Lines Matching refs:ad
117 struct apparmor_audit_data *ad = aad(sa); in audit_net_cb() local
119 if (address_family_names[ad->common.u.net->family]) in audit_net_cb()
121 address_family_names[ad->common.u.net->family]); in audit_net_cb()
124 ad->common.u.net->family); in audit_net_cb()
125 if (sock_type_names[ad->net.type]) in audit_net_cb()
127 sock_type_names[ad->net.type]); in audit_net_cb()
130 ad->net.type); in audit_net_cb()
131 audit_log_format(ab, " protocol=%d", ad->net.protocol); in audit_net_cb()
133 if (ad->request & NET_PERMS_MASK) { in audit_net_cb()
135 aa_audit_perm_mask(ab, ad->request, NULL, 0, in audit_net_cb()
138 if (ad->denied & NET_PERMS_MASK) { in audit_net_cb()
140 aa_audit_perm_mask(ab, ad->denied, NULL, 0, in audit_net_cb()
144 if (ad->common.u.net->family == PF_UNIX) { in audit_net_cb()
145 if (ad->net.addr || !ad->common.u.net->sk) in audit_net_cb()
147 unix_addr(ad->net.addr), in audit_net_cb()
148 ad->net.addrlen); in audit_net_cb()
150 audit_unix_sk_addr(ab, "addr", ad->common.u.net->sk); in audit_net_cb()
151 if (ad->request & NET_PEER_MASK) { in audit_net_cb()
153 unix_addr(ad->net.peer.addr), in audit_net_cb()
154 ad->net.peer.addrlen); in audit_net_cb()
157 if (ad->peer) { in audit_net_cb()
159 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in audit_net_cb()
167 struct aa_perms *p, struct apparmor_audit_data *ad) in aa_do_perms() argument
179 return aa_check_perms(profile, &perms, request, ad, in aa_do_perms()
251 struct apparmor_audit_data *ad, u32 request, u16 family, in aa_profile_af_perm() argument
268 protocol, &p, &ad->info); in aa_profile_af_perm()
269 return aa_do_perms(profile, rules->policy, state, request, p, ad); in aa_profile_af_perm()
276 DEFINE_AUDIT_NET(ad, op, subj_cred, NULL, family, type, protocol); in aa_af_perm()
279 aa_profile_af_perm(profile, &ad, request, family, in aa_af_perm()
296 DEFINE_AUDIT_SK(ad, op, subj_cred, sk); in aa_label_sk_perm()
298 ad.subj_cred = subj_cred; in aa_label_sk_perm()
300 aa_profile_af_sk_perm(profile, &ad, request, sk)); in aa_label_sk_perm()
360 struct apparmor_audit_data *ad) in aa_secmark_perm() argument
390 return aa_check_perms(profile, &perms, request, ad, audit_net_cb); in aa_secmark_perm()
397 DEFINE_AUDIT_SK(ad, op, NULL, sk); in apparmor_secmark_check()
401 &ad)); in apparmor_secmark_check()