Home
last modified time | relevance | path

Searched refs:root (Results 1 – 15 of 15) sorted by relevance

/security/apparmor/
Dpath.c120 struct path root; in d_namespace_path() local
121 get_fs_root(current->fs, &root); in d_namespace_path()
122 res = __d_path(path, &root, buf, buflen); in d_namespace_path()
123 path_put(&root); in d_namespace_path()
Dpolicy_ns.c162 struct aa_ns *aa_findn_ns(struct aa_ns *root, const char *name, size_t n) in aa_findn_ns() argument
167 ns = aa_get_ns(__aa_findn_ns(&root->sub_ns, name, n)); in aa_findn_ns()
183 struct aa_ns *aa_find_ns(struct aa_ns *root, const char *name) in aa_find_ns() argument
185 return aa_findn_ns(root, name, strlen(name)); in aa_find_ns()
Dapparmorfs.c1977 static struct aa_ns *__next_ns(struct aa_ns *root, struct aa_ns *ns) in __next_ns() argument
1981 AA_BUG(!root); in __next_ns()
1983 AA_BUG(ns != root && !mutex_is_locked(&ns->parent->lock)); in __next_ns()
1994 while (ns != root) { in __next_ns()
2016 static struct aa_profile *__first_profile(struct aa_ns *root, in __first_profile() argument
2019 AA_BUG(!root); in __first_profile()
2022 for (; ns; ns = __next_ns(root, ns)) { in __first_profile()
2078 static struct aa_profile *next_profile(struct aa_ns *root, in next_profile() argument
2086 return __first_profile(root, __next_ns(root, profile->ns)); in next_profile()
2101 struct aa_ns *root = aa_get_current_ns(); in p_start() local
[all …]
Ddomain.c1008 struct aa_profile *root, *hat = NULL; in build_change_hat() local
1013 root = aa_get_profile_rcu(&profile->parent); in build_change_hat()
1015 root = aa_get_profile(profile); in build_change_hat()
1022 hat = aa_find_child(root, name); in build_change_hat()
1034 aa_put_profile(root); in build_change_hat()
1056 struct aa_profile *profile, *root, *hat = NULL; in change_hat() local
1075 root = aa_get_profile_rcu(&profile->parent); in change_hat()
1077 root = aa_get_profile(profile); in change_hat()
1083 hat = aa_find_child(root, name); in change_hat()
1084 aa_put_profile(root); in change_hat()
Dlabel.c578 rb_erase(&label->node, &ls->root); in __label_remove()
613 rb_replace_node(&old->node, &new->node, &ls->root); in __label_replace()
647 new = &ls->root.rb_node; in __label_insert()
674 rb_insert_color(&label->node, &ls->root); in __label_insert()
700 node = vec_labelset(vec, n)->root.rb_node; in __vec_find()
1125 node = ls->root.rb_node; in __label_find_merge()
1960 for (node = rb_first(&ls->root); node; node = rb_first(&ls->root)) { in aa_labelset_destroy()
1980 ls->root = RB_ROOT; in aa_labelset_init()
/security/apparmor/include/
Dpolicy_ns.h90 struct aa_ns *aa_find_ns(struct aa_ns *root, const char *name);
91 struct aa_ns *aa_findn_ns(struct aa_ns *root, const char *name, size_t n);
96 struct aa_ns *aa_prepare_ns(struct aa_ns *root, const char *name);
Dlabel.h74 struct rb_root root; member
78 for ((N) = rb_first(&(LS)->root); (N); (N) = rb_next(N))
/security/
Dcommoncap.c375 uid_t root, mappedroot; in cap_inode_getsecurity() local
413 root = le32_to_cpu(nscap->rootid); in cap_inode_getsecurity()
414 kroot = make_kuid(fs_ns, root); in cap_inode_getsecurity()
780 kuid_t root, bool has_fcap) in nonroot_raised_pE() argument
786 (__is_eff(root, new) || __is_real(root, new)) && in nonroot_raised_pE()
789 __is_suid(root, new) && in nonroot_raised_pE()
DKconfig113 correctly. This level of protection requires a root of trust outside
/security/loadpin/
DKconfig11 have a root filesystem backed by a read-only device such as
/security/integrity/evm/
DKconfig54 When this option is enabled, root can add additional xattrs to the
/security/selinux/
Dhooks.c540 struct dentry *root = sb->s_root; in sb_finish_set_opts() local
541 struct inode *root_inode = d_backing_inode(root); in sb_finish_set_opts()
557 rc = __vfs_getxattr(root, root_inode, XATTR_NAME_SELINUX, NULL, in sb_finish_set_opts()
585 rc = inode_doinit_with_dentry(root_inode, root); in sb_finish_set_opts()
654 struct dentry *root = sbsec->sb->s_root; in selinux_set_mnt_opts() local
697 root_isec = backing_inode_security_novalidate(root); in selinux_set_mnt_opts()
1133 struct dentry *root = sbsec->sb->s_root; in selinux_sb_show_options() local
1134 struct inode_security_struct *isec = backing_inode_security(root); in selinux_sb_show_options()
/security/integrity/ima/
DKconfig144 This option allows the root user to see the current policy rules.
/security/keys/
Dkeyring.c736 ptr = READ_ONCE(keyring->keys.root); in search_nested_keyrings()
/security/smack/
Dsmack_lsm.c783 struct dentry *root = sb->s_root; in smack_set_mnt_opts() local
784 struct inode *inode = d_backing_inode(root); in smack_set_mnt_opts()