Lines Matching refs:root
53 * policy symlink in the root of the securityfs apparmor/ directory.
1128 * several root files and
2060 * @root: root namespace to stop search at (NOT NULL)
2063 * Find the next namespace from @ns under @root and handle all locking needed
2066 * Returns: next namespace or NULL if at last namespace under @root
2068 * NOTE: will not unlock root->lock
2070 static struct aa_ns *__next_ns(struct aa_ns *root, struct aa_ns *ns)
2074 AA_BUG(!root);
2076 AA_BUG(ns != root && !mutex_is_locked(&ns->parent->lock));
2087 while (ns != root) {
2103 * @root: namespace that is root of profiles being displayed (NOT NULL)
2109 static struct aa_profile *__first_profile(struct aa_ns *root,
2112 AA_BUG(!root);
2115 for (; ns; ns = __next_ns(root, ns)) {
2166 * @root: root namespace (NOT NULL)
2171 static struct aa_profile *next_profile(struct aa_ns *root,
2179 return __first_profile(root, __next_ns(root, profile->ns));
2194 struct aa_ns *root = aa_get_current_ns();
2196 f->private = root;
2199 mutex_lock_nested(&root->lock, root->level);
2200 profile = __first_profile(root, root);
2204 profile = next_profile(root, profile);
2238 struct aa_ns *root = f->private, *ns;
2241 for (ns = profile->ns; ns && ns != root; ns = ns->parent)
2244 mutex_unlock(&root->lock);
2245 aa_put_ns(root);
2258 struct aa_ns *root = f->private;
2260 aa_label_seq_xprint(f, root, &profile->label,