cladatum 497 security/selinux/ss/mls.c struct class_datum *cladatum; cladatum 514 security/selinux/ss/mls.c cladatum = p->class_val_to_struct[tclass - 1]; cladatum 515 security/selinux/ss/mls.c if (cladatum) cladatum 516 security/selinux/ss/mls.c default_range = cladatum->default_range; cladatum 221 security/selinux/ss/policydb.c struct class_datum *cladatum; cladatum 227 security/selinux/ss/policydb.c cladatum = datum; cladatum 228 security/selinux/ss/policydb.c hashtab_map(cladatum->permissions.table, perm_destroy, NULL); cladatum 229 security/selinux/ss/policydb.c hashtab_destroy(cladatum->permissions.table); cladatum 230 security/selinux/ss/policydb.c constraint = cladatum->constraints; cladatum 243 security/selinux/ss/policydb.c constraint = cladatum->validatetrans; cladatum 255 security/selinux/ss/policydb.c kfree(cladatum->comkey); cladatum 548 security/selinux/ss/policydb.c struct class_datum *cladatum; cladatum 550 security/selinux/ss/policydb.c cladatum = datum; cladatum 552 security/selinux/ss/policydb.c if (!cladatum->value || cladatum->value > p->p_classes.nprim) cladatum 555 security/selinux/ss/policydb.c p->sym_val_to_name[SYM_CLASSES][cladatum->value - 1] = key; cladatum 556 security/selinux/ss/policydb.c p->class_val_to_struct[cladatum->value - 1] = cladatum; cladatum 1283 security/selinux/ss/policydb.c struct class_datum *cladatum; cladatum 1288 security/selinux/ss/policydb.c cladatum = kzalloc(sizeof(*cladatum), GFP_KERNEL); cladatum 1289 security/selinux/ss/policydb.c if (!cladatum) cladatum 1298 security/selinux/ss/policydb.c cladatum->value = le32_to_cpu(buf[2]); cladatum 1300 security/selinux/ss/policydb.c rc = symtab_init(&cladatum->permissions, PERM_SYMTAB_SIZE); cladatum 1303 security/selinux/ss/policydb.c cladatum->permissions.nprim = le32_to_cpu(buf[3]); cladatum 1313 security/selinux/ss/policydb.c rc = str_read(&cladatum->comkey, GFP_KERNEL, fp, len2); cladatum 1318 security/selinux/ss/policydb.c cladatum->comdatum = hashtab_search(p->p_commons.table, cladatum->comkey); cladatum 1319 security/selinux/ss/policydb.c if (!cladatum->comdatum) { cladatum 1321 security/selinux/ss/policydb.c cladatum->comkey); cladatum 1326 security/selinux/ss/policydb.c rc = perm_read(p, cladatum->permissions.table, fp); cladatum 1331 security/selinux/ss/policydb.c rc = read_cons_helper(p, &cladatum->constraints, ncons, 0, fp); cladatum 1341 security/selinux/ss/policydb.c rc = read_cons_helper(p, &cladatum->validatetrans, cladatum 1352 security/selinux/ss/policydb.c cladatum->default_user = le32_to_cpu(buf[0]); cladatum 1353 security/selinux/ss/policydb.c cladatum->default_role = le32_to_cpu(buf[1]); cladatum 1354 security/selinux/ss/policydb.c cladatum->default_range = le32_to_cpu(buf[2]); cladatum 1361 security/selinux/ss/policydb.c cladatum->default_type = le32_to_cpu(buf[0]); cladatum 1364 security/selinux/ss/policydb.c rc = hashtab_insert(h, key, cladatum); cladatum 1370 security/selinux/ss/policydb.c cls_destroy(key, cladatum, NULL); cladatum 1769 security/selinux/ss/policydb.c struct class_datum *cladatum; cladatum 1771 security/selinux/ss/policydb.c cladatum = hashtab_search(p->p_classes.table, name); cladatum 1772 security/selinux/ss/policydb.c if (!cladatum) cladatum 1775 security/selinux/ss/policydb.c return cladatum->value; cladatum 1780 security/selinux/ss/policydb.c struct class_datum *cladatum; cladatum 1787 security/selinux/ss/policydb.c cladatum = p->class_val_to_struct[tclass-1]; cladatum 1788 security/selinux/ss/policydb.c comdatum = cladatum->comdatum; cladatum 1793 security/selinux/ss/policydb.c perdatum = hashtab_search(cladatum->permissions.table, cladatum 2856 security/selinux/ss/policydb.c struct class_datum *cladatum = datum; cladatum 2867 security/selinux/ss/policydb.c if (cladatum->comkey) cladatum 2868 security/selinux/ss/policydb.c len2 = strlen(cladatum->comkey); cladatum 2873 security/selinux/ss/policydb.c for (c = cladatum->constraints; c; c = c->next) cladatum 2878 security/selinux/ss/policydb.c buf[2] = cpu_to_le32(cladatum->value); cladatum 2879 security/selinux/ss/policydb.c buf[3] = cpu_to_le32(cladatum->permissions.nprim); cladatum 2880 security/selinux/ss/policydb.c if (cladatum->permissions.table) cladatum 2881 security/selinux/ss/policydb.c buf[4] = cpu_to_le32(cladatum->permissions.table->nel); cladatum 2893 security/selinux/ss/policydb.c if (cladatum->comkey) { cladatum 2894 security/selinux/ss/policydb.c rc = put_entry(cladatum->comkey, 1, len2, fp); cladatum 2899 security/selinux/ss/policydb.c rc = hashtab_map(cladatum->permissions.table, perm_write, fp); cladatum 2903 security/selinux/ss/policydb.c rc = write_cons_helper(p, cladatum->constraints, fp); cladatum 2909 security/selinux/ss/policydb.c for (c = cladatum->validatetrans; c; c = c->next) cladatum 2917 security/selinux/ss/policydb.c rc = write_cons_helper(p, cladatum->validatetrans, fp); cladatum 2922 security/selinux/ss/policydb.c buf[0] = cpu_to_le32(cladatum->default_user); cladatum 2923 security/selinux/ss/policydb.c buf[1] = cpu_to_le32(cladatum->default_role); cladatum 2924 security/selinux/ss/policydb.c buf[2] = cpu_to_le32(cladatum->default_range); cladatum 2932 security/selinux/ss/policydb.c buf[0] = cpu_to_le32(cladatum->default_type); cladatum 1647 security/selinux/ss/services.c struct class_datum *cladatum = NULL; cladatum 1701 security/selinux/ss/services.c cladatum = policydb->class_val_to_struct[tclass - 1]; cladatum 1707 security/selinux/ss/services.c if (cladatum && cladatum->default_user == DEFAULT_TARGET) { cladatum 1722 security/selinux/ss/services.c if (cladatum && cladatum->default_role == DEFAULT_SOURCE) { cladatum 1724 security/selinux/ss/services.c } else if (cladatum && cladatum->default_role == DEFAULT_TARGET) { cladatum 1734 security/selinux/ss/services.c if (cladatum && cladatum->default_type == DEFAULT_SOURCE) { cladatum 1736 security/selinux/ss/services.c } else if (cladatum && cladatum->default_type == DEFAULT_TARGET) {