HomeSort by relevance Sort by last modified time
    Searched refs:policy (Results 1 - 25 of 1616) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/libbrillo/policy/
device_policy.cc 5 #include "policy/device_policy.h"
7 namespace policy { namespace
15 } // namespace policy
  /hardware/qcom/gps/msm8998/utils/platform_lib_abstractions/loc_stub/src/
loc_stub_sched_policy.cpp 47 int set_sched_policy(int tid, SchedPolicy policy)
  /external/dnsmasq/dbus/
dnsmasq.conf 5 <policy user="root">
8 </policy>
9 <policy context="default">
12 </policy>
  /system/tpm/trunks/
com.android.Trunks.conf 5 <policy user="system">
7 </policy>
9 <policy context="default">
14 </policy>
org.chromium.Trunks.conf 5 <policy user="trunks">
7 </policy>
9 <policy context="default">
14 </policy>
  /external/libunwind/src/mi/
Gset_caching_policy.c 29 unw_set_caching_policy (unw_addr_space_t as, unw_caching_policy_t policy)
35 if (policy == UNW_CACHE_PER_THREAD)
36 policy = UNW_CACHE_GLOBAL;
39 if (policy == as->caching_policy)
42 as->caching_policy = policy;
  /system/tpm/tpm_manager/server/
org.chromium.TpmManager.conf 5 <policy user="tpm_manager">
8 </policy>
9 <policy user="root">
12 </policy>
13 <policy context="default">
18 </policy>
  /frameworks/base/core/java/com/android/internal/policy/
IKeyguardDrawnCallback.aidl 16 package com.android.internal.policy;
IKeyguardDismissCallback.aidl 17 package com.android.internal.policy;
IKeyguardExitCallback.aidl 16 package com.android.internal.policy;
IShortcutService.aidl 17 package com.android.internal.policy;
  /hardware/qcom/gps/msm8998/utils/platform_lib_abstractions/loc_pla/src/
platform_lib_sched_policy.cpp 37 int platform_lib_abstraction_set_sched_policy(int tid, PLASchedPolicy policy)
39 return set_sched_policy(tid, (SchedPolicy)policy);
  /system/tpm/attestation/server/
org.chromium.Attestation.conf 5 <policy user="attestation">
8 </policy>
9 <policy context="default">
14 </policy>
  /external/toybox/toys/pending/
chrt.c 11 usage: chrt [-m] [-p PID] [POLICY PRIO] [COMMAND [ARGS...]]
33 static char *policy_name(int policy) {
37 return policy < ARRAY_LEN(policy_names) ? policy_names[policy] : "???";
42 int policy = SCHED_RR; local
47 for (policy = SCHED_OTHER; policy <= SCHED_IDLE; ++policy)
48 if (policy != 4) // There's an unused hole in the priorities.
49 printf("%s min/max priority\t: %d/%d\n", policy_name(policy),
    [all...]
  /external/ipsec-tools/src/libipsec/
ipsec_get_policylen.c 50 ipsec_get_policylen(policy)
51 ipsec_policy_t policy;
53 return policy ? PFKEY_EXTLEN(policy) : -1;
  /frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/
Listenable.java 17 package com.android.systemui.statusbar.policy;
  /system/libhidl/transport/
HidlTransportSupport.cpp 32 int policy, int priority) {
34 ALOGE("Can't set scheduler policy on remote service.");
38 if (policy != SCHED_NORMAL && policy != SCHED_FIFO && policy != SCHED_RR) {
39 ALOGE("Invalid scheduler policy %d", policy);
43 if (policy == SCHED_NORMAL && (priority < -20 || priority > 19)) {
47 ALOGE("Invalid priority for real-time policy: %d", priority);
51 details::gServicePrioMap.set(service, { policy, priority })
    [all...]
  /frameworks/base/packages/SettingsLib/src/com/android/settingslib/
NetworkPolicyEditor.java 62 for (NetworkPolicy policy : policies) {
64 if (policy.limitBytes < -1) {
65 policy.limitBytes = LIMIT_DISABLED;
68 if (policy.warningBytes < -1) {
69 policy.warningBytes = WARNING_DISABLED;
73 mPolicies.add(policy);
97 final NetworkPolicy policy = getPolicy(template); local
98 return policy != null && policy.limitBytes != LIMIT_DISABLED;
102 NetworkPolicy policy = getPolicy(template) local
120 NetworkPolicy policy = getPolicy(template); local
152 final NetworkPolicy policy = getPolicy(template); local
157 final NetworkPolicy policy = getOrCreatePolicy(template); local
166 final NetworkPolicy policy = getPolicy(template); local
171 final NetworkPolicy policy = getOrCreatePolicy(template); local
188 final NetworkPolicy policy = getPolicy(template); local
200 final NetworkPolicy policy = getOrCreatePolicy(template); local
208 NetworkPolicy policy = getPolicy(template); local
219 NetworkPolicy policy = getPolicy(template); local
    [all...]
  /external/ltp/testcases/kernel/security/tomoyo/
tomoyo_new_file_test.c 26 static const char *policy = ""; variable
31 printf("%s : ", policy);
126 policy = "allow_read /proc/sys/net/ipv4/ip_local_port_range";
127 write_domain_policy(policy, 0);
129 write_domain_policy(policy, 1);
132 policy = "allow_write /proc/sys/net/ipv4/ip_local_port_range";
133 write_domain_policy(policy, 0);
135 write_domain_policy(policy, 1);
138 policy = "allow_read/write /proc/sys/net/ipv4/ip_local_port_range";
139 write_domain_policy(policy, 0)
    [all...]
  /external/caliper/caliper/src/main/java/com/google/caliper/runner/
ScheduledTrial.java 28 private final TrialSchedulingPolicy policy; field in class:ScheduledTrial
31 TrialSchedulingPolicy policy) {
34 this.policy = policy;
37 TrialSchedulingPolicy policy() { method in class:ScheduledTrial
38 return policy;
  /packages/apps/Settings/src/com/android/settings/datausage/
DataUsageInfoController.java 27 public void updateDataLimit(DataUsageInfo info, NetworkPolicy policy) {
28 if (info == null || policy == null) {
31 if (policy.warningBytes >= 0) {
32 info.warningLevel = policy.warningBytes;
34 if (policy.limitBytes >= 0) {
35 info.limitLevel = policy.limitBytes;
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus-wpa_supplicant.conf 5 <policy user="root">
16 </policy>
17 <policy context="default">
24 </policy>
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/
initsid.py 25 def initialsid_factory(policy, name):
29 assert name.policy == policy
32 return InitialSID(policy, name)
35 return InitialSID(policy, qpol.qpol_isid_t(policy, name))
47 return context.context_factory(self.policy, self.qpol_symbol.context(self.policy))
polcap.py 23 def polcap_factory(policy, name):
24 """Factory function for creating policy capability objects."""
27 assert name.policy == policy
30 return PolicyCapability(policy, name)
32 raise TypeError("Policy capabilities cannot be looked up.")
37 """A policy capability."""
  /system/core/libcutils/include/cutils/
sched_policy.h 55 extern int set_cpuset_policy(int tid, SchedPolicy policy);
57 /* Assign thread tid to the cgroup associated with the specified policy.
63 extern int set_sched_policy(int tid, SchedPolicy policy);
65 /* Return the policy associated with the cgroup of thread tid via policy pointer.
69 extern int get_sched_policy(int tid, SchedPolicy *policy);
71 /* Return a displayable string corresponding to policy.
75 extern const char *get_sched_policy_name(SchedPolicy policy);

Completed in 353 milliseconds

1 2 3 4 5 6 7 8 91011>>