dfa              3732 arch/mips/include/asm/octeon/cvmx-npei-defs.h 		uint64_t dfa:1;
dfa              3746 arch/mips/include/asm/octeon/cvmx-npei-defs.h 		uint64_t dfa:1;
dfa              2240 arch/mips/include/asm/octeon/cvmx-npi-defs.h 		uint64_t dfa:1;
dfa              2254 arch/mips/include/asm/octeon/cvmx-npi-defs.h 		uint64_t dfa:1;
dfa              2309 arch/mips/include/asm/octeon/cvmx-npi-defs.h 		uint64_t dfa:1;
dfa              2323 arch/mips/include/asm/octeon/cvmx-npi-defs.h 		uint64_t dfa:1;
dfa              2380 arch/mips/include/asm/octeon/cvmx-npi-defs.h 		uint64_t dfa:1;
dfa              2394 arch/mips/include/asm/octeon/cvmx-npi-defs.h 		uint64_t dfa:1;
dfa              2447 arch/mips/include/asm/octeon/cvmx-npi-defs.h 		uint64_t dfa:1;
dfa              2461 arch/mips/include/asm/octeon/cvmx-npi-defs.h 		uint64_t dfa:1;
dfa              1029 drivers/staging/octeon/octeon-stubs.h 		uint64_t dfa:1;
dfa              1064 drivers/staging/octeon/octeon-stubs.h 		uint64_t dfa:1;
dfa              1099 drivers/staging/octeon/octeon-stubs.h 		uint64_t dfa:1;
dfa              1130 drivers/staging/octeon/octeon-stubs.h 		uint64_t dfa:1;
dfa               614 security/apparmor/apparmorfs.c 	struct aa_dfa *dfa;
dfa               619 security/apparmor/apparmorfs.c 	if (profile->file.dfa && *match_str == AA_CLASS_FILE) {
dfa               620 security/apparmor/apparmorfs.c 		dfa = profile->file.dfa;
dfa               621 security/apparmor/apparmorfs.c 		state = aa_dfa_match_len(dfa, profile->file.start,
dfa               626 security/apparmor/apparmorfs.c 			tmp = aa_compute_fperms(dfa, state, &cond);
dfa               628 security/apparmor/apparmorfs.c 	} else if (profile->policy.dfa) {
dfa               631 security/apparmor/apparmorfs.c 		dfa = profile->policy.dfa;
dfa               632 security/apparmor/apparmorfs.c 		state = aa_dfa_match_len(dfa, profile->policy.start[0],
dfa               635 security/apparmor/apparmorfs.c 			aa_compute_perms(dfa, state, &tmp);
dfa               104 security/apparmor/domain.c 		state = aa_dfa_match(profile->file.dfa, state, "&");
dfa               106 security/apparmor/domain.c 		return aa_dfa_match(profile->file.dfa, state, tp->base.hname);
dfa               110 security/apparmor/domain.c 	state = aa_dfa_match_len(profile->file.dfa, state, ":", 1);
dfa               111 security/apparmor/domain.c 	state = aa_dfa_match(profile->file.dfa, state, ns_name);
dfa               112 security/apparmor/domain.c 	state = aa_dfa_match_len(profile->file.dfa, state, ":", 1);
dfa               113 security/apparmor/domain.c 	return aa_dfa_match(profile->file.dfa, state, tp->base.hname);
dfa               159 security/apparmor/domain.c 		state = aa_dfa_match(profile->file.dfa, state, "//&");
dfa               164 security/apparmor/domain.c 	*perms = aa_compute_fperms(profile->file.dfa, state, &cond);
dfa               217 security/apparmor/domain.c 	tmp = aa_compute_fperms(profile->file.dfa, state, &cond);
dfa               226 security/apparmor/domain.c 		tmp = aa_compute_fperms(profile->file.dfa, state, &cond);
dfa               660 security/apparmor/domain.c 	state = aa_str_perms(profile->file.dfa, state, name, cond, &perms);
dfa               781 security/apparmor/domain.c 	state = aa_str_perms(profile->file.dfa, state, xname, cond, &perms);
dfa               790 security/apparmor/domain.c 	state = aa_dfa_null_transition(profile->file.dfa, state);
dfa               224 security/apparmor/file.c struct aa_perms aa_compute_fperms(struct aa_dfa *dfa, unsigned int state,
dfa               235 security/apparmor/file.c 		perms.allow = map_old_perms(dfa_user_allow(dfa, state));
dfa               236 security/apparmor/file.c 		perms.audit = map_old_perms(dfa_user_audit(dfa, state));
dfa               237 security/apparmor/file.c 		perms.quiet = map_old_perms(dfa_user_quiet(dfa, state));
dfa               238 security/apparmor/file.c 		perms.xindex = dfa_user_xindex(dfa, state);
dfa               240 security/apparmor/file.c 		perms.allow = map_old_perms(dfa_other_allow(dfa, state));
dfa               241 security/apparmor/file.c 		perms.audit = map_old_perms(dfa_other_audit(dfa, state));
dfa               242 security/apparmor/file.c 		perms.quiet = map_old_perms(dfa_other_quiet(dfa, state));
dfa               243 security/apparmor/file.c 		perms.xindex = dfa_other_xindex(dfa, state);
dfa               248 security/apparmor/file.c 	if (ACCEPT_TABLE(dfa)[state] & 0x80000000)
dfa               250 security/apparmor/file.c 	if (ACCEPT_TABLE(dfa)[state] & 0x40000000)
dfa               266 security/apparmor/file.c unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start,
dfa               271 security/apparmor/file.c 	state = aa_dfa_match(dfa, start, name);
dfa               272 security/apparmor/file.c 	*perms = aa_compute_fperms(dfa, state, cond);
dfa               285 security/apparmor/file.c 	aa_str_perms(profile->file.dfa, profile->file.start, name, cond, perms);
dfa               390 security/apparmor/file.c 	state = aa_str_perms(profile->file.dfa, profile->file.start, lname,
dfa               397 security/apparmor/file.c 	state = aa_dfa_null_transition(profile->file.dfa, state);
dfa               398 security/apparmor/file.c 	aa_str_perms(profile->file.dfa, state, tname, cond, &perms);
dfa               420 security/apparmor/file.c 	aa_str_perms(profile->file.dfa, profile->file.start, tname, cond,
dfa               143 security/apparmor/include/file.h #define dfa_user_allow(dfa, state) (((ACCEPT_TABLE(dfa)[state]) & 0x7f) | \
dfa               144 security/apparmor/include/file.h 				    ((ACCEPT_TABLE(dfa)[state]) & 0x80000000))
dfa               145 security/apparmor/include/file.h #define dfa_user_audit(dfa, state) ((ACCEPT_TABLE2(dfa)[state]) & 0x7f)
dfa               146 security/apparmor/include/file.h #define dfa_user_quiet(dfa, state) (((ACCEPT_TABLE2(dfa)[state]) >> 7) & 0x7f)
dfa               147 security/apparmor/include/file.h #define dfa_user_xindex(dfa, state) \
dfa               148 security/apparmor/include/file.h 	(dfa_map_xindex(ACCEPT_TABLE(dfa)[state] & 0x3fff))
dfa               150 security/apparmor/include/file.h #define dfa_other_allow(dfa, state) ((((ACCEPT_TABLE(dfa)[state]) >> 14) & \
dfa               152 security/apparmor/include/file.h 				     ((ACCEPT_TABLE(dfa)[state]) & 0x80000000))
dfa               153 security/apparmor/include/file.h #define dfa_other_audit(dfa, state) (((ACCEPT_TABLE2(dfa)[state]) >> 14) & 0x7f)
dfa               154 security/apparmor/include/file.h #define dfa_other_quiet(dfa, state) \
dfa               155 security/apparmor/include/file.h 	((((ACCEPT_TABLE2(dfa)[state]) >> 7) >> 14) & 0x7f)
dfa               156 security/apparmor/include/file.h #define dfa_other_xindex(dfa, state) \
dfa               157 security/apparmor/include/file.h 	dfa_map_xindex((ACCEPT_TABLE(dfa)[state] >> 14) & 0x3fff)
dfa               177 security/apparmor/include/file.h 	struct aa_dfa *dfa;
dfa               183 security/apparmor/include/file.h struct aa_perms aa_compute_fperms(struct aa_dfa *dfa, unsigned int state,
dfa               185 security/apparmor/include/file.h unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start,
dfa               206 security/apparmor/include/file.h 	aa_put_dfa(rules->dfa);
dfa                80 security/apparmor/include/lib.h static inline unsigned int aa_dfa_null_transition(struct aa_dfa *dfa,
dfa                84 security/apparmor/include/lib.h 	return aa_dfa_next(dfa, start, 0);
dfa               124 security/apparmor/include/match.h unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start,
dfa               126 security/apparmor/include/match.h unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start,
dfa               128 security/apparmor/include/match.h unsigned int aa_dfa_next(struct aa_dfa *dfa, unsigned int state,
dfa               130 security/apparmor/include/match.h unsigned int aa_dfa_match_until(struct aa_dfa *dfa, unsigned int start,
dfa               132 security/apparmor/include/match.h unsigned int aa_dfa_matchn_until(struct aa_dfa *dfa, unsigned int start,
dfa               153 security/apparmor/include/match.h unsigned int aa_dfa_leftmatch(struct aa_dfa *dfa, unsigned int start,
dfa               163 security/apparmor/include/match.h static inline struct aa_dfa *aa_get_dfa(struct aa_dfa *dfa)
dfa               165 security/apparmor/include/match.h 	if (dfa)
dfa               166 security/apparmor/include/match.h 		kref_get(&(dfa->count));
dfa               168 security/apparmor/include/match.h 	return dfa;
dfa               177 security/apparmor/include/match.h static inline void aa_put_dfa(struct aa_dfa *dfa)
dfa               179 security/apparmor/include/match.h 	if (dfa)
dfa               180 security/apparmor/include/match.h 		kref_put(&dfa->count, aa_dfa_free_kref);
dfa               144 security/apparmor/include/perms.h void aa_compute_perms(struct aa_dfa *dfa, unsigned int state,
dfa                75 security/apparmor/include/policy.h 	struct aa_dfa *dfa;
dfa               222 security/apparmor/include/policy.h 		return aa_dfa_match_len(profile->policy.dfa,
dfa               233 security/apparmor/include/policy.h 	return aa_dfa_match_len(profile->policy.dfa, state, (char *) &be_af, 2);
dfa               200 security/apparmor/ipc.c 	state = aa_dfa_next(profile->policy.dfa,
dfa              1248 security/apparmor/label.c 		return aa_dfa_match(profile->policy.dfa, state, tp->base.hname);
dfa              1252 security/apparmor/label.c 	state = aa_dfa_match_len(profile->policy.dfa, state, ":", 1);
dfa              1253 security/apparmor/label.c 	state = aa_dfa_match(profile->policy.dfa, state, ns_name);
dfa              1254 security/apparmor/label.c 	state = aa_dfa_match_len(profile->policy.dfa, state, ":", 1);
dfa              1255 security/apparmor/label.c 	return aa_dfa_match(profile->policy.dfa, state, tp->base.hname);
dfa              1299 security/apparmor/label.c 		state = aa_dfa_match(profile->policy.dfa, state, "//&");
dfa              1304 security/apparmor/label.c 	aa_compute_perms(profile->policy.dfa, state, perms);
dfa              1355 security/apparmor/label.c 	aa_compute_perms(profile->policy.dfa, state, &tmp);
dfa              1364 security/apparmor/label.c 		aa_compute_perms(profile->policy.dfa, state, &tmp);
dfa               325 security/apparmor/lib.c void aa_compute_perms(struct aa_dfa *dfa, unsigned int state,
dfa               329 security/apparmor/lib.c 		.allow = dfa_user_allow(dfa, state),
dfa               330 security/apparmor/lib.c 		.audit = dfa_user_audit(dfa, state),
dfa               331 security/apparmor/lib.c 		.quiet = dfa_user_quiet(dfa, state),
dfa               337 security/apparmor/lib.c 	perms->allow |= map_other(dfa_other_allow(dfa, state));
dfa               338 security/apparmor/lib.c 	perms->audit |= map_other(dfa_other_audit(dfa, state));
dfa               339 security/apparmor/lib.c 	perms->quiet |= map_other(dfa_other_quiet(dfa, state));
dfa               387 security/apparmor/lib.c 	state = aa_dfa_next(profile->policy.dfa,
dfa               194 security/apparmor/match.c static int verify_dfa(struct aa_dfa *dfa)
dfa               199 security/apparmor/match.c 	state_count = dfa->tables[YYTD_ID_BASE]->td_lolen;
dfa               200 security/apparmor/match.c 	trans_count = dfa->tables[YYTD_ID_NXT]->td_lolen;
dfa               202 security/apparmor/match.c 		if (!(BASE_TABLE(dfa)[i] & MATCH_FLAG_DIFF_ENCODE) &&
dfa               203 security/apparmor/match.c 		    (DEFAULT_TABLE(dfa)[i] >= state_count))
dfa               205 security/apparmor/match.c 		if (base_idx(BASE_TABLE(dfa)[i]) + 255 >= trans_count) {
dfa               212 security/apparmor/match.c 		if (NEXT_TABLE(dfa)[i] >= state_count)
dfa               214 security/apparmor/match.c 		if (CHECK_TABLE(dfa)[i] >= state_count)
dfa               223 security/apparmor/match.c 		     (BASE_TABLE(dfa)[j] & MATCH_FLAG_DIFF_ENCODE) &&
dfa               224 security/apparmor/match.c 		     !(BASE_TABLE(dfa)[j] & MARK_DIFF_ENCODE);
dfa               226 security/apparmor/match.c 			k = DEFAULT_TABLE(dfa)[j];
dfa               231 security/apparmor/match.c 			BASE_TABLE(dfa)[j] |= MARK_DIFF_ENCODE;
dfa               246 security/apparmor/match.c static void dfa_free(struct aa_dfa *dfa)
dfa               248 security/apparmor/match.c 	if (dfa) {
dfa               251 security/apparmor/match.c 		for (i = 0; i < ARRAY_SIZE(dfa->tables); i++) {
dfa               252 security/apparmor/match.c 			kvfree(dfa->tables[i]);
dfa               253 security/apparmor/match.c 			dfa->tables[i] = NULL;
dfa               255 security/apparmor/match.c 		kfree(dfa);
dfa               265 security/apparmor/match.c 	struct aa_dfa *dfa = container_of(kref, struct aa_dfa, count);
dfa               266 security/apparmor/match.c 	dfa_free(dfa);
dfa               287 security/apparmor/match.c 	struct aa_dfa *dfa = kzalloc(sizeof(struct aa_dfa), GFP_KERNEL);
dfa               288 security/apparmor/match.c 	if (!dfa)
dfa               291 security/apparmor/match.c 	kref_init(&dfa->count);
dfa               306 security/apparmor/match.c 	dfa->flags = ntohs(*(__be16 *) (data + 12));
dfa               307 security/apparmor/match.c 	if (dfa->flags != 0 && dfa->flags != YYTH_FLAG_DIFF_ENCODE)
dfa               345 security/apparmor/match.c 		if (dfa->tables[table->td_id])
dfa               347 security/apparmor/match.c 		dfa->tables[table->td_id] = table;
dfa               352 security/apparmor/match.c 	error = verify_table_headers(dfa->tables, flags);
dfa               357 security/apparmor/match.c 		error = verify_dfa(dfa);
dfa               362 security/apparmor/match.c 	return dfa;
dfa               366 security/apparmor/match.c 	dfa_free(dfa);
dfa               400 security/apparmor/match.c unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start,
dfa               403 security/apparmor/match.c 	u16 *def = DEFAULT_TABLE(dfa);
dfa               404 security/apparmor/match.c 	u32 *base = BASE_TABLE(dfa);
dfa               405 security/apparmor/match.c 	u16 *next = NEXT_TABLE(dfa);
dfa               406 security/apparmor/match.c 	u16 *check = CHECK_TABLE(dfa);
dfa               413 security/apparmor/match.c 	if (dfa->tables[YYTD_ID_EC]) {
dfa               415 security/apparmor/match.c 		u8 *equiv = EQUIV_TABLE(dfa);
dfa               440 security/apparmor/match.c unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start,
dfa               443 security/apparmor/match.c 	u16 *def = DEFAULT_TABLE(dfa);
dfa               444 security/apparmor/match.c 	u32 *base = BASE_TABLE(dfa);
dfa               445 security/apparmor/match.c 	u16 *next = NEXT_TABLE(dfa);
dfa               446 security/apparmor/match.c 	u16 *check = CHECK_TABLE(dfa);
dfa               453 security/apparmor/match.c 	if (dfa->tables[YYTD_ID_EC]) {
dfa               455 security/apparmor/match.c 		u8 *equiv = EQUIV_TABLE(dfa);
dfa               479 security/apparmor/match.c unsigned int aa_dfa_next(struct aa_dfa *dfa, unsigned int state,
dfa               482 security/apparmor/match.c 	u16 *def = DEFAULT_TABLE(dfa);
dfa               483 security/apparmor/match.c 	u32 *base = BASE_TABLE(dfa);
dfa               484 security/apparmor/match.c 	u16 *next = NEXT_TABLE(dfa);
dfa               485 security/apparmor/match.c 	u16 *check = CHECK_TABLE(dfa);
dfa               488 security/apparmor/match.c 	if (dfa->tables[YYTD_ID_EC]) {
dfa               490 security/apparmor/match.c 		u8 *equiv = EQUIV_TABLE(dfa);
dfa               511 security/apparmor/match.c unsigned int aa_dfa_match_until(struct aa_dfa *dfa, unsigned int start,
dfa               514 security/apparmor/match.c 	u16 *def = DEFAULT_TABLE(dfa);
dfa               515 security/apparmor/match.c 	u32 *base = BASE_TABLE(dfa);
dfa               516 security/apparmor/match.c 	u16 *next = NEXT_TABLE(dfa);
dfa               517 security/apparmor/match.c 	u16 *check = CHECK_TABLE(dfa);
dfa               518 security/apparmor/match.c 	u32 *accept = ACCEPT_TABLE(dfa);
dfa               525 security/apparmor/match.c 	if (dfa->tables[YYTD_ID_EC]) {
dfa               527 security/apparmor/match.c 		u8 *equiv = EQUIV_TABLE(dfa);
dfa               572 security/apparmor/match.c unsigned int aa_dfa_matchn_until(struct aa_dfa *dfa, unsigned int start,
dfa               575 security/apparmor/match.c 	u16 *def = DEFAULT_TABLE(dfa);
dfa               576 security/apparmor/match.c 	u32 *base = BASE_TABLE(dfa);
dfa               577 security/apparmor/match.c 	u16 *next = NEXT_TABLE(dfa);
dfa               578 security/apparmor/match.c 	u16 *check = CHECK_TABLE(dfa);
dfa               579 security/apparmor/match.c 	u32 *accept = ACCEPT_TABLE(dfa);
dfa               587 security/apparmor/match.c 	if (dfa->tables[YYTD_ID_EC]) {
dfa               589 security/apparmor/match.c 		u8 *equiv = EQUIV_TABLE(dfa);
dfa               647 security/apparmor/match.c static unsigned int leftmatch_fb(struct aa_dfa *dfa, unsigned int start,
dfa               651 security/apparmor/match.c 	u16 *def = DEFAULT_TABLE(dfa);
dfa               652 security/apparmor/match.c 	u32 *base = BASE_TABLE(dfa);
dfa               653 security/apparmor/match.c 	u16 *next = NEXT_TABLE(dfa);
dfa               654 security/apparmor/match.c 	u16 *check = CHECK_TABLE(dfa);
dfa               657 security/apparmor/match.c 	AA_BUG(!dfa);
dfa               667 security/apparmor/match.c 	if (dfa->tables[YYTD_ID_EC]) {
dfa               669 security/apparmor/match.c 		u8 *equiv = EQUIV_TABLE(dfa);
dfa               681 security/apparmor/match.c 				state = aa_dfa_match(dfa, state, str);
dfa               700 security/apparmor/match.c 				state = aa_dfa_match(dfa, state, str);
dfa               728 security/apparmor/match.c unsigned int aa_dfa_leftmatch(struct aa_dfa *dfa, unsigned int start,
dfa               735 security/apparmor/match.c 	return leftmatch_fb(dfa, start, str, &wb, count);
dfa               193 security/apparmor/mount.c static unsigned int match_mnt_flags(struct aa_dfa *dfa, unsigned int state,
dfa               200 security/apparmor/mount.c 			state = aa_dfa_next(dfa, state, i + 1);
dfa               213 security/apparmor/mount.c static struct aa_perms compute_mnt_perms(struct aa_dfa *dfa,
dfa               217 security/apparmor/mount.c 		.allow = dfa_user_allow(dfa, state),
dfa               218 security/apparmor/mount.c 		.audit = dfa_user_audit(dfa, state),
dfa               219 security/apparmor/mount.c 		.quiet = dfa_user_quiet(dfa, state),
dfa               220 security/apparmor/mount.c 		.xindex = dfa_user_xindex(dfa, state),
dfa               239 security/apparmor/mount.c static int do_match_mnt(struct aa_dfa *dfa, unsigned int start,
dfa               246 security/apparmor/mount.c 	AA_BUG(!dfa);
dfa               249 security/apparmor/mount.c 	state = aa_dfa_match(dfa, start, mntpnt);
dfa               250 security/apparmor/mount.c 	state = aa_dfa_null_transition(dfa, state);
dfa               255 security/apparmor/mount.c 		state = aa_dfa_match(dfa, state, devname);
dfa               256 security/apparmor/mount.c 	state = aa_dfa_null_transition(dfa, state);
dfa               261 security/apparmor/mount.c 		state = aa_dfa_match(dfa, state, type);
dfa               262 security/apparmor/mount.c 	state = aa_dfa_null_transition(dfa, state);
dfa               266 security/apparmor/mount.c 	state = match_mnt_flags(dfa, state, flags);
dfa               269 security/apparmor/mount.c 	*perms = compute_mnt_perms(dfa, state);
dfa               275 security/apparmor/mount.c 		state = aa_dfa_null_transition(dfa, state);
dfa               279 security/apparmor/mount.c 		state = aa_dfa_match(dfa, state, data);
dfa               282 security/apparmor/mount.c 		*perms = compute_mnt_perms(dfa, state);
dfa               344 security/apparmor/mount.c 	pos = do_match_mnt(profile->policy.dfa,
dfa               572 security/apparmor/mount.c 	state = aa_dfa_match(profile->policy.dfa,
dfa               575 security/apparmor/mount.c 	perms = compute_mnt_perms(profile->policy.dfa, state);
dfa               638 security/apparmor/mount.c 	state = aa_dfa_match(profile->policy.dfa,
dfa               641 security/apparmor/mount.c 	state = aa_dfa_null_transition(profile->policy.dfa, state);
dfa               642 security/apparmor/mount.c 	state = aa_dfa_match(profile->policy.dfa, state, old_name);
dfa               643 security/apparmor/mount.c 	perms = compute_mnt_perms(profile->policy.dfa, state);
dfa               124 security/apparmor/net.c 	state = aa_dfa_match_len(profile->policy.dfa, state, (char *) &buffer,
dfa               126 security/apparmor/net.c 	aa_compute_perms(profile->policy.dfa, state, &perms);
dfa               234 security/apparmor/policy.c 	aa_put_dfa(profile->policy.dfa);
dfa               547 security/apparmor/policy.c 	profile->file.dfa = aa_get_dfa(nulldfa);
dfa               548 security/apparmor/policy.c 	profile->policy.dfa = aa_get_dfa(nulldfa);
dfa               111 security/apparmor/policy_ns.c 	ns->unconfined->file.dfa = aa_get_dfa(nulldfa);
dfa               112 security/apparmor/policy_ns.c 	ns->unconfined->policy.dfa = aa_get_dfa(nulldfa);
dfa               443 security/apparmor/policy_unpack.c 	struct aa_dfa *dfa = NULL;
dfa               457 security/apparmor/policy_unpack.c 		dfa = aa_dfa_unpack(blob + pad, size - pad, flags);
dfa               459 security/apparmor/policy_unpack.c 		if (IS_ERR(dfa))
dfa               460 security/apparmor/policy_unpack.c 			return dfa;
dfa               464 security/apparmor/policy_unpack.c 	return dfa;
dfa               822 security/apparmor/policy_unpack.c 		profile->policy.dfa = unpack_dfa(e);
dfa               823 security/apparmor/policy_unpack.c 		if (IS_ERR(profile->policy.dfa)) {
dfa               824 security/apparmor/policy_unpack.c 			error = PTR_ERR(profile->policy.dfa);
dfa               825 security/apparmor/policy_unpack.c 			profile->policy.dfa = NULL;
dfa               827 security/apparmor/policy_unpack.c 		} else if (!profile->policy.dfa) {
dfa               837 security/apparmor/policy_unpack.c 				aa_dfa_next(profile->policy.dfa,
dfa               844 security/apparmor/policy_unpack.c 		profile->policy.dfa = aa_get_dfa(nulldfa);
dfa               847 security/apparmor/policy_unpack.c 	profile->file.dfa = unpack_dfa(e);
dfa               848 security/apparmor/policy_unpack.c 	if (IS_ERR(profile->file.dfa)) {
dfa               849 security/apparmor/policy_unpack.c 		error = PTR_ERR(profile->file.dfa);
dfa               850 security/apparmor/policy_unpack.c 		profile->file.dfa = NULL;
dfa               853 security/apparmor/policy_unpack.c 	} else if (profile->file.dfa) {
dfa               857 security/apparmor/policy_unpack.c 	} else if (profile->policy.dfa &&
dfa               859 security/apparmor/policy_unpack.c 		profile->file.dfa = aa_get_dfa(profile->policy.dfa);
dfa               862 security/apparmor/policy_unpack.c 		profile->file.dfa = aa_get_dfa(nulldfa);
dfa               992 security/apparmor/policy_unpack.c static bool verify_dfa_xindex(struct aa_dfa *dfa, int table_size)
dfa               995 security/apparmor/policy_unpack.c 	for (i = 0; i < dfa->tables[YYTD_ID_ACCEPT]->td_lolen; i++) {
dfa               996 security/apparmor/policy_unpack.c 		if (!verify_xindex(dfa_user_xindex(dfa, i), table_size))
dfa               998 security/apparmor/policy_unpack.c 		if (!verify_xindex(dfa_other_xindex(dfa, i), table_size))
dfa              1012 security/apparmor/policy_unpack.c 	if (profile->file.dfa &&
dfa              1013 security/apparmor/policy_unpack.c 	    !verify_dfa_xindex(profile->file.dfa,