Lines Matching +full:auto +full:- +full:switching
1 // SPDX-License-Identifier: GPL-2.0-only
7 * Copyright (C) 1998-2008 Novell/SUSE
8 * Copyright 2009-2010 Canonical Ltd.
36 "AUTO"
81 * user auditing, - send user auditing to netlink interface
86 * audit_pre() - core AppArmor function.
98 aa_audit_type[ad->type]);
101 if (ad->op)
102 audit_log_format(ab, " operation=\"%s\"", ad->op);
104 if (ad->class)
106 ad->class <= AA_CLASS_LAST ?
107 aa_class_names[ad->class] :
110 if (ad->info) {
111 audit_log_format(ab, " info=\"%s\"", ad->info);
112 if (ad->error)
113 audit_log_format(ab, " error=%d", ad->error);
116 if (ad->subj_label) {
117 struct aa_label *label = ad->subj_label;
122 if (profile->ns != root_ns) {
125 profile->ns->base.hname);
128 audit_log_untrustedstring(ab, profile->base.hname);
136 if (ad->name) {
138 audit_log_untrustedstring(ab, ad->name);
143 * aa_audit_msg - Log a message to the audit subsystem
151 ad->type = type;
152 common_lsm_audit(&ad->common, audit_pre, cb);
156 * aa_audit - Log a profile based audit event to the audit subsystem
162 * Handle default message switching based off of audit mode flags
173 if (likely(!ad->error)) {
185 return ad->error;
190 ad->subj_label = &profile->label;
194 if (ad->type == AUDIT_APPARMOR_KILL)
196 ad->common.type == LSM_AUDIT_DATA_TASK &&
197 ad->common.u.tsk ? ad->common.u.tsk : current);
199 if (ad->type == AUDIT_APPARMOR_ALLOWED)
200 return complain_error(ad->error);
202 return ad->error;
214 if (!IS_ERR(rule->label))
215 aa_put_label(rule->label);
227 return -EINVAL;
230 return -EINVAL;
236 return -ENOMEM;
239 rule->label = aa_label_parse(&root_ns->unconfined->label, rulestr,
241 if (IS_ERR(rule->label)) {
242 int err = PTR_ERR(rule->label);
255 for (i = 0; i < rule->field_count; i++) {
256 struct audit_field *f = &rule->fields[i];
258 switch (f->type) {
273 label = prop->apparmor.label;
276 return -ENOENT;
278 if (aa_label_is_subset(label, rule->label))