Lines Matching full:subject

958 	const struct landlock_cred_security *const subject =  in current_check_access_path()  local
963 if (!subject) in current_check_access_path()
966 access_request = landlock_init_layer_masks(subject->domain, in current_check_access_path()
969 if (is_access_to_paths_allowed(subject->domain, path, access_request, in current_check_access_path()
974 landlock_log_denial(subject, &request); in current_check_access_path()
1135 const struct landlock_cred_security *const subject = in current_check_refer_path() local
1145 if (!subject) in current_check_refer_path()
1172 subject->domain, in current_check_refer_path()
1175 if (is_access_to_paths_allowed(subject->domain, new_dir, in current_check_refer_path()
1181 landlock_log_denial(subject, &request1); in current_check_refer_path()
1202 allow_parent1 = collect_domain_accesses(subject->domain, mnt_dir.dentry, in current_check_refer_path()
1205 allow_parent2 = collect_domain_accesses(subject->domain, mnt_dir.dentry, in current_check_refer_path()
1219 subject->domain, &mnt_dir, access_request_parent1, in current_check_refer_path()
1227 landlock_log_denial(subject, &request1); in current_check_refer_path()
1231 landlock_log_denial(subject, &request2); in current_check_refer_path()
1377 log_fs_change_topology_path(const struct landlock_cred_security *const subject, in log_fs_change_topology_path() argument
1380 landlock_log_denial(subject, &(struct landlock_request) { in log_fs_change_topology_path()
1391 const struct landlock_cred_security *const subject, size_t handle_layer, in log_fs_change_topology_dentry() argument
1394 landlock_log_denial(subject, &(struct landlock_request) { in log_fs_change_topology_dentry()
1427 const struct landlock_cred_security *const subject = in hook_sb_mount() local
1431 if (!subject) in hook_sb_mount()
1434 log_fs_change_topology_path(subject, handle_layer, path); in hook_sb_mount()
1442 const struct landlock_cred_security *const subject = in hook_move_mount() local
1446 if (!subject) in hook_move_mount()
1449 log_fs_change_topology_path(subject, handle_layer, to_path); in hook_move_mount()
1460 const struct landlock_cred_security *const subject = in hook_sb_umount() local
1464 if (!subject) in hook_sb_umount()
1467 log_fs_change_topology_dentry(subject, handle_layer, mnt->mnt_root); in hook_sb_umount()
1474 const struct landlock_cred_security *const subject = in hook_sb_remount() local
1478 if (!subject) in hook_sb_remount()
1481 log_fs_change_topology_dentry(subject, handle_layer, sb->s_root); in hook_sb_remount()
1497 const struct landlock_cred_security *const subject = in hook_sb_pivotroot() local
1501 if (!subject) in hook_sb_pivotroot()
1504 log_fs_change_topology_path(subject, handle_layer, new_path); in hook_sb_pivotroot()
1621 const struct landlock_cred_security *const subject = in hook_file_open() local
1625 if (!subject) in hook_file_open()
1646 subject->domain, &file->f_path, in hook_file_open()
1647 landlock_init_layer_masks(subject->domain, in hook_file_open()
1687 landlock_log_denial(subject, &request); in hook_file_open()