILES_arm := seccomp_policy/crash_dump.arm.policy
20 LOCAL_SRC_FILES_arm64 := seccomp_policy/crash_dump.arm64.policy
21 LOCAL_SRC_FILES_x86 := seccomp_policy/crash_dump.x86.policy
22 LOCAL_SRC_FILES_x86_64 := seccomp_policy/crash_dump.x86_64.policy
/system/core/include/cutils/
H A Dsched_policy.h57 extern int set_cpuset_policy(int tid, SchedPolicy policy);
59 /* Assign thread tid to the cgroup associated with the specified policy.
65 extern int set_sched_policy(int tid, SchedPolicy policy);
67 /* Return the policy associated with the cgroup of thread tid via policy pointer.
71 extern int get_sched_policy(int tid, SchedPolicy *policy);
73 /* Return a displayable string corresponding to policy.
77 extern const char *get_sched_policy_name(SchedPolicy policy);
/system/core/libcutils/include/cutils/
H A Dsched_policy.h57 extern int set_cpuset_policy(int tid, SchedPolicy policy);
59 /* Assign thread tid to the cgroup associated with the specified policy.
65 extern int set_sched_policy(int tid, SchedPolicy policy);
67 /* Return the policy associated with the cgroup of thread tid via policy pointer.
71 extern int get_sched_policy(int tid, SchedPolicy *policy);
73 /* Return a displayable string corresponding to policy.
77 extern const char *get_sched_policy_name(SchedPolicy policy);
/system/core/libcutils/include_vndk/cutils/
H A Dsched_policy.h57 extern int set_cpuset_policy(int tid, SchedPolicy policy);
59 /* Assign thread tid to the cgroup associated with the specified policy.
65 extern int set_sched_policy(int tid, SchedPolicy policy);
67 /* Return the policy associated with the cgroup of thread tid via policy pointer.
71 extern int get_sched_policy(int tid, SchedPolicy *policy);
73 /* Return a displayable string corresponding to policy.
77 extern const char *get_sched_policy_name(SchedPolicy policy);
/system/libhidl/transport/
H A DHidlTransportSupport.cpp42 int policy, int priority) {
44 ALOGE("Can't set scheduler policy on remote service.");
48 if (policy != SCHED_NORMAL && policy != SCHED_FIFO && policy != SCHED_RR) {
49 ALOGE("Invalid scheduler policy %d", policy);
53 if (policy == SCHED_NORMAL && (priority < -20 || priority > 19)) {
57 ALOGE("Invalid priority for real-time policy: %d", priority);
61 details::gServicePrioMap.set(service, { policy, priorit
41 setMinSchedulerPolicy(const sp<::android::hidl::base::V1_0::IBase>& service, int policy, int priority) argument
[all...]
/system/sepolicy/
H A Ddefinitions.mk1 # Command to turn collection of policy files into a policy.conf file to be
3 define transform-policy-to-conf
16 .KATI_READONLY := transform-policy-to-conf
/system/nvram/hal/
H A DAndroid.mk40 LOCAL_REQUIRED_MODULES_arm := fake-nvram-seccomp.policy
41 LOCAL_REQUIRED_MODULES_arm64 := fake-nvram-seccomp.policy
42 LOCAL_REQUIRED_MODULES_x86 := fake-nvram-seccomp.policy
43 LOCAL_REQUIRED_MODULES_x86_64 := fake-nvram-seccomp.policy
48 # seccomp policy for fake_nvram.
50 LOCAL_MODULE := fake-nvram-seccomp.policy
52 LOCAL_MODULE_PATH := $(TARGET_OUT)/usr/share/policy/
53 LOCAL_SRC_FILES := fake-nvram-seccomp-$(TARGET_ARCH).policy
/system/update_engine/
H A DUpdateEngine.conf4 <policy user="root">
7 </policy>
8 <policy user="chronos">
70 </policy>
71 <policy user="power">
75 </policy>
H A Dsystem_state.h26 namespace policy { namespace
30 } // namespace policy
61 // Sets or gets the latest device policy.
62 virtual void set_device_policy(const policy::DevicePolicy* device_policy) = 0;
63 virtual const policy::DevicePolicy* device_policy() = 0;
H A Dreal_system_state.h25 #include <policy/device_policy.h>
75 const policy::DevicePolicy* device_policy) override {
79 inline const policy::DevicePolicy* device_policy() override {
144 // The latest device policy object from the policy provider.
145 const policy::DevicePolicy* device_policy_{nullptr};
181 policy::PolicyProvider policy_provider_;
/system/extras/ext4_utils/
H A Dext4_crypt_init_extensions.cpp69 // Try to set policy on this directory, but if it is non-empty this may fail.
74 // Only set policy on first level /data directories
75 // To make this less restrictive, consider using a policy file.
76 // However this is overkill for as long as the policy is simply
77 // to apply a global policy to all /data folders created via makedir
96 LOG(INFO) << "Not setting policy on " << dir;
105 std::string policy; local
106 if (!android::base::ReadFileToString(ref_filename, &policy)) {
107 LOG(ERROR) << "Unable to read system policy to set on " << dir;
124 LOG(INFO) << "Setting policy o
[all...]
H A Dext4_crypt.cpp37 #define XATTR_NAME_ENCRYPTION_POLICY "encryption.policy"
100 static void policy_to_hex(const char* policy, char* hex) { argument
102 hex[j++] = HEX_LOOKUP[(policy[i] & 0xF0) >> 4];
103 hex[j++] = HEX_LOOKUP[policy[i] & 0x0F];
150 static bool e4crypt_policy_set(const char *directory, const char *policy, argument
159 policy_to_hex(policy, policy_hex);
172 memcpy(eep.master_key_descriptor, policy, EXT4_KEY_DESCRIPTOR_SIZE);
174 PLOG(ERROR) << "Failed to set encryption policy for " << directory << " to " << policy_hex
186 static bool e4crypt_policy_get(const char *directory, char *policy, argument
204 PLOG(ERROR) << "Failed to get encryption policy fo
224 e4crypt_policy_check(const char *directory, const char *policy, size_t policy_length, int contents_encryption_mode, int filenames_encryption_mode) argument
253 e4crypt_policy_ensure(const char *directory, const char *policy, size_t policy_length, const char *contents_encryption_mode, const char *filenames_encryption_mode) argument
[all...]
/system/core/libcutils/
H A Dsched_policy.cpp30 /* Re-map SP_DEFAULT to the system default policy, and leave other values unchanged.
32 * Returns the possibly re-mapped policy.
68 /* Add tid to the scheduling group defined by the policy */
248 int get_sched_policy(int tid, SchedPolicy *policy) argument
265 *policy = SP_FOREGROUND;
267 *policy = SP_FOREGROUND;
269 *policy = SP_SYSTEM;
271 *policy = SP_BACKGROUND;
273 *policy = SP_TOP_APP;
281 int set_cpuset_policy(int tid, SchedPolicy policy) argument
362 set_sched_policy(int tid, SchedPolicy policy) argument
456 get_sched_policy(int , SchedPolicy* policy) argument
463 get_sched_policy_name(SchedPolicy policy) argument
[all...]
/system/extras/ext4_utils/include/ext4_utils/
H A Dext4_crypt.h28 int e4crypt_policy_ensure(const char *directory, const char *policy,
/system/update_engine/update_manager/
H A Dstate_factory.h37 policy::PolicyProvider* policy_provider,
/system/sepolicy/tools/
H A Dsepolicy-check.c18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0);
66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) {
77 if (expand_avtab(policy, avtab, &exp_avtab)) {
116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { argument
131 src = hashtab_search(policy->p_types.table, s);
138 tgt = hashtab_search(policy->p_types.table, t);
145 cls = hashtab_search(policy->p_classes.table, c);
177 perm, policy, &policy->te_avtab);
185 perm, policy,
63 expand_and_check(int s_op, uint32_t source_type, int t_op, uint32_t target_type, int c_op, uint32_t target_class, perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) argument
235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local
[all...]
/system/sepolicy/tests/
H A Dsearchpolicy.py4 import policy namespace
7 description="SELinux policy rule search tool. Intended to have a similar "
9 parser.add_argument("policy", help="Path to the SELinux policy to search.", nargs="?")
30 if not args.policy:
31 parser.error("Must include path to policy")
38 pol = policy.Policy(args.policy, None, args.libpath)
/system/bt/bta/sys/
H A Dbta_sys_conn.cc52 * Description Called by BTA DM to register link policy change callbacks
364 * policy to peer device should be set
369 void bta_sys_set_policy(uint8_t id, uint8_t policy, argument
371 APPL_TRACE_DEBUG("%s: peer %s id:%d policy:0x%x", __func__,
372 peer_addr.ToString().c_str(), id, policy);
374 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_SET, id, policy, peer_addr);
383 * policy to peer device should be clear
388 void bta_sys_clear_policy(uint8_t id, uint8_t policy, argument
390 APPL_TRACE_DEBUG("%s: peer %s id:%d policy:0x%x", __func__,
391 peer_addr.ToString().c_str(), id, policy);
407 bta_sys_set_default_policy(uint8_t id, uint8_t policy) argument
425 bta_sys_clear_default_policy(uint8_t id, uint8_t policy) argument
[all...]
/system/sepolicy/tools/sepolicy-analyze/
H A Dsepolicy-analyze.c34 fprintf(stderr, "%s must be called on a policy file with a component and the appropriate arguments specified\n", arg0);
35 fprintf(stderr, "%s <policy-file>:\n", arg0);
44 char *policy; local
52 policy = argv[1];
53 if(load_policy(policy, &policydb, &pf))

Completed in 456 milliseconds

1234