Lines Matching refs:ad
47 struct apparmor_audit_data *ad = aad(sa);
48 kuid_t fsuid = ad->subj_cred ? ad->subj_cred->fsuid : current_fsuid();
51 if (ad->request & AA_AUDIT_FILE_MASK) {
53 map_mask_to_chr_mask(ad->request));
56 if (ad->denied & AA_AUDIT_FILE_MASK) {
58 map_mask_to_chr_mask(ad->denied));
61 if (ad->request & AA_AUDIT_FILE_MASK) {
65 from_kuid(&init_user_ns, ad->fs.ouid));
68 if (ad->peer) {
70 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer,
72 } else if (ad->fs.target) {
74 audit_log_untrustedstring(ab, ad->fs.target);
101 DEFINE_AUDIT_DATA(ad, LSM_AUDIT_DATA_TASK, AA_CLASS_FILE, op);
103 ad.subj_cred = subj_cred;
104 ad.request = request;
105 ad.name = name;
106 ad.fs.target = target;
107 ad.peer = tlabel;
108 ad.fs.ouid = ouid;
109 ad.info = info;
110 ad.error = error;
111 ad.common.u.tsk = NULL;
113 if (likely(!ad.error)) {
120 ad.request &= mask;
122 if (likely(!ad.request))
127 ad.request = ad.request & ~perms->allow;
128 AA_BUG(!ad.request);
130 if (ad.request & perms->kill)
134 if ((ad.request & perms->quiet) &&
137 ad.request &= ~perms->quiet;
139 if (!ad.request)
140 return ad.error;
143 ad.denied = ad.request & ~perms->allow;
144 return aa_audit(type, profile, &ad, file_audit_cb);