scontext         1873 drivers/infiniband/hw/hfi1/pio.c static void set_threshold(struct hfi1_devdata *dd, int scontext, int i)
scontext         1877 drivers/infiniband/hw/hfi1/pio.c 	thres = min(sc_percent_to_threshold(dd->kernel_send_context[scontext],
scontext         1879 drivers/infiniband/hw/hfi1/pio.c 		    sc_mtu_to_threshold(dd->kernel_send_context[scontext],
scontext         1882 drivers/infiniband/hw/hfi1/pio.c 	sc_set_cr_threshold(dd->kernel_send_context[scontext], thres);
scontext         1917 drivers/infiniband/hw/hfi1/pio.c 	int scontext = 1;
scontext         1947 drivers/infiniband/hw/hfi1/pio.c 		int first_scontext = scontext;
scontext         1965 drivers/infiniband/hw/hfi1/pio.c 				if (dd->kernel_send_context[scontext]) {
scontext         1967 drivers/infiniband/hw/hfi1/pio.c 					dd->kernel_send_context[scontext];
scontext         1968 drivers/infiniband/hw/hfi1/pio.c 					set_threshold(dd, scontext, i);
scontext         1970 drivers/infiniband/hw/hfi1/pio.c 				if (++scontext >= first_scontext +
scontext         1973 drivers/infiniband/hw/hfi1/pio.c 					scontext = first_scontext;
scontext         1979 drivers/infiniband/hw/hfi1/pio.c 		scontext = first_scontext + vl_scontexts[i];
scontext          705 security/selinux/avc.c 	char *scontext;
scontext          709 security/selinux/avc.c 	rc = security_sid_to_context(sad->state, sad->ssid, &scontext,
scontext          714 security/selinux/avc.c 		audit_log_format(ab, " scontext=%s", scontext);
scontext          715 security/selinux/avc.c 		kfree(scontext);
scontext          718 security/selinux/avc.c 	rc = security_sid_to_context(sad->state, sad->tsid, &scontext,
scontext          723 security/selinux/avc.c 		audit_log_format(ab, " tcontext=%s", scontext);
scontext          724 security/selinux/avc.c 		kfree(scontext);
scontext          733 security/selinux/avc.c 	rc = security_sid_to_context_inval(sad->state, sad->ssid, &scontext,
scontext          735 security/selinux/avc.c 	if (!rc && scontext) {
scontext          736 security/selinux/avc.c 		if (scontext_len && scontext[scontext_len - 1] == '\0')
scontext          739 security/selinux/avc.c 		audit_log_n_untrustedstring(ab, scontext, scontext_len);
scontext          740 security/selinux/avc.c 		kfree(scontext);
scontext          743 security/selinux/avc.c 	rc = security_sid_to_context_inval(sad->state, sad->tsid, &scontext,
scontext          745 security/selinux/avc.c 	if (!rc && scontext) {
scontext          746 security/selinux/avc.c 		if (scontext_len && scontext[scontext_len - 1] == '\0')
scontext          749 security/selinux/avc.c 		audit_log_n_untrustedstring(ab, scontext, scontext_len);
scontext          750 security/selinux/avc.c 		kfree(scontext);
scontext         5067 security/selinux/hooks.c 	char *scontext;
scontext         5079 security/selinux/hooks.c 	err = security_sid_to_context(&selinux_state, peer_sid, &scontext,
scontext         5089 security/selinux/hooks.c 	if (copy_to_user(optval, scontext, scontext_len))
scontext         5095 security/selinux/hooks.c 	kfree(scontext);
scontext          254 security/selinux/include/security.h 			    char **scontext, u32 *scontext_len);
scontext          257 security/selinux/include/security.h 				  u32 sid, char **scontext, u32 *scontext_len);
scontext          260 security/selinux/include/security.h 				  u32 sid, char **scontext, u32 *scontext_len);
scontext          263 security/selinux/include/security.h 			    const char *scontext, u32 scontext_len,
scontext          267 security/selinux/include/security.h 				const char *scontext, u32 *out_sid, gfp_t gfp);
scontext          270 security/selinux/include/security.h 				    const char *scontext, u32 scontext_len,
scontext          274 security/selinux/include/security.h 				  const char *scontext, u32 scontext_len,
scontext           91 security/selinux/ss/mls.c 			char **scontext)
scontext          101 security/selinux/ss/mls.c 	scontextp = *scontext;
scontext          158 security/selinux/ss/mls.c 	*scontext = scontextp;
scontext          236 security/selinux/ss/mls.c 		       char *scontext,
scontext          278 security/selinux/ss/mls.c 	rangep[0] = scontext;
scontext          279 security/selinux/ss/mls.c 	rangep[1] = strchr(scontext, '-');
scontext          488 security/selinux/ss/mls.c 		    struct context *scontext,
scontext          506 security/selinux/ss/mls.c 		rtr.source_type = scontext->type;
scontext          521 security/selinux/ss/mls.c 			return mls_context_cpy_low(newcontext, scontext);
scontext          523 security/selinux/ss/mls.c 			return mls_context_cpy_high(newcontext, scontext);
scontext          525 security/selinux/ss/mls.c 			return mls_context_cpy(newcontext, scontext);
scontext          538 security/selinux/ss/mls.c 			return mls_context_cpy(newcontext, scontext);
scontext          541 security/selinux/ss/mls.c 			return mls_context_cpy_low(newcontext, scontext);
scontext          544 security/selinux/ss/mls.c 		return mls_context_cpy_low(newcontext, scontext);
scontext           30 security/selinux/ss/mls.h 			char **scontext);
scontext           37 security/selinux/ss/mls.h 		       char *scontext,
scontext           53 security/selinux/ss/mls.h 		    struct context *scontext,
scontext           91 security/selinux/ss/services.c 				    char **scontext,
scontext           95 security/selinux/ss/services.c 				      struct context *scontext,
scontext          263 security/selinux/ss/services.c 				struct context *scontext,
scontext          297 security/selinux/ss/services.c 				val1 = scontext->user;
scontext          301 security/selinux/ss/services.c 				val1 = scontext->type;
scontext          305 security/selinux/ss/services.c 				val1 = scontext->role;
scontext          329 security/selinux/ss/services.c 				l1 = &(scontext->range.level[0]);
scontext          333 security/selinux/ss/services.c 				l1 = &(scontext->range.level[0]);
scontext          337 security/selinux/ss/services.c 				l1 = &(scontext->range.level[1]);
scontext          341 security/selinux/ss/services.c 				l1 = &(scontext->range.level[1]);
scontext          345 security/selinux/ss/services.c 				l1 = &(scontext->range.level[0]);
scontext          346 security/selinux/ss/services.c 				l2 = &(scontext->range.level[1]);
scontext          394 security/selinux/ss/services.c 			c = scontext;
scontext          454 security/selinux/ss/services.c 				    struct context *scontext,
scontext          489 security/selinux/ss/services.c 	if (context_struct_to_string(policydb, scontext,
scontext          533 security/selinux/ss/services.c 				     struct context *scontext,
scontext          545 security/selinux/ss/services.c 	source = policydb->type_val_to_struct[scontext->type - 1];
scontext          556 security/selinux/ss/services.c 	memcpy(&lo_scontext, scontext, sizeof(lo_scontext));
scontext          580 security/selinux/ss/services.c 	security_dump_masked_av(policydb, scontext, tcontext,
scontext          614 security/selinux/ss/services.c 				      struct context *scontext,
scontext          651 security/selinux/ss/services.c 	sattr = &policydb->type_attr_map_array[scontext->type - 1];
scontext          685 security/selinux/ss/services.c 		    !constraint_expr_eval(policydb, scontext, tcontext, NULL,
scontext          699 security/selinux/ss/services.c 	    scontext->role != tcontext->role) {
scontext          701 security/selinux/ss/services.c 			if (scontext->role == ra->role &&
scontext          714 security/selinux/ss/services.c 	type_attribute_bounds_av(policydb, scontext, tcontext,
scontext         1008 security/selinux/ss/services.c 	struct context *scontext, *tcontext;
scontext         1028 security/selinux/ss/services.c 	scontext = sidtab_search(sidtab, ssid);
scontext         1029 security/selinux/ss/services.c 	if (!scontext) {
scontext         1057 security/selinux/ss/services.c 	sattr = &policydb->type_attr_map_array[scontext->type - 1];
scontext         1102 security/selinux/ss/services.c 	struct context *scontext = NULL, *tcontext = NULL;
scontext         1113 security/selinux/ss/services.c 	scontext = sidtab_search(sidtab, ssid);
scontext         1114 security/selinux/ss/services.c 	if (!scontext) {
scontext         1121 security/selinux/ss/services.c 	if (ebitmap_get_bit(&policydb->permissive_map, scontext->type))
scontext         1137 security/selinux/ss/services.c 	context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
scontext         1157 security/selinux/ss/services.c 	struct context *scontext = NULL, *tcontext = NULL;
scontext         1167 security/selinux/ss/services.c 	scontext = sidtab_search(sidtab, ssid);
scontext         1168 security/selinux/ss/services.c 	if (!scontext) {
scontext         1175 security/selinux/ss/services.c 	if (ebitmap_get_bit(&policydb->permissive_map, scontext->type))
scontext         1191 security/selinux/ss/services.c 	context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
scontext         1210 security/selinux/ss/services.c 				    char **scontext, u32 *scontext_len)
scontext         1214 security/selinux/ss/services.c 	if (scontext)
scontext         1215 security/selinux/ss/services.c 		*scontext = NULL;
scontext         1220 security/selinux/ss/services.c 		if (scontext) {
scontext         1221 security/selinux/ss/services.c 			*scontext = kstrdup(context->str, GFP_ATOMIC);
scontext         1222 security/selinux/ss/services.c 			if (!(*scontext))
scontext         1234 security/selinux/ss/services.c 	if (!scontext)
scontext         1241 security/selinux/ss/services.c 	*scontext = scontextp;
scontext         1268 security/selinux/ss/services.c 					u32 sid, char **scontext,
scontext         1277 security/selinux/ss/services.c 	if (scontext)
scontext         1278 security/selinux/ss/services.c 		*scontext = NULL;
scontext         1286 security/selinux/ss/services.c 			if (!scontext)
scontext         1294 security/selinux/ss/services.c 			*scontext = scontextp;
scontext         1318 security/selinux/ss/services.c 		rc = context_struct_to_string(policydb, context, scontext,
scontext         1338 security/selinux/ss/services.c 			    u32 sid, char **scontext, u32 *scontext_len)
scontext         1340 security/selinux/ss/services.c 	return security_sid_to_context_core(state, sid, scontext,
scontext         1345 security/selinux/ss/services.c 				  char **scontext, u32 *scontext_len)
scontext         1347 security/selinux/ss/services.c 	return security_sid_to_context_core(state, sid, scontext,
scontext         1365 security/selinux/ss/services.c 				  char **scontext, u32 *scontext_len)
scontext         1367 security/selinux/ss/services.c 	return security_sid_to_context_core(state, sid, scontext,
scontext         1376 security/selinux/ss/services.c 				    char *scontext,
scontext         1391 security/selinux/ss/services.c 	scontextp = (char *) scontext;
scontext         1453 security/selinux/ss/services.c 					const char *scontext, u32 scontext_len,
scontext         1468 security/selinux/ss/services.c 	scontext2 = kmemdup_nul(scontext, scontext_len, gfp_flags);
scontext         1527 security/selinux/ss/services.c 			    const char *scontext, u32 scontext_len, u32 *sid,
scontext         1530 security/selinux/ss/services.c 	return security_context_to_sid_core(state, scontext, scontext_len,
scontext         1535 security/selinux/ss/services.c 				const char *scontext, u32 *sid, gfp_t gfp)
scontext         1537 security/selinux/ss/services.c 	return security_context_to_sid(state, scontext, strlen(scontext),
scontext         1560 security/selinux/ss/services.c 				    const char *scontext, u32 scontext_len,
scontext         1563 security/selinux/ss/services.c 	return security_context_to_sid_core(state, scontext, scontext_len,
scontext         1568 security/selinux/ss/services.c 				  const char *scontext, u32 scontext_len,
scontext         1571 security/selinux/ss/services.c 	return security_context_to_sid_core(state, scontext, scontext_len,
scontext         1577 security/selinux/ss/services.c 	struct context *scontext,
scontext         1587 security/selinux/ss/services.c 	if (context_struct_to_string(policydb, scontext, &s, &slen))
scontext         1648 security/selinux/ss/services.c 	struct context *scontext = NULL, *tcontext = NULL, newcontext;
scontext         1685 security/selinux/ss/services.c 	scontext = sidtab_search(sidtab, ssid);
scontext         1686 security/selinux/ss/services.c 	if (!scontext) {
scontext         1712 security/selinux/ss/services.c 			newcontext.user = scontext->user;
scontext         1723 security/selinux/ss/services.c 		newcontext.role = scontext->role;
scontext         1728 security/selinux/ss/services.c 			newcontext.role = scontext->role;
scontext         1735 security/selinux/ss/services.c 		newcontext.type = scontext->type;
scontext         1741 security/selinux/ss/services.c 			newcontext.type = scontext->type;
scontext         1749 security/selinux/ss/services.c 	avkey.source_type = scontext->type;
scontext         1773 security/selinux/ss/services.c 		filename_compute_type(policydb, &newcontext, scontext->type,
scontext         1781 security/selinux/ss/services.c 			if ((roletr->role == scontext->role) &&
scontext         1793 security/selinux/ss/services.c 	rc = mls_compute_sid(policydb, scontext, tcontext, tclass, specified,
scontext         1800 security/selinux/ss/services.c 		rc = compute_sid_handle_invalid_context(state, scontext,