Lines Matching full:subject

957 	const struct landlock_cred_security *const subject =  in current_check_access_path()  local
962 if (!subject) in current_check_access_path()
965 access_request = landlock_init_layer_masks(subject->domain, in current_check_access_path()
968 if (is_access_to_paths_allowed(subject->domain, path, access_request, in current_check_access_path()
973 landlock_log_denial(subject, &request); in current_check_access_path()
1134 const struct landlock_cred_security *const subject = in current_check_refer_path() local
1144 if (!subject) in current_check_refer_path()
1171 subject->domain, in current_check_refer_path()
1174 if (is_access_to_paths_allowed(subject->domain, new_dir, in current_check_refer_path()
1180 landlock_log_denial(subject, &request1); in current_check_refer_path()
1201 allow_parent1 = collect_domain_accesses(subject->domain, mnt_dir.dentry, in current_check_refer_path()
1204 allow_parent2 = collect_domain_accesses(subject->domain, mnt_dir.dentry, in current_check_refer_path()
1218 subject->domain, &mnt_dir, access_request_parent1, in current_check_refer_path()
1226 landlock_log_denial(subject, &request1); in current_check_refer_path()
1230 landlock_log_denial(subject, &request2); in current_check_refer_path()
1376 log_fs_change_topology_path(const struct landlock_cred_security *const subject, in log_fs_change_topology_path() argument
1379 landlock_log_denial(subject, &(struct landlock_request) { in log_fs_change_topology_path()
1390 const struct landlock_cred_security *const subject, size_t handle_layer, in log_fs_change_topology_dentry() argument
1393 landlock_log_denial(subject, &(struct landlock_request) { in log_fs_change_topology_dentry()
1426 const struct landlock_cred_security *const subject = in hook_sb_mount() local
1430 if (!subject) in hook_sb_mount()
1433 log_fs_change_topology_path(subject, handle_layer, path); in hook_sb_mount()
1441 const struct landlock_cred_security *const subject = in hook_move_mount() local
1445 if (!subject) in hook_move_mount()
1448 log_fs_change_topology_path(subject, handle_layer, to_path); in hook_move_mount()
1459 const struct landlock_cred_security *const subject = in hook_sb_umount() local
1463 if (!subject) in hook_sb_umount()
1466 log_fs_change_topology_dentry(subject, handle_layer, mnt->mnt_root); in hook_sb_umount()
1473 const struct landlock_cred_security *const subject = in hook_sb_remount() local
1477 if (!subject) in hook_sb_remount()
1480 log_fs_change_topology_dentry(subject, handle_layer, sb->s_root); in hook_sb_remount()
1496 const struct landlock_cred_security *const subject = in hook_sb_pivotroot() local
1500 if (!subject) in hook_sb_pivotroot()
1503 log_fs_change_topology_path(subject, handle_layer, new_path); in hook_sb_pivotroot()
1620 const struct landlock_cred_security *const subject = in hook_file_open() local
1624 if (!subject) in hook_file_open()
1645 subject->domain, &file->f_path, in hook_file_open()
1646 landlock_init_layer_masks(subject->domain, in hook_file_open()
1686 landlock_log_denial(subject, &request); in hook_file_open()