Lines Matching refs:profile
33 struct aa_profile *profile;
55 * @profile: profile being tested for confinement (NOT NULL)
64 static int audit_caps(struct apparmor_audit_data *ad, struct aa_profile *profile,
67 struct aa_ruleset *rules = list_first_entry(&profile->rules,
76 if (likely((AUDIT_MODE(profile) != AUDIT_ALL) &&
80 } else if (KILL_MODE(profile) ||
84 AUDIT_MODE(profile) != AUDIT_NOQUIET &&
85 AUDIT_MODE(profile) != AUDIT_ALL) {
92 if (profile == ent->profile && cap_raised(ent->caps, cap)) {
94 if (COMPLAIN_MODE(profile))
98 aa_put_profile(ent->profile);
99 ent->profile = aa_get_profile(profile);
104 return aa_audit(type, profile, ad, audit_cb);
108 * profile_capable - test if profile allows use of capability @cap
109 * @profile: profile being enforced (NOT NULL, NOT unconfined)
116 static int profile_capable(struct aa_profile *profile, int cap,
119 struct aa_ruleset *rules = list_first_entry(&profile->rules,
130 if (!COMPLAIN_MODE(profile))
138 return audit_caps(ad, profile, cap, error);
148 * Look up capability in profile capability set.
155 struct aa_profile *profile;
161 error = fn_for_each_confined(label, profile,
162 profile_capable(profile, cap, opts, &ad));