Lines Matching full:checks
510 /* Checks unhandled allowed_access. */ in TEST_F_FORK()
811 * Checks that it is not possible to add nsfs-like filesystem in TEST_F_FORK()
888 /* Checks effective read and write actions. */ in TEST_F_FORK()
897 /* Just in case, double-checks effective actions. */ in TEST_F_FORK()
954 /* Checks s1d1 hierarchy. */ in TEST_F_FORK()
960 /* Checks s1d2 hierarchy. */ in TEST_F_FORK()
966 /* Checks s1d3 hierarchy. */ in TEST_F_FORK()
1010 /* Checks s1d1 hierarchy with layer1. */ in TEST_F_FORK()
1016 /* Checks s1d2 hierarchy with layer1. */ in TEST_F_FORK()
1022 /* Checks s1d3 hierarchy with layer1. */ in TEST_F_FORK()
1035 /* Checks s1d1 hierarchy with layer2. */ in TEST_F_FORK()
1041 /* Checks s1d2 hierarchy with layer2. */ in TEST_F_FORK()
1047 /* Checks s1d3 hierarchy with layer2. */ in TEST_F_FORK()
1060 /* Checks s1d1 hierarchy with layer3. */ in TEST_F_FORK()
1066 /* Checks s1d2 hierarchy with layer3. */ in TEST_F_FORK()
1072 /* Checks s1d3 hierarchy with layer3. */ in TEST_F_FORK()
1123 /* Checks file removing. */ in TEST_F_FORK()
1132 * Checks overly restrictive rules: in TEST_F_FORK()
1228 /* Checks that read access is granted for file1_s1d3 with layer 1. */ in TEST_F_FORK()
1241 /* Checks that previous access rights are unchanged with layer 2. */ in TEST_F_FORK()
1252 /* Checks that previous access rights are unchanged with layer 3. */ in TEST_F_FORK()
1267 * Checks that the only change with layer 4 is that write access is in TEST_F_FORK()
1281 /* Checks that previous access rights are unchanged with layer 5. */ in TEST_F_FORK()
1293 /* Checks that previous access rights are unchanged with layer 6. */ in TEST_F_FORK()
1307 /* Checks read access is now denied with layer 7. */ in TEST_F_FORK()
1603 /* Checks allowed access. */ in TEST_F_FORK()
1613 /* Checks denied access (on a directory). */ in TEST_F_FORK()
1633 /* Checks denied access (on a directory). */ in TEST_F_FORK()
1738 /* Mount, remount, move_mount, umount, and pivot_root checks. */ in TEST_F_FORK()
1766 /* Mount, remount, move_mount, umount, and pivot_root checks. */ in TEST_F_FORK()
1916 /* Checks the root dir_s1d2. */ in test_relative_path()
2094 /* Checks that linkind doesn't require the ability to delete a file. */ in TEST_F_FORK()
2166 /* Checks that file1_s2d1 cannot be removed (instead of ENOTDIR). */ in TEST_F_FORK()
2172 /* Checks that file1_s1d1 cannot be removed (instead of EISDIR). */ in TEST_F_FORK()
2237 /* Checks that dir_s1d2 cannot be removed (instead of ENOTDIR). */ in TEST_F_FORK()
2243 /* Checks that dir_s1d2 cannot be removed (instead of EISDIR). */ in TEST_F_FORK()
2301 /* Checks renames beneath dir_s1d1. */
2504 /* Checks reverse linking. */ in TEST_F_FORK()
2712 * Same checks as before but with a second layer and a new MAKE_DIR in reparent_exdev_layers_enforce2()
2781 /* Checks EACCES predominance over EXDEV. */ in TEST_F_FORK()
2799 /* Checks EACCES predominance over EXDEV. */ in TEST_F_FORK()
2802 /* Checks with actual file2_s1d2. */ in TEST_F_FORK()
2842 * Checks with directories which creation could be allowed, but denied in TEST_F_FORK()
2852 /* Checks with same access rights. */ in TEST_F_FORK()
2858 /* Checks with different (child-only) access rights. */ in TEST_F_FORK()
2865 * Checks that exchange between file and directory are consistent. in TEST_F_FORK()
2898 /* Checks with directories which creation is now denied. */ in TEST_F_FORK()
2906 /* Checks with different (child-only) access rights. */ in TEST_F_FORK()
2915 /* Checks with different (child-only) access rights. */ in TEST_F_FORK()
2937 /* Checks that exchange between file and directory are consistent. */ in TEST_F_FORK()
2956 * Checks that exchange between file and directory are consistent, in TEST_F_FORK()
3117 * Checks similar directory one-way move: dir_s2d3 loses EXECUTE and in TEST_F_FORK()
3422 /* Checks enforcement for normal files. */ in TEST_F_FORK()
3426 /* Checks access to pipes through FD. */ in TEST_F_FORK()
3435 /* Checks write access to pipe through /proc/self/fd . */ in TEST_F_FORK()
3445 /* Checks read access to pipe through /proc/self/fd . */ in TEST_F_FORK()
3522 * Checks read right: truncate and open with O_TRUNC work, unless the in TEST_F_FORK()
3531 * Checks write right: truncate and open with O_TRUNC work, unless the in TEST_F_FORK()
3540 * Checks "no rights" case: truncate works but all open attempts fail, in TEST_F_FORK()
3604 /* Checks read, write and truncate rights: truncation works. */ in TEST_F_FORK()
3609 /* Checks read and write rights: no truncate variant works. */ in TEST_F_FORK()
3615 * Checks read and truncate rights: truncation works. in TEST_F_FORK()
3623 /* Checks truncate right: truncate works, but can't open file. */ in TEST_F_FORK()
3628 /* Checks "no rights" case: No form of truncation works. */ in TEST_F_FORK()
3634 * Checks truncate right on directory: truncate works on contained in TEST_F_FORK()
3642 * Checks creat in dir_w: This requires the truncate right when in TEST_F_FORK()
3927 * Checks that operations associated with the opened file in TEST()
3961 * Checks that for files opened with O_PATH, both ioctl(2) and in TEST_F_FORK()
3980 * Checks that after enabling Landlock, in TEST_F_FORK()
4066 * Checks permitted commands. in TEST_F_FORK()
4085 * Checks blocked commands. in TEST_F_FORK()
4268 /* Checks that IOCTL commands return the expected errors. */ in TEST_F_FORK()
4272 /* Checks that unrestrictable commands are unrestricted. */ in TEST_F_FORK()
4310 * Checks that IOCTL commands return the expected errors. in TEST_F_FORK()
4317 /* Checks that unrestrictable commands are unrestricted. */ in TEST_F_FORK()
4351 /* Checks that IOCTL commands return the expected errors. */ in TEST_F_FORK()
4355 /* Checks that unrestrictable commands are unrestricted. */ in TEST_F_FORK()
4497 /* Checks source hierarchy. */ in TEST_F_FORK()
4506 /* Checks destination hierarchy. */ in TEST_F_FORK()
4519 /* Checks source hierarchy. */ in TEST_F_FORK()
4528 /* Checks destination hierarchy. */ in TEST_F_FORK()
4543 /* Checks source hierarchy. */ in TEST_F_FORK()
4552 /* Checks destination hierarchy. */ in TEST_F_FORK()
4567 /* Checks source hierarchy. */ in TEST_F_FORK()
4571 /* Checks destination hierarchy. */ in TEST_F_FORK()
4598 /* Checks basic denied move. */ in TEST_F_FORK()
4602 /* Checks real cross-mount move (Landlock is not involved). */ in TEST_F_FORK()
4606 /* Checks move that will give more accesses. */ in TEST_F_FORK()
4610 /* Checks legitimate downgrade move. */ in TEST_F_FORK()
4992 /* Checks lower layer. */ in TEST_F_FORK()
5005 /* Checks upper layer. */ in TEST_F_FORK()
5019 * Checks that access rights are independent from the lower and upper in TEST_F_FORK()
5040 /* Checks merge. */ in TEST_F_FORK()
5051 /* Same checks with tighter rules. */ in TEST_F_FORK()
5057 /* Checks changes for lower layer. */ in TEST_F_FORK()
5061 /* Checks changes for upper layer. */ in TEST_F_FORK()
5065 /* Checks all merge accesses. */ in TEST_F_FORK()
5082 /* Checks unchanged accesses on lower layer. */ in TEST_F_FORK()
5087 /* Checks unchanged accesses on upper layer. */ in TEST_F_FORK()
5092 /* Checks all merge accesses. */ in TEST_F_FORK()
5110 /* Checks new accesses on lower layer. */ in TEST_F_FORK()
5114 /* Checks new accesses on upper layer. */ in TEST_F_FORK()
5118 /* Checks all merge accesses. */ in TEST_F_FORK()
5303 /* Checks without Landlock. */ in layer3_fs_tag_inode()
5324 /* Checks with Landlock and forbidden access. */ in layer3_fs_tag_inode()
5399 /* Checks that access to the new mount point is denied. */ in TEST_F_FORK()