Lines Matching refs:sk
98 const struct sock *sk) in audit_unix_sk_addr() argument
100 const struct unix_sock *u = unix_sk(sk); in audit_unix_sk_addr()
145 if (ad->net.addr || !ad->common.u.net->sk) in audit_net_cb()
150 audit_unix_sk_addr(ab, "addr", ad->common.u.net->sk); in audit_net_cb()
286 struct sock *sk) in aa_label_sk_perm() argument
288 struct aa_sk_ctx *ctx = aa_sock(sk); in aa_label_sk_perm()
292 AA_BUG(!sk); in aa_label_sk_perm()
296 DEFINE_AUDIT_SK(ad, op, subj_cred, sk); in aa_label_sk_perm()
300 aa_profile_af_sk_perm(profile, &ad, request, sk)); in aa_label_sk_perm()
306 int aa_sk_perm(const char *op, u32 request, struct sock *sk) in aa_sk_perm() argument
311 AA_BUG(!sk); in aa_sk_perm()
316 error = aa_label_sk_perm(current_cred(), label, op, request, sk); in aa_sk_perm()
330 AA_BUG(!sock->sk); in aa_sock_file_perm()
332 if (sock->sk->sk_family == PF_UNIX) in aa_sock_file_perm()
334 return aa_label_sk_perm(subj_cred, label, op, request, sock->sk); in aa_sock_file_perm()
394 u32 secid, const struct sock *sk) in apparmor_secmark_check() argument
397 DEFINE_AUDIT_SK(ad, op, NULL, sk); in apparmor_secmark_check()