/system/core/libprocessgroup/ |
D | sched_policy.cpp | 41 int set_cpuset_policy(int tid, SchedPolicy policy) { in set_cpuset_policy() argument 45 policy = _policy(policy); in set_cpuset_policy() 47 switch (policy) { in set_cpuset_policy() 67 int set_sched_policy(int tid, SchedPolicy policy) { in set_sched_policy() argument 71 policy = _policy(policy); in set_sched_policy() 96 switch (policy) { in set_sched_policy() 118 switch (policy) { in set_sched_policy() 167 int get_sched_policy(int tid, SchedPolicy* policy) { in get_sched_policy() argument 184 *policy = SP_FOREGROUND; in get_sched_policy() 186 *policy = SP_FOREGROUND; in get_sched_policy() [all …]
|
/system/core/code_coverage/ |
D | Android.bp | 3 name: "code_coverage.policy", 8 src: "empty_policy/code_coverage.arm.policy", 11 src: "seccomp_policy/code_coverage.arm.policy", 16 src: "empty_policy/code_coverage.arm64.policy", 19 src: "seccomp_policy/code_coverage.arm64.policy", 24 src: "empty_policy/code_coverage.x86.policy", 27 src: "seccomp_policy/code_coverage.x86.policy", 32 src: "empty_policy/code_coverage.x86_64.policy", 35 src: "seccomp_policy/code_coverage.x86_64.policy", 41 "code_coverage.policy.other", [all …]
|
/system/extras/libfscrypt/ |
D | fscrypt.cpp | 127 fscrypt_policy_v1 policy; in fscrypt_is_encrypted() local 132 return ioctl(fd, FS_IOC_GET_ENCRYPTION_POLICY, &policy) == 0 || errno == EINVAL; in fscrypt_is_encrypted() 271 static std::string PolicyDebugString(const EncryptionPolicy& policy) { in PolicyDebugString() argument 274 BytesToHex(policy.key_raw_ref, &ref_hex); in PolicyDebugString() 276 ss << " v" << policy.options.version; in PolicyDebugString() 277 ss << " modes " << policy.options.contents_mode << "/" << policy.options.filenames_mode; in PolicyDebugString() 278 ss << std::hex << " flags 0x" << policy.options.flags; in PolicyDebugString() 282 bool EnsurePolicy(const EncryptionPolicy& policy, const std::string& directory) { in EnsurePolicy() argument 289 switch (policy.options.version) { in EnsurePolicy() 291 if (policy.key_raw_ref.size() != FSCRYPT_KEY_DESCRIPTOR_SIZE) { in EnsurePolicy() [all …]
|
/system/core/libprocessgroup/include/processgroup/ |
D | sched_policy.h | 56 extern int set_cpuset_policy(int tid, SchedPolicy policy); 64 extern int set_sched_policy(int tid, SchedPolicy policy); 70 extern int get_sched_policy(int tid, SchedPolicy* policy); 76 extern const char* get_sched_policy_name(SchedPolicy policy); 82 extern const char* get_cpuset_policy_profile_name(SchedPolicy policy); 88 extern const char* get_sched_policy_profile_name(SchedPolicy policy);
|
/system/vold/ |
D | KeyUtil.cpp | 206 static bool buildKeySpecifier(fscrypt_key_specifier* spec, const EncryptionPolicy& policy) { in buildKeySpecifier() argument 207 switch (policy.options.version) { in buildKeySpecifier() 209 if (policy.key_raw_ref.size() != FSCRYPT_KEY_DESCRIPTOR_SIZE) { in buildKeySpecifier() 211 << policy.key_raw_ref.size(); in buildKeySpecifier() 215 memcpy(spec->u.descriptor, policy.key_raw_ref.c_str(), FSCRYPT_KEY_DESCRIPTOR_SIZE); in buildKeySpecifier() 218 if (policy.key_raw_ref.size() != FSCRYPT_KEY_IDENTIFIER_SIZE) { in buildKeySpecifier() 220 << policy.key_raw_ref.size(); in buildKeySpecifier() 224 memcpy(spec->u.identifier, policy.key_raw_ref.c_str(), FSCRYPT_KEY_IDENTIFIER_SIZE); in buildKeySpecifier() 227 LOG(ERROR) << "Invalid encryption policy version: " << policy.options.version; in buildKeySpecifier() 261 const KeyBuffer& key, EncryptionPolicy* policy) { in installKey() argument [all …]
|
/system/core/init/ |
D | fscrypt_init_extensions.cpp | 102 static bool LookupPolicy(const std::string& ref_basename, EncryptionPolicy* policy) { in LookupPolicy() argument 104 if (!android::base::ReadFileToString(ref_filename, &policy->key_raw_ref)) { in LookupPolicy() 115 if (!ParseOptions(options_string, &policy->options)) { in LookupPolicy() 122 static bool EnsurePolicyOrLog(const EncryptionPolicy& policy, const std::string& dir) { in EnsurePolicyOrLog() argument 123 if (!EnsurePolicy(policy, dir)) { in EnsurePolicyOrLog() 125 BytesToHex(policy.key_raw_ref, &ref_hex); in EnsurePolicyOrLog() 133 EncryptionPolicy policy; in SetPolicyOn() local 134 if (!LookupPolicy(ref_basename, &policy)) return false; in SetPolicyOn() 135 if (!EnsurePolicyOrLog(policy, dir)) return false; in SetPolicyOn()
|
/system/core/debuggerd/seccomp_policy/ |
D | generate.sh | 7 $CPP -D__arm__ -o crash_dump.arm.policy 8 $CPP -D__aarch64__ -D__LP64__ -o crash_dump.arm64.policy 9 $CPP -D__i386__ -o crash_dump.x86.policy 10 $CPP -D__x86_64__ -D__LP64__ -o crash_dump.x86_64.policy
|
/system/core/code_coverage/seccomp_policy/ |
D | generate.sh | 9 $CPP -D__arm__ -o code_coverage.arm.policy 10 $CPP -D__aarch64__ -D__LP64__ -o code_coverage.arm64.policy 11 $CPP -D__i386__ -o code_coverage.x86.policy 12 $CPP -D__x86_64__ -D__LP64__ -o code_coverage.x86_64.policy
|
/system/sepolicy/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 20 ; Unfortunately, we can't currently express this in module policy language: 24 ; Unfortunately, we can't currently express this in module policy language: 28 ; Unfortunately, we can't currently express this in module policy language: 33 ; Unfortunately, we can't currently express this in module policy language: 38 ; Unfortunately, we can't currently express this in module policy language: 43 ; Unfortunately, we can't currently express this in module policy language: [all …]
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 20 ; Unfortunately, we can't currently express this in module policy language: 24 ; Unfortunately, we can't currently express this in module policy language: 28 ; Unfortunately, we can't currently express this in module policy language: 33 ; Unfortunately, we can't currently express this in module policy language: 38 ; Unfortunately, we can't currently express this in module policy language: 43 ; Unfortunately, we can't currently express this in module policy language: [all …]
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 20 ; Unfortunately, we can't currently express this in module policy language: 24 ; Unfortunately, we can't currently express this in module policy language: 29 ; Unfortunately, we can't currently express this in module policy language: 34 ; Unfortunately, we can't currently express this in module policy language: 39 ; Unfortunately, we can't currently express this in module policy language: 44 ; Unfortunately, we can't currently express this in module policy language: [all …]
|
/system/update_engine/ |
D | UpdateEngine.conf | 19 <policy user="root"> 22 </policy> 23 <policy user="chronos"> 85 </policy> 86 <policy user="power"> 90 </policy> 91 <policy user="dlcservice"> 104 </policy>
|
/system/bpfprogs/ |
D | time_in_state.c | 62 uint32_t policy = *policyp; variable 64 uint32_t* policy_active = bpf_policy_nr_active_map_lookup_elem(&policy); 88 uint8_t* freq_idxp = bpf_policy_freq_idx_map_lookup_elem(&policy); 107 concurrent_val_t zero_val = {.active = {0}, .policy = {0}}; 117 concurrent_val_t zero_val = {.active = {0}, .policy = {0}}; 122 if (ct) ct->policy[policy_nactive % CPUS_PER_ENTRY] += delta; 144 uint32_t policy = *policyp; variable 145 freq_idx_key_t key = {.policy = policy, .freq = new}; 149 bpf_policy_freq_idx_map_update_elem(&policy, &idx, BPF_ANY);
|
/system/sepolicy/tools/ |
D | sepolicy-check.c | 66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { in expand_and_check() argument 77 if (expand_avtab(policy, avtab, &exp_avtab)) { in expand_and_check() 116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { in check_rule() argument 131 src = hashtab_search(policy->p_types.table, s); in check_rule() 138 tgt = hashtab_search(policy->p_types.table, t); in check_rule() 145 cls = hashtab_search(policy->p_classes.table, c); in check_rule() 177 perm, policy, &policy->te_avtab); in check_rule() 185 perm, policy, &policy->te_cond_avtab); in check_rule() 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; in main() local 266 policy = optarg; in main() [all …]
|
D | README | 1 This directory contains a number of tools related to policy, some of 2 which are used in building and validating the policy and others are 3 available for help in auditing and analyzing policy. The tools are 7 A tool to build SELinux policy for multiple targets in parallel. 17 property_contexts configuration file. Used as part of the policy 40 policy build process to merge and validate the configuration. 52 certs not already found in that policy. This becomes useful when a directory 54 policy not already explicitly listed. 61 -f POLICY, --file POLICY mac_permissions.xml policy file
|
/system/nvram/hal/ |
D | Android.bp | 82 required: ["fake-nvram-seccomp.policy"], 85 // seccomp policy for fake_nvram. 87 name: "fake-nvram-seccomp.policy", 88 sub_dir: "policy", 91 src: "fake-nvram-seccomp-arm.policy", 94 src: "fake-nvram-seccomp-arm64.policy", 97 src: "fake-nvram-seccomp-x86.policy", 100 src: "fake-nvram-seccomp-x86_64.policy",
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 21 ; Unfortunately, we can't currently express this in module policy language: 26 ; Unfortunately, we can't currently express this in module policy language: 31 ; Unfortunately, we can't currently express this in module policy language: 36 ; Unfortunately, we can't currently express this in module policy language:
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 21 ; Unfortunately, we can't currently express this in module policy language: 26 ; Unfortunately, we can't currently express this in module policy language: 31 ; Unfortunately, we can't currently express this in module policy language:
|
/system/bt/bta/sys/ |
D | bta_sys_conn.cc | 369 void bta_sys_set_policy(uint8_t id, uint8_t policy, in bta_sys_set_policy() argument 372 peer_addr.ToString().c_str(), id, policy); in bta_sys_set_policy() 374 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_SET, id, policy, peer_addr); in bta_sys_set_policy() 388 void bta_sys_clear_policy(uint8_t id, uint8_t policy, in bta_sys_clear_policy() argument 391 peer_addr.ToString().c_str(), id, policy); in bta_sys_clear_policy() 393 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_CLR, id, policy, peer_addr); in bta_sys_clear_policy() 407 void bta_sys_set_default_policy(uint8_t id, uint8_t policy) { in bta_sys_set_default_policy() argument 408 APPL_TRACE_DEBUG("%s: id:%d policy:0x%x", __func__, id, policy); in bta_sys_set_default_policy() 410 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_DEF_SET, id, policy, in bta_sys_set_default_policy() 425 void bta_sys_clear_default_policy(uint8_t id, uint8_t policy) { in bta_sys_clear_default_policy() argument [all …]
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | technical_debt.cil | 1 ; THIS IS A WORKAROUND for the current limitations of the module policy language 6 ; NOTE: This file has no effect on recovery policy. 9 ; Unfortunately, we can't currently express this in module policy language: 16 ; Unfortunately, we can't currently express this in module policy language: 21 ; Unfortunately, we can't currently express this in module policy language: 26 ; Unfortunately, we can't currently express this in module policy language:
|
/system/update_engine/update_manager/ |
D | staging_utils.h | 30 using StagingSchedule = std::vector<policy::DevicePolicy::DayPercentagePair>; 55 int GetStagingSchedule(const policy::DevicePolicy* device_policy, 64 StagingCase CalculateStagingCase(const policy::DevicePolicy* device_policy,
|
/system/bt/gd/security/ |
D | l2cap_security_module_interface.cc | 27 hci::AddressWithType remote, l2cap::classic::SecurityPolicy policy, in Enforce() argument 31 … std::forward<hci::AddressWithType>(remote), std::forward<l2cap::classic::SecurityPolicy>(policy), in Enforce() 35 …2capSecurityModuleInterface::Enforce(hci::AddressWithType remote, l2cap::le::SecurityPolicy policy, in Enforce() argument 39 std::forward<hci::AddressWithType>(remote), std::forward<l2cap::le::SecurityPolicy>(policy), in Enforce()
|
/system/bt/gd/l2cap/classic/ |
D | security_enforcement_interface.h | 40 …virtual void Enforce(hci::AddressWithType remote, SecurityPolicy policy, ResultCallback result_cal… 49 …void Enforce(hci::AddressWithType remote, SecurityPolicy policy, ResultCallback result_callback) o… in Enforce() argument 50 if (policy == SecurityPolicy::_SDP_ONLY_NO_SECURITY_WHATSOEVER_PLAINTEXT_TRANSPORT_OK) { in Enforce()
|
/system/bt/gd/l2cap/le/ |
D | security_enforcement_interface.h | 40 …virtual void Enforce(hci::AddressWithType remote, SecurityPolicy policy, ResultCallback result_cal… 49 …void Enforce(hci::AddressWithType remote, SecurityPolicy policy, ResultCallback result_callback) o… in Enforce() argument 50 if (policy == SecurityPolicy::NO_SECURITY_WHATSOEVER_PLAINTEXT_TRANSPORT_OK) { in Enforce()
|
/system/libhidl/transport/ |
D | HidlTransportSupport.cpp | 62 bool setMinSchedulerPolicy(const sp<IBase>& service, int policy, int priority) { in setMinSchedulerPolicy() argument 68 switch (policy) { in setMinSchedulerPolicy() 78 LOG(ERROR) << "Invalid priority for " << policy << " policy: " << priority; in setMinSchedulerPolicy() 83 LOG(ERROR) << "Invalid scheduler policy " << policy; in setMinSchedulerPolicy() 93 details::gServicePrioMap->setLocked(service, {policy, priority}); in setMinSchedulerPolicy()
|