Lines Matching refs:c

74 	c := &policyConf{}
75 c.AddProperties(&c.properties)
76 android.InitAndroidArchModule(c, android.DeviceSupported, android.MultilibCommon)
77 return c
80 func (c *policyConf) installable() bool {
81 return proptools.BoolDefault(c.properties.Installable, true)
84 func (c *policyConf) stem() string {
85 return proptools.StringDefault(c.properties.Stem, c.Name())
88 func (c *policyConf) buildVariant(ctx android.ModuleContext) string {
89 if variant := proptools.String(c.properties.Build_variant); variant != "" {
101 func (c *policyConf) cts() bool {
102 return proptools.Bool(c.properties.Cts)
105 func (c *policyConf) withAsan(ctx android.ModuleContext) string {
107 return strconv.FormatBool(proptools.BoolDefault(c.properties.With_asan, isAsanDevice))
110 func (c *policyConf) sepolicySplit(ctx android.ModuleContext) string {
111 if c.cts() {
117 func (c *policyConf) compatibleProperty(ctx android.ModuleContext) string {
118 if c.cts() {
124 func (c *policyConf) trebleSyspropNeverallow(ctx android.ModuleContext) string {
125 if c.cts() {
131 func (c *policyConf) enforceSyspropOwner(ctx android.ModuleContext) string {
132 if c.cts() {
138 func (c *policyConf) enforceDebugfsRestrictions(ctx android.ModuleContext) string {
139 if c.cts() {
145 func (c *policyConf) transformPolicyToConf(ctx android.ModuleContext) android.OutputPath {
154 FlagWithArg("-D target_with_asan=", c.withAsan(ctx)).
157 FlagWithArg("-D target_build_variant=", c.buildVariant(ctx)).
158 FlagWithArg("-D target_full_treble=", c.sepolicySplit(ctx)).
159 FlagWithArg("-D target_compatible_property=", c.compatibleProperty(ctx)).
160 FlagWithArg("-D target_treble_sysprop_neverallow=", c.trebleSyspropNeverallow(ctx)).
161 FlagWithArg("-D target_enforce_sysprop_owner=", c.enforceSyspropOwner(ctx)).
162 …FlagWithArg("-D target_exclude_build_test=", strconv.FormatBool(proptools.Bool(c.properties.Exclud…
164 FlagWithArg("-D target_enforce_debugfs_restriction=", c.enforceDebugfsRestrictions(ctx)).
166 Inputs(android.PathsForModuleSrc(ctx, c.properties.Srcs)).
173 func (c *policyConf) DepsMutator(ctx android.BottomUpMutatorContext) {
177 func (c *policyConf) GenerateAndroidBuildActions(ctx android.ModuleContext) {
178 c.installSource = c.transformPolicyToConf(ctx)
179 c.installPath = android.PathForModuleInstall(ctx, "etc")
180 ctx.InstallFile(c.installPath, c.stem(), c.installSource)
182 if !c.installable() {
183 c.SkipInstall()
187 func (c *policyConf) AndroidMkEntries() []android.AndroidMkEntries {
189 OutputFile: android.OptionalPathForPath(c.installSource),
193 entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", !c.installable())
194 entries.SetPath("LOCAL_MODULE_PATH", c.installPath.ToMakePath())
195 entries.SetString("LOCAL_INSTALLED_MODULE_STEM", c.stem())
201 func (c *policyConf) OutputFiles(tag string) (android.Paths, error) {
203 return android.Paths{c.installSource}, nil
251 c := &policyCil{}
252 c.AddProperties(&c.properties)
253 android.InitAndroidArchModule(c, android.DeviceSupported, android.MultilibCommon)
254 return c
257 func (c *policyCil) Installable() bool {
258 return proptools.BoolDefault(c.properties.Installable, true)
261 func (c *policyCil) stem() string {
262 return proptools.StringDefault(c.properties.Stem, c.Name())
265 func (c *policyCil) compileConfToCil(ctx android.ModuleContext, conf android.Path) android.OutputPa…
266 cil := android.PathForModuleOut(ctx, c.stem()).OutputPath
275 if len(c.properties.Additional_cil_files) > 0 {
277 Inputs(android.PathsForModuleSrc(ctx, c.properties.Additional_cil_files)).
281 if len(c.properties.Filter_out) > 0 {
285 Inputs(android.PathsForModuleSrc(ctx, c.properties.Filter_out)).
289 if proptools.Bool(c.properties.Remove_line_marker) {
300 if proptools.BoolDefault(c.properties.Secilc_check, true) {
306 …Inputs(android.PathsForModuleSrc(ctx, c.properties.Filter_out)). // Also add cil files which are f…
311 …if proptools.BoolDefault(c.properties.Ignore_neverallow, ctx.Config().SelinuxIgnoreNeverallows()) {
320 func (c *policyCil) GenerateAndroidBuildActions(ctx android.ModuleContext) {
321 if proptools.String(c.properties.Src) == "" {
325 conf := android.PathForModuleSrc(ctx, *c.properties.Src)
326 cil := c.compileConfToCil(ctx, conf)
328 if c.InstallInDebugRamdisk() {
330 c.installPath = android.PathForModuleInstall(ctx)
332 c.installPath = android.PathForModuleInstall(ctx, "etc", "selinux")
334 c.installSource = cil
335 ctx.InstallFile(c.installPath, c.stem(), c.installSource)
337 if !c.Installable() {
338 c.SkipInstall()
342 func (c *policyCil) AndroidMkEntries() []android.AndroidMkEntries {
344 OutputFile: android.OptionalPathForPath(c.installSource),
348 entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", !c.Installable())
349 entries.SetPath("LOCAL_MODULE_PATH", c.installPath.ToMakePath())
350 entries.SetString("LOCAL_INSTALLED_MODULE_STEM", c.stem())
356 func (c *policyCil) OutputFiles(tag string) (android.Paths, error) {
358 return android.Paths{c.installSource}, nil