Lines Matching refs:sa
73 struct common_audit_data *sa = va;
75 if (address_family_names[sa->u.net->family])
77 address_family_names[sa->u.net->family]);
80 sa->u.net->family);
81 if (sock_type_names[aad(sa)->net.type])
83 sock_type_names[aad(sa)->net.type]);
86 aad(sa)->net.type);
87 audit_log_format(ab, " protocol=%d", aad(sa)->net.protocol);
89 if (aad(sa)->request & NET_PERMS_MASK) {
91 aa_audit_perm_mask(ab, aad(sa)->request, NULL, 0,
94 if (aad(sa)->denied & NET_PERMS_MASK) {
96 aa_audit_perm_mask(ab, aad(sa)->denied, NULL, 0,
100 if (aad(sa)->peer) {
102 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer,
108 int aa_profile_af_perm(struct aa_profile *profile, struct common_audit_data *sa,
131 return aa_check_perms(profile, &perms, request, sa, audit_net_cb);
138 DEFINE_AUDIT_NET(sa, op, NULL, family, type, protocol);
141 aa_profile_af_perm(profile, &sa, request, family,
155 DEFINE_AUDIT_SK(sa, op, sk);
158 aa_profile_af_sk_perm(profile, &sa, request, sk));
214 struct common_audit_data *sa, struct sock *sk)
243 return aa_check_perms(profile, &perms, request, sa, audit_net_cb);
250 DEFINE_AUDIT_SK(sa, op, sk);
254 &sa, sk));