scontext 1873 drivers/infiniband/hw/hfi1/pio.c static void set_threshold(struct hfi1_devdata *dd, int scontext, int i) scontext 1877 drivers/infiniband/hw/hfi1/pio.c thres = min(sc_percent_to_threshold(dd->kernel_send_context[scontext], scontext 1879 drivers/infiniband/hw/hfi1/pio.c sc_mtu_to_threshold(dd->kernel_send_context[scontext], scontext 1882 drivers/infiniband/hw/hfi1/pio.c sc_set_cr_threshold(dd->kernel_send_context[scontext], thres); scontext 1917 drivers/infiniband/hw/hfi1/pio.c int scontext = 1; scontext 1947 drivers/infiniband/hw/hfi1/pio.c int first_scontext = scontext; scontext 1965 drivers/infiniband/hw/hfi1/pio.c if (dd->kernel_send_context[scontext]) { scontext 1967 drivers/infiniband/hw/hfi1/pio.c dd->kernel_send_context[scontext]; scontext 1968 drivers/infiniband/hw/hfi1/pio.c set_threshold(dd, scontext, i); scontext 1970 drivers/infiniband/hw/hfi1/pio.c if (++scontext >= first_scontext + scontext 1973 drivers/infiniband/hw/hfi1/pio.c scontext = first_scontext; scontext 1979 drivers/infiniband/hw/hfi1/pio.c scontext = first_scontext + vl_scontexts[i]; scontext 705 security/selinux/avc.c char *scontext; scontext 709 security/selinux/avc.c rc = security_sid_to_context(sad->state, sad->ssid, &scontext, scontext 714 security/selinux/avc.c audit_log_format(ab, " scontext=%s", scontext); scontext 715 security/selinux/avc.c kfree(scontext); scontext 718 security/selinux/avc.c rc = security_sid_to_context(sad->state, sad->tsid, &scontext, scontext 723 security/selinux/avc.c audit_log_format(ab, " tcontext=%s", scontext); scontext 724 security/selinux/avc.c kfree(scontext); scontext 733 security/selinux/avc.c rc = security_sid_to_context_inval(sad->state, sad->ssid, &scontext, scontext 735 security/selinux/avc.c if (!rc && scontext) { scontext 736 security/selinux/avc.c if (scontext_len && scontext[scontext_len - 1] == '\0') scontext 739 security/selinux/avc.c audit_log_n_untrustedstring(ab, scontext, scontext_len); scontext 740 security/selinux/avc.c kfree(scontext); scontext 743 security/selinux/avc.c rc = security_sid_to_context_inval(sad->state, sad->tsid, &scontext, scontext 745 security/selinux/avc.c if (!rc && scontext) { scontext 746 security/selinux/avc.c if (scontext_len && scontext[scontext_len - 1] == '\0') scontext 749 security/selinux/avc.c audit_log_n_untrustedstring(ab, scontext, scontext_len); scontext 750 security/selinux/avc.c kfree(scontext); scontext 5067 security/selinux/hooks.c char *scontext; scontext 5079 security/selinux/hooks.c err = security_sid_to_context(&selinux_state, peer_sid, &scontext, scontext 5089 security/selinux/hooks.c if (copy_to_user(optval, scontext, scontext_len)) scontext 5095 security/selinux/hooks.c kfree(scontext); scontext 254 security/selinux/include/security.h char **scontext, u32 *scontext_len); scontext 257 security/selinux/include/security.h u32 sid, char **scontext, u32 *scontext_len); scontext 260 security/selinux/include/security.h u32 sid, char **scontext, u32 *scontext_len); scontext 263 security/selinux/include/security.h const char *scontext, u32 scontext_len, scontext 267 security/selinux/include/security.h const char *scontext, u32 *out_sid, gfp_t gfp); scontext 270 security/selinux/include/security.h const char *scontext, u32 scontext_len, scontext 274 security/selinux/include/security.h const char *scontext, u32 scontext_len, scontext 91 security/selinux/ss/mls.c char **scontext) scontext 101 security/selinux/ss/mls.c scontextp = *scontext; scontext 158 security/selinux/ss/mls.c *scontext = scontextp; scontext 236 security/selinux/ss/mls.c char *scontext, scontext 278 security/selinux/ss/mls.c rangep[0] = scontext; scontext 279 security/selinux/ss/mls.c rangep[1] = strchr(scontext, '-'); scontext 488 security/selinux/ss/mls.c struct context *scontext, scontext 506 security/selinux/ss/mls.c rtr.source_type = scontext->type; scontext 521 security/selinux/ss/mls.c return mls_context_cpy_low(newcontext, scontext); scontext 523 security/selinux/ss/mls.c return mls_context_cpy_high(newcontext, scontext); scontext 525 security/selinux/ss/mls.c return mls_context_cpy(newcontext, scontext); scontext 538 security/selinux/ss/mls.c return mls_context_cpy(newcontext, scontext); scontext 541 security/selinux/ss/mls.c return mls_context_cpy_low(newcontext, scontext); scontext 544 security/selinux/ss/mls.c return mls_context_cpy_low(newcontext, scontext); scontext 30 security/selinux/ss/mls.h char **scontext); scontext 37 security/selinux/ss/mls.h char *scontext, scontext 53 security/selinux/ss/mls.h struct context *scontext, scontext 91 security/selinux/ss/services.c char **scontext, scontext 95 security/selinux/ss/services.c struct context *scontext, scontext 263 security/selinux/ss/services.c struct context *scontext, scontext 297 security/selinux/ss/services.c val1 = scontext->user; scontext 301 security/selinux/ss/services.c val1 = scontext->type; scontext 305 security/selinux/ss/services.c val1 = scontext->role; scontext 329 security/selinux/ss/services.c l1 = &(scontext->range.level[0]); scontext 333 security/selinux/ss/services.c l1 = &(scontext->range.level[0]); scontext 337 security/selinux/ss/services.c l1 = &(scontext->range.level[1]); scontext 341 security/selinux/ss/services.c l1 = &(scontext->range.level[1]); scontext 345 security/selinux/ss/services.c l1 = &(scontext->range.level[0]); scontext 346 security/selinux/ss/services.c l2 = &(scontext->range.level[1]); scontext 394 security/selinux/ss/services.c c = scontext; scontext 454 security/selinux/ss/services.c struct context *scontext, scontext 489 security/selinux/ss/services.c if (context_struct_to_string(policydb, scontext, scontext 533 security/selinux/ss/services.c struct context *scontext, scontext 545 security/selinux/ss/services.c source = policydb->type_val_to_struct[scontext->type - 1]; scontext 556 security/selinux/ss/services.c memcpy(&lo_scontext, scontext, sizeof(lo_scontext)); scontext 580 security/selinux/ss/services.c security_dump_masked_av(policydb, scontext, tcontext, scontext 614 security/selinux/ss/services.c struct context *scontext, scontext 651 security/selinux/ss/services.c sattr = &policydb->type_attr_map_array[scontext->type - 1]; scontext 685 security/selinux/ss/services.c !constraint_expr_eval(policydb, scontext, tcontext, NULL, scontext 699 security/selinux/ss/services.c scontext->role != tcontext->role) { scontext 701 security/selinux/ss/services.c if (scontext->role == ra->role && scontext 714 security/selinux/ss/services.c type_attribute_bounds_av(policydb, scontext, tcontext, scontext 1008 security/selinux/ss/services.c struct context *scontext, *tcontext; scontext 1028 security/selinux/ss/services.c scontext = sidtab_search(sidtab, ssid); scontext 1029 security/selinux/ss/services.c if (!scontext) { scontext 1057 security/selinux/ss/services.c sattr = &policydb->type_attr_map_array[scontext->type - 1]; scontext 1102 security/selinux/ss/services.c struct context *scontext = NULL, *tcontext = NULL; scontext 1113 security/selinux/ss/services.c scontext = sidtab_search(sidtab, ssid); scontext 1114 security/selinux/ss/services.c if (!scontext) { scontext 1121 security/selinux/ss/services.c if (ebitmap_get_bit(&policydb->permissive_map, scontext->type)) scontext 1137 security/selinux/ss/services.c context_struct_compute_av(policydb, scontext, tcontext, tclass, avd, scontext 1157 security/selinux/ss/services.c struct context *scontext = NULL, *tcontext = NULL; scontext 1167 security/selinux/ss/services.c scontext = sidtab_search(sidtab, ssid); scontext 1168 security/selinux/ss/services.c if (!scontext) { scontext 1175 security/selinux/ss/services.c if (ebitmap_get_bit(&policydb->permissive_map, scontext->type)) scontext 1191 security/selinux/ss/services.c context_struct_compute_av(policydb, scontext, tcontext, tclass, avd, scontext 1210 security/selinux/ss/services.c char **scontext, u32 *scontext_len) scontext 1214 security/selinux/ss/services.c if (scontext) scontext 1215 security/selinux/ss/services.c *scontext = NULL; scontext 1220 security/selinux/ss/services.c if (scontext) { scontext 1221 security/selinux/ss/services.c *scontext = kstrdup(context->str, GFP_ATOMIC); scontext 1222 security/selinux/ss/services.c if (!(*scontext)) scontext 1234 security/selinux/ss/services.c if (!scontext) scontext 1241 security/selinux/ss/services.c *scontext = scontextp; scontext 1268 security/selinux/ss/services.c u32 sid, char **scontext, scontext 1277 security/selinux/ss/services.c if (scontext) scontext 1278 security/selinux/ss/services.c *scontext = NULL; scontext 1286 security/selinux/ss/services.c if (!scontext) scontext 1294 security/selinux/ss/services.c *scontext = scontextp; scontext 1318 security/selinux/ss/services.c rc = context_struct_to_string(policydb, context, scontext, scontext 1338 security/selinux/ss/services.c u32 sid, char **scontext, u32 *scontext_len) scontext 1340 security/selinux/ss/services.c return security_sid_to_context_core(state, sid, scontext, scontext 1345 security/selinux/ss/services.c char **scontext, u32 *scontext_len) scontext 1347 security/selinux/ss/services.c return security_sid_to_context_core(state, sid, scontext, scontext 1365 security/selinux/ss/services.c char **scontext, u32 *scontext_len) scontext 1367 security/selinux/ss/services.c return security_sid_to_context_core(state, sid, scontext, scontext 1376 security/selinux/ss/services.c char *scontext, scontext 1391 security/selinux/ss/services.c scontextp = (char *) scontext; scontext 1453 security/selinux/ss/services.c const char *scontext, u32 scontext_len, scontext 1468 security/selinux/ss/services.c scontext2 = kmemdup_nul(scontext, scontext_len, gfp_flags); scontext 1527 security/selinux/ss/services.c const char *scontext, u32 scontext_len, u32 *sid, scontext 1530 security/selinux/ss/services.c return security_context_to_sid_core(state, scontext, scontext_len, scontext 1535 security/selinux/ss/services.c const char *scontext, u32 *sid, gfp_t gfp) scontext 1537 security/selinux/ss/services.c return security_context_to_sid(state, scontext, strlen(scontext), scontext 1560 security/selinux/ss/services.c const char *scontext, u32 scontext_len, scontext 1563 security/selinux/ss/services.c return security_context_to_sid_core(state, scontext, scontext_len, scontext 1568 security/selinux/ss/services.c const char *scontext, u32 scontext_len, scontext 1571 security/selinux/ss/services.c return security_context_to_sid_core(state, scontext, scontext_len, scontext 1577 security/selinux/ss/services.c struct context *scontext, scontext 1587 security/selinux/ss/services.c if (context_struct_to_string(policydb, scontext, &s, &slen)) scontext 1648 security/selinux/ss/services.c struct context *scontext = NULL, *tcontext = NULL, newcontext; scontext 1685 security/selinux/ss/services.c scontext = sidtab_search(sidtab, ssid); scontext 1686 security/selinux/ss/services.c if (!scontext) { scontext 1712 security/selinux/ss/services.c newcontext.user = scontext->user; scontext 1723 security/selinux/ss/services.c newcontext.role = scontext->role; scontext 1728 security/selinux/ss/services.c newcontext.role = scontext->role; scontext 1735 security/selinux/ss/services.c newcontext.type = scontext->type; scontext 1741 security/selinux/ss/services.c newcontext.type = scontext->type; scontext 1749 security/selinux/ss/services.c avkey.source_type = scontext->type; scontext 1773 security/selinux/ss/services.c filename_compute_type(policydb, &newcontext, scontext->type, scontext 1781 security/selinux/ss/services.c if ((roletr->role == scontext->role) && scontext 1793 security/selinux/ss/services.c rc = mls_compute_sid(policydb, scontext, tcontext, tclass, specified, scontext 1800 security/selinux/ss/services.c rc = compute_sid_handle_invalid_context(state, scontext,