Lines Matching refs:ad
74 struct apparmor_audit_data *ad = aad(sa);
82 if (sock_type_names[ad->net.type])
84 sock_type_names[ad->net.type]);
87 ad->net.type);
88 audit_log_format(ab, " protocol=%d", ad->net.protocol);
90 if (ad->request & NET_PERMS_MASK) {
92 aa_audit_perm_mask(ab, ad->request, NULL, 0,
95 if (ad->denied & NET_PERMS_MASK) {
97 aa_audit_perm_mask(ab, ad->denied, NULL, 0,
101 if (ad->peer) {
103 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer,
110 struct apparmor_audit_data *ad, u32 request, u16 family,
135 return aa_check_perms(profile, &perms, request, ad, audit_net_cb);
142 DEFINE_AUDIT_NET(ad, op, NULL, family, type, protocol);
145 aa_profile_af_perm(profile, &ad, request, family,
162 DEFINE_AUDIT_SK(ad, op, sk);
164 ad.subj_cred = subj_cred;
166 aa_profile_af_sk_perm(profile, &ad, request, sk));
222 struct apparmor_audit_data *ad)
253 return aa_check_perms(profile, &perms, request, ad, audit_net_cb);
260 DEFINE_AUDIT_SK(ad, op, sk);
264 &ad));