Searched refs:labels_ns (Results 1 – 14 of 14) sorted by relevance
| /linux/security/apparmor/ |
| H A D | label.c | 84 &labels_ns(orig)->lock); in __aa_proxy_redirect() 362 aa_free_ns(labels_ns(label)); in label_free_switch() 382 struct aa_ns *ns = labels_ns(label); in aa_label_kref() 793 res = __label_remove(label, ns_unconfined(labels_ns(label))); in aa_label_remove() 812 if (name_is_shared(old, new) && labels_ns(old) == labels_ns(new)) { in aa_label_replace() 826 if (labels_ns(old) != labels_ns(new)) { in aa_label_replace() 1116 struct aa_ns *nsa = labels_ns(a); in labelset_of_merge() 1117 struct aa_ns *nsb = labels_ns(b); in labelset_of_merge() 1443 if (label->hname || labels_ns(label) != ns) in aa_update_label_name() 1468 if (label->hname && (!ns || labels_ns(label) == ns) && in use_label_hname() [all …]
|
| H A D | task.c | 71 if (unconfined(label) || (labels_ns(old) != labels_ns(label))) in aa_replace_current_label() 221 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in audit_ptrace_cb()
|
| H A D | policy.c | 665 ns = aa_lookupn_ns(labels_ns(base), ns_name, ns_len); in aa_fqlookupn_profile() 669 ns = aa_get_ns(labels_ns(base)); in aa_fqlookupn_profile() 1206 ns = aa_prepare_ns(policy_ns ? policy_ns : labels_ns(label), in aa_replace_profiles() 1217 ns = aa_get_ns(policy_ns ? policy_ns : labels_ns(label)); in aa_replace_profiles() 1444 ns = aa_lookupn_ns(policy_ns ? policy_ns : labels_ns(subj), in aa_remove_profiles() 1453 ns = aa_get_ns(policy_ns ? policy_ns : labels_ns(subj)); in aa_remove_profiles()
|
| H A D | procattr.c | 33 struct aa_ns *ns = labels_ns(label); in aa_getprocattr()
|
| H A D | ipc.c | 74 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in audit_signal_cb()
|
| H A D | domain.c | 1128 label_for_each_in_scope(it, labels_ns(label), label, profile) { in change_hat() 1164 label_for_each_in_scope(it, labels_ns(label), label, profile) { in change_hat() 1175 label_for_each_in_scope(it, labels_ns(label), label, profile) { in change_hat() 1256 label_for_each_in_scope(i, labels_ns(label), label, profile) { in aa_change_hat() 1440 label == &labels_ns(label)->unconfined->label && in aa_change_profile()
|
| H A D | resource.c | 39 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in audit_cb()
|
| H A D | apparmorfs.c | 163 return aa_get_ns(labels_ns(reflabel)); in get_ns_common_ref() 201 aa_put_ns(labels_ns(container_of(ref, struct aa_label, count))); in aa_put_common_ref() 872 label_for_each_in_scope(i, labels_ns(label), label, profile) { in query_label() 1253 if (profile->ns != labels_ns(label)) { in seq_ns_nsstacked_show() 1270 seq_printf(seq, "%d\n", labels_ns(label)->level); in seq_ns_level_show() 1279 seq_printf(seq, "%s\n", labels_ns(label)->base.name); in seq_ns_name_show()
|
| H A D | net.c | 159 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in audit_net_cb()
|
| H A D | file.c | 71 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in file_audit_cb()
|
| H A D | lsm.c | 615 aa_label_xaudit(ab, labels_ns(ad->subj_label), in audit_uring_cb() 1559 slen = aa_label_asxprint(&name, labels_ns(label), peer, in apparmor_socket_getpeersec_stream()
|
| /linux/security/apparmor/include/ |
| H A D | label.h | 162 #define labels_ns(X) (vec_ns(&((X)->vec[0]), (X)->size)) macro 163 #define labels_set(X) (&labels_ns(X)->labels) 164 #define labels_view(X) labels_ns(X) 212 struct aa_ns *__ns = labels_ns(L); \
|
| H A D | cred.h | 244 ns = aa_get_ns(labels_ns(label)); in aa_get_current_ns()
|
| H A D | lib.h | 357 __fn_build_in_scope(labels_ns(L), (P), (NS_FN), (OTHER_FN))); \
|