/linux-6.14.4/security/landlock/ |
D | task.c | 28 * domain_scope_le - Checks domain ordering for scoped ptrace 47 /* @parent is in the scoped hierarchy of @child. */ in domain_scope_le() 116 * domain_is_scoped - Checks if the client domain is scoped in the same 123 * Returns: True if the @client domain is scoped to access the @server, 124 * unless the @server is also scoped in the same domain as @client. 151 * parent domains are scoped. in domain_is_scoped() 170 * hierarchy. If the client is scoped, the request is in domain_is_scoped()
|
D | syscalls.c | 101 ruleset_size += sizeof(ruleset_attr.scoped); in build_check_abi() 232 if ((ruleset_attr.scoped | LANDLOCK_MASK_SCOPE) != LANDLOCK_MASK_SCOPE) in SYSCALL_DEFINE3() 238 ruleset_attr.scoped); in SYSCALL_DEFINE3()
|
D | access.h | 37 /* Makes sure all scoped rights can be stored. */
|
/linux-6.14.4/Documentation/userspace-api/ |
D | landlock.rst | 84 .scoped = 128 ruleset_attr.scoped &= ~(LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET | 320 interactions between sandboxes. Each Landlock domain can be explicitly scoped 330 not scoped. If a process's domain is scoped, it can only connect to sockets 332 Moreover, if a process is scoped to send signal to a non-scoped process, it can 336 scoped, meaning if the domain is scoped after the socket is connected, it can 341 A process with a scoped domain can inherit a socket created by a non-scoped 342 process. The process cannot connect to this socket since it has a scoped 345 IPC scoping does not support exceptions, so if a domain is scoped, no rules can 589 ``LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET`` to the ``scoped`` ruleset attribute. [all …]
|
/linux-6.14.4/include/linux/ |
D | kcsan-checks.h | 22 #define KCSAN_ACCESS_SCOPED (1 << 4) /* Access is a scoped access. */ 130 /* Scoped access information. */ 145 /* Location where scoped access was set up. */ 157 * kcsan_begin_scoped_access - begin scoped access 159 * Begin scoped access and initialize @sa, which will cause KCSAN to 163 * Scoped accesses are implemented by appending @sa to an internal list for the 177 * kcsan_end_scoped_access - end scoped access 179 * End a scoped access, which will stop KCSAN checking the memory range. 390 * Scoped variant of ASSERT_EXCLUSIVE_WRITER(). 457 * Scoped variant of ASSERT_EXCLUSIVE_ACCESS().
|
D | kcsan.h | 24 int disable_scoped; /* disable scoped access counter */ 52 /* List of scoped accesses; likely to be empty. */ 57 * Scoped access for modeling access reordering to detect missing memory
|
/linux-6.14.4/arch/powerpc/mm/book3s64/ |
D | radix_tlb.c | 66 /* Flush process scoped entries. */ in tlbiel_all_isa300() 108 prs = 1; /* process scoped */ in __tlbiel_pid() 122 prs = 1; /* process scoped */ in __tlbie_pid() 136 prs = 0; /* partition scoped */ in __tlbie_lpid() 150 prs = 1; /* process scoped */ in __tlbie_lpid_guest() 166 prs = 1; /* process scoped */ in __tlbiel_va() 182 prs = 1; /* process scoped */ in __tlbie_va() 198 prs = 0; /* partition scoped */ in __tlbie_lpid_va() 1146 * Flush partition scoped LPID address translation for all CPUs. 1159 * Flush partition scoped PWC from LPID for all CPUs. [all …]
|
/linux-6.14.4/samples/landlock/ |
D | sandboxer.c | 235 if (!(ruleset_attr->scoped & in check_ruleset_scope() 266 ruleset_attr->scoped &= ~LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET; in check_ruleset_scope() 268 ruleset_attr->scoped &= ~LANDLOCK_SCOPE_SIGNAL; in check_ruleset_scope() 351 .scoped = LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET | in main() 423 ruleset_attr.scoped &= ~(LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET | in main()
|
/linux-6.14.4/tools/testing/selftests/landlock/ |
D | scoped_signal_test.c | 77 * after getting scoped. 107 * domain is not scoped. in TEST_F() 169 * This test ensures that a scoped process cannot send signal out of 170 * scoped domain.
|
D | scoped_common.h | 17 .scoped = scope, in create_scoped_domain()
|
D | scoped_test.c | 24 .scoped = scoped_mask, in TEST()
|
D | scoped_abstract_unix_test.c | 70 * parent, when they have scoped domain or no domain. 166 * its child, when they have scoped domain or no domain. 302 * grand child processes when they can have scoped or non-scoped domains. 913 * the domain is not scoped. in TEST() 1002 /* Child's domain is scoped. */ in TEST()
|
D | sandbox-and-launch.c | 22 .scoped = LANDLOCK_SCOPE_SIGNAL, in main()
|
/linux-6.14.4/Documentation/security/ |
D | landlock.rst | 12 Landlock's goal is to create scoped access-control (i.e. sandboxing). To 45 sandboxed process shall retain their scoped accesses (at the time of resource
|
/linux-6.14.4/security/landlock/errata/ |
D | abi-6.h | 6 * Erratum 2: Scoped signal handling
|
/linux-6.14.4/include/uapi/linux/ |
D | openat2.h | 36 be scoped inside the dirfd
|
D | landlock.h | 48 * @scoped: Bitmask of scopes (cf. `Scope flags`_) 52 __u64 scoped; member
|
/linux-6.14.4/kernel/kcsan/ |
D | core.c | 212 /* Check scoped accesses; never inline because this is a slow-path! */ 568 * 2. Avoid races of scoped accesses from nested interrupts (below). in kcsan_setup_watchpoint() 574 * Avoid races of scoped accesses from nested interrupts (or scheduler). in kcsan_setup_watchpoint() 575 * Assume setting up a watchpoint for a non-scoped (normal) access that in kcsan_setup_watchpoint() 576 * also conflicts with a current scoped access. In a nested interrupt, in kcsan_setup_watchpoint() 577 * which shares the context, it would check a conflicting scoped access. in kcsan_setup_watchpoint() 578 * To avoid, disable scoped access checking. in kcsan_setup_watchpoint()
|
/linux-6.14.4/Documentation/arch/powerpc/ |
D | ultravisor.rst | 305 scoped page table. But the Hypervisor can provide a hint to the 372 partition-scoped page-table of the SVM. If `dest_gpa` is not shared, 488 scoped page tables for the Hypervisor as well as each of the 490 operates in partition 0 and its partition-scoped page tables 494 scoped and process-scoped page table entries for the Hypervisor
|
/linux-6.14.4/Documentation/virt/kvm/arm/ |
D | vcpu-features.rst | 27 system. The ID register values may be VM-scoped in KVM, meaning that the
|
/linux-6.14.4/Documentation/netlink/specs/ |
D | netdev.yaml | 282 are scoped to an interface and queue type. 307 Get device statistics, scoped to a device or a queue. 332 doc: Queue ID, if stats are scoped to a single queue instance.
|
/linux-6.14.4/Documentation/networking/devlink/ |
D | devlink-region.rst | 17 Snapshot identifiers are scoped to the devlink instance, not a region.
|
/linux-6.14.4/net/ipv4/ |
D | ping.c | 343 int addr_type, scoped, has_addr; in ping_check_bind_addr() local 356 scoped = __ipv6_addr_needs_scope_id(addr_type); in ping_check_bind_addr() 359 (scoped && !addr->sin6_scope_id)) in ping_check_bind_addr() 379 scoped); in ping_check_bind_addr() 386 if (scoped) in ping_check_bind_addr()
|
/linux-6.14.4/arch/powerpc/kvm/ |
D | book3s_hv_nested.c | 1235 * is == 1 -> Partition scoped translations not associated with pid in kvmhv_emulate_priv_tlbie() 1345 * Performs partition-scoped invalidations for nested guests 1372 * because intermediate partition scoped table in nested guest doesn't in do_h_rpt_invalidate_pat() 1469 /* Are the rc bits set in the L1 partition scoped pte? */ in kvmhv_handle_nested_set_rc() 1555 * translation in the l1 partition-scoped tree, remove the shadow pte in __kvmhv_nested_page_fault() 1580 * means we have no partition scoped translation for that. This means in __kvmhv_nested_page_fault() 1625 /* See if can find translation in our partition scoped tables for L1 */ in __kvmhv_nested_page_fault()
|
/linux-6.14.4/tools/testing/selftests/openat2/ |
D | helpers.h | 62 be scoped inside the dirfd
|