Lines Matching refs:aad

70 	if (sa->aad->fs.request & AA_AUDIT_FILE_MASK) {  in file_audit_cb()
72 audit_file_mask(ab, sa->aad->fs.request); in file_audit_cb()
74 if (sa->aad->fs.denied & AA_AUDIT_FILE_MASK) { in file_audit_cb()
76 audit_file_mask(ab, sa->aad->fs.denied); in file_audit_cb()
78 if (sa->aad->fs.request & AA_AUDIT_FILE_MASK) { in file_audit_cb()
82 from_kuid(&init_user_ns, sa->aad->fs.ouid)); in file_audit_cb()
85 if (sa->aad->fs.target) { in file_audit_cb()
87 audit_log_untrustedstring(ab, sa->aad->fs.target); in file_audit_cb()
112 struct apparmor_audit_data aad = {0,}; in aa_audit_file() local
114 sa.aad = &aad; in aa_audit_file()
115 aad.op = op, in aa_audit_file()
116 aad.fs.request = request; in aa_audit_file()
117 aad.name = name; in aa_audit_file()
118 aad.fs.target = target; in aa_audit_file()
119 aad.fs.ouid = ouid; in aa_audit_file()
120 aad.info = info; in aa_audit_file()
121 aad.error = error; in aa_audit_file()
123 if (likely(!sa.aad->error)) { in aa_audit_file()
130 sa.aad->fs.request &= mask; in aa_audit_file()
132 if (likely(!sa.aad->fs.request)) in aa_audit_file()
137 sa.aad->fs.request = sa.aad->fs.request & ~perms->allow; in aa_audit_file()
139 if (sa.aad->fs.request & perms->kill) in aa_audit_file()
143 if ((sa.aad->fs.request & perms->quiet) && in aa_audit_file()
146 sa.aad->fs.request &= ~perms->quiet; in aa_audit_file()
148 if (!sa.aad->fs.request) in aa_audit_file()
149 return COMPLAIN_MODE(profile) ? 0 : sa.aad->error; in aa_audit_file()
152 sa.aad->fs.denied = sa.aad->fs.request & ~perms->allow; in aa_audit_file()