Lines Matching refs:profile
165 int aa_do_perms(struct aa_profile *profile, struct aa_policydb *policy, in aa_do_perms() argument
171 AA_BUG(!profile); in aa_do_perms()
178 aa_apply_modes_to_perms(profile, &perms); in aa_do_perms()
179 return aa_check_perms(profile, &perms, request, ad, in aa_do_perms()
250 int aa_profile_af_perm(struct aa_profile *profile, in aa_profile_af_perm() argument
254 struct aa_ruleset *rules = profile->label.rules[0]; in aa_profile_af_perm()
260 AA_BUG(profile_unconfined(profile)); in aa_profile_af_perm()
262 if (profile_unconfined(profile)) in aa_profile_af_perm()
269 return aa_do_perms(profile, rules->policy, state, request, p, ad); in aa_profile_af_perm()
275 struct aa_profile *profile; in aa_af_perm() local
278 return fn_for_each_confined(label, profile, in aa_af_perm()
279 aa_profile_af_perm(profile, &ad, request, family, in aa_af_perm()
295 struct aa_profile *profile; in aa_label_sk_perm() local
299 error = fn_for_each_confined(label, profile, in aa_label_sk_perm()
300 aa_profile_af_sk_perm(profile, &ad, request, sk)); in aa_label_sk_perm()
359 static int aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid, in aa_secmark_perm() argument
364 struct aa_ruleset *rules = profile->label.rules[0]; in aa_secmark_perm()
388 aa_apply_modes_to_perms(profile, &perms); in aa_secmark_perm()
390 return aa_check_perms(profile, &perms, request, ad, audit_net_cb); in aa_secmark_perm()
396 struct aa_profile *profile; in apparmor_secmark_check() local
399 return fn_for_each_confined(label, profile, in apparmor_secmark_check()
400 aa_secmark_perm(profile, request, secid, in apparmor_secmark_check()