Lines Matching refs:profile
57 * @profile: profile being tested for confinement (NOT NULL)
66 static int audit_caps(struct apparmor_audit_data *ad, struct aa_profile *profile,
71 struct aa_ruleset *rules = list_first_entry(&profile->rules,
80 if (likely((AUDIT_MODE(profile) != AUDIT_ALL) &&
84 } else if (KILL_MODE(profile) ||
88 AUDIT_MODE(profile) != AUDIT_NOQUIET &&
89 AUDIT_MODE(profile) != AUDIT_ALL) {
99 if (COMPLAIN_MODE(profile))
109 return aa_audit(type, profile, ad, audit_cb);
113 * profile_capable - test if profile allows use of capability @cap
114 * @profile: profile being enforced (NOT NULL, NOT unconfined)
121 static int profile_capable(struct aa_profile *profile, int cap,
124 struct aa_ruleset *rules = list_first_entry(&profile->rules,
135 if (!COMPLAIN_MODE(profile))
143 return audit_caps(ad, profile, cap, error);
153 * Look up capability in profile capability set.
160 struct aa_profile *profile;
166 error = fn_for_each_confined(label, profile,
167 profile_capable(profile, cap, opts, &ad));