Searched refs:root (Results 1 - 10 of 10) sorted by relevance
/security/apparmor/ |
H A D | path.c | 83 struct path root; local 84 get_fs_root(current->fs, &root); 85 res = __d_path(path, &root, buf, buflen); 86 path_put(&root); 123 /* If the path is not connected to the expected root, 130 * resolves to the namespace root (would be connected outside 132 * namespace root. 169 * Append "/" to the pathname. The root directory is a special
|
H A D | apparmorfs.c | 559 * @root: root namespace to stop search at (NOT NULL) 562 * Find the next namespace from @ns under @root and handle all locking needed 565 * Returns: next namespace or NULL if at last namespace under @root 567 * NOTE: will not unlock root->lock 569 static struct aa_namespace *__next_namespace(struct aa_namespace *root, argument 583 while (ns != root) { 599 * @root: namespace that is root of profiles being displayed (NOT NULL) 605 static struct aa_profile *__first_profile(struct aa_namespace *root, argument 662 next_profile(struct aa_namespace *root, struct aa_profile *profile) argument 685 struct aa_namespace *root = aa_current_profile()->ns; local 730 struct aa_namespace *root = f->private, *ns; local 750 struct aa_namespace *root = f->private; local [all...] |
H A D | policy.c | 92 /* root profile namespace */ 349 * @root: namespace to search in (NOT NULL) 357 struct aa_namespace *aa_find_namespace(struct aa_namespace *root, argument 363 ns = aa_get_namespace(__aa_find_namespace(&root->sub_ns, name)); 377 struct aa_namespace *ns, *root; local 379 root = aa_current_profile()->ns; 381 mutex_lock(&root->lock); 386 ns = aa_get_namespace(root); 392 ns = aa_get_namespace(__aa_find_namespace(&root->sub_ns, name)); 394 ns = alloc_namespace(root 1242 struct aa_namespace *root, *ns = NULL; local [all...] |
H A D | domain.c | 641 struct aa_profile *root; local 643 root = aa_get_profile_rcu(&profile->parent); 645 root = aa_get_profile(profile); 650 hat = aa_find_child(root, hats[i]); 652 if (!COMPLAIN_MODE(root) || permtest) { 653 if (list_empty(&root->base.profiles)) 657 aa_put_profile(root); 671 name = new_compound_name(root->base.hname, hats[0]); 672 aa_put_profile(root); 682 aa_put_profile(root); [all...] |
/security/apparmor/include/ |
H A D | policy.h | 238 struct aa_namespace *aa_find_namespace(struct aa_namespace *root,
|
/security/ |
H A D | Kconfig | 87 correctly. This level of protection requires a root of trust outside
|
H A D | capability.c | 323 static int cap_path_chroot(struct path *root) argument
|
/security/selinux/ |
H A D | hooks.c | 419 struct dentry *root = sb->s_root; local 420 struct inode *root_inode = root->d_inode; 426 the root directory. -ENODATA is ok, as this may be 435 rc = root_inode->i_op->getxattr(root, XATTR_NAME_SELINUX, NULL, 0); 461 /* Initialize the root inode. */ 462 rc = inode_doinit_with_dentry(root_inode, root); 562 struct inode *root = sbsec->sb->s_root->d_inode; local 563 struct inode_security_struct *isec = root->i_security;
|
/security/keys/ |
H A D | keyring.c | 672 * Start from the root node of the index tree. Because of the way the 674 * branch of the root node (root slot 0) or in the root node itself. 675 * Non-keyrings avoid the leftmost branch of the root entirely (root 678 ptr = ACCESS_ONCE(keyring->keys.root); 683 /* If the root is a shortcut, either the keyring only contains 684 * keyring pointers (everything clusters behind root slot 0) or 777 /* If we've ascended to the root (zer [all...] |
/security/smack/ |
H A D | smack_lsm.c | 547 struct dentry *root = sb->s_root; local 548 struct inode *inode = root->d_inode; 614 * Unprivileged mounts get root and default from the caller. 621 * Initialize the root inode. 3029 * If this is the root inode the superblock 3031 * If that is the case use the root value out
|
Completed in 89 milliseconds