Searched refs:access_mask_t (Results 1 – 13 of 13) sorted by relevance
| /linux/security/landlock/ |
| H A D | ruleset.h | 37 access_mask_t access; 193 landlock_create_ruleset(const access_mask_t access_mask_fs, 194 const access_mask_t access_mask_net, 195 const access_mask_t scope_mask); 205 const access_mask_t access); 248 const access_mask_t fs_access_mask, in landlock_add_fs_access_mask() 251 access_mask_t fs_mask = fs_access_mask & LANDLOCK_MASK_ACCESS_FS; in landlock_add_fs_access_mask() 260 const access_mask_t net_access_mask, in landlock_add_net_access_mask() 263 access_mask_t net_mask = net_access_mask & LANDLOCK_MASK_ACCESS_NET; in landlock_add_net_access_mask() 272 const access_mask_t scope_mask, const u16 layer_level) in landlock_add_scope_mask() [all …]
|
| H A D | access.h | 37 typedef u16 access_mask_t; typedef 40 static_assert(BITS_PER_TYPE(access_mask_t) >= LANDLOCK_NUM_ACCESS_FS); 42 static_assert(BITS_PER_TYPE(access_mask_t) >= LANDLOCK_NUM_ACCESS_NET); 44 static_assert(BITS_PER_TYPE(access_mask_t) >= LANDLOCK_NUM_SCOPE); 46 static_assert(sizeof(unsigned long) >= sizeof(access_mask_t)); 50 access_mask_t fs : LANDLOCK_NUM_ACCESS_FS; 51 access_mask_t net : LANDLOCK_NUM_ACCESS_NET; 52 access_mask_t scope : LANDLOCK_NUM_SCOPE; 76 access_mask_t access[LANDLOCK_MAX_NUM_LAYERS]; 117 static inline bool access_mask_subset(access_mask_t subset, in access_mask_subset() [all …]
|
| H A D | domain.c | 136 get_layer_deny_mask(const access_mask_t all_existing_optional_access, in get_layer_deny_mask() 182 landlock_get_deny_masks(const access_mask_t all_existing_optional_access, in landlock_get_deny_masks() 183 const access_mask_t optional_access, in landlock_get_deny_masks() 189 access_mask_t all_denied = 0; in landlock_get_deny_masks() 202 const access_mask_t denied = masks->access[i] & optional_access; in landlock_get_deny_masks() 209 8 * sizeof(access_mask_t)) { in landlock_get_deny_masks()
|
| H A D | audit.c | 89 const access_mask_t access) in log_blockers() 185 access_mask_t *const access_request, in get_denied_layer() 214 access_mask_t access; in test_get_denied_layer() 246 get_layer_from_deny_masks(access_mask_t *const access_request, in get_layer_from_deny_masks() 247 const access_mask_t all_existing_optional_access, in get_layer_from_deny_masks() 252 access_mask_t missing = 0; in get_layer_from_deny_masks() 261 BITS_PER_TYPE(access_mask_t)) { in get_layer_from_deny_masks() 286 access_mask_t access; in test_get_layer_from_deny_masks() 365 access_mask_t missing; in landlock_log_denial()
|
| H A D | ruleset.c | 57 landlock_create_ruleset(const access_mask_t fs_access_mask, in landlock_create_ruleset() 58 const access_mask_t net_access_mask, in landlock_create_ruleset() 59 const access_mask_t scope_mask) in landlock_create_ruleset() 306 const access_mask_t access) in landlock_insert_rule() 660 typedef access_mask_t 678 access_mask_t 680 const access_mask_t access_request, in landlock_init_layer_masks() 684 access_mask_t handled_accesses = 0; in landlock_init_layer_masks() 708 const access_mask_t handled = get_access_mask(domain, i); in landlock_init_layer_masks()
|
| H A D | fs.c | 325 access_mask_t access_rights) in landlock_append_fs_rule() 412 access_mask_t child_access = src_parent->access[i] & in may_refer() 414 access_mask_t parent_access = new_parent->access[i]; in may_refer() 575 static bool scope_to_request(const access_mask_t access_request, in scope_to_request() 640 const access_mask_t access_request) in is_eacces() 744 const access_mask_t access_request_parent1, in is_access_to_paths_allowed() 748 const access_mask_t access_request_parent2, in is_access_to_paths_allowed() 756 access_mask_t access_masked_parent1, access_masked_parent2; in is_access_to_paths_allowed() 947 access_mask_t access_request) in current_check_access_path() 972 static __attribute_const__ access_mask_t get_mode_access(const umode_t mode) in get_mode_access() [all …]
|
| H A D | net.c | 23 const u16 port, access_mask_t access_rights) in landlock_append_net_rule() 47 access_mask_t access_request) in current_check_access_socket() 215 access_mask_t access_request; in hook_socket_bind() 230 access_mask_t access_request; in hook_socket_connect()
|
| H A D | net.h | 19 const u16 port, access_mask_t access_rights); 27 access_mask_t access_rights) in landlock_append_net_rule()
|
| H A D | audit.h | 43 access_mask_t access; 49 const access_mask_t all_existing_optional_access;
|
| H A D | fs.h | 58 access_mask_t allowed_access; 129 access_mask_t access_hierarchy);
|
| H A D | domain.h | 123 landlock_get_deny_masks(const access_mask_t all_existing_optional_access, 124 const access_mask_t optional_access,
|
| H A D | syscalls.c | 323 access_mask_t mask; in add_rule_path_beneath() 360 access_mask_t mask; in add_rule_net_port()
|
| H A D | task.c | 181 access_mask_t scope) in domain_is_scoped()
|