Lines Matching refs:profiles

15  * AppArmor policy is based around profiles, which contain the rules a
18 * visible set of profiles or by following a profiles attachment rules.
21 * visible profiles. Each namespace contains a special "unconfined" profile,
34 * null-XXXX-YYYY - special automatically generated learning profiles
38 * user-XXXX - user defined profiles
44 * The namespace contains the set of visible profiles that are considered
46 * the namespace so that for example a chroot can have its own set of profiles
49 * - it allows for sub profiles or hats, which allows an application to run
55 * - it allows for binary hierarchy of profiles, so that execution history
144 INIT_LIST_HEAD(&policy->profiles);
155 /* still contains profiles -- invalid */
156 if (on_list_rcu(&policy->profiles)) {
158 "policy '%s' still contains profiles\n",
462 __profile_list_release(&profile->base.profiles);
470 * __profile_list_release - remove all profiles on the list and put refs
471 * @head: list of profiles (NOT NULL)
494 /* release all profiles in this namespace */
495 __profile_list_release(&ns->base.profiles);
597 /* free children profiles */
682 * null profiles are added to the profile list but the list does not
715 __list_add_profile(&parent->base.profiles, profile);
769 profile = aa_get_profile(__find_child(&parent->base.profiles, name));
799 profile = __strn_find_child(&policy->profiles, hname,
830 profile = __strn_find_child(&base->profiles, hname,
840 profile = __find_child(&base->profiles, hname);
982 if (!list_empty(&old->base.profiles)) {
984 list_splice_init_rcu(&old->base.profiles, &lh, synchronize_rcu);
990 p = __find_child(&new->base.profiles, child->base.name);
1002 list_add_rcu(&child->base.list, &new->base.profiles);
1197 __list_add_profile(&parent->base.profiles, ent->new);
1202 __list_add_profile(&ns->base.profiles, ent->new);