Lines Matching full:sa
73 struct common_audit_data *sa = va; in audit_net_cb() local
75 if (address_family_names[sa->u.net->family]) in audit_net_cb()
77 address_family_names[sa->u.net->family]); in audit_net_cb()
80 sa->u.net->family); in audit_net_cb()
81 if (sock_type_names[aad(sa)->net.type]) in audit_net_cb()
83 sock_type_names[aad(sa)->net.type]); in audit_net_cb()
86 aad(sa)->net.type); in audit_net_cb()
87 audit_log_format(ab, " protocol=%d", aad(sa)->net.protocol); in audit_net_cb()
89 if (aad(sa)->request & NET_PERMS_MASK) { in audit_net_cb()
91 aa_audit_perm_mask(ab, aad(sa)->request, NULL, 0, in audit_net_cb()
94 if (aad(sa)->denied & NET_PERMS_MASK) { in audit_net_cb()
96 aa_audit_perm_mask(ab, aad(sa)->denied, NULL, 0, in audit_net_cb()
100 if (aad(sa)->peer) { in audit_net_cb()
102 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in audit_net_cb()
108 int aa_profile_af_perm(struct aa_profile *profile, struct common_audit_data *sa, in aa_profile_af_perm() argument
131 return aa_check_perms(profile, &perms, request, sa, audit_net_cb); in aa_profile_af_perm()
138 DEFINE_AUDIT_NET(sa, op, NULL, family, type, protocol); in aa_af_perm()
141 aa_profile_af_perm(profile, &sa, request, family, in aa_af_perm()
155 DEFINE_AUDIT_SK(sa, op, sk); in aa_label_sk_perm()
158 aa_profile_af_sk_perm(profile, &sa, request, sk)); in aa_label_sk_perm()
214 struct common_audit_data *sa, struct sock *sk) in aa_secmark_perm() argument
243 return aa_check_perms(profile, &perms, request, sa, audit_net_cb); in aa_secmark_perm()
250 DEFINE_AUDIT_SK(sa, op, sk); in apparmor_secmark_check()
254 &sa, sk)); in apparmor_secmark_check()