usrdatum          195 security/selinux/ss/mls.c 	struct user_datum *usrdatum;
usrdatum          211 security/selinux/ss/mls.c 	usrdatum = p->user_val_to_struct[c->user - 1];
usrdatum          212 security/selinux/ss/mls.c 	if (!mls_range_contains(usrdatum->range, c->range))
usrdatum          284 security/selinux/ss/policydb.c 	struct user_datum *usrdatum;
usrdatum          288 security/selinux/ss/policydb.c 		usrdatum = datum;
usrdatum          289 security/selinux/ss/policydb.c 		ebitmap_destroy(&usrdatum->roles);
usrdatum          290 security/selinux/ss/policydb.c 		ebitmap_destroy(&usrdatum->range.level[0].cat);
usrdatum          291 security/selinux/ss/policydb.c 		ebitmap_destroy(&usrdatum->range.level[1].cat);
usrdatum          292 security/selinux/ss/policydb.c 		ebitmap_destroy(&usrdatum->dfltlevel.cat);
usrdatum          600 security/selinux/ss/policydb.c 	struct user_datum *usrdatum;
usrdatum          602 security/selinux/ss/policydb.c 	usrdatum = datum;
usrdatum          604 security/selinux/ss/policydb.c 	if (!usrdatum->value
usrdatum          605 security/selinux/ss/policydb.c 	    || usrdatum->value > p->p_users.nprim
usrdatum          606 security/selinux/ss/policydb.c 	    || usrdatum->bounds > p->p_users.nprim)
usrdatum          609 security/selinux/ss/policydb.c 	p->sym_val_to_name[SYM_USERS][usrdatum->value - 1] = key;
usrdatum          610 security/selinux/ss/policydb.c 	p->user_val_to_struct[usrdatum->value - 1] = usrdatum;
usrdatum          918 security/selinux/ss/policydb.c 	struct user_datum *usrdatum;
usrdatum          941 security/selinux/ss/policydb.c 		usrdatum = p->user_val_to_struct[c->user - 1];
usrdatum          942 security/selinux/ss/policydb.c 		if (!usrdatum)
usrdatum          945 security/selinux/ss/policydb.c 		if (!ebitmap_get_bit(&usrdatum->roles, c->role - 1))
usrdatum         1507 security/selinux/ss/policydb.c 	struct user_datum *usrdatum;
usrdatum         1512 security/selinux/ss/policydb.c 	usrdatum = kzalloc(sizeof(*usrdatum), GFP_KERNEL);
usrdatum         1513 security/selinux/ss/policydb.c 	if (!usrdatum)
usrdatum         1524 security/selinux/ss/policydb.c 	usrdatum->value = le32_to_cpu(buf[1]);
usrdatum         1526 security/selinux/ss/policydb.c 		usrdatum->bounds = le32_to_cpu(buf[2]);
usrdatum         1532 security/selinux/ss/policydb.c 	rc = ebitmap_read(&usrdatum->roles, fp);
usrdatum         1537 security/selinux/ss/policydb.c 		rc = mls_read_range_helper(&usrdatum->range, fp);
usrdatum         1540 security/selinux/ss/policydb.c 		rc = mls_read_level(&usrdatum->dfltlevel, fp);
usrdatum         1545 security/selinux/ss/policydb.c 	rc = hashtab_insert(h, key, usrdatum);
usrdatum         1550 security/selinux/ss/policydb.c 	user_destroy(key, usrdatum, NULL);
usrdatum         3024 security/selinux/ss/policydb.c 	struct user_datum *usrdatum = datum;
usrdatum         3035 security/selinux/ss/policydb.c 	buf[items++] = cpu_to_le32(usrdatum->value);
usrdatum         3037 security/selinux/ss/policydb.c 		buf[items++] = cpu_to_le32(usrdatum->bounds);
usrdatum         3047 security/selinux/ss/policydb.c 	rc = ebitmap_write(&usrdatum->roles, fp);
usrdatum         3051 security/selinux/ss/policydb.c 	rc = mls_write_range_helper(&usrdatum->range, fp);
usrdatum         3055 security/selinux/ss/policydb.c 	rc = mls_write_level(&usrdatum->dfltlevel, fp);
usrdatum         1382 security/selinux/ss/services.c 	struct user_datum *usrdatum;
usrdatum         1403 security/selinux/ss/services.c 	usrdatum = hashtab_search(pol->p_users.table, scontextp);
usrdatum         1404 security/selinux/ss/services.c 	if (!usrdatum)
usrdatum         1407 security/selinux/ss/services.c 	ctx->user = usrdatum->value;
usrdatum         1934 security/selinux/ss/services.c 	struct user_datum *usrdatum;
usrdatum         1978 security/selinux/ss/services.c 	usrdatum = hashtab_search(args->newp->p_users.table,
usrdatum         1981 security/selinux/ss/services.c 	if (!usrdatum)
usrdatum         1983 security/selinux/ss/services.c 	newc->user = usrdatum->value;