Lines Matching refs:root
54 * policy symlink in the root of the securityfs apparmor/ directory.
1132 * several root files and
2078 * @root: root namespace to stop search at (NOT NULL)
2081 * Find the next namespace from @ns under @root and handle all locking needed
2084 * Returns: next namespace or NULL if at last namespace under @root
2086 * NOTE: will not unlock root->lock
2088 static struct aa_ns *__next_ns(struct aa_ns *root, struct aa_ns *ns)
2092 AA_BUG(!root);
2094 AA_BUG(ns != root && !mutex_is_locked(&ns->parent->lock));
2105 while (ns != root) {
2121 * @root: namespace that is root of profiles being displayed (NOT NULL)
2127 static struct aa_profile *__first_profile(struct aa_ns *root,
2130 AA_BUG(!root);
2133 for (; ns; ns = __next_ns(root, ns)) {
2184 * @root: root namespace (NOT NULL)
2189 static struct aa_profile *next_profile(struct aa_ns *root,
2197 return __first_profile(root, __next_ns(root, profile->ns));
2212 struct aa_ns *root = aa_get_current_ns();
2214 f->private = root;
2217 mutex_lock_nested(&root->lock, root->level);
2218 profile = __first_profile(root, root);
2222 profile = next_profile(root, profile);
2256 struct aa_ns *root = f->private, *ns;
2259 for (ns = profile->ns; ns && ns != root; ns = ns->parent)
2262 mutex_unlock(&root->lock);
2263 aa_put_ns(root);
2276 struct aa_ns *root = f->private;
2278 aa_label_seq_xprint(f, root, &profile->label,