Lines Matching refs:ad
74 struct apparmor_audit_data *ad = aad(sa); in audit_net_cb() local
82 if (sock_type_names[ad->net.type]) in audit_net_cb()
84 sock_type_names[ad->net.type]); in audit_net_cb()
87 ad->net.type); in audit_net_cb()
88 audit_log_format(ab, " protocol=%d", ad->net.protocol); in audit_net_cb()
90 if (ad->request & NET_PERMS_MASK) { in audit_net_cb()
92 aa_audit_perm_mask(ab, ad->request, NULL, 0, in audit_net_cb()
95 if (ad->denied & NET_PERMS_MASK) { in audit_net_cb()
97 aa_audit_perm_mask(ab, ad->denied, NULL, 0, in audit_net_cb()
101 if (ad->peer) { in audit_net_cb()
103 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in audit_net_cb()
110 struct apparmor_audit_data *ad, u32 request, u16 family, in aa_profile_af_perm() argument
135 return aa_check_perms(profile, &perms, request, ad, audit_net_cb); in aa_profile_af_perm()
142 DEFINE_AUDIT_NET(ad, op, NULL, family, type, protocol); in aa_af_perm()
145 aa_profile_af_perm(profile, &ad, request, family, in aa_af_perm()
162 DEFINE_AUDIT_SK(ad, op, sk); in aa_label_sk_perm()
164 ad.subj_cred = subj_cred; in aa_label_sk_perm()
166 aa_profile_af_sk_perm(profile, &ad, request, sk)); in aa_label_sk_perm()
222 struct apparmor_audit_data *ad) in aa_secmark_perm() argument
253 return aa_check_perms(profile, &perms, request, ad, audit_net_cb); in aa_secmark_perm()
260 DEFINE_AUDIT_SK(ad, op, sk); in apparmor_secmark_check()
264 &ad)); in apparmor_secmark_check()