newcontext 492 security/selinux/ss/mls.c struct context *newcontext, newcontext 511 security/selinux/ss/mls.c return mls_range_set(newcontext, r); newcontext 521 security/selinux/ss/mls.c return mls_context_cpy_low(newcontext, scontext); newcontext 523 security/selinux/ss/mls.c return mls_context_cpy_high(newcontext, scontext); newcontext 525 security/selinux/ss/mls.c return mls_context_cpy(newcontext, scontext); newcontext 527 security/selinux/ss/mls.c return mls_context_cpy_low(newcontext, tcontext); newcontext 529 security/selinux/ss/mls.c return mls_context_cpy_high(newcontext, tcontext); newcontext 531 security/selinux/ss/mls.c return mls_context_cpy(newcontext, tcontext); newcontext 538 security/selinux/ss/mls.c return mls_context_cpy(newcontext, scontext); newcontext 541 security/selinux/ss/mls.c return mls_context_cpy_low(newcontext, scontext); newcontext 544 security/selinux/ss/mls.c return mls_context_cpy_low(newcontext, scontext); newcontext 57 security/selinux/ss/mls.h struct context *newcontext, newcontext 1580 security/selinux/ss/services.c struct context *newcontext) newcontext 1591 security/selinux/ss/services.c if (context_struct_to_string(policydb, newcontext, &n, &nlen)) newcontext 1611 security/selinux/ss/services.c struct context *newcontext, newcontext 1633 security/selinux/ss/services.c newcontext->type = otype->otype; newcontext 1648 security/selinux/ss/services.c struct context *scontext = NULL, *tcontext = NULL, newcontext; newcontext 1669 security/selinux/ss/services.c context_init(&newcontext); newcontext 1708 security/selinux/ss/services.c newcontext.user = tcontext->user; newcontext 1712 security/selinux/ss/services.c newcontext.user = scontext->user; newcontext 1717 security/selinux/ss/services.c newcontext.user = tcontext->user; newcontext 1723 security/selinux/ss/services.c newcontext.role = scontext->role; newcontext 1725 security/selinux/ss/services.c newcontext.role = tcontext->role; newcontext 1728 security/selinux/ss/services.c newcontext.role = scontext->role; newcontext 1730 security/selinux/ss/services.c newcontext.role = OBJECT_R_VAL; newcontext 1735 security/selinux/ss/services.c newcontext.type = scontext->type; newcontext 1737 security/selinux/ss/services.c newcontext.type = tcontext->type; newcontext 1741 security/selinux/ss/services.c newcontext.type = scontext->type; newcontext 1744 security/selinux/ss/services.c newcontext.type = tcontext->type; newcontext 1768 security/selinux/ss/services.c newcontext.type = avdatum->u.data; newcontext 1773 security/selinux/ss/services.c filename_compute_type(policydb, &newcontext, scontext->type, newcontext 1785 security/selinux/ss/services.c newcontext.role = roletr->new_role; newcontext 1794 security/selinux/ss/services.c &newcontext, sock); newcontext 1799 security/selinux/ss/services.c if (!policydb_context_isvalid(policydb, &newcontext)) { newcontext 1803 security/selinux/ss/services.c &newcontext); newcontext 1808 security/selinux/ss/services.c rc = sidtab_context_to_sid(sidtab, &newcontext, out_sid); newcontext 1811 security/selinux/ss/services.c context_destroy(&newcontext);