Home
last modified time | relevance | path

Searched refs:allowed_access (Results 1 – 8 of 8) sorted by relevance

/linux/tools/testing/selftests/landlock/
H A Dnet_test.c650 .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP | in TEST_F()
655 .allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP, in TEST_F()
700 .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP | in TEST_F()
705 .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP, in TEST_F()
744 .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP, in TEST_F()
835 .allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP, in TEST_F()
1021 .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP | in TEST_F()
1160 .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP, in TEST_F()
1164 .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP | in TEST_F()
1236 .allowed_access in TEST_F()
[all...]
H A Dbase_test.c195 .allowed_access = LANDLOCK_ACCESS_FS_EXECUTE, in TEST()
242 .allowed_access = LANDLOCK_ACCESS_FS_EXECUTE, in TEST()
390 .allowed_access = LANDLOCK_ACCESS_FS_READ_DIR, in TEST()
H A Dfs_test.c479 .allowed_access = LANDLOCK_ACCESS_FS_READ_FILE | in TEST_F_FORK()
530 /* Checks unhandled allowed_access. */ in TEST_F_FORK()
536 path_beneath.allowed_access |= LANDLOCK_ACCESS_FS_EXECUTE; in TEST_F_FORK()
540 path_beneath.allowed_access &= ~LANDLOCK_ACCESS_FS_EXECUTE; in TEST_F_FORK()
543 path_beneath.allowed_access |= LANDLOCK_ACCESS_FS_REFER; in TEST_F_FORK()
547 path_beneath.allowed_access &= ~LANDLOCK_ACCESS_FS_REFER; in TEST_F_FORK()
550 path_beneath.allowed_access |= (1ULL << 60); in TEST_F_FORK()
554 path_beneath.allowed_access &= ~(1ULL << 60); in TEST_F_FORK()
557 path_beneath.allowed_access = 0; in TEST_F_FORK()
561 path_beneath.allowed_access in TEST_F_FORK()
720 add_path_beneath(struct __test_metadata * const _metadata,const int ruleset_fd,const __u64 allowed_access,const char * const path) add_path_beneath() argument
[all...]
/linux/security/landlock/
H A Dsyscalls.c111 path_beneath_size = sizeof(path_beneath_attr.allowed_access); in build_check_abi()
116 net_port_size = sizeof(net_port_attr.allowed_access); in build_check_abi()
337 * Informs about useless rule: empty allowed_access (i.e. deny rules) in add_rule_path_beneath()
340 if (!path_beneath_attr.allowed_access) in add_rule_path_beneath()
343 /* Checks that allowed_access matches the @ruleset constraints. */ in add_rule_path_beneath()
345 if ((path_beneath_attr.allowed_access | mask) != mask) in add_rule_path_beneath()
355 path_beneath_attr.allowed_access); in add_rule_net_port()
373 * Informs about useless rule: empty allowed_access (i.e. deny rules) in add_rule_net_port()
376 if (!net_port_attr.allowed_access) in add_rule_net_port()
379 /* Checks that allowed_access matche in add_rule_net_port()
[all...]
H A Dfs.c1729 landlock_file(file)->allowed_access = LANDLOCK_MASK_ACCESS_FS; in hook_file_ioctl_common()
1743 access_mask_t open_access_request, full_access_request, allowed_access, in hook_file_ioctl_common()
1775 allowed_access = full_access_request; in control_current_fowner()
1782 allowed_access = full_access_request; in control_current_fowner()
1784 allowed_access &= ~layer_masks.access[i]; in control_current_fowner()
1793 landlock_file(file)->allowed_access = allowed_access; in hook_file_set_fowner()
1799 if (access_mask_subset(open_access_request, allowed_access)) in hook_file_set_fowner()
1820 if (landlock_file(file)->allowed_access & LANDLOCK_ACCESS_FS_TRUNCATE) in hook_file_free_security()
1841 access_mask_t allowed_access
1617 access_mask_t open_access_request, full_access_request, allowed_access, hook_file_open() local
1715 access_mask_t allowed_access = landlock_file(file)->allowed_access; hook_file_ioctl_common() local
[all...]
H A Dfs.h53 * @allowed_access: Access rights that were available at the time of
58 access_mask_t allowed_access;
55 access_mask_t allowed_access; global() member
/linux/samples/landlock/
H A Dsandboxer.c120 const __u64 allowed_access) in populate_ruleset_fs() argument
166 path_beneath.allowed_access = allowed_access; in populate_ruleset_fs()
168 path_beneath.allowed_access &= ACCESS_FILE; in populate_ruleset_fs()
188 const __u64 allowed_access) in populate_ruleset_net() argument
193 .allowed_access = allowed_access, in populate_ruleset_net()
/linux/Documentation/userspace-api/
H A Dlandlock.rst160 .allowed_access =
184 ``allowed_access`` rights are already available in ABI 1.
192 .allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP,