/security/apparmor/ |
D | ipc.c | 47 if (aad(sa)->request & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 49 audit_ptrace_mask(aad(sa)->request)); in audit_ptrace_cb() 51 if (aad(sa)->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 53 audit_ptrace_mask(aad(sa)->denied)); in audit_ptrace_cb() 57 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in audit_ptrace_cb() 69 aad(sa)->peer = peer; in profile_ptrace_perm() 101 aad(sa)->label = &tracer->label; in profile_tracer_perm() 102 aad(sa)->peer = tracee; in profile_tracer_perm() 103 aad(sa)->request = 0; in profile_tracer_perm() 104 aad(sa)->error = aa_capable(&tracer->label, CAP_SYS_PTRACE, in profile_tracer_perm() [all …]
|
D | audit.c | 61 aa_audit_type[aad(sa)->type]); in audit_pre() 64 if (aad(sa)->op) { in audit_pre() 65 audit_log_format(ab, " operation=\"%s\"", aad(sa)->op); in audit_pre() 68 if (aad(sa)->info) { in audit_pre() 69 audit_log_format(ab, " info=\"%s\"", aad(sa)->info); in audit_pre() 70 if (aad(sa)->error) in audit_pre() 71 audit_log_format(ab, " error=%d", aad(sa)->error); in audit_pre() 74 if (aad(sa)->label) { in audit_pre() 75 struct aa_label *label = aad(sa)->label; in audit_pre() 94 if (aad(sa)->name) { in audit_pre() [all …]
|
D | file.c | 48 if (aad(sa)->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() 50 map_mask_to_chr_mask(aad(sa)->request)); in file_audit_cb() 53 if (aad(sa)->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 55 map_mask_to_chr_mask(aad(sa)->denied)); in file_audit_cb() 58 if (aad(sa)->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() 62 from_kuid(&init_user_ns, aad(sa)->fs.ouid)); in file_audit_cb() 65 if (aad(sa)->peer) { in file_audit_cb() 67 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in file_audit_cb() 69 } else if (aad(sa)->fs.target) { in file_audit_cb() 71 audit_log_untrustedstring(ab, aad(sa)->fs.target); in file_audit_cb() [all …]
|
D | resource.c | 35 rlim_names[aad(sa)->rlim.rlim], aad(sa)->rlim.max); in audit_cb() 36 if (aad(sa)->peer) { in audit_cb() 38 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in audit_cb() 58 aad(&sa)->rlim.rlim = resource; in audit_resource() 59 aad(&sa)->rlim.max = value; in audit_resource() 60 aad(&sa)->peer = peer; in audit_resource() 61 aad(&sa)->info = info; in audit_resource() 62 aad(&sa)->error = error; in audit_resource()
|
D | net.c | 81 if (sock_type_names[aad(sa)->net.type]) in audit_net_cb() 83 sock_type_names[aad(sa)->net.type]); in audit_net_cb() 86 aad(sa)->net.type); in audit_net_cb() 87 audit_log_format(ab, " protocol=%d", aad(sa)->net.protocol); in audit_net_cb() 89 if (aad(sa)->request & NET_PERMS_MASK) { in audit_net_cb() 91 aa_audit_perm_mask(ab, aad(sa)->request, NULL, 0, in audit_net_cb() 94 if (aad(sa)->denied & NET_PERMS_MASK) { in audit_net_cb() 96 aa_audit_perm_mask(ab, aad(sa)->denied, NULL, 0, in audit_net_cb() 100 if (aad(sa)->peer) { in audit_net_cb() 102 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in audit_net_cb()
|
D | lib.c | 129 aad(&sa)->info = str; in aa_info_message() 266 if (aad(sa)->request) { in aa_audit_perms_cb() 268 aa_audit_perm_mask(ab, aad(sa)->request, aa_file_perm_chrs, in aa_audit_perms_cb() 272 if (aad(sa)->denied) { in aa_audit_perms_cb() 274 aa_audit_perm_mask(ab, aad(sa)->denied, aa_file_perm_chrs, in aa_audit_perms_cb() 279 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in aa_audit_perms_cb() 401 aad(sa)->label = &profile->label; in aa_profile_label_perm() 402 aad(sa)->peer = &target->label; in aa_profile_label_perm() 403 aad(sa)->request = request; in aa_profile_label_perm() 463 aad(sa)->label = &profile->label; in aa_check_perms() [all …]
|
D | mount.c | 90 if (aad(sa)->mnt.type) { in audit_cb() 92 audit_log_untrustedstring(ab, aad(sa)->mnt.type); in audit_cb() 94 if (aad(sa)->mnt.src_name) { in audit_cb() 96 audit_log_untrustedstring(ab, aad(sa)->mnt.src_name); in audit_cb() 98 if (aad(sa)->mnt.trans) { in audit_cb() 100 audit_log_untrustedstring(ab, aad(sa)->mnt.trans); in audit_cb() 102 if (aad(sa)->mnt.flags) { in audit_cb() 104 audit_mnt_flags(ab, aad(sa)->mnt.flags); in audit_cb() 107 if (aad(sa)->mnt.data) { in audit_cb() 109 audit_log_untrustedstring(ab, aad(sa)->mnt.data); in audit_cb() [all …]
|
D | policy_unpack.c | 82 if (aad(sa)->iface.ns) { in audit_cb() 84 audit_log_untrustedstring(ab, aad(sa)->iface.ns); in audit_cb() 86 if (aad(sa)->name) { in audit_cb() 88 audit_log_untrustedstring(ab, aad(sa)->name); in audit_cb() 90 if (aad(sa)->iface.pos) in audit_cb() 91 audit_log_format(ab, " offset=%ld", aad(sa)->iface.pos); in audit_cb() 112 aad(&sa)->iface.pos = e->pos - e->start; in audit_iface() 113 aad(&sa)->iface.ns = ns_name; in audit_iface() 115 aad(&sa)->name = new->base.hname; in audit_iface() 117 aad(&sa)->name = name; in audit_iface() [all …]
|
D | capability.c | 70 aad(sa)->error = error; in audit_caps() 131 aad(sa)->info = "optional: no audit"; in profile_capable()
|
D | policy.c | 601 if (aad(sa)->iface.ns) { in audit_cb() 603 audit_log_untrustedstring(ab, aad(sa)->iface.ns); in audit_cb() 624 aad(&sa)->iface.ns = ns_name; in audit_policy() 625 aad(&sa)->name = name; in audit_policy() 626 aad(&sa)->info = info; in audit_policy() 627 aad(&sa)->error = error; in audit_policy() 628 aad(&sa)->label = label; in audit_policy()
|
D | lsm.c | 680 aad(&sa)->label = begin_current_label_crit_section(); in apparmor_setprocattr() 681 aad(&sa)->info = name; in apparmor_setprocattr() 682 aad(&sa)->error = error = -EINVAL; in apparmor_setprocattr() 684 end_current_label_crit_section(aad(&sa)->label); in apparmor_setprocattr()
|
/security/apparmor/include/ |
D | audit.h | 157 #define aad(SA) ((SA)->apparmor_audit_data) macro 175 aad((SA))->error = (ERROR); \ 177 aad((SA))->error; \
|
D | net.h | 64 aad(&NAME)->net.type = (T); \ 65 aad(&NAME)->net.protocol = (P)
|