/external/selinux/libselinux/src/ |
policy.h | 28 extern char *selinux_mnt;
|
enabled.c | 17 return (selinux_mnt ? 1 : 0); 19 return (selinux_mnt && has_selinux_config); 35 if (!selinux_mnt) 38 snprintf(path, sizeof path, "%s/mls", selinux_mnt);
|
checkreqprot.c | 18 if (!selinux_mnt) { 23 snprintf(path, sizeof(path), "%s/checkreqprot", selinux_mnt);
|
deny_unknown.c | 18 if (!selinux_mnt) { 23 snprintf(path, sizeof(path), "%s/deny_unknown", selinux_mnt);
|
disable.c | 18 if (!selinux_mnt) { 23 snprintf(path, sizeof path, "%s/disable", selinux_mnt);
|
getenforce.c | 18 if (!selinux_mnt) { 23 snprintf(path, sizeof path, "%s/enforce", selinux_mnt);
|
setenforce.c | 18 if (!selinux_mnt) { 23 snprintf(path, sizeof path, "%s/enforce", selinux_mnt);
|
check_context.c | 17 if (!selinux_mnt) { 22 snprintf(path, sizeof path, "%s/context", selinux_mnt);
|
policyvers.c | 20 if (!selinux_mnt) { 25 snprintf(path, sizeof path, "%s/policyvers", selinux_mnt);
|
init.c | 20 char *selinux_mnt = NULL; variable 91 if (selinux_mnt) 137 free(selinux_mnt); 138 selinux_mnt = NULL; 145 selinux_mnt = strdup(mnt);
|
canonicalize_context.c | 20 if (!selinux_mnt) { 25 snprintf(path, sizeof path, "%s/context", selinux_mnt);
|
compute_relabel.c | 23 if (!selinux_mnt) { 28 snprintf(path, sizeof path, "%s/relabel", selinux_mnt);
|
get_initial_context.c | 21 if (!selinux_mnt) { 27 selinux_mnt, SELINUX_INITCON_DIR, name);
|
compute_member.c | 23 if (!selinux_mnt) { 28 snprintf(path, sizeof path, "%s/member", selinux_mnt);
|
compute_user.c | 22 if (!selinux_mnt) { 27 snprintf(path, sizeof path, "%s/user", selinux_mnt);
|
booleans.c | 50 if (!selinux_mnt) { 55 snprintf(path, sizeof path, "%s%s", selinux_mnt, SELINUX_BOOL_DIR); 158 len = strlen(name) + strlen(selinux_mnt) + sizeof(SELINUX_BOOL_DIR); 163 ret = snprintf(fname, len, "%s%s%s", selinux_mnt, SELINUX_BOOL_DIR, name); 177 len = strlen(alt_name) + strlen(selinux_mnt) + sizeof(SELINUX_BOOL_DIR); 183 ret = snprintf(fname, len, "%s%s%s", selinux_mnt, SELINUX_BOOL_DIR, alt_name); 202 if (!selinux_mnt) { 268 if (!selinux_mnt) { 302 if (!selinux_mnt) { 307 snprintf(path, sizeof path, "%s/commit_pending_bools", selinux_mnt); [all...] |
compute_create.c | 62 if (!selinux_mnt) { 67 snprintf(path, sizeof path, "%s/create", selinux_mnt);
|
stringrep.c | 61 if (!selinux_mnt) { 82 snprintf(path, sizeof path, "%s/class/%s/index", selinux_mnt,s); 97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name);
|
compute_av.c | 24 if (!selinux_mnt) { 29 snprintf(path, sizeof path, "%s/access", selinux_mnt);
|
sestatus.c | 261 if (!selinux_mnt) { 270 snprintf(path, sizeof(path), "%s/status", selinux_mnt);
|
load_policy.c | 31 if (!selinux_mnt) { 36 snprintf(path, sizeof path, "%s/load", selinux_mnt); 423 umount(selinux_mnt); 453 umount(selinux_mnt);
|
selinux_config.c | 353 if (selinux_mnt) { 354 snprintf(policy_path, sizeof(policy_path), "%s/policy", selinux_mnt);
|
/external/selinux/libselinux/utils/ |
avcstat.c | 44 extern char *selinux_mnt; 74 printf("AVC statistics file, defaulting to \'%s%s\'.\n\n", selinux_mnt, 101 snprintf(avcstatfile, sizeof avcstatfile, "%s%s", selinux_mnt,
|
/external/selinux/policycoreutils/sestatus/ |
sestatus.c | 35 extern char *selinux_mnt; 238 if (selinux_mnt != NULL) { 239 printf("%s\n", selinux_mnt);
|