Lines Matching defs:profile

29  * aa_split_fqname - split a fqname into a profile and namespace name
30 * @fqname: a full qualified name in namespace profile format (NOT NULL)
33 * Returns: profile name or NULL if one is not specified
35 * Split a namespace name from a profile name (see policy.c for naming
57 /* a ns name without a following profile is allowed */
109 /* a ns name without a following profile is allowed */
121 * aa_info_message - log a none profile related status message
284 * aa_apply_modes_to_perms - apply namespace and profile flags to perms
285 * @profile: that perms where computed from
288 * TODO: split into profile and ns based flags for when accumulating perms
290 void aa_apply_modes_to_perms(struct aa_profile *profile, struct aa_perms *perms)
292 switch (AUDIT_MODE(profile)) {
307 if (KILL_MODE(profile))
309 else if (COMPLAIN_MODE(profile))
313 * else if (PROMPT_MODE(profile))
381 void aa_profile_match_label(struct aa_profile *profile, struct aa_label *label,
387 state = aa_dfa_next(profile->policy.dfa,
388 profile->policy.start[AA_CLASS_LABEL],
390 aa_label_match(profile, label, state, false, request, perms);
395 int aa_profile_label_perm(struct aa_profile *profile, struct aa_profile *target,
401 aad(sa)->label = &profile->label;
405 aa_profile_match_label(profile, &target->label, type, request, &perms);
406 aa_apply_modes_to_perms(profile, &perms);
408 return aa_check_perms(profile, &perms, request, sa, aa_audit_perms_cb);
413 * @profile: profile being checked
422 * Note: profile audit modes need to be set before calling by setting the
429 int aa_check_perms(struct aa_profile *profile, struct aa_perms *perms,
463 aad(sa)->label = &profile->label;