Lines Matching refs:profiles

10  * AppArmor policy is based around profiles, which contain the rules a
13 * visible set of profiles or by following a profiles attachment rules.
16 * visible profiles. Each namespace contains a special "unconfined" profile,
29 * null-XXXX-YYYY - special automatically generated learning profiles
33 * user-XXXX - user defined profiles
39 * The namespace contains the set of visible profiles that are considered
41 * the namespace so that for example a chroot can have its own set of profiles
44 * - it allows for sub profiles or hats, which allows an application to run
50 * - it allows for binary hierarchy of profiles, so that execution history
101 * __add_profile - add a profiles to list and label tree
161 __aa_profile_list_release(&profile->base.profiles);
169 * __aa_profile_list_release - remove all profiles on the list and put refs
170 * @head: list of profiles (NOT NULL)
215 /* free children profiles */
340 profile = __find_child(&parent->base.profiles, name);
371 profile = __strn_find_child(&policy->profiles, hname,
404 profile = __strn_find_child(&base->profiles, hname,
415 return __strn_find_child(&base->profiles, hname, n);
497 * null profiles are added to the profile list but the list does not
552 p = __find_child(&parent->base.profiles, bname);
557 __add_profile(&parent->base.profiles, profile);
745 if (!list_empty(&old->base.profiles)) {
747 list_splice_init_rcu(&old->base.profiles, &lh, synchronize_rcu);
753 p = __find_child(&new->base.profiles, child->base.name);
765 list_add_rcu(&child->base.list, &new->base.profiles);
875 /* ensure that profiles are all for the same ns
876 * TODO: update locking to remove this constaint. All profiles in
1033 lh = &parent->base.profiles;
1035 lh = &ns->base.profiles;
1061 /* audit status that rest of profiles in the atomic set failed too */