Lines Matching full:checks
529 /* Checks unhandled allowed_access. */ in TEST_F_FORK()
830 * Checks that it is not possible to add nsfs-like filesystem in TEST_F_FORK()
907 /* Checks effective read and write actions. */ in TEST_F_FORK()
916 /* Just in case, double-checks effective actions. */ in TEST_F_FORK()
973 /* Checks s1d1 hierarchy. */ in TEST_F_FORK()
979 /* Checks s1d2 hierarchy. */ in TEST_F_FORK()
985 /* Checks s1d3 hierarchy. */ in TEST_F_FORK()
1029 /* Checks s1d1 hierarchy with layer1. */ in TEST_F_FORK()
1035 /* Checks s1d2 hierarchy with layer1. */ in TEST_F_FORK()
1041 /* Checks s1d3 hierarchy with layer1. */ in TEST_F_FORK()
1054 /* Checks s1d1 hierarchy with layer2. */ in TEST_F_FORK()
1060 /* Checks s1d2 hierarchy with layer2. */ in TEST_F_FORK()
1066 /* Checks s1d3 hierarchy with layer2. */ in TEST_F_FORK()
1079 /* Checks s1d1 hierarchy with layer3. */ in TEST_F_FORK()
1085 /* Checks s1d2 hierarchy with layer3. */ in TEST_F_FORK()
1091 /* Checks s1d3 hierarchy with layer3. */ in TEST_F_FORK()
1142 /* Checks file removing. */ in TEST_F_FORK()
1151 * Checks overly restrictive rules: in TEST_F_FORK()
1247 /* Checks that read access is granted for file1_s1d3 with layer 1. */ in TEST_F_FORK()
1260 /* Checks that previous access rights are unchanged with layer 2. */ in TEST_F_FORK()
1271 /* Checks that previous access rights are unchanged with layer 3. */ in TEST_F_FORK()
1286 * Checks that the only change with layer 4 is that write access is in TEST_F_FORK()
1300 /* Checks that previous access rights are unchanged with layer 5. */ in TEST_F_FORK()
1312 /* Checks that previous access rights are unchanged with layer 6. */ in TEST_F_FORK()
1326 /* Checks read access is now denied with layer 7. */ in TEST_F_FORK()
1622 /* Checks allowed access. */ in TEST_F_FORK()
1632 /* Checks denied access (on a directory). */ in TEST_F_FORK()
1652 /* Checks denied access (on a directory). */ in TEST_F_FORK()
1757 /* Mount, remount, move_mount, umount, and pivot_root checks. */ in TEST_F_FORK()
1785 /* Mount, remount, move_mount, umount, and pivot_root checks. */ in TEST_F_FORK()
1836 * This test checks that a rule on a directory used as a mount point does not
1871 /* Checks that access to the new mount point is denied. */ in TEST_F_FORK()
1975 /* Checks the root dir_s1d2. */ in test_relative_path()
2101 /* Checks before file1_s1d1 being denied. */ in TEST_F_FORK()
2251 /* Checks that linkind doesn't require the ability to delete a file. */ in TEST_F_FORK()
2323 /* Checks that file1_s2d1 cannot be removed (instead of ENOTDIR). */ in TEST_F_FORK()
2329 /* Checks that file1_s1d1 cannot be removed (instead of EISDIR). */ in TEST_F_FORK()
2394 /* Checks that dir_s1d2 cannot be removed (instead of ENOTDIR). */ in TEST_F_FORK()
2400 /* Checks that dir_s1d2 cannot be removed (instead of EISDIR). */ in TEST_F_FORK()
2458 /* Checks renames beneath dir_s1d1. */
2699 /* Checks reverse linking. */ in TEST_F_FORK()
2907 * Same checks as before but with a second layer and a new MAKE_DIR in reparent_exdev_layers_enforce2()
2976 /* Checks EACCES predominance over EXDEV. */ in TEST_F_FORK()
2994 /* Checks EACCES predominance over EXDEV. */ in TEST_F_FORK()
2997 /* Checks with actual file2_s1d2. */ in TEST_F_FORK()
3037 * Checks with directories which creation could be allowed, but denied in TEST_F_FORK()
3047 /* Checks with same access rights. */ in TEST_F_FORK()
3053 /* Checks with different (child-only) access rights. */ in TEST_F_FORK()
3060 * Checks that exchange between file and directory are consistent. in TEST_F_FORK()
3093 /* Checks with directories which creation is now denied. */ in TEST_F_FORK()
3101 /* Checks with different (child-only) access rights. */ in TEST_F_FORK()
3110 /* Checks with different (child-only) access rights. */ in TEST_F_FORK()
3132 /* Checks that exchange between file and directory are consistent. */ in TEST_F_FORK()
3151 * Checks that exchange between file and directory are consistent, in TEST_F_FORK()
3312 * Checks similar directory one-way move: dir_s2d3 loses EXECUTE and in TEST_F_FORK()
3617 /* Checks enforcement for normal files. */ in TEST_F_FORK()
3621 /* Checks access to pipes through FD. */ in TEST_F_FORK()
3630 /* Checks write access to pipe through /proc/self/fd . */ in TEST_F_FORK()
3640 /* Checks read access to pipe through /proc/self/fd . */ in TEST_F_FORK()
3717 * Checks read right: truncate and open with O_TRUNC work, unless the in TEST_F_FORK()
3726 * Checks write right: truncate and open with O_TRUNC work, unless the in TEST_F_FORK()
3735 * Checks "no rights" case: truncate works but all open attempts fail, in TEST_F_FORK()
3799 /* Checks read, write and truncate rights: truncation works. */ in TEST_F_FORK()
3804 /* Checks read and write rights: no truncate variant works. */ in TEST_F_FORK()
3810 * Checks read and truncate rights: truncation works. in TEST_F_FORK()
3818 /* Checks truncate right: truncate works, but can't open file. */ in TEST_F_FORK()
3823 /* Checks "no rights" case: No form of truncation works. */ in TEST_F_FORK()
3829 * Checks truncate right on directory: truncate works on contained in TEST_F_FORK()
3837 * Checks creat in dir_w: This requires the truncate right when in TEST_F_FORK()
4122 * Checks that operations associated with the opened file in TEST()
4156 * Checks that for files opened with O_PATH, both ioctl(2) and in TEST_F_FORK()
4175 * Checks that after enabling Landlock, in TEST_F_FORK()
4261 * Checks permitted commands. in TEST_F_FORK()
4280 * Checks blocked commands. in TEST_F_FORK()
4463 /* Checks that IOCTL commands return the expected errors. */ in TEST_F_FORK()
4467 /* Checks that unrestrictable commands are unrestricted. */ in TEST_F_FORK()
4505 * Checks that IOCTL commands return the expected errors. in TEST_F_FORK()
4512 /* Checks that unrestrictable commands are unrestricted. */ in TEST_F_FORK()
4546 /* Checks that IOCTL commands return the expected errors. */ in TEST_F_FORK()
4550 /* Checks that unrestrictable commands are unrestricted. */ in TEST_F_FORK()
4692 /* Checks source hierarchy. */ in TEST_F_FORK()
4701 /* Checks destination hierarchy. */ in TEST_F_FORK()
4714 /* Checks source hierarchy. */ in TEST_F_FORK()
4723 /* Checks destination hierarchy. */ in TEST_F_FORK()
4738 /* Checks source hierarchy. */ in TEST_F_FORK()
4747 /* Checks destination hierarchy. */ in TEST_F_FORK()
4762 /* Checks source hierarchy. */ in TEST_F_FORK()
4766 /* Checks destination hierarchy. */ in TEST_F_FORK()
4793 /* Checks basic denied move. */ in TEST_F_FORK()
4797 /* Checks real cross-mount move (Landlock is not involved). */ in TEST_F_FORK()
4801 /* Checks move that will give more accesses. */ in TEST_F_FORK()
4805 /* Checks legitimate downgrade move. */ in TEST_F_FORK()
5187 /* Checks lower layer. */ in TEST_F_FORK()
5200 /* Checks upper layer. */ in TEST_F_FORK()
5214 * Checks that access rights are independent from the lower and upper in TEST_F_FORK()
5235 /* Checks merge. */ in TEST_F_FORK()
5246 /* Same checks with tighter rules. */ in TEST_F_FORK()
5252 /* Checks changes for lower layer. */ in TEST_F_FORK()
5256 /* Checks changes for upper layer. */ in TEST_F_FORK()
5260 /* Checks all merge accesses. */ in TEST_F_FORK()
5277 /* Checks unchanged accesses on lower layer. */ in TEST_F_FORK()
5282 /* Checks unchanged accesses on upper layer. */ in TEST_F_FORK()
5287 /* Checks all merge accesses. */ in TEST_F_FORK()
5305 /* Checks new accesses on lower layer. */ in TEST_F_FORK()
5309 /* Checks new accesses on upper layer. */ in TEST_F_FORK()
5313 /* Checks all merge accesses. */ in TEST_F_FORK()
5498 /* Checks without Landlock. */ in layer3_fs_tag_inode()
5519 /* Checks with Landlock and forbidden access. */ in layer3_fs_tag_inode()
5594 /* Checks that access to the new mount point is denied. */ in TEST_F_FORK()
6092 * This test checks that the audit record is correctly generated when the
6098 * ("landlock: Align partial refer access checks with final ones").