Searched refs:profiles (Results 1 – 8 of 8) sorted by relevance
/security/apparmor/ |
D | policy.c | 161 __aa_profile_list_release(&profile->base.profiles); in __remove_profile() 339 profile = __find_child(&parent->base.profiles, name); in aa_find_child() 370 profile = __strn_find_child(&policy->profiles, hname, in __lookup_parent() 403 profile = __strn_find_child(&base->profiles, hname, in __lookupn_profile() 414 return __strn_find_child(&base->profiles, hname, n); in __lookupn_profile() 551 p = __find_child(&parent->base.profiles, bname); in aa_new_null_profile() 556 __add_profile(&parent->base.profiles, profile); in aa_new_null_profile() 744 if (!list_empty(&old->base.profiles)) { in __replace_profile() 746 list_splice_init_rcu(&old->base.profiles, &lh, synchronize_rcu); in __replace_profile() 752 p = __find_child(&new->base.profiles, child->base.name); in __replace_profile() [all …]
|
D | apparmorfs.c | 1424 list_for_each_entry(child, &profile->base.profiles, base.list) in __aafs_profile_rmdir() 1672 list_for_each_entry(child, &profile->base.profiles, base.list) { in __aafs_profile_mkdir() 1810 list_for_each_entry(child, &ns->base.profiles, base.list) in __aafs_ns_rmdir() 1936 list_for_each_entry(child, &ns->base.profiles, base.list) { in __aafs_ns_mkdir() 2023 if (!list_empty(&ns->base.profiles)) in __first_profile() 2024 return list_first_entry(&ns->base.profiles, in __first_profile() 2047 if (!list_empty(&p->base.profiles)) in __next_profile() 2048 return list_first_entry(&p->base.profiles, typeof(*p), in __next_profile() 2056 if (!list_entry_is_head(p, &parent->base.profiles, base.list)) in __next_profile() 2065 if (!list_entry_is_head(p, &ns->base.profiles, base.list)) in __next_profile()
|
D | lib.c | 509 INIT_LIST_HEAD(&policy->profiles); in aa_policy_init() 520 AA_BUG(on_list_rcu(&policy->profiles)); in aa_policy_destroy()
|
D | Kconfig | 19 bool "Enable introspection of sha1 hashes for loaded profiles"
|
D | domain.c | 579 new = find_attach(bprm, ns, &profile->base.profiles, in x_to_label() 583 new = find_attach(bprm, ns, &ns->base.profiles, in x_to_label() 650 &profile->ns->base.profiles, name, &info); in profile_transition() 1110 if (!list_empty(&profile->base.profiles)) { in change_hat()
|
D | policy_ns.c | 337 __aa_profile_list_release(&ns->base.profiles); in destroy_ns()
|
D | label.c | 384 on_list_rcu(&label->vec[0]->base.profiles)); in aa_label_kref()
|
/security/apparmor/include/ |
D | lib.h | 132 struct list_head profiles; member
|