Lines Matching defs:scontext
83 char **scontext,
89 char **scontext,
93 struct context *scontext,
263 * only. For these rules, scontext is the context before the transition,
269 struct context *scontext,
303 val1 = scontext->user;
307 val1 = scontext->type;
311 val1 = scontext->role;
335 l1 = &(scontext->range.level[0]);
339 l1 = &(scontext->range.level[0]);
343 l1 = &(scontext->range.level[1]);
347 l1 = &(scontext->range.level[1]);
351 l1 = &(scontext->range.level[0]);
352 l2 = &(scontext->range.level[1]);
400 c = scontext;
460 struct context *scontext,
494 /* get scontext/tcontext in text form */
495 if (context_struct_to_string(policydb, scontext,
510 "scontext=%s tcontext=%s tclass=%s perms=",
527 /* release scontext/tcontext */
539 struct context *scontext,
551 source = policydb->type_val_to_struct[scontext->type - 1];
562 memcpy(&lo_scontext, scontext, sizeof(lo_scontext));
586 security_dump_masked_av(policydb, scontext, tcontext,
620 struct context *scontext,
657 sattr = &policydb->type_attr_map_array[scontext->type - 1];
691 !constraint_expr_eval(policydb, scontext, tcontext, NULL,
705 scontext->role != tcontext->role) {
707 if (scontext->role == ra->role &&
720 type_attribute_bounds_av(policydb, scontext, tcontext,
1025 struct context *scontext, *tcontext;
1046 scontext = sidtab_search(sidtab, ssid);
1047 if (!scontext) {
1075 sattr = &policydb->type_attr_map_array[scontext->type - 1];
1121 struct context *scontext = NULL, *tcontext = NULL;
1133 scontext = sidtab_search(sidtab, ssid);
1134 if (!scontext) {
1141 if (ebitmap_get_bit(&policydb->permissive_map, scontext->type))
1157 context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
1178 struct context *scontext = NULL, *tcontext = NULL;
1189 scontext = sidtab_search(sidtab, ssid);
1190 if (!scontext) {
1197 if (ebitmap_get_bit(&policydb->permissive_map, scontext->type))
1213 context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
1226 * allocated string of the correct size. Set `*scontext'
1232 char **scontext, u32 *scontext_len)
1236 if (scontext)
1237 *scontext = NULL;
1242 if (scontext) {
1243 *scontext = kstrdup(context->str, GFP_ATOMIC);
1244 if (!(*scontext))
1256 if (!scontext)
1263 *scontext = scontextp;
1283 char **scontext, u32 *scontext_len)
1285 int rc = sidtab_sid2str_get(sidtab, entry, scontext, scontext_len);
1290 rc = context_struct_to_string(p, &entry->context, scontext,
1292 if (!rc && scontext)
1293 sidtab_sid2str_put(sidtab, entry, *scontext, *scontext_len);
1326 u32 sid, char **scontext,
1336 if (scontext)
1337 *scontext = NULL;
1348 if (!scontext)
1353 *scontext = scontextp;
1378 rc = sidtab_entry_to_string(policydb, sidtab, entry, scontext,
1390 * @scontext: security context
1394 * into a dynamically allocated string of the correct size. Set @scontext
1398 u32 sid, char **scontext, u32 *scontext_len)
1400 return security_sid_to_context_core(state, sid, scontext,
1405 char **scontext, u32 *scontext_len)
1407 return security_sid_to_context_core(state, sid, scontext,
1415 * @scontext: security context
1420 * context is invalid in the current policy. Set @scontext to point to
1425 char **scontext, u32 *scontext_len)
1427 return security_sid_to_context_core(state, sid, scontext,
1432 * Caveat: Mutates scontext.
1436 char *scontext,
1451 scontextp = (char *) scontext;
1513 const char *scontext, u32 scontext_len,
1529 scontext2 = kmemdup_nul(scontext, scontext_len, gfp_flags);
1590 * @scontext: security context
1596 * has the string representation specified by @scontext.
1601 const char *scontext, u32 scontext_len, u32 *sid,
1604 return security_context_to_sid_core(state, scontext, scontext_len,
1609 const char *scontext, u32 *sid, gfp_t gfp)
1611 return security_context_to_sid(state, scontext, strlen(scontext),
1619 * @scontext: security context
1625 * has the string representation specified by @scontext.
1634 const char *scontext, u32 scontext_len,
1637 return security_context_to_sid_core(state, scontext, scontext_len,
1642 const char *scontext, u32 scontext_len,
1645 return security_context_to_sid_core(state, scontext, scontext_len,
1674 audit_log_format(ab, " scontext=%s tcontext=%s tclass=%s",
1729 struct context *scontext, *tcontext, newcontext;
1785 scontext = &sentry->context;
1800 newcontext.user = scontext->user;
1811 newcontext.role = scontext->role;
1816 newcontext.role = scontext->role;
1823 newcontext.type = scontext->type;
1829 newcontext.type = scontext->type;
1837 avkey.source_type = scontext->type;
1861 filename_compute_type(policydb, &newcontext, scontext->type,
1869 .role = scontext->role,
1881 rc = mls_compute_sid(policydb, scontext, tcontext, tclass, specified,