@@ -984,7 +984,7 @@ static int current_check_access_path(const struct path *const path,
984984 NULL , 0 , NULL , NULL , NULL , NULL ))
985985 return 0 ;
986986
987- landlock_log_denial (subject , & request , & rule_flags );
987+ landlock_log_denial (subject , & request , rule_flags );
988988 return - EACCES ;
989989}
990990
@@ -1194,7 +1194,7 @@ static int current_check_refer_path(struct dentry *const old_dentry,
11941194 & request1 , NULL , 0 , NULL , NULL , NULL , NULL ))
11951195 return 0 ;
11961196
1197- landlock_log_denial (subject , & request1 , & rule_flags_parent1 );
1197+ landlock_log_denial (subject , & request1 , rule_flags_parent1 );
11981198 return - EACCES ;
11991199 }
12001200
@@ -1243,13 +1243,11 @@ static int current_check_refer_path(struct dentry *const old_dentry,
12431243
12441244 if (request1 .access ) {
12451245 request1 .audit .u .path .dentry = old_parent ;
1246- landlock_log_denial (subject , & request1 ,
1247- & rule_flags_parent1 );
1246+ landlock_log_denial (subject , & request1 , rule_flags_parent1 );
12481247 }
12491248 if (request2 .access ) {
12501249 request2 .audit .u .path .dentry = new_dir -> dentry ;
1251- landlock_log_denial (subject , & request2 ,
1252- & rule_flags_parent2 );
1250+ landlock_log_denial (subject , & request2 , rule_flags_parent2 );
12531251 }
12541252
12551253 /*
@@ -1405,7 +1403,7 @@ log_fs_change_topology_path(const struct landlock_cred_security *const subject,
14051403 .u .path = * path ,
14061404 },
14071405 .layer_plus_one = handle_layer + 1 ,
1408- }, NULL );
1406+ }, no_rule_flags );
14091407}
14101408
14111409static void log_fs_change_topology_dentry (
@@ -1419,7 +1417,7 @@ static void log_fs_change_topology_dentry(
14191417 .u .dentry = dentry ,
14201418 },
14211419 .layer_plus_one = handle_layer + 1 ,
1422- }, NULL );
1420+ }, no_rule_flags );
14231421}
14241422
14251423/*
@@ -1707,7 +1705,7 @@ static int hook_file_open(struct file *const file)
17071705
17081706 /* Sets access to reflect the actual request. */
17091707 request .access = open_access_request ;
1710- landlock_log_denial (subject , & request , & rule_flags );
1708+ landlock_log_denial (subject , & request , rule_flags );
17111709 return - EACCES ;
17121710}
17131711
@@ -1737,7 +1735,7 @@ static int hook_file_truncate(struct file *const file)
17371735#ifdef CONFIG_AUDIT
17381736 .deny_masks = landlock_file (file )-> deny_masks ,
17391737#endif /* CONFIG_AUDIT */
1740- }, NULL );
1738+ }, no_rule_flags );
17411739 return - EACCES ;
17421740}
17431741
@@ -1776,7 +1774,7 @@ static int hook_file_ioctl_common(const struct file *const file,
17761774#ifdef CONFIG_AUDIT
17771775 .deny_masks = landlock_file (file )-> deny_masks ,
17781776#endif /* CONFIG_AUDIT */
1779- }, NULL );
1777+ }, no_rule_flags );
17801778 return - EACCES ;
17811779}
17821780
0 commit comments