Searched refs:layer_masks_parent2 (Results 1 - 1 of 1) sorted by relevance
/kernel/linux/linux-6.6/security/landlock/ |
H A D | fs.c | 360 const layer_mask_t (*const layer_masks_parent2)[LANDLOCK_NUM_ACCESS_FS], in no_more_access() 366 for (access_bit = 0; access_bit < ARRAY_SIZE(*layer_masks_parent2); in no_more_access() 381 (*layer_masks_parent2)[access_bit]) != in no_more_access() 382 (*layer_masks_parent2)[access_bit]) in no_more_access() 393 if ((((*layer_masks_parent2)[access_bit] & in no_more_access() 452 * equal to @layer_masks_parent2 (if any). This is tied to the unique 469 * @layer_masks_parent2: Similar to @layer_masks_parent1 but for a refer 492 layer_mask_t (*const layer_masks_parent2)[LANDLOCK_NUM_ACCESS_FS], in is_access_to_paths_allowed() 513 if (unlikely(layer_masks_parent2)) { in is_access_to_paths_allowed() 575 child1_is_directory, layer_masks_parent2, in is_access_to_paths_allowed() 356 no_more_access( const layer_mask_t (const layer_masks_parent1)[LANDLOCK_NUM_ACCESS_FS], const layer_mask_t (*const layer_masks_child1)[LANDLOCK_NUM_ACCESS_FS], const bool child1_is_directory, const layer_mask_t (*const layer_masks_parent2)[LANDLOCK_NUM_ACCESS_FS], const layer_mask_t (*const layer_masks_child2)[LANDLOCK_NUM_ACCESS_FS], const bool child2_is_directory) no_more_access() argument 485 is_access_to_paths_allowed( const struct landlock_ruleset *const domain, const struct path *const path, const access_mask_t access_request_parent1, layer_mask_t (*const layer_masks_parent1)[LANDLOCK_NUM_ACCESS_FS], const struct dentry *const dentry_child1, const access_mask_t access_request_parent2, layer_mask_t (*const layer_masks_parent2)[LANDLOCK_NUM_ACCESS_FS], const struct dentry *const dentry_child2) is_access_to_paths_allowed() argument 824 layer_masks_parent2[LANDLOCK_NUM_ACCESS_FS] = {}; current_check_refer_path() local [all...] |
Completed in 2 milliseconds