Lines Matching refs:sa

73 	struct common_audit_data *sa = va;  in audit_net_cb()  local
76 if (address_family_names[sa->u.net->family]) in audit_net_cb()
77 audit_log_string(ab, address_family_names[sa->u.net->family]); in audit_net_cb()
79 audit_log_format(ab, "\"unknown(%d)\"", sa->u.net->family); in audit_net_cb()
81 if (sock_type_names[aad(sa)->net.type]) in audit_net_cb()
82 audit_log_string(ab, sock_type_names[aad(sa)->net.type]); in audit_net_cb()
84 audit_log_format(ab, "\"unknown(%d)\"", aad(sa)->net.type); in audit_net_cb()
85 audit_log_format(ab, " protocol=%d", aad(sa)->net.protocol); in audit_net_cb()
87 if (aad(sa)->request & NET_PERMS_MASK) { in audit_net_cb()
89 aa_audit_perm_mask(ab, aad(sa)->request, NULL, 0, in audit_net_cb()
92 if (aad(sa)->denied & NET_PERMS_MASK) { in audit_net_cb()
94 aa_audit_perm_mask(ab, aad(sa)->denied, NULL, 0, in audit_net_cb()
98 if (aad(sa)->peer) { in audit_net_cb()
100 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in audit_net_cb()
106 int aa_profile_af_perm(struct aa_profile *profile, struct common_audit_data *sa, in aa_profile_af_perm() argument
129 return aa_check_perms(profile, &perms, request, sa, audit_net_cb); in aa_profile_af_perm()
136 DEFINE_AUDIT_NET(sa, op, NULL, family, type, protocol); in aa_af_perm()
139 aa_profile_af_perm(profile, &sa, request, family, in aa_af_perm()
153 DEFINE_AUDIT_SK(sa, op, sk); in aa_label_sk_perm()
156 aa_profile_af_sk_perm(profile, &sa, request, sk)); in aa_label_sk_perm()
212 struct common_audit_data *sa, struct sock *sk) in aa_secmark_perm() argument
241 return aa_check_perms(profile, &perms, request, sa, audit_net_cb); in aa_secmark_perm()
248 DEFINE_AUDIT_SK(sa, op, sk); in apparmor_secmark_check()
252 &sa, sk)); in apparmor_secmark_check()