/external/selinux/libselinux/src/ |
D | enabled.c | 17 return (selinux_mnt ? 1 : 0); in is_selinux_enabled() 19 return (selinux_mnt && has_selinux_config); in is_selinux_enabled() 35 if (!selinux_mnt) in hidden_def() 38 snprintf(path, sizeof path, "%s/mls", selinux_mnt); in hidden_def()
|
D | booleans.c | 50 if (!selinux_mnt) { in security_get_boolean_names() 55 snprintf(path, sizeof path, "%s%s", selinux_mnt, SELINUX_BOOL_DIR); in security_get_boolean_names() 161 len = strlen(name) + strlen(selinux_mnt) + sizeof(SELINUX_BOOL_DIR); in bool_open() 166 ret = snprintf(fname, len, "%s%s%s", selinux_mnt, SELINUX_BOOL_DIR, name); in bool_open() 180 len = strlen(alt_name) + strlen(selinux_mnt) + sizeof(SELINUX_BOOL_DIR); in bool_open() 186 ret = snprintf(fname, len, "%s%s%s", selinux_mnt, SELINUX_BOOL_DIR, alt_name); in bool_open() 205 if (!selinux_mnt) { in get_bool_value() 271 if (!selinux_mnt) { in security_set_boolean() 305 if (!selinux_mnt) { in security_commit_booleans() 310 snprintf(path, sizeof path, "%s/commit_pending_bools", selinux_mnt); in security_commit_booleans()
|
D | init.c | 20 char *selinux_mnt = NULL; variable 91 if (selinux_mnt) in hidden_def() 137 free(selinux_mnt); in fini_selinuxmnt() 138 selinux_mnt = NULL; in fini_selinuxmnt() 145 selinux_mnt = strdup(mnt); in hidden_def()
|
D | disable.c | 18 if (!selinux_mnt) { in security_disable() 23 snprintf(path, sizeof path, "%s/disable", selinux_mnt); in security_disable()
|
D | setenforce.c | 18 if (!selinux_mnt) { in security_setenforce() 23 snprintf(path, sizeof path, "%s/enforce", selinux_mnt); in security_setenforce()
|
D | getenforce.c | 18 if (!selinux_mnt) { in security_getenforce() 23 snprintf(path, sizeof path, "%s/enforce", selinux_mnt); in security_getenforce()
|
D | checkreqprot.c | 18 if (!selinux_mnt) { in security_get_checkreqprot() 23 snprintf(path, sizeof(path), "%s/checkreqprot", selinux_mnt); in security_get_checkreqprot()
|
D | deny_unknown.c | 18 if (!selinux_mnt) { in security_deny_unknown() 23 snprintf(path, sizeof(path), "%s/deny_unknown", selinux_mnt); in security_deny_unknown()
|
D | reject_unknown.c | 18 if (!selinux_mnt) { in security_reject_unknown() 23 snprintf(path, sizeof(path), "%s/reject_unknown", selinux_mnt); in security_reject_unknown()
|
D | policyvers.c | 20 if (!selinux_mnt) { in security_policyvers() 25 snprintf(path, sizeof path, "%s/policyvers", selinux_mnt); in security_policyvers()
|
D | check_context.c | 17 if (!selinux_mnt) { in security_check_context_raw() 22 snprintf(path, sizeof path, "%s/context", selinux_mnt); in security_check_context_raw()
|
D | get_initial_context.c | 21 if (!selinux_mnt) { in security_get_initial_context_raw() 27 selinux_mnt, SELINUX_INITCON_DIR, name); in security_get_initial_context_raw()
|
D | canonicalize_context.c | 20 if (!selinux_mnt) { in security_canonicalize_context_raw() 25 snprintf(path, sizeof path, "%s/context", selinux_mnt); in security_canonicalize_context_raw()
|
D | compute_relabel.c | 23 if (!selinux_mnt) { in security_compute_relabel_raw() 28 snprintf(path, sizeof path, "%s/relabel", selinux_mnt); in security_compute_relabel_raw()
|
D | validatetrans.c | 24 if (!selinux_mnt) { in security_validatetrans_raw() 28 snprintf(path, sizeof path, "%s/validatetrans", selinux_mnt); in security_validatetrans_raw()
|
D | load_policy.c | 31 if (!selinux_mnt) { in security_load_policy() 36 snprintf(path, sizeof path, "%s/load", selinux_mnt); in security_load_policy() 333 umount(selinux_mnt); in hidden_def() 363 umount(selinux_mnt); in hidden_def()
|
D | compute_member.c | 23 if (!selinux_mnt) { in security_compute_member_raw() 28 snprintf(path, sizeof path, "%s/member", selinux_mnt); in security_compute_member_raw()
|
D | stringrep.c | 61 if (!selinux_mnt) { in discover_class() 82 snprintf(path, sizeof path, "%s/class/%s/index", selinux_mnt,s); in discover_class() 97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); in discover_class() 107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); in discover_class()
|
D | compute_user.c | 22 if (!selinux_mnt) { in security_compute_user_raw() 27 snprintf(path, sizeof path, "%s/user", selinux_mnt); in security_compute_user_raw()
|
D | compute_create.c | 62 if (!selinux_mnt) { in security_compute_create_name_raw() 67 snprintf(path, sizeof path, "%s/create", selinux_mnt); in security_compute_create_name_raw()
|
D | compute_av.c | 25 if (!selinux_mnt) { in security_compute_av_flags_raw() 30 snprintf(path, sizeof path, "%s/access", selinux_mnt); in security_compute_av_flags_raw()
|
D | sestatus.c | 261 if (!selinux_mnt) { in selinux_status_open() 270 snprintf(path, sizeof(path), "%s/status", selinux_mnt); in selinux_status_open()
|
D | policy.h | 28 extern char *selinux_mnt;
|
/external/selinux/libselinux/utils/ |
D | avcstat.c | 44 extern char *selinux_mnt; 74 printf("AVC statistics file, defaulting to \'%s%s\'.\n\n", selinux_mnt, in usage() 101 snprintf(avcstatfile, sizeof avcstatfile, "%s%s", selinux_mnt, in main()
|
/external/selinux/policycoreutils/sestatus/ |
D | sestatus.c | 36 extern char *selinux_mnt; 245 if (selinux_mnt != NULL) { in main() 246 printf("%s\n", selinux_mnt); in main()
|