Lines Matching refs:sa
45 struct common_audit_data *sa = va;
47 if (aad(sa)->request & AA_PTRACE_PERM_MASK) {
49 audit_ptrace_mask(aad(sa)->request));
51 if (aad(sa)->denied & AA_PTRACE_PERM_MASK) {
53 audit_ptrace_mask(aad(sa)->denied));
57 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer,
65 struct common_audit_data *sa)
69 aad(sa)->peer = peer;
73 return aa_check_perms(profile, &perms, request, sa, audit_ptrace_cb);
78 struct common_audit_data *sa)
84 return profile_ptrace_perm(tracee, tracer, request, sa);
89 struct common_audit_data *sa)
95 return profile_ptrace_perm(tracer, tracee, request, sa);
101 aad(sa)->label = &tracer->label;
102 aad(sa)->peer = tracee;
103 aad(sa)->request = 0;
104 aad(sa)->error = aa_capable(&tracer->label, CAP_SYS_PTRACE,
107 return aa_audit(AUDIT_APPARMOR_AUTO, tracer, sa, audit_ptrace_cb);
123 DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, OP_PTRACE);
126 profile_tracer_perm(profile, tracee, request, &sa),
127 profile_tracee_perm(profile, tracer, xrequest, &sa));
164 struct common_audit_data *sa = va;
166 if (aad(sa)->request & AA_SIGNAL_PERM_MASK) {
168 audit_signal_mask(aad(sa)->request));
169 if (aad(sa)->denied & AA_SIGNAL_PERM_MASK) {
171 audit_signal_mask(aad(sa)->denied));
174 if (aad(sa)->signal == SIGUNKNOWN)
176 aad(sa)->unmappedsig);
177 else if (aad(sa)->signal < MAXMAPPED_SIGNAME)
178 audit_log_format(ab, " signal=%s", sig_names[aad(sa)->signal]);
181 aad(sa)->signal - SIGRT_BASE);
183 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer,
189 struct common_audit_data *sa)
198 aad(sa)->peer = peer;
202 aad(sa)->signal);
205 return aa_check_perms(profile, &perms, request, sa, audit_signal_cb);
211 DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, OP_SIGNAL);
213 aad(&sa)->signal = map_signal_num(sig);
214 aad(&sa)->unmappedsig = sig;
216 profile_signal_perm(profile, target, MAY_WRITE, &sa),
217 profile_signal_perm(profile, sender, MAY_READ, &sa));