Searched refs:root (Results 1 – 9 of 9) sorted by relevance
/security/apparmor/ |
D | apparmorfs.c | 572 static struct aa_namespace *__next_namespace(struct aa_namespace *root, in __next_namespace() argument 586 while (ns != root) { in __next_namespace() 608 static struct aa_profile *__first_profile(struct aa_namespace *root, in __first_profile() argument 611 for (; ns; ns = __next_namespace(root, ns)) { in __first_profile() 665 static struct aa_profile *next_profile(struct aa_namespace *root, in next_profile() argument 673 return __first_profile(root, __next_namespace(root, profile->ns)); in next_profile() 688 struct aa_namespace *root = aa_current_profile()->ns; in p_start() local 690 f->private = aa_get_namespace(root); in p_start() 694 mutex_lock(&root->lock); in p_start() 695 profile = __first_profile(root, root); in p_start() [all …]
|
D | policy.c | 357 struct aa_namespace *aa_find_namespace(struct aa_namespace *root, in aa_find_namespace() argument 363 ns = aa_get_namespace(__aa_find_namespace(&root->sub_ns, name)); in aa_find_namespace() 377 struct aa_namespace *ns, *root; in aa_prepare_namespace() local 379 root = aa_current_profile()->ns; in aa_prepare_namespace() 381 mutex_lock(&root->lock); in aa_prepare_namespace() 386 ns = aa_get_namespace(root); in aa_prepare_namespace() 392 ns = aa_get_namespace(__aa_find_namespace(&root->sub_ns, name)); in aa_prepare_namespace() 394 ns = alloc_namespace(root->base.hname, name); in aa_prepare_namespace() 397 if (__aa_fs_namespace_mkdir(ns, ns_subns_dir(root), name)) { in aa_prepare_namespace() 404 ns->parent = aa_get_namespace(root); in aa_prepare_namespace() [all …]
|
D | path.c | 83 struct path root; in d_namespace_path() local 84 get_fs_root(current->fs, &root); in d_namespace_path() 85 res = __d_path(path, &root, buf, buflen); in d_namespace_path() 86 path_put(&root); in d_namespace_path()
|
D | domain.c | 637 struct aa_profile *root; in aa_change_hat() local 639 root = aa_get_profile_rcu(&profile->parent); in aa_change_hat() 641 root = aa_get_profile(profile); in aa_change_hat() 646 hat = aa_find_child(root, hats[i]); in aa_change_hat() 648 if (!COMPLAIN_MODE(root) || permtest) { in aa_change_hat() 649 if (list_empty(&root->base.profiles)) in aa_change_hat() 653 aa_put_profile(root); in aa_change_hat() 667 name = new_compound_name(root->base.hname, hats[0]); in aa_change_hat() 668 aa_put_profile(root); in aa_change_hat() 678 aa_put_profile(root); in aa_change_hat()
|
/security/apparmor/include/ |
D | policy.h | 238 struct aa_namespace *aa_find_namespace(struct aa_namespace *root,
|
/security/ |
D | Kconfig | 107 correctly. This level of protection requires a root of trust outside
|
/security/selinux/ |
D | hooks.c | 440 struct dentry *root = sb->s_root; in sb_finish_set_opts() local 441 struct inode *root_inode = d_backing_inode(root); in sb_finish_set_opts() 456 rc = root_inode->i_op->getxattr(root, XATTR_NAME_SELINUX, NULL, 0); in sb_finish_set_opts() 475 rc = inode_doinit_with_dentry(root_inode, root); in sb_finish_set_opts() 575 struct inode *root = d_backing_inode(sbsec->sb->s_root); in selinux_get_mnt_opts() local 576 struct inode_security_struct *isec = root->i_security; in selinux_get_mnt_opts()
|
/security/keys/ |
D | keyring.c | 670 ptr = ACCESS_ONCE(keyring->keys.root); in search_nested_keyrings()
|
/security/smack/ |
D | smack_lsm.c | 760 struct dentry *root = sb->s_root; in smack_set_mnt_opts() local 761 struct inode *inode = d_backing_inode(root); in smack_set_mnt_opts()
|