Searched refs:LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET (Results 1 – 5 of 5) sorted by relevance
91 LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET); in TEST_F() 106 _metadata, LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET); in TEST_F() 141 LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET); in TEST_F() 189 LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET); in TEST_F() 203 _metadata, LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET); in TEST_F() 234 LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET); in TEST_F() 347 create_scoped_domain(_metadata, LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET); in TEST_F() 432 LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET); in TEST_F() 447 _metadata, LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET); in TEST_F() 464 LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET); in TEST_F() [all...]
241 (LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET | LANDLOCK_SCOPE_SIGNAL))) in check_ruleset_scope() 271 ruleset_attr->scoped &= ~LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET; in check_ruleset_scope() 360 .scoped = LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET | in main() 434 ruleset_attr.scoped &= ~(LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET | in main()
396 * - %LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET: Restrict a sandboxed process from403 #define LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET (1ULL << 0)380 #define LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET global() macro
248 LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET); in is_abstract_socket() 266 .scope = LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET, in hook_unix_stream_connect()
86 LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET |129 ruleset_attr.scoped &= ~(LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET |365 ``LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET``685 ``LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET`` to the ``scoped`` ruleset attribute.