dfa 3732 arch/mips/include/asm/octeon/cvmx-npei-defs.h uint64_t dfa:1; dfa 3746 arch/mips/include/asm/octeon/cvmx-npei-defs.h uint64_t dfa:1; dfa 2240 arch/mips/include/asm/octeon/cvmx-npi-defs.h uint64_t dfa:1; dfa 2254 arch/mips/include/asm/octeon/cvmx-npi-defs.h uint64_t dfa:1; dfa 2309 arch/mips/include/asm/octeon/cvmx-npi-defs.h uint64_t dfa:1; dfa 2323 arch/mips/include/asm/octeon/cvmx-npi-defs.h uint64_t dfa:1; dfa 2380 arch/mips/include/asm/octeon/cvmx-npi-defs.h uint64_t dfa:1; dfa 2394 arch/mips/include/asm/octeon/cvmx-npi-defs.h uint64_t dfa:1; dfa 2447 arch/mips/include/asm/octeon/cvmx-npi-defs.h uint64_t dfa:1; dfa 2461 arch/mips/include/asm/octeon/cvmx-npi-defs.h uint64_t dfa:1; dfa 1029 drivers/staging/octeon/octeon-stubs.h uint64_t dfa:1; dfa 1064 drivers/staging/octeon/octeon-stubs.h uint64_t dfa:1; dfa 1099 drivers/staging/octeon/octeon-stubs.h uint64_t dfa:1; dfa 1130 drivers/staging/octeon/octeon-stubs.h uint64_t dfa:1; dfa 614 security/apparmor/apparmorfs.c struct aa_dfa *dfa; dfa 619 security/apparmor/apparmorfs.c if (profile->file.dfa && *match_str == AA_CLASS_FILE) { dfa 620 security/apparmor/apparmorfs.c dfa = profile->file.dfa; dfa 621 security/apparmor/apparmorfs.c state = aa_dfa_match_len(dfa, profile->file.start, dfa 626 security/apparmor/apparmorfs.c tmp = aa_compute_fperms(dfa, state, &cond); dfa 628 security/apparmor/apparmorfs.c } else if (profile->policy.dfa) { dfa 631 security/apparmor/apparmorfs.c dfa = profile->policy.dfa; dfa 632 security/apparmor/apparmorfs.c state = aa_dfa_match_len(dfa, profile->policy.start[0], dfa 635 security/apparmor/apparmorfs.c aa_compute_perms(dfa, state, &tmp); dfa 104 security/apparmor/domain.c state = aa_dfa_match(profile->file.dfa, state, "&"); dfa 106 security/apparmor/domain.c return aa_dfa_match(profile->file.dfa, state, tp->base.hname); dfa 110 security/apparmor/domain.c state = aa_dfa_match_len(profile->file.dfa, state, ":", 1); dfa 111 security/apparmor/domain.c state = aa_dfa_match(profile->file.dfa, state, ns_name); dfa 112 security/apparmor/domain.c state = aa_dfa_match_len(profile->file.dfa, state, ":", 1); dfa 113 security/apparmor/domain.c return aa_dfa_match(profile->file.dfa, state, tp->base.hname); dfa 159 security/apparmor/domain.c state = aa_dfa_match(profile->file.dfa, state, "//&"); dfa 164 security/apparmor/domain.c *perms = aa_compute_fperms(profile->file.dfa, state, &cond); dfa 217 security/apparmor/domain.c tmp = aa_compute_fperms(profile->file.dfa, state, &cond); dfa 226 security/apparmor/domain.c tmp = aa_compute_fperms(profile->file.dfa, state, &cond); dfa 660 security/apparmor/domain.c state = aa_str_perms(profile->file.dfa, state, name, cond, &perms); dfa 781 security/apparmor/domain.c state = aa_str_perms(profile->file.dfa, state, xname, cond, &perms); dfa 790 security/apparmor/domain.c state = aa_dfa_null_transition(profile->file.dfa, state); dfa 224 security/apparmor/file.c struct aa_perms aa_compute_fperms(struct aa_dfa *dfa, unsigned int state, dfa 235 security/apparmor/file.c perms.allow = map_old_perms(dfa_user_allow(dfa, state)); dfa 236 security/apparmor/file.c perms.audit = map_old_perms(dfa_user_audit(dfa, state)); dfa 237 security/apparmor/file.c perms.quiet = map_old_perms(dfa_user_quiet(dfa, state)); dfa 238 security/apparmor/file.c perms.xindex = dfa_user_xindex(dfa, state); dfa 240 security/apparmor/file.c perms.allow = map_old_perms(dfa_other_allow(dfa, state)); dfa 241 security/apparmor/file.c perms.audit = map_old_perms(dfa_other_audit(dfa, state)); dfa 242 security/apparmor/file.c perms.quiet = map_old_perms(dfa_other_quiet(dfa, state)); dfa 243 security/apparmor/file.c perms.xindex = dfa_other_xindex(dfa, state); dfa 248 security/apparmor/file.c if (ACCEPT_TABLE(dfa)[state] & 0x80000000) dfa 250 security/apparmor/file.c if (ACCEPT_TABLE(dfa)[state] & 0x40000000) dfa 266 security/apparmor/file.c unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start, dfa 271 security/apparmor/file.c state = aa_dfa_match(dfa, start, name); dfa 272 security/apparmor/file.c *perms = aa_compute_fperms(dfa, state, cond); dfa 285 security/apparmor/file.c aa_str_perms(profile->file.dfa, profile->file.start, name, cond, perms); dfa 390 security/apparmor/file.c state = aa_str_perms(profile->file.dfa, profile->file.start, lname, dfa 397 security/apparmor/file.c state = aa_dfa_null_transition(profile->file.dfa, state); dfa 398 security/apparmor/file.c aa_str_perms(profile->file.dfa, state, tname, cond, &perms); dfa 420 security/apparmor/file.c aa_str_perms(profile->file.dfa, profile->file.start, tname, cond, dfa 143 security/apparmor/include/file.h #define dfa_user_allow(dfa, state) (((ACCEPT_TABLE(dfa)[state]) & 0x7f) | \ dfa 144 security/apparmor/include/file.h ((ACCEPT_TABLE(dfa)[state]) & 0x80000000)) dfa 145 security/apparmor/include/file.h #define dfa_user_audit(dfa, state) ((ACCEPT_TABLE2(dfa)[state]) & 0x7f) dfa 146 security/apparmor/include/file.h #define dfa_user_quiet(dfa, state) (((ACCEPT_TABLE2(dfa)[state]) >> 7) & 0x7f) dfa 147 security/apparmor/include/file.h #define dfa_user_xindex(dfa, state) \ dfa 148 security/apparmor/include/file.h (dfa_map_xindex(ACCEPT_TABLE(dfa)[state] & 0x3fff)) dfa 150 security/apparmor/include/file.h #define dfa_other_allow(dfa, state) ((((ACCEPT_TABLE(dfa)[state]) >> 14) & \ dfa 152 security/apparmor/include/file.h ((ACCEPT_TABLE(dfa)[state]) & 0x80000000)) dfa 153 security/apparmor/include/file.h #define dfa_other_audit(dfa, state) (((ACCEPT_TABLE2(dfa)[state]) >> 14) & 0x7f) dfa 154 security/apparmor/include/file.h #define dfa_other_quiet(dfa, state) \ dfa 155 security/apparmor/include/file.h ((((ACCEPT_TABLE2(dfa)[state]) >> 7) >> 14) & 0x7f) dfa 156 security/apparmor/include/file.h #define dfa_other_xindex(dfa, state) \ dfa 157 security/apparmor/include/file.h dfa_map_xindex((ACCEPT_TABLE(dfa)[state] >> 14) & 0x3fff) dfa 177 security/apparmor/include/file.h struct aa_dfa *dfa; dfa 183 security/apparmor/include/file.h struct aa_perms aa_compute_fperms(struct aa_dfa *dfa, unsigned int state, dfa 185 security/apparmor/include/file.h unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start, dfa 206 security/apparmor/include/file.h aa_put_dfa(rules->dfa); dfa 80 security/apparmor/include/lib.h static inline unsigned int aa_dfa_null_transition(struct aa_dfa *dfa, dfa 84 security/apparmor/include/lib.h return aa_dfa_next(dfa, start, 0); dfa 124 security/apparmor/include/match.h unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start, dfa 126 security/apparmor/include/match.h unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start, dfa 128 security/apparmor/include/match.h unsigned int aa_dfa_next(struct aa_dfa *dfa, unsigned int state, dfa 130 security/apparmor/include/match.h unsigned int aa_dfa_match_until(struct aa_dfa *dfa, unsigned int start, dfa 132 security/apparmor/include/match.h unsigned int aa_dfa_matchn_until(struct aa_dfa *dfa, unsigned int start, dfa 153 security/apparmor/include/match.h unsigned int aa_dfa_leftmatch(struct aa_dfa *dfa, unsigned int start, dfa 163 security/apparmor/include/match.h static inline struct aa_dfa *aa_get_dfa(struct aa_dfa *dfa) dfa 165 security/apparmor/include/match.h if (dfa) dfa 166 security/apparmor/include/match.h kref_get(&(dfa->count)); dfa 168 security/apparmor/include/match.h return dfa; dfa 177 security/apparmor/include/match.h static inline void aa_put_dfa(struct aa_dfa *dfa) dfa 179 security/apparmor/include/match.h if (dfa) dfa 180 security/apparmor/include/match.h kref_put(&dfa->count, aa_dfa_free_kref); dfa 144 security/apparmor/include/perms.h void aa_compute_perms(struct aa_dfa *dfa, unsigned int state, dfa 75 security/apparmor/include/policy.h struct aa_dfa *dfa; dfa 222 security/apparmor/include/policy.h return aa_dfa_match_len(profile->policy.dfa, dfa 233 security/apparmor/include/policy.h return aa_dfa_match_len(profile->policy.dfa, state, (char *) &be_af, 2); dfa 200 security/apparmor/ipc.c state = aa_dfa_next(profile->policy.dfa, dfa 1248 security/apparmor/label.c return aa_dfa_match(profile->policy.dfa, state, tp->base.hname); dfa 1252 security/apparmor/label.c state = aa_dfa_match_len(profile->policy.dfa, state, ":", 1); dfa 1253 security/apparmor/label.c state = aa_dfa_match(profile->policy.dfa, state, ns_name); dfa 1254 security/apparmor/label.c state = aa_dfa_match_len(profile->policy.dfa, state, ":", 1); dfa 1255 security/apparmor/label.c return aa_dfa_match(profile->policy.dfa, state, tp->base.hname); dfa 1299 security/apparmor/label.c state = aa_dfa_match(profile->policy.dfa, state, "//&"); dfa 1304 security/apparmor/label.c aa_compute_perms(profile->policy.dfa, state, perms); dfa 1355 security/apparmor/label.c aa_compute_perms(profile->policy.dfa, state, &tmp); dfa 1364 security/apparmor/label.c aa_compute_perms(profile->policy.dfa, state, &tmp); dfa 325 security/apparmor/lib.c void aa_compute_perms(struct aa_dfa *dfa, unsigned int state, dfa 329 security/apparmor/lib.c .allow = dfa_user_allow(dfa, state), dfa 330 security/apparmor/lib.c .audit = dfa_user_audit(dfa, state), dfa 331 security/apparmor/lib.c .quiet = dfa_user_quiet(dfa, state), dfa 337 security/apparmor/lib.c perms->allow |= map_other(dfa_other_allow(dfa, state)); dfa 338 security/apparmor/lib.c perms->audit |= map_other(dfa_other_audit(dfa, state)); dfa 339 security/apparmor/lib.c perms->quiet |= map_other(dfa_other_quiet(dfa, state)); dfa 387 security/apparmor/lib.c state = aa_dfa_next(profile->policy.dfa, dfa 194 security/apparmor/match.c static int verify_dfa(struct aa_dfa *dfa) dfa 199 security/apparmor/match.c state_count = dfa->tables[YYTD_ID_BASE]->td_lolen; dfa 200 security/apparmor/match.c trans_count = dfa->tables[YYTD_ID_NXT]->td_lolen; dfa 202 security/apparmor/match.c if (!(BASE_TABLE(dfa)[i] & MATCH_FLAG_DIFF_ENCODE) && dfa 203 security/apparmor/match.c (DEFAULT_TABLE(dfa)[i] >= state_count)) dfa 205 security/apparmor/match.c if (base_idx(BASE_TABLE(dfa)[i]) + 255 >= trans_count) { dfa 212 security/apparmor/match.c if (NEXT_TABLE(dfa)[i] >= state_count) dfa 214 security/apparmor/match.c if (CHECK_TABLE(dfa)[i] >= state_count) dfa 223 security/apparmor/match.c (BASE_TABLE(dfa)[j] & MATCH_FLAG_DIFF_ENCODE) && dfa 224 security/apparmor/match.c !(BASE_TABLE(dfa)[j] & MARK_DIFF_ENCODE); dfa 226 security/apparmor/match.c k = DEFAULT_TABLE(dfa)[j]; dfa 231 security/apparmor/match.c BASE_TABLE(dfa)[j] |= MARK_DIFF_ENCODE; dfa 246 security/apparmor/match.c static void dfa_free(struct aa_dfa *dfa) dfa 248 security/apparmor/match.c if (dfa) { dfa 251 security/apparmor/match.c for (i = 0; i < ARRAY_SIZE(dfa->tables); i++) { dfa 252 security/apparmor/match.c kvfree(dfa->tables[i]); dfa 253 security/apparmor/match.c dfa->tables[i] = NULL; dfa 255 security/apparmor/match.c kfree(dfa); dfa 265 security/apparmor/match.c struct aa_dfa *dfa = container_of(kref, struct aa_dfa, count); dfa 266 security/apparmor/match.c dfa_free(dfa); dfa 287 security/apparmor/match.c struct aa_dfa *dfa = kzalloc(sizeof(struct aa_dfa), GFP_KERNEL); dfa 288 security/apparmor/match.c if (!dfa) dfa 291 security/apparmor/match.c kref_init(&dfa->count); dfa 306 security/apparmor/match.c dfa->flags = ntohs(*(__be16 *) (data + 12)); dfa 307 security/apparmor/match.c if (dfa->flags != 0 && dfa->flags != YYTH_FLAG_DIFF_ENCODE) dfa 345 security/apparmor/match.c if (dfa->tables[table->td_id]) dfa 347 security/apparmor/match.c dfa->tables[table->td_id] = table; dfa 352 security/apparmor/match.c error = verify_table_headers(dfa->tables, flags); dfa 357 security/apparmor/match.c error = verify_dfa(dfa); dfa 362 security/apparmor/match.c return dfa; dfa 366 security/apparmor/match.c dfa_free(dfa); dfa 400 security/apparmor/match.c unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start, dfa 403 security/apparmor/match.c u16 *def = DEFAULT_TABLE(dfa); dfa 404 security/apparmor/match.c u32 *base = BASE_TABLE(dfa); dfa 405 security/apparmor/match.c u16 *next = NEXT_TABLE(dfa); dfa 406 security/apparmor/match.c u16 *check = CHECK_TABLE(dfa); dfa 413 security/apparmor/match.c if (dfa->tables[YYTD_ID_EC]) { dfa 415 security/apparmor/match.c u8 *equiv = EQUIV_TABLE(dfa); dfa 440 security/apparmor/match.c unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start, dfa 443 security/apparmor/match.c u16 *def = DEFAULT_TABLE(dfa); dfa 444 security/apparmor/match.c u32 *base = BASE_TABLE(dfa); dfa 445 security/apparmor/match.c u16 *next = NEXT_TABLE(dfa); dfa 446 security/apparmor/match.c u16 *check = CHECK_TABLE(dfa); dfa 453 security/apparmor/match.c if (dfa->tables[YYTD_ID_EC]) { dfa 455 security/apparmor/match.c u8 *equiv = EQUIV_TABLE(dfa); dfa 479 security/apparmor/match.c unsigned int aa_dfa_next(struct aa_dfa *dfa, unsigned int state, dfa 482 security/apparmor/match.c u16 *def = DEFAULT_TABLE(dfa); dfa 483 security/apparmor/match.c u32 *base = BASE_TABLE(dfa); dfa 484 security/apparmor/match.c u16 *next = NEXT_TABLE(dfa); dfa 485 security/apparmor/match.c u16 *check = CHECK_TABLE(dfa); dfa 488 security/apparmor/match.c if (dfa->tables[YYTD_ID_EC]) { dfa 490 security/apparmor/match.c u8 *equiv = EQUIV_TABLE(dfa); dfa 511 security/apparmor/match.c unsigned int aa_dfa_match_until(struct aa_dfa *dfa, unsigned int start, dfa 514 security/apparmor/match.c u16 *def = DEFAULT_TABLE(dfa); dfa 515 security/apparmor/match.c u32 *base = BASE_TABLE(dfa); dfa 516 security/apparmor/match.c u16 *next = NEXT_TABLE(dfa); dfa 517 security/apparmor/match.c u16 *check = CHECK_TABLE(dfa); dfa 518 security/apparmor/match.c u32 *accept = ACCEPT_TABLE(dfa); dfa 525 security/apparmor/match.c if (dfa->tables[YYTD_ID_EC]) { dfa 527 security/apparmor/match.c u8 *equiv = EQUIV_TABLE(dfa); dfa 572 security/apparmor/match.c unsigned int aa_dfa_matchn_until(struct aa_dfa *dfa, unsigned int start, dfa 575 security/apparmor/match.c u16 *def = DEFAULT_TABLE(dfa); dfa 576 security/apparmor/match.c u32 *base = BASE_TABLE(dfa); dfa 577 security/apparmor/match.c u16 *next = NEXT_TABLE(dfa); dfa 578 security/apparmor/match.c u16 *check = CHECK_TABLE(dfa); dfa 579 security/apparmor/match.c u32 *accept = ACCEPT_TABLE(dfa); dfa 587 security/apparmor/match.c if (dfa->tables[YYTD_ID_EC]) { dfa 589 security/apparmor/match.c u8 *equiv = EQUIV_TABLE(dfa); dfa 647 security/apparmor/match.c static unsigned int leftmatch_fb(struct aa_dfa *dfa, unsigned int start, dfa 651 security/apparmor/match.c u16 *def = DEFAULT_TABLE(dfa); dfa 652 security/apparmor/match.c u32 *base = BASE_TABLE(dfa); dfa 653 security/apparmor/match.c u16 *next = NEXT_TABLE(dfa); dfa 654 security/apparmor/match.c u16 *check = CHECK_TABLE(dfa); dfa 657 security/apparmor/match.c AA_BUG(!dfa); dfa 667 security/apparmor/match.c if (dfa->tables[YYTD_ID_EC]) { dfa 669 security/apparmor/match.c u8 *equiv = EQUIV_TABLE(dfa); dfa 681 security/apparmor/match.c state = aa_dfa_match(dfa, state, str); dfa 700 security/apparmor/match.c state = aa_dfa_match(dfa, state, str); dfa 728 security/apparmor/match.c unsigned int aa_dfa_leftmatch(struct aa_dfa *dfa, unsigned int start, dfa 735 security/apparmor/match.c return leftmatch_fb(dfa, start, str, &wb, count); dfa 193 security/apparmor/mount.c static unsigned int match_mnt_flags(struct aa_dfa *dfa, unsigned int state, dfa 200 security/apparmor/mount.c state = aa_dfa_next(dfa, state, i + 1); dfa 213 security/apparmor/mount.c static struct aa_perms compute_mnt_perms(struct aa_dfa *dfa, dfa 217 security/apparmor/mount.c .allow = dfa_user_allow(dfa, state), dfa 218 security/apparmor/mount.c .audit = dfa_user_audit(dfa, state), dfa 219 security/apparmor/mount.c .quiet = dfa_user_quiet(dfa, state), dfa 220 security/apparmor/mount.c .xindex = dfa_user_xindex(dfa, state), dfa 239 security/apparmor/mount.c static int do_match_mnt(struct aa_dfa *dfa, unsigned int start, dfa 246 security/apparmor/mount.c AA_BUG(!dfa); dfa 249 security/apparmor/mount.c state = aa_dfa_match(dfa, start, mntpnt); dfa 250 security/apparmor/mount.c state = aa_dfa_null_transition(dfa, state); dfa 255 security/apparmor/mount.c state = aa_dfa_match(dfa, state, devname); dfa 256 security/apparmor/mount.c state = aa_dfa_null_transition(dfa, state); dfa 261 security/apparmor/mount.c state = aa_dfa_match(dfa, state, type); dfa 262 security/apparmor/mount.c state = aa_dfa_null_transition(dfa, state); dfa 266 security/apparmor/mount.c state = match_mnt_flags(dfa, state, flags); dfa 269 security/apparmor/mount.c *perms = compute_mnt_perms(dfa, state); dfa 275 security/apparmor/mount.c state = aa_dfa_null_transition(dfa, state); dfa 279 security/apparmor/mount.c state = aa_dfa_match(dfa, state, data); dfa 282 security/apparmor/mount.c *perms = compute_mnt_perms(dfa, state); dfa 344 security/apparmor/mount.c pos = do_match_mnt(profile->policy.dfa, dfa 572 security/apparmor/mount.c state = aa_dfa_match(profile->policy.dfa, dfa 575 security/apparmor/mount.c perms = compute_mnt_perms(profile->policy.dfa, state); dfa 638 security/apparmor/mount.c state = aa_dfa_match(profile->policy.dfa, dfa 641 security/apparmor/mount.c state = aa_dfa_null_transition(profile->policy.dfa, state); dfa 642 security/apparmor/mount.c state = aa_dfa_match(profile->policy.dfa, state, old_name); dfa 643 security/apparmor/mount.c perms = compute_mnt_perms(profile->policy.dfa, state); dfa 124 security/apparmor/net.c state = aa_dfa_match_len(profile->policy.dfa, state, (char *) &buffer, dfa 126 security/apparmor/net.c aa_compute_perms(profile->policy.dfa, state, &perms); dfa 234 security/apparmor/policy.c aa_put_dfa(profile->policy.dfa); dfa 547 security/apparmor/policy.c profile->file.dfa = aa_get_dfa(nulldfa); dfa 548 security/apparmor/policy.c profile->policy.dfa = aa_get_dfa(nulldfa); dfa 111 security/apparmor/policy_ns.c ns->unconfined->file.dfa = aa_get_dfa(nulldfa); dfa 112 security/apparmor/policy_ns.c ns->unconfined->policy.dfa = aa_get_dfa(nulldfa); dfa 443 security/apparmor/policy_unpack.c struct aa_dfa *dfa = NULL; dfa 457 security/apparmor/policy_unpack.c dfa = aa_dfa_unpack(blob + pad, size - pad, flags); dfa 459 security/apparmor/policy_unpack.c if (IS_ERR(dfa)) dfa 460 security/apparmor/policy_unpack.c return dfa; dfa 464 security/apparmor/policy_unpack.c return dfa; dfa 822 security/apparmor/policy_unpack.c profile->policy.dfa = unpack_dfa(e); dfa 823 security/apparmor/policy_unpack.c if (IS_ERR(profile->policy.dfa)) { dfa 824 security/apparmor/policy_unpack.c error = PTR_ERR(profile->policy.dfa); dfa 825 security/apparmor/policy_unpack.c profile->policy.dfa = NULL; dfa 827 security/apparmor/policy_unpack.c } else if (!profile->policy.dfa) { dfa 837 security/apparmor/policy_unpack.c aa_dfa_next(profile->policy.dfa, dfa 844 security/apparmor/policy_unpack.c profile->policy.dfa = aa_get_dfa(nulldfa); dfa 847 security/apparmor/policy_unpack.c profile->file.dfa = unpack_dfa(e); dfa 848 security/apparmor/policy_unpack.c if (IS_ERR(profile->file.dfa)) { dfa 849 security/apparmor/policy_unpack.c error = PTR_ERR(profile->file.dfa); dfa 850 security/apparmor/policy_unpack.c profile->file.dfa = NULL; dfa 853 security/apparmor/policy_unpack.c } else if (profile->file.dfa) { dfa 857 security/apparmor/policy_unpack.c } else if (profile->policy.dfa && dfa 859 security/apparmor/policy_unpack.c profile->file.dfa = aa_get_dfa(profile->policy.dfa); dfa 862 security/apparmor/policy_unpack.c profile->file.dfa = aa_get_dfa(nulldfa); dfa 992 security/apparmor/policy_unpack.c static bool verify_dfa_xindex(struct aa_dfa *dfa, int table_size) dfa 995 security/apparmor/policy_unpack.c for (i = 0; i < dfa->tables[YYTD_ID_ACCEPT]->td_lolen; i++) { dfa 996 security/apparmor/policy_unpack.c if (!verify_xindex(dfa_user_xindex(dfa, i), table_size)) dfa 998 security/apparmor/policy_unpack.c if (!verify_xindex(dfa_other_xindex(dfa, i), table_size)) dfa 1012 security/apparmor/policy_unpack.c if (profile->file.dfa && dfa 1013 security/apparmor/policy_unpack.c !verify_dfa_xindex(profile->file.dfa,