Lines Matching +full:in +full:- +full:masks

1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * Landlock LSM - Ruleset management
5 * Copyright © 2016-2020 Mickaël Salaün <[email protected]>
6 * Copyright © 2018-2020 ANSSI
24 * struct landlock_layer - Access rights for a given layer
28 * @level: Position of this layer in the layer stack.
39 * union landlock_key - Key of a ruleset's red-black tree
47 * @data: Raw data to identify an arbitrary 32-bit value
54 * enum landlock_key_type - Type of &union landlock_key
70 * struct landlock_id - Unique rule identifier for a ruleset
85 * struct landlock_rule - Access rights tied to an object
89 * @node: Node in the ruleset's red-black tree.
101 * @num_layers: Number of entries in @layers.
112 * struct landlock_hierarchy - Node in a ruleset hierarchy
128 * struct landlock_ruleset - Landlock ruleset
135 * @root_inode: Root of a red-black tree containing &struct
144 * @root_net_port: Root of a red-black tree containing &struct
178 * @num_rules: Number of non-overlapping (i.e. not for
179 * the same object) rules in this ruleset.
183 * @num_layers: Number of layers that are used in this
186 * non-merged ruleset (i.e. not a domain).
192 * A domain saves all layers of merged rulesets in a
196 * (i.e. future-proof), and to properly handle merged
232 refcount_inc(&ruleset->usage); in landlock_get_ruleset()
236 * landlock_union_access_masks - Return all access rights handled in the
241 * Returns: an access_masks result of the OR of all the domain's access masks.
249 for (layer_level = 0; layer_level < domain->num_layers; layer_level++) { in landlock_union_access_masks()
251 .masks = domain->access_masks[layer_level], in landlock_union_access_masks()
257 return matches.masks; in landlock_union_access_masks()
261 * landlock_get_applicable_domain - Return @domain if it applies to (handles)
263 * in @masks
266 * @masks: access masks
268 * Returns: @domain if any access rights specified in @masks is handled, or
273 const struct access_masks masks) in landlock_get_applicable_domain() argument
276 .masks = masks, in landlock_get_applicable_domain()
283 merge.masks = landlock_union_access_masks(domain); in landlock_get_applicable_domain()
297 /* Should already be checked in sys_landlock_create_ruleset(). */ in landlock_add_fs_access_mask()
299 ruleset->access_masks[layer_level].fs |= fs_mask; in landlock_add_fs_access_mask()
309 /* Should already be checked in sys_landlock_create_ruleset(). */ in landlock_add_net_access_mask()
311 ruleset->access_masks[layer_level].net |= net_mask; in landlock_add_net_access_mask()
320 /* Should already be checked in sys_landlock_create_ruleset(). */ in landlock_add_scope_mask()
322 ruleset->access_masks[layer_level].scope |= mask; in landlock_add_scope_mask()
330 return ruleset->access_masks[layer_level].fs | in landlock_get_fs_access_mask()
338 return ruleset->access_masks[layer_level].net; in landlock_get_net_access_mask()
345 return ruleset->access_masks[layer_level].scope; in landlock_get_scope_mask()