Lines Matching full:access

15 #include "access.h"
89 const access_mask_t access) in log_blockers() argument
91 const unsigned long access_mask = access; in log_blockers()
95 for_each_set_bit(access_bit, &access_mask, BITS_PER_TYPE(access)) { in log_blockers()
188 for (ssize_t i = ARRAY_SIZE(masks->access) - 1; i >= 0; i--) { in get_denied_layer()
189 if (masks->access[i] & *access_request) { in get_denied_layer()
190 *access_request &= masks->access[i]; in get_denied_layer()
208 .access[0] = LANDLOCK_ACCESS_FS_EXECUTE | in test_get_denied_layer()
210 .access[1] = LANDLOCK_ACCESS_FS_READ_FILE | in test_get_denied_layer()
212 .access[2] = LANDLOCK_ACCESS_FS_REMOVE_DIR, in test_get_denied_layer()
214 access_mask_t access; in test_get_denied_layer() local
216 access = LANDLOCK_ACCESS_FS_EXECUTE; in test_get_denied_layer()
217 KUNIT_EXPECT_EQ(test, 0, get_denied_layer(&dom, &access, &masks)); in test_get_denied_layer()
218 KUNIT_EXPECT_EQ(test, access, LANDLOCK_ACCESS_FS_EXECUTE); in test_get_denied_layer()
220 access = LANDLOCK_ACCESS_FS_READ_FILE; in test_get_denied_layer()
221 KUNIT_EXPECT_EQ(test, 1, get_denied_layer(&dom, &access, &masks)); in test_get_denied_layer()
222 KUNIT_EXPECT_EQ(test, access, LANDLOCK_ACCESS_FS_READ_FILE); in test_get_denied_layer()
224 access = LANDLOCK_ACCESS_FS_READ_DIR; in test_get_denied_layer()
225 KUNIT_EXPECT_EQ(test, 1, get_denied_layer(&dom, &access, &masks)); in test_get_denied_layer()
226 KUNIT_EXPECT_EQ(test, access, LANDLOCK_ACCESS_FS_READ_DIR); in test_get_denied_layer()
228 access = LANDLOCK_ACCESS_FS_READ_FILE | LANDLOCK_ACCESS_FS_READ_DIR; in test_get_denied_layer()
229 KUNIT_EXPECT_EQ(test, 1, get_denied_layer(&dom, &access, &masks)); in test_get_denied_layer()
230 KUNIT_EXPECT_EQ(test, access, in test_get_denied_layer()
234 access = LANDLOCK_ACCESS_FS_EXECUTE | LANDLOCK_ACCESS_FS_READ_DIR; in test_get_denied_layer()
235 KUNIT_EXPECT_EQ(test, 1, get_denied_layer(&dom, &access, &masks)); in test_get_denied_layer()
236 KUNIT_EXPECT_EQ(test, access, LANDLOCK_ACCESS_FS_READ_DIR); in test_get_denied_layer()
238 access = LANDLOCK_ACCESS_FS_WRITE_FILE; in test_get_denied_layer()
239 KUNIT_EXPECT_EQ(test, 4, get_denied_layer(&dom, &access, &masks)); in test_get_denied_layer()
240 KUNIT_EXPECT_EQ(test, access, 0); in test_get_denied_layer()
286 access_mask_t access; in test_get_layer_from_deny_masks() local
291 access = LANDLOCK_ACCESS_FS_TRUNCATE; in test_get_layer_from_deny_masks()
293 get_layer_from_deny_masks(&access, in test_get_layer_from_deny_masks()
296 KUNIT_EXPECT_EQ(test, access, LANDLOCK_ACCESS_FS_TRUNCATE); in test_get_layer_from_deny_masks()
298 access = LANDLOCK_ACCESS_FS_TRUNCATE | LANDLOCK_ACCESS_FS_IOCTL_DEV; in test_get_layer_from_deny_masks()
300 get_layer_from_deny_masks(&access, in test_get_layer_from_deny_masks()
303 KUNIT_EXPECT_EQ(test, access, LANDLOCK_ACCESS_FS_IOCTL_DEV); in test_get_layer_from_deny_masks()
308 access = LANDLOCK_ACCESS_FS_TRUNCATE; in test_get_layer_from_deny_masks()
310 get_layer_from_deny_masks(&access, in test_get_layer_from_deny_masks()
313 KUNIT_EXPECT_EQ(test, access, LANDLOCK_ACCESS_FS_TRUNCATE); in test_get_layer_from_deny_masks()
315 access = LANDLOCK_ACCESS_FS_TRUNCATE | LANDLOCK_ACCESS_FS_IOCTL_DEV; in test_get_layer_from_deny_masks()
317 get_layer_from_deny_masks(&access, in test_get_layer_from_deny_masks()
320 KUNIT_EXPECT_EQ(test, access, in test_get_layer_from_deny_masks()
332 if (WARN_ON_ONCE(!(!!request->layer_plus_one ^ !!request->access))) in is_valid_request()
335 if (request->access) { in is_valid_request()
374 missing = request->access; in landlock_log_denial()
398 * Consistently keeps track of the number of denied access requests in landlock_log_denial()