Lines Matching refs:profiles
10 * AppArmor policy is based around profiles, which contain the rules a
13 * visible set of profiles or by following a profiles attachment rules.
16 * visible profiles. Each namespace contains a special "unconfined" profile,
29 * null-XXXX-YYYY - special automatically generated learning profiles
33 * user-XXXX - user defined profiles
39 * The namespace contains the set of visible profiles that are considered
41 * the namespace so that for example a chroot can have its own set of profiles
44 * - it allows for sub profiles or hats, which allows an application to run
50 * - it allows for binary hierarchy of profiles, so that execution history
102 * __add_profile - add a profiles to list and label tree
162 __aa_profile_list_release(&profile->base.profiles);
170 * __aa_profile_list_release - remove all profiles on the list and put refs
171 * @head: list of profiles (NOT NULL)
252 /* free children profiles */
385 profile = __find_child(&parent->base.profiles, name);
416 profile = __strn_find_child(&policy->profiles, hname,
438 * place holder profiles.
455 profile = __strn_find_child(&policy->profiles, hname,
498 profile = __strn_find_child(&base->profiles, hname,
509 return __strn_find_child(&base->profiles, hname, n);
632 * null profiles are added to the profile list but the list does not
678 p = __find_child(&parent->base.profiles, bname);
683 __add_profile(&parent->base.profiles, profile);
921 if (!list_empty(&old->base.profiles)) {
923 list_splice_init_rcu(&old->base.profiles, &lh, synchronize_rcu);
929 p = __find_child(&new->base.profiles, child->base.name);
941 list_add_rcu(&child->base.list, &new->base.profiles);
1051 /* ensure that profiles are all for the same ns
1052 * TODO: update locking to remove this constaint. All profiles in
1232 lh = &parent->base.profiles;
1234 lh = &ns->base.profiles;
1260 /* audit status that rest of profiles in the atomic set failed too */