secclass_map 62 scripts/selinux/genheaders/genheaders.c for (i = 0; secclass_map[i].name; i++) { secclass_map 63 scripts/selinux/genheaders/genheaders.c struct security_class_mapping *map = &secclass_map[i]; secclass_map 76 scripts/selinux/genheaders/genheaders.c for (i = 0; secclass_map[i].name; i++) { secclass_map 77 scripts/selinux/genheaders/genheaders.c struct security_class_mapping *map = &secclass_map[i]; secclass_map 92 scripts/selinux/genheaders/genheaders.c for (i = 0; secclass_map[i].name; i++) { secclass_map 94 scripts/selinux/genheaders/genheaders.c struct security_class_mapping *map = &secclass_map[i]; secclass_map 120 scripts/selinux/genheaders/genheaders.c for (i = 0; secclass_map[i].name; i++) { secclass_map 121 scripts/selinux/genheaders/genheaders.c struct security_class_mapping *map = &secclass_map[i]; secclass_map 64 scripts/selinux/mdp/mdp.c for (i = 0; secclass_map[i].name; i++) secclass_map 65 scripts/selinux/mdp/mdp.c fprintf(fout, "class %s\n", secclass_map[i].name); secclass_map 75 scripts/selinux/mdp/mdp.c for (i = 0; secclass_map[i].name; i++) { secclass_map 76 scripts/selinux/mdp/mdp.c struct security_class_mapping *map = &secclass_map[i]; secclass_map 96 scripts/selinux/mdp/mdp.c for (i = 0; secclass_map[i].name; i++) { secclass_map 97 scripts/selinux/mdp/mdp.c struct security_class_mapping *map = &secclass_map[i]; secclass_map 116 scripts/selinux/mdp/mdp.c for (i = 0; secclass_map[i].name; i++) secclass_map 118 scripts/selinux/mdp/mdp.c secclass_map[i].name); secclass_map 675 security/selinux/avc.c perms = secclass_map[sad->tclass-1].perms; secclass_map 727 security/selinux/avc.c audit_log_format(ab, " tclass=%s", secclass_map[sad->tclass-1].name); secclass_map 763 security/selinux/avc.c if (WARN_ON(!tclass || tclass >= ARRAY_SIZE(secclass_map))) secclass_map 5556 security/selinux/hooks.c secclass_map[sclass - 1].name, secclass_map 21 security/selinux/include/avc_ss.h extern struct security_class_mapping secclass_map[]; secclass_map 40 security/selinux/include/classmap.h struct security_class_mapping secclass_map[] = { secclass_map 2120 security/selinux/ss/services.c rc = selinux_set_mapping(policydb, secclass_map, secclass_map 2169 security/selinux/ss/services.c rc = selinux_set_mapping(newpolicydb, secclass_map, &newmap);