Lines Matching +full:non +full:- +full:updatable

1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * Landlock LSM - Ruleset management
5 * Copyright © 2016-2020 Mickaël Salaün <mic@digikod.net>
6 * Copyright © 2018-2020 ANSSI
26 * by a ruleset/layer. This must be ORed with all ruleset->access_masks[]
29 /* clang-format off */
32 /* clang-format on */
65 * struct landlock_layer - Access rights for a given layer
80 * union landlock_key - Key of a ruleset's red-black tree
88 * @data: Raw data to identify an arbitrary 32-bit value
95 * enum landlock_key_type - Type of &union landlock_key
111 * struct landlock_id - Unique rule identifier for a ruleset
126 * struct landlock_rule - Access rights tied to an object
130 * @node: Node in the ruleset's red-black tree.
153 * struct landlock_hierarchy - Node in a ruleset hierarchy
169 * struct landlock_ruleset - Landlock ruleset
171 * This data structure must contain unique entries, be updatable, and quick to
176 * @root_inode: Root of a red-black tree containing &struct
185 * @root_net_port: Root of a red-black tree containing &struct
219 * @num_rules: Number of non-overlapping (i.e. not for
227 * non-merged ruleset (i.e. not a domain).
237 * (i.e. future-proof), and to properly handle merged
270 refcount_inc(&ruleset->usage); in landlock_get_ruleset()
274 * landlock_union_access_masks - Return all access rights handled in the
287 for (layer_level = 0; layer_level < domain->num_layers; layer_level++) { in landlock_union_access_masks()
289 .masks = domain->access_masks[layer_level], in landlock_union_access_masks()
299 * landlock_get_applicable_domain - Return @domain if it applies to (handles)
337 ruleset->access_masks[layer_level].fs |= fs_mask; in landlock_add_fs_access_mask()
349 ruleset->access_masks[layer_level].net |= net_mask; in landlock_add_net_access_mask()
360 ruleset->access_masks[layer_level].scope |= mask; in landlock_add_scope_mask()
368 return ruleset->access_masks[layer_level].fs | in landlock_get_fs_access_mask()
376 return ruleset->access_masks[layer_level].net; in landlock_get_net_access_mask()
383 return ruleset->access_masks[layer_level].scope; in landlock_get_scope_mask()