labels_ns         788 security/apparmor/apparmorfs.c 		label_for_each_in_ns(i, labels_ns(label), label, profile) {
labels_ns        1168 security/apparmor/apparmorfs.c 			if (profile->ns != labels_ns(label)) {
labels_ns        1185 security/apparmor/apparmorfs.c 	seq_printf(seq, "%d\n", labels_ns(label)->level);
labels_ns        1194 security/apparmor/apparmorfs.c 	seq_printf(seq, "%s\n", labels_ns(label)->base.name);
labels_ns        1073 security/apparmor/domain.c 		label_for_each_in_ns(it, labels_ns(label), label, profile) {
labels_ns        1109 security/apparmor/domain.c 	label_for_each_in_ns(it, labels_ns(label), label, profile) {
labels_ns        1120 security/apparmor/domain.c 	label_for_each_in_ns(it, labels_ns(label), label, profile) {
labels_ns          78 security/apparmor/file.c 		aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer,
labels_ns         182 security/apparmor/include/cred.h 	ns = aa_get_ns(labels_ns(label));
labels_ns         150 security/apparmor/include/label.h #define labels_set(X) (&labels_ns(X)->labels)
labels_ns         222 security/apparmor/include/label.h 	struct aa_ns *__ns = labels_ns(L);				\
labels_ns         285 security/apparmor/include/lib.h 		__fn_build_in_ns(labels_ns(L), (P), (NS_FN), (OTHER_FN))); \
labels_ns          59 security/apparmor/ipc.c 	aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer,
labels_ns         183 security/apparmor/ipc.c 	aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer,
labels_ns          82 security/apparmor/label.c 					&labels_ns(orig)->lock);
labels_ns         356 security/apparmor/label.c 		aa_free_ns(labels_ns(label));
labels_ns         375 security/apparmor/label.c 	struct aa_ns *ns = labels_ns(label);
labels_ns         751 security/apparmor/label.c 	res = __label_remove(label, ns_unconfined(labels_ns(label)));
labels_ns         770 security/apparmor/label.c 	if (name_is_shared(old, new) && labels_ns(old) == labels_ns(new)) {
labels_ns         784 security/apparmor/label.c 		if (labels_ns(old) != labels_ns(new)) {
labels_ns        1093 security/apparmor/label.c 	struct aa_ns *nsa = labels_ns(a);
labels_ns        1094 security/apparmor/label.c 	struct aa_ns *nsb = labels_ns(b);
labels_ns        1233 security/apparmor/label.c 	return aa_ns_visible(profile->ns, labels_ns(label), true);
labels_ns        1426 security/apparmor/label.c 	if (label->hname || labels_ns(label) != ns)
labels_ns        1451 security/apparmor/label.c 	if (label->hname && (!ns || labels_ns(label) == ns) &&
labels_ns        1612 security/apparmor/label.c 		ns = labels_ns(label);
labels_ns        1899 security/apparmor/label.c 		if (vec[i]->ns != labels_ns(currbase))
labels_ns        1963 security/apparmor/label.c 		if (labels_ns(this) != root_ns)
labels_ns        1965 security/apparmor/label.c 				       ns_unconfined(labels_ns(this)->parent));
labels_ns        2029 security/apparmor/label.c 	AA_BUG(!mutex_is_locked(&labels_ns(label)->lock));
labels_ns        2068 security/apparmor/label.c 		AA_BUG(labels_ns(label) != labels_ns(new));
labels_ns         279 security/apparmor/lib.c 	aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer,
labels_ns        1070 security/apparmor/lsm.c 	slen = aa_label_asxprint(&name, labels_ns(label), peer,
labels_ns         100 security/apparmor/net.c 		aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer,
labels_ns         466 security/apparmor/policy.c 		ns = aa_lookupn_ns(labels_ns(base), ns_name, ns_len);
labels_ns         470 security/apparmor/policy.c 		ns = aa_get_ns(labels_ns(base));
labels_ns         899 security/apparmor/policy.c 		ns = aa_prepare_ns(policy_ns ? policy_ns : labels_ns(label),
labels_ns         910 security/apparmor/policy.c 		ns = aa_get_ns(policy_ns ? policy_ns : labels_ns(label));
labels_ns        1113 security/apparmor/policy.c 		ns = aa_lookupn_ns(policy_ns ? policy_ns : labels_ns(subj),
labels_ns        1122 security/apparmor/policy.c 		ns = aa_get_ns(policy_ns ? policy_ns : labels_ns(subj));
labels_ns          35 security/apparmor/procattr.c 	struct aa_ns *ns = labels_ns(label);
labels_ns          38 security/apparmor/resource.c 		aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer,
labels_ns          65 security/apparmor/task.c 	if (unconfined(label) || (labels_ns(old) != labels_ns(label)))