Searched refs:parent_fd (Results 1 – 8 of 8) sorted by relevance
| /linux/tools/testing/selftests/landlock/ |
| H A D | base_test.c | 196 .parent_fd = -1, in TEST() 220 /* Checks invalid path_beneath.parent_fd. */ in TEST() 226 path_beneath_attr.parent_fd = in TEST() 228 ASSERT_LE(0, path_beneath_attr.parent_fd); in TEST() 231 ASSERT_EQ(0, close(path_beneath_attr.parent_fd)); in TEST() 243 .parent_fd = -1, in TEST() 249 path_beneath_attr.parent_fd = in TEST() 251 ASSERT_LE(0, path_beneath_attr.parent_fd); in TEST() 254 ASSERT_EQ(0, close(path_beneath_attr.parent_fd)); in TEST() 403 path_beneath_attr.parent_fd [all...] |
| H A D | fs_test.c | 480 .parent_fd = -1, in TEST_F_FORK() 488 path_beneath.parent_fd = in TEST_F_FORK() 490 ASSERT_LE(0, path_beneath.parent_fd); in TEST_F_FORK() 514 ASSERT_EQ(0, close(path_beneath.parent_fd)); in TEST_F_FORK() 517 path_beneath.parent_fd = open(dir_s1d2, O_DIRECTORY | O_CLOEXEC); in TEST_F_FORK() 518 ASSERT_LE(0, path_beneath.parent_fd); in TEST_F_FORK() 521 ASSERT_EQ(0, close(path_beneath.parent_fd)); in TEST_F_FORK() 524 path_beneath.parent_fd = ruleset_fd; in TEST_F_FORK() 530 path_beneath.parent_fd = in TEST_F_FORK() 532 ASSERT_LE(0, path_beneath.parent_fd); in TEST_F_FORK() [all...] |
| H A D | net_test.c | 1631 .parent_fd = -1, in TEST_F() 1645 path_beneath.parent_fd = open("/dev", O_PATH | O_DIRECTORY | O_CLOEXEC); in TEST_F() 1646 ASSERT_LE(0, path_beneath.parent_fd); in TEST_F() 1649 EXPECT_EQ(0, close(path_beneath.parent_fd)); in TEST_F()
|
| /linux/samples/landlock/ |
| H A D | sandboxer.c | 125 .parent_fd = -1, in populate_ruleset_fs() 153 path_beneath.parent_fd = open(path_list[i], O_PATH | O_CLOEXEC); in populate_ruleset_fs() 154 if (path_beneath.parent_fd < 0) { in populate_ruleset_fs() 159 if (fstat(path_beneath.parent_fd, &statbuf)) { in populate_ruleset_fs() 162 close(path_beneath.parent_fd); in populate_ruleset_fs() 173 close(path_beneath.parent_fd); in populate_ruleset_fs() 176 close(path_beneath.parent_fd); in populate_ruleset_fs()
|
| /linux/security/landlock/ |
| H A D | syscalls.c | 109 path_beneath_size += sizeof(path_beneath_attr.parent_fd); in build_check_abi() 294 fd, ((struct landlock_path_beneath_attr *)NULL)->parent_fd)); in get_path_from_fd() 341 err = get_path_from_fd(path_beneath_attr.parent_fd, &path); in add_rule_path_beneath()
|
| /linux/tools/testing/selftests/namespaces/ |
| H A D | ns_active_ref_test.c | 654 int parent_fd = open("/proc/self/ns/user", O_RDONLY); in TEST() local 655 if (parent_fd < 0) { in TEST() 661 TH_LOG("Child: opened parent userns fd %d", parent_fd); in TEST() 663 if (ioctl(parent_fd, NS_GET_ID, &parent_id) < 0) { in TEST() 665 close(parent_fd); in TEST() 669 close(parent_fd); in TEST() 783 int parent_fd = open_by_handle_at(FD_NSFS_ROOT, parent_handle, O_RDONLY); in TEST() local 784 ASSERT_GE(parent_fd, 0); in TEST() 786 TH_LOG("SUCCESS: Parent namespace is active (fd=%d) due to active child", parent_fd); in TEST() 792 close(parent_fd); in TEST() [all …]
|
| /linux/include/uapi/linux/ |
| H A D | landlock.h | 157 * @parent_fd: File descriptor, preferably opened with ``O_PATH``, 161 __s32 parent_fd; member
|
| /linux/Documentation/userspace-api/ |
| H A D | landlock.rst | 161 path_beneath.parent_fd = open("/usr", O_PATH | O_CLOEXEC); 162 if (path_beneath.parent_fd < 0) { 169 close(path_beneath.parent_fd);
|