Lines Matching defs:label

101  * __add_profile - add a profiles to list and label tree
121 l = aa_label_insert(&profile->ns->labels, &profile->label);
122 AA_BUG(l != &profile->label);
163 aa_label_remove(&profile->label);
230 kfree_sensitive(profile->secmark[i].label);
245 aa_label_destroy(&profile->label);
270 if (!aa_label_init(&profile->label, 1, gfp))
275 proxy = aa_alloc_proxy(&profile->label, gfp);
280 profile->label.proxy = proxy;
282 profile->label.hname = profile->base.hname;
283 profile->label.flags |= FLAG_PROFILE;
284 profile->label.vec[0] = profile;
540 profile->label.flags |= FLAG_NULL;
542 profile->label.flags |= FLAG_HAT;
585 if (profile->label.flags & FLAG_IMMUTIBLE) {
609 * @label: label to check if it can manage policy
618 static int audit_policy(struct aa_label *label, const char *op,
628 aad(&sa)->label = label;
676 * @label: label to check if it can manage policy
681 int aa_may_manage_policy(struct aa_label *label, struct aa_ns *ns, u32 mask)
694 return audit_policy(label, op, NULL, NULL, "policy_locked",
698 return audit_policy(label, op, NULL, NULL, "not policy admin",
774 aa_label_replace(&old->label, &new->label);
775 /* migrate dents must come after label replacement b/c update */
819 new->label.hname = old->label.hname;
846 * @label: label that is attempting to load/replace policy
857 ssize_t aa_replace_profiles(struct aa_ns *policy_ns, struct aa_label *label,
900 ns = aa_prepare_ns(policy_ns ? policy_ns : labels_ns(label),
911 ns = aa_get_ns(policy_ns ? policy_ns : labels_ns(label));
1007 audit_policy(label, op, ns_name, ent->new->base.hname,
1011 aa_put_proxy(ent->new->label.proxy);
1012 ent->new->label.proxy = NULL;
1020 audit_policy(label, op, ns_name, ent->new->base.hname, NULL,
1059 audit_policy(label, op, ns_name, ent ? ent->new->base.hname : NULL,
1070 audit_policy(label, op, ns_name, tmp->new->base.hname, info,
1084 * @subj: label attempting to remove policy