labels_ns 788 security/apparmor/apparmorfs.c label_for_each_in_ns(i, labels_ns(label), label, profile) { labels_ns 1168 security/apparmor/apparmorfs.c if (profile->ns != labels_ns(label)) { labels_ns 1185 security/apparmor/apparmorfs.c seq_printf(seq, "%d\n", labels_ns(label)->level); labels_ns 1194 security/apparmor/apparmorfs.c seq_printf(seq, "%s\n", labels_ns(label)->base.name); labels_ns 1073 security/apparmor/domain.c label_for_each_in_ns(it, labels_ns(label), label, profile) { labels_ns 1109 security/apparmor/domain.c label_for_each_in_ns(it, labels_ns(label), label, profile) { labels_ns 1120 security/apparmor/domain.c label_for_each_in_ns(it, labels_ns(label), label, profile) { labels_ns 78 security/apparmor/file.c aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, labels_ns 182 security/apparmor/include/cred.h ns = aa_get_ns(labels_ns(label)); labels_ns 150 security/apparmor/include/label.h #define labels_set(X) (&labels_ns(X)->labels) labels_ns 222 security/apparmor/include/label.h struct aa_ns *__ns = labels_ns(L); \ labels_ns 285 security/apparmor/include/lib.h __fn_build_in_ns(labels_ns(L), (P), (NS_FN), (OTHER_FN))); \ labels_ns 59 security/apparmor/ipc.c aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, labels_ns 183 security/apparmor/ipc.c aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, labels_ns 82 security/apparmor/label.c &labels_ns(orig)->lock); labels_ns 356 security/apparmor/label.c aa_free_ns(labels_ns(label)); labels_ns 375 security/apparmor/label.c struct aa_ns *ns = labels_ns(label); labels_ns 751 security/apparmor/label.c res = __label_remove(label, ns_unconfined(labels_ns(label))); labels_ns 770 security/apparmor/label.c if (name_is_shared(old, new) && labels_ns(old) == labels_ns(new)) { labels_ns 784 security/apparmor/label.c if (labels_ns(old) != labels_ns(new)) { labels_ns 1093 security/apparmor/label.c struct aa_ns *nsa = labels_ns(a); labels_ns 1094 security/apparmor/label.c struct aa_ns *nsb = labels_ns(b); labels_ns 1233 security/apparmor/label.c return aa_ns_visible(profile->ns, labels_ns(label), true); labels_ns 1426 security/apparmor/label.c if (label->hname || labels_ns(label) != ns) labels_ns 1451 security/apparmor/label.c if (label->hname && (!ns || labels_ns(label) == ns) && labels_ns 1612 security/apparmor/label.c ns = labels_ns(label); labels_ns 1899 security/apparmor/label.c if (vec[i]->ns != labels_ns(currbase)) labels_ns 1963 security/apparmor/label.c if (labels_ns(this) != root_ns) labels_ns 1965 security/apparmor/label.c ns_unconfined(labels_ns(this)->parent)); labels_ns 2029 security/apparmor/label.c AA_BUG(!mutex_is_locked(&labels_ns(label)->lock)); labels_ns 2068 security/apparmor/label.c AA_BUG(labels_ns(label) != labels_ns(new)); labels_ns 279 security/apparmor/lib.c aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, labels_ns 1070 security/apparmor/lsm.c slen = aa_label_asxprint(&name, labels_ns(label), peer, labels_ns 100 security/apparmor/net.c aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, labels_ns 466 security/apparmor/policy.c ns = aa_lookupn_ns(labels_ns(base), ns_name, ns_len); labels_ns 470 security/apparmor/policy.c ns = aa_get_ns(labels_ns(base)); labels_ns 899 security/apparmor/policy.c ns = aa_prepare_ns(policy_ns ? policy_ns : labels_ns(label), labels_ns 910 security/apparmor/policy.c ns = aa_get_ns(policy_ns ? policy_ns : labels_ns(label)); labels_ns 1113 security/apparmor/policy.c ns = aa_lookupn_ns(policy_ns ? policy_ns : labels_ns(subj), labels_ns 1122 security/apparmor/policy.c ns = aa_get_ns(policy_ns ? policy_ns : labels_ns(subj)); labels_ns 35 security/apparmor/procattr.c struct aa_ns *ns = labels_ns(label); labels_ns 38 security/apparmor/resource.c aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, labels_ns 65 security/apparmor/task.c if (unconfined(label) || (labels_ns(old) != labels_ns(label)))