tcontext          489 security/selinux/ss/mls.c 		    struct context *tcontext,
tcontext          507 security/selinux/ss/mls.c 		rtr.target_type = tcontext->type;
tcontext          527 security/selinux/ss/mls.c 			return mls_context_cpy_low(newcontext, tcontext);
tcontext          529 security/selinux/ss/mls.c 			return mls_context_cpy_high(newcontext, tcontext);
tcontext          531 security/selinux/ss/mls.c 			return mls_context_cpy(newcontext, tcontext);
tcontext           54 security/selinux/ss/mls.h 		    struct context *tcontext,
tcontext           96 security/selinux/ss/services.c 				      struct context *tcontext,
tcontext          264 security/selinux/ss/services.c 				struct context *tcontext,
tcontext          298 security/selinux/ss/services.c 				val2 = tcontext->user;
tcontext          302 security/selinux/ss/services.c 				val2 = tcontext->type;
tcontext          306 security/selinux/ss/services.c 				val2 = tcontext->role;
tcontext          330 security/selinux/ss/services.c 				l2 = &(tcontext->range.level[0]);
tcontext          334 security/selinux/ss/services.c 				l2 = &(tcontext->range.level[1]);
tcontext          338 security/selinux/ss/services.c 				l2 = &(tcontext->range.level[0]);
tcontext          342 security/selinux/ss/services.c 				l2 = &(tcontext->range.level[1]);
tcontext          349 security/selinux/ss/services.c 				l1 = &(tcontext->range.level[0]);
tcontext          350 security/selinux/ss/services.c 				l2 = &(tcontext->range.level[1]);
tcontext          396 security/selinux/ss/services.c 				c = tcontext;
tcontext          455 security/selinux/ss/services.c 				    struct context *tcontext,
tcontext          493 security/selinux/ss/services.c 	if (context_struct_to_string(policydb, tcontext,
tcontext          534 security/selinux/ss/services.c 				     struct context *tcontext,
tcontext          539 security/selinux/ss/services.c 	struct context lo_tcontext, *tcontextp = tcontext;
tcontext          551 security/selinux/ss/services.c 	target = policydb->type_val_to_struct[tcontext->type - 1];
tcontext          560 security/selinux/ss/services.c 		memcpy(&lo_tcontext, tcontext, sizeof(lo_tcontext));
tcontext          580 security/selinux/ss/services.c 	security_dump_masked_av(policydb, scontext, tcontext,
tcontext          615 security/selinux/ss/services.c 				      struct context *tcontext,
tcontext          652 security/selinux/ss/services.c 	tattr = &policydb->type_attr_map_array[tcontext->type - 1];
tcontext          685 security/selinux/ss/services.c 		    !constraint_expr_eval(policydb, scontext, tcontext, NULL,
tcontext          699 security/selinux/ss/services.c 	    scontext->role != tcontext->role) {
tcontext          702 security/selinux/ss/services.c 			    tcontext->role == ra->new_role)
tcontext          714 security/selinux/ss/services.c 	type_attribute_bounds_av(policydb, scontext, tcontext,
tcontext          721 security/selinux/ss/services.c 					   struct context *tcontext,
tcontext          732 security/selinux/ss/services.c 	if (context_struct_to_string(p, tcontext, &t, &tlen))
tcontext          756 security/selinux/ss/services.c 	struct context *tcontext;
tcontext          798 security/selinux/ss/services.c 	tcontext = sidtab_search(sidtab, tasksid);
tcontext          799 security/selinux/ss/services.c 	if (!tcontext) {
tcontext          809 security/selinux/ss/services.c 					  tcontext, constraint->expr)) {
tcontext          816 security/selinux/ss/services.c 								     tcontext,
tcontext         1008 security/selinux/ss/services.c 	struct context *scontext, *tcontext;
tcontext         1035 security/selinux/ss/services.c 	tcontext = sidtab_search(sidtab, tsid);
tcontext         1036 security/selinux/ss/services.c 	if (!tcontext) {
tcontext         1058 security/selinux/ss/services.c 	tattr = &policydb->type_attr_map_array[tcontext->type - 1];
tcontext         1102 security/selinux/ss/services.c 	struct context *scontext = NULL, *tcontext = NULL;
tcontext         1124 security/selinux/ss/services.c 	tcontext = sidtab_search(sidtab, tsid);
tcontext         1125 security/selinux/ss/services.c 	if (!tcontext) {
tcontext         1137 security/selinux/ss/services.c 	context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
tcontext         1157 security/selinux/ss/services.c 	struct context *scontext = NULL, *tcontext = NULL;
tcontext         1178 security/selinux/ss/services.c 	tcontext = sidtab_search(sidtab, tsid);
tcontext         1179 security/selinux/ss/services.c 	if (!tcontext) {
tcontext         1191 security/selinux/ss/services.c 	context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
tcontext         1578 security/selinux/ss/services.c 	struct context *tcontext,
tcontext         1589 security/selinux/ss/services.c 	if (context_struct_to_string(policydb, tcontext, &t, &tlen))
tcontext         1648 security/selinux/ss/services.c 	struct context *scontext = NULL, *tcontext = NULL, newcontext;
tcontext         1692 security/selinux/ss/services.c 	tcontext = sidtab_search(sidtab, tsid);
tcontext         1693 security/selinux/ss/services.c 	if (!tcontext) {
tcontext         1708 security/selinux/ss/services.c 			newcontext.user = tcontext->user;
tcontext         1717 security/selinux/ss/services.c 		newcontext.user = tcontext->user;
tcontext         1725 security/selinux/ss/services.c 		newcontext.role = tcontext->role;
tcontext         1737 security/selinux/ss/services.c 		newcontext.type = tcontext->type;
tcontext         1744 security/selinux/ss/services.c 			newcontext.type = tcontext->type;
tcontext         1750 security/selinux/ss/services.c 	avkey.target_type = tcontext->type;
tcontext         1774 security/selinux/ss/services.c 				      tcontext->type, tclass, objname);
tcontext         1782 security/selinux/ss/services.c 			    (roletr->type == tcontext->type) &&
tcontext         1793 security/selinux/ss/services.c 	rc = mls_compute_sid(policydb, scontext, tcontext, tclass, specified,
tcontext         1801 security/selinux/ss/services.c 							tcontext,