Searched refs:avd (Results 1 - 19 of 19) sorted by relevance

/external/libselinux/src/
H A Dcompute_av.c17 struct av_decision *avd)
54 &avd->allowed, &avd->decided,
55 &avd->auditallow, &avd->auditdeny,
56 &avd->seqno, &avd->flags);
61 avd->flags = 0;
63 map_decision(tclass, avd);
13 security_compute_av(const security_context_t scon, const security_context_t tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) argument
H A Dmapping.c169 map_decision(security_class_t tclass, struct av_decision *avd) argument
176 if (avd->allowed & current_mapping[tclass].perms[i])
178 avd->allowed = result;
181 if (avd->decided & current_mapping[tclass].perms[i])
183 avd->decided = result;
186 if (avd->auditallow & current_mapping[tclass].perms[i])
188 avd->auditallow = result;
191 if (avd->auditdeny & current_mapping[tclass].perms[i])
193 avd->auditdeny = result;
H A Dmapping.h32 map_decision(security_class_t tclass, struct av_decision *avd);
H A Davc.c22 struct av_decision avd; member in struct:avc_entry
292 ae->avd.allowed = ae->avd.decided = 0;
293 ae->avd.auditallow = ae->avd.auditdeny = 0;
388 if (node && ((node->ae.avd.decided & requested) == requested)) {
414 * sequence number @ae->avd.seqno is not less than the latest
427 if (ae->avd.seqno < avc_cache.latest_notif) {
430 ae->avd.seqno, avc_cache.latest_notif);
442 node->ae.avd
651 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) argument
770 struct av_decision avd; local
[all...]
/external/qemu/android/
H A Dmain.c175 AvdInfo* avd; local
269 avd = createAVD(opts, &inAndroidBuild);
270 opts->snapstorage = avdInfo_getSnapStoragePath(avd);
298 avd = android_avdInfo = createAVD(opts, &inAndroidBuild);
311 avdInfo_getSkinInfo(avd, &skinName, &skinDir);
323 /* update the avd hw config from this new skin */
324 avdInfo_getSkinHardwareIni(avd, opts->skin, opts->skindir);
328 opts->dynamic_skin = avdInfo_shouldUseDynamicSkin(avd);
333 if (avdInfo_initHwConfig(avd, hw) < 0) {
391 char* tracePath = avdInfo_getTracePath(avd, opt
[all...]
H A Dmain-common.h19 #include "android/avd/hw-config.h"
88 * avd - AVD info containig paths for the hardware configuration.
93 void updateHwConfigFromAVD(AndroidHwConfig* hwConfig, struct AvdInfo* avd,
H A Dcmdline-options.h28 * and will be ignored if you start the emulator with the -avd <name> flag.
30 * However, if you use them with -avd-create <name>, these options will be
88 CFG_PARAM( avd, "<name>", "use a specific android virtual device" )
H A Dmain-common.c27 #include "android/avd/util.h"
1015 if (opts->avd == NULL) {
1049 if (opts->avd == NULL && !android_build_out)
1059 "If you are an Android SDK user, please use '@<name>' or '-avd <name>'\n"
1060 "to start a given virtual device (see -help-avd for details).\n\n"
1097 "with the '-avd <name>' option. Read -help-avd for more information.\n\n"
1121 if (opts->avd != NULL)
1123 ret = avdInfo_new( opts->avd, android_avdParams );
1126 dprint("could not find virtual device named '%s'", opts->avd);
[all...]
H A Dcmdline-option.c61 * '-avd <name>'
64 opt->avd = aread[0]+1;
H A Dmain-emulator.c30 #include <android/avd/util.h>
104 * 1) an avd name either in the form or '-avd <name>' or '@<name>'
120 if (!strcmp(opt,"-avd") && nn+1 < argc) {
/external/libsepol/include/sepol/policydb/
H A Dservices.h47 struct sepol_av_decision *avd); /* OUT */
58 struct sepol_av_decision *avd,
H A Dconditional.h134 struct sepol_av_decision *avd);
/external/libsepol/src/
H A Dservices.c311 struct sepol_av_decision *avd,
332 avd->allowed = 0;
333 avd->decided = 0xffffffff;
334 avd->auditallow = 0;
335 avd->auditdeny = 0xffffffff;
336 avd->seqno = latest_granting;
361 avd->allowed |= node->datum.data;
364 avd->auditallow |= node->datum.data;
366 avd->auditdeny &= node->datum.data;
370 cond_compute_av(&policydb->te_cond_avtab, &avkey, avd);
307 context_struct_compute_av(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) argument
473 sepol_compute_av_reason(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) argument
502 sepol_compute_av(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd) argument
1297 struct sepol_av_decision avd; local
[all...]
H A Dconditional.c879 struct sepol_av_decision *avd)
883 if (!ctab || !key || !avd)
890 avd->allowed |= node->datum.data;
898 avd->auditdeny &= node->datum.data;
901 avd->auditallow |= node->datum.data;
878 cond_compute_av(avtab_t * ctab, avtab_key_t * key, struct sepol_av_decision *avd) argument
H A Dexpand.c3076 avtab_datum_t *avd; local
3097 avd = &node->datum;
3101 avd->data |= d->data;
3104 avd->data &= d->data;
3207 avtab_datum_t *avd; local
3232 avd = &node->datum;
3236 avd->data |= d->data;
3239 avd->data &= d->data;
/external/libselinux/include/selinux/
H A Davc.h242 * @avd: access vector decisions
249 * in @avd. Return %0 if all @requested permissions are granted, -%1 with
260 struct avc_entry_ref *aeref, struct av_decision *avd);
290 * @avd: access vector decisions
305 struct av_decision *avd, int result, void *auditdata);
H A Dselinux.h167 struct av_decision *avd);
/external/ipsec-tools/src/racoon/
H A Dsecurity.c220 struct av_decision avd; local
254 rtn = avc_has_perm(slsid, rangesid, tclass, av, NULL, &avd);
/external/checkpolicy/
H A Dcheckpolicy.c382 struct sepol_av_decision avd; local
695 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd);
699 for (i = 1; i <= sizeof(avd.allowed) * 8; i++) {
700 if (avd.allowed & (1 << (i - 1))) {

Completed in 231 milliseconds