/external/libselinux/src/ |
H A D | policy.h | 23 extern char *selinux_mnt;
|
H A D | init.c | 24 char *selinux_mnt = NULL; variable 36 if (selinux_mnt) 46 selinux_mnt = strdup(SELINUXMNT); 91 selinux_mnt = strdup(p); 101 free(selinux_mnt); 102 selinux_mnt = NULL; 107 selinux_mnt = strdup(mnt);
|
H A D | enabled.c | 16 return (selinux_mnt ? 1 : 0); 31 if (!selinux_mnt) 34 snprintf(path, sizeof path, "%s/mls", selinux_mnt);
|
H A D | check_context.c | 17 if (!selinux_mnt) { 22 snprintf(path, sizeof path, "%s/context", selinux_mnt);
|
H A D | deny_unknown.c | 18 if (!selinux_mnt) { 23 snprintf(path, sizeof(path), "%s/deny_unknown", selinux_mnt);
|
H A D | disable.c | 18 if (!selinux_mnt) { 23 snprintf(path, sizeof path, "%s/disable", selinux_mnt);
|
H A D | getenforce.c | 18 if (!selinux_mnt) { 23 snprintf(path, sizeof path, "%s/enforce", selinux_mnt);
|
H A D | setenforce.c | 18 if (!selinux_mnt) { 23 snprintf(path, sizeof path, "%s/enforce", selinux_mnt);
|
H A D | get_initial_context.c | 21 if (!selinux_mnt) { 27 selinux_mnt, SELINUX_INITCON_DIR, name);
|
H A D | load_policy.c | 24 if (!selinux_mnt) { 29 snprintf(path, sizeof path, "%s/load", selinux_mnt);
|
H A D | policyvers.c | 20 if (!selinux_mnt) { 25 snprintf(path, sizeof path, "%s/policyvers", selinux_mnt);
|
H A D | booleans.c | 44 if (!selinux_mnt) { 49 snprintf(path, sizeof path, "%s%s", selinux_mnt, SELINUX_BOOL_DIR); 91 if (!selinux_mnt) { 101 len = strlen(name) + strlen(selinux_mnt) + sizeof(SELINUX_BOOL_DIR); 105 snprintf(fname, len, "%s%s%s", selinux_mnt, SELINUX_BOOL_DIR, name); 166 if (!selinux_mnt) { 175 len = strlen(name) + strlen(selinux_mnt) + sizeof(SELINUX_BOOL_DIR); 179 snprintf(fname, len, "%s%s%s", selinux_mnt, SELINUX_BOOL_DIR, name); 211 if (!selinux_mnt) { 216 snprintf(path, sizeof path, "%s/commit_pending_bools", selinux_mnt); [all...] |
H A D | canonicalize_context.c | 20 if (!selinux_mnt) { 25 snprintf(path, sizeof path, "%s/context", selinux_mnt);
|
H A D | compute_av.c | 24 if (!selinux_mnt) { 29 snprintf(path, sizeof path, "%s/access", selinux_mnt);
|
H A D | compute_create.c | 23 if (!selinux_mnt) { 28 snprintf(path, sizeof path, "%s/create", selinux_mnt);
|
/external/selinux/libselinux/src/ |
H A D | policy.h | 23 extern char *selinux_mnt;
|
H A D | enabled.c | 17 return (selinux_mnt ? 1 : 0); 19 return (selinux_mnt && has_selinux_config); 35 if (!selinux_mnt) 38 snprintf(path, sizeof path, "%s/mls", selinux_mnt);
|
H A D | deny_unknown.c | 18 if (!selinux_mnt) { 23 snprintf(path, sizeof(path), "%s/deny_unknown", selinux_mnt);
|
H A D | disable.c | 18 if (!selinux_mnt) { 23 snprintf(path, sizeof path, "%s/disable", selinux_mnt);
|
H A D | getenforce.c | 18 if (!selinux_mnt) { 23 snprintf(path, sizeof path, "%s/enforce", selinux_mnt);
|
H A D | setenforce.c | 18 if (!selinux_mnt) { 23 snprintf(path, sizeof path, "%s/enforce", selinux_mnt);
|
H A D | check_context.c | 17 if (!selinux_mnt) { 22 snprintf(path, sizeof path, "%s/context", selinux_mnt);
|
H A D | policyvers.c | 20 if (!selinux_mnt) { 25 snprintf(path, sizeof path, "%s/policyvers", selinux_mnt);
|
H A D | init.c | 21 char *selinux_mnt = NULL; variable 106 if (selinux_mnt) 152 free(selinux_mnt); 153 selinux_mnt = NULL; 160 selinux_mnt = strdup(mnt);
|
H A D | canonicalize_context.c | 20 if (!selinux_mnt) { 25 snprintf(path, sizeof path, "%s/context", selinux_mnt);
|