Lines Matching refs:ad

48 	struct apparmor_audit_data *ad = aad(sa);  in file_audit_cb()  local
49 kuid_t fsuid = ad->subj_cred ? ad->subj_cred->fsuid : current_fsuid(); in file_audit_cb()
52 if (ad->request & AA_AUDIT_FILE_MASK) { in file_audit_cb()
54 map_mask_to_chr_mask(ad->request)); in file_audit_cb()
57 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb()
59 map_mask_to_chr_mask(ad->denied)); in file_audit_cb()
62 if (ad->request & AA_AUDIT_FILE_MASK) { in file_audit_cb()
66 from_kuid(&init_user_ns, ad->fs.ouid)); in file_audit_cb()
69 if (ad->peer) { in file_audit_cb()
71 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in file_audit_cb()
73 } else if (ad->fs.target) { in file_audit_cb()
75 audit_log_untrustedstring(ab, ad->fs.target); in file_audit_cb()
102 DEFINE_AUDIT_DATA(ad, LSM_AUDIT_DATA_TASK, AA_CLASS_FILE, op); in aa_audit_file()
104 ad.subj_cred = subj_cred; in aa_audit_file()
105 ad.request = request; in aa_audit_file()
106 ad.name = name; in aa_audit_file()
107 ad.fs.target = target; in aa_audit_file()
108 ad.peer = tlabel; in aa_audit_file()
109 ad.fs.ouid = ouid; in aa_audit_file()
110 ad.info = info; in aa_audit_file()
111 ad.error = error; in aa_audit_file()
112 ad.common.u.tsk = NULL; in aa_audit_file()
114 if (likely(!ad.error)) { in aa_audit_file()
121 ad.request &= mask; in aa_audit_file()
123 if (likely(!ad.request)) in aa_audit_file()
128 ad.request = ad.request & ~perms->allow; in aa_audit_file()
129 AA_BUG(!ad.request); in aa_audit_file()
131 if (ad.request & perms->kill) in aa_audit_file()
135 if ((ad.request & perms->quiet) && in aa_audit_file()
138 ad.request &= ~perms->quiet; in aa_audit_file()
140 if (!ad.request) in aa_audit_file()
141 return ad.error; in aa_audit_file()
144 ad.denied = ad.request & ~perms->allow; in aa_audit_file()
145 return aa_audit(type, profile, &ad, file_audit_cb); in aa_audit_file()