Searched refs:root (Results 1 - 10 of 10) sorted by relevance

/security/apparmor/
H A Dpath.c83 struct path root; local
84 get_fs_root(current->fs, &root);
85 res = __d_path(path, &root, buf, buflen);
86 path_put(&root);
123 /* If the path is not connected to the expected root,
130 * resolves to the namespace root (would be connected outside
132 * namespace root.
169 * Append "/" to the pathname. The root directory is a special
H A Dapparmorfs.c559 * @root: root namespace to stop search at (NOT NULL)
562 * Find the next namespace from @ns under @root and handle all locking needed
565 * Returns: next namespace or NULL if at last namespace under @root
567 * NOTE: will not unlock root->lock
569 static struct aa_namespace *__next_namespace(struct aa_namespace *root, argument
583 while (ns != root) {
599 * @root: namespace that is root of profiles being displayed (NOT NULL)
605 static struct aa_profile *__first_profile(struct aa_namespace *root, argument
662 next_profile(struct aa_namespace *root, struct aa_profile *profile) argument
685 struct aa_namespace *root = aa_current_profile()->ns; local
730 struct aa_namespace *root = f->private, *ns; local
750 struct aa_namespace *root = f->private; local
[all...]
H A Dpolicy.c92 /* root profile namespace */
349 * @root: namespace to search in (NOT NULL)
357 struct aa_namespace *aa_find_namespace(struct aa_namespace *root, argument
363 ns = aa_get_namespace(__aa_find_namespace(&root->sub_ns, name));
377 struct aa_namespace *ns, *root; local
379 root = aa_current_profile()->ns;
381 mutex_lock(&root->lock);
386 ns = aa_get_namespace(root);
392 ns = aa_get_namespace(__aa_find_namespace(&root->sub_ns, name));
394 ns = alloc_namespace(root
1242 struct aa_namespace *root, *ns = NULL; local
[all...]
H A Ddomain.c641 struct aa_profile *root; local
643 root = aa_get_profile_rcu(&profile->parent);
645 root = aa_get_profile(profile);
650 hat = aa_find_child(root, hats[i]);
652 if (!COMPLAIN_MODE(root) || permtest) {
653 if (list_empty(&root->base.profiles))
657 aa_put_profile(root);
671 name = new_compound_name(root->base.hname, hats[0]);
672 aa_put_profile(root);
682 aa_put_profile(root);
[all...]
/security/apparmor/include/
H A Dpolicy.h238 struct aa_namespace *aa_find_namespace(struct aa_namespace *root,
/security/
H A DKconfig87 correctly. This level of protection requires a root of trust outside
H A Dcapability.c323 static int cap_path_chroot(struct path *root) argument
/security/selinux/
H A Dhooks.c419 struct dentry *root = sb->s_root; local
420 struct inode *root_inode = root->d_inode;
426 the root directory. -ENODATA is ok, as this may be
435 rc = root_inode->i_op->getxattr(root, XATTR_NAME_SELINUX, NULL, 0);
461 /* Initialize the root inode. */
462 rc = inode_doinit_with_dentry(root_inode, root);
562 struct inode *root = sbsec->sb->s_root->d_inode; local
563 struct inode_security_struct *isec = root->i_security;
/security/keys/
H A Dkeyring.c672 * Start from the root node of the index tree. Because of the way the
674 * branch of the root node (root slot 0) or in the root node itself.
675 * Non-keyrings avoid the leftmost branch of the root entirely (root
678 ptr = ACCESS_ONCE(keyring->keys.root);
683 /* If the root is a shortcut, either the keyring only contains
684 * keyring pointers (everything clusters behind root slot 0) or
777 /* If we've ascended to the root (zer
[all...]
/security/smack/
H A Dsmack_lsm.c547 struct dentry *root = sb->s_root; local
548 struct inode *inode = root->d_inode;
614 * Unprivileged mounts get root and default from the caller.
621 * Initialize the root inode.
3029 * If this is the root inode the superblock
3031 * If that is the case use the root value out

Completed in 89 milliseconds