tcontext 489 security/selinux/ss/mls.c struct context *tcontext, tcontext 507 security/selinux/ss/mls.c rtr.target_type = tcontext->type; tcontext 527 security/selinux/ss/mls.c return mls_context_cpy_low(newcontext, tcontext); tcontext 529 security/selinux/ss/mls.c return mls_context_cpy_high(newcontext, tcontext); tcontext 531 security/selinux/ss/mls.c return mls_context_cpy(newcontext, tcontext); tcontext 54 security/selinux/ss/mls.h struct context *tcontext, tcontext 96 security/selinux/ss/services.c struct context *tcontext, tcontext 264 security/selinux/ss/services.c struct context *tcontext, tcontext 298 security/selinux/ss/services.c val2 = tcontext->user; tcontext 302 security/selinux/ss/services.c val2 = tcontext->type; tcontext 306 security/selinux/ss/services.c val2 = tcontext->role; tcontext 330 security/selinux/ss/services.c l2 = &(tcontext->range.level[0]); tcontext 334 security/selinux/ss/services.c l2 = &(tcontext->range.level[1]); tcontext 338 security/selinux/ss/services.c l2 = &(tcontext->range.level[0]); tcontext 342 security/selinux/ss/services.c l2 = &(tcontext->range.level[1]); tcontext 349 security/selinux/ss/services.c l1 = &(tcontext->range.level[0]); tcontext 350 security/selinux/ss/services.c l2 = &(tcontext->range.level[1]); tcontext 396 security/selinux/ss/services.c c = tcontext; tcontext 455 security/selinux/ss/services.c struct context *tcontext, tcontext 493 security/selinux/ss/services.c if (context_struct_to_string(policydb, tcontext, tcontext 534 security/selinux/ss/services.c struct context *tcontext, tcontext 539 security/selinux/ss/services.c struct context lo_tcontext, *tcontextp = tcontext; tcontext 551 security/selinux/ss/services.c target = policydb->type_val_to_struct[tcontext->type - 1]; tcontext 560 security/selinux/ss/services.c memcpy(&lo_tcontext, tcontext, sizeof(lo_tcontext)); tcontext 580 security/selinux/ss/services.c security_dump_masked_av(policydb, scontext, tcontext, tcontext 615 security/selinux/ss/services.c struct context *tcontext, tcontext 652 security/selinux/ss/services.c tattr = &policydb->type_attr_map_array[tcontext->type - 1]; tcontext 685 security/selinux/ss/services.c !constraint_expr_eval(policydb, scontext, tcontext, NULL, tcontext 699 security/selinux/ss/services.c scontext->role != tcontext->role) { tcontext 702 security/selinux/ss/services.c tcontext->role == ra->new_role) tcontext 714 security/selinux/ss/services.c type_attribute_bounds_av(policydb, scontext, tcontext, tcontext 721 security/selinux/ss/services.c struct context *tcontext, tcontext 732 security/selinux/ss/services.c if (context_struct_to_string(p, tcontext, &t, &tlen)) tcontext 756 security/selinux/ss/services.c struct context *tcontext; tcontext 798 security/selinux/ss/services.c tcontext = sidtab_search(sidtab, tasksid); tcontext 799 security/selinux/ss/services.c if (!tcontext) { tcontext 809 security/selinux/ss/services.c tcontext, constraint->expr)) { tcontext 816 security/selinux/ss/services.c tcontext, tcontext 1008 security/selinux/ss/services.c struct context *scontext, *tcontext; tcontext 1035 security/selinux/ss/services.c tcontext = sidtab_search(sidtab, tsid); tcontext 1036 security/selinux/ss/services.c if (!tcontext) { tcontext 1058 security/selinux/ss/services.c tattr = &policydb->type_attr_map_array[tcontext->type - 1]; tcontext 1102 security/selinux/ss/services.c struct context *scontext = NULL, *tcontext = NULL; tcontext 1124 security/selinux/ss/services.c tcontext = sidtab_search(sidtab, tsid); tcontext 1125 security/selinux/ss/services.c if (!tcontext) { tcontext 1137 security/selinux/ss/services.c context_struct_compute_av(policydb, scontext, tcontext, tclass, avd, tcontext 1157 security/selinux/ss/services.c struct context *scontext = NULL, *tcontext = NULL; tcontext 1178 security/selinux/ss/services.c tcontext = sidtab_search(sidtab, tsid); tcontext 1179 security/selinux/ss/services.c if (!tcontext) { tcontext 1191 security/selinux/ss/services.c context_struct_compute_av(policydb, scontext, tcontext, tclass, avd, tcontext 1578 security/selinux/ss/services.c struct context *tcontext, tcontext 1589 security/selinux/ss/services.c if (context_struct_to_string(policydb, tcontext, &t, &tlen)) tcontext 1648 security/selinux/ss/services.c struct context *scontext = NULL, *tcontext = NULL, newcontext; tcontext 1692 security/selinux/ss/services.c tcontext = sidtab_search(sidtab, tsid); tcontext 1693 security/selinux/ss/services.c if (!tcontext) { tcontext 1708 security/selinux/ss/services.c newcontext.user = tcontext->user; tcontext 1717 security/selinux/ss/services.c newcontext.user = tcontext->user; tcontext 1725 security/selinux/ss/services.c newcontext.role = tcontext->role; tcontext 1737 security/selinux/ss/services.c newcontext.type = tcontext->type; tcontext 1744 security/selinux/ss/services.c newcontext.type = tcontext->type; tcontext 1750 security/selinux/ss/services.c avkey.target_type = tcontext->type; tcontext 1774 security/selinux/ss/services.c tcontext->type, tclass, objname); tcontext 1782 security/selinux/ss/services.c (roletr->type == tcontext->type) && tcontext 1793 security/selinux/ss/services.c rc = mls_compute_sid(policydb, scontext, tcontext, tclass, specified, tcontext 1801 security/selinux/ss/services.c tcontext,