Lines Matching full:checks

528 	/* Checks unhandled allowed_access. */  in TEST_F_FORK()
829 * Checks that it is not possible to add nsfs-like filesystem in TEST_F_FORK()
906 /* Checks effective read and write actions. */ in TEST_F_FORK()
915 /* Just in case, double-checks effective actions. */ in TEST_F_FORK()
972 /* Checks s1d1 hierarchy. */ in TEST_F_FORK()
978 /* Checks s1d2 hierarchy. */ in TEST_F_FORK()
984 /* Checks s1d3 hierarchy. */ in TEST_F_FORK()
1028 /* Checks s1d1 hierarchy with layer1. */ in TEST_F_FORK()
1034 /* Checks s1d2 hierarchy with layer1. */ in TEST_F_FORK()
1040 /* Checks s1d3 hierarchy with layer1. */ in TEST_F_FORK()
1053 /* Checks s1d1 hierarchy with layer2. */ in TEST_F_FORK()
1059 /* Checks s1d2 hierarchy with layer2. */ in TEST_F_FORK()
1065 /* Checks s1d3 hierarchy with layer2. */ in TEST_F_FORK()
1078 /* Checks s1d1 hierarchy with layer3. */ in TEST_F_FORK()
1084 /* Checks s1d2 hierarchy with layer3. */ in TEST_F_FORK()
1090 /* Checks s1d3 hierarchy with layer3. */ in TEST_F_FORK()
1141 /* Checks file removing. */ in TEST_F_FORK()
1150 * Checks overly restrictive rules: in TEST_F_FORK()
1246 /* Checks that read access is granted for file1_s1d3 with layer 1. */ in TEST_F_FORK()
1259 /* Checks that previous access rights are unchanged with layer 2. */ in TEST_F_FORK()
1270 /* Checks that previous access rights are unchanged with layer 3. */ in TEST_F_FORK()
1285 * Checks that the only change with layer 4 is that write access is in TEST_F_FORK()
1299 /* Checks that previous access rights are unchanged with layer 5. */ in TEST_F_FORK()
1311 /* Checks that previous access rights are unchanged with layer 6. */ in TEST_F_FORK()
1325 /* Checks read access is now denied with layer 7. */ in TEST_F_FORK()
1621 /* Checks allowed access. */ in TEST_F_FORK()
1631 /* Checks denied access (on a directory). */ in TEST_F_FORK()
1651 /* Checks denied access (on a directory). */ in TEST_F_FORK()
1756 /* Mount, remount, move_mount, umount, and pivot_root checks. */ in TEST_F_FORK()
1784 /* Mount, remount, move_mount, umount, and pivot_root checks. */ in TEST_F_FORK()
1934 /* Checks the root dir_s1d2. */ in test_relative_path()
2060 /* Checks before file1_s1d1 being denied. */ in TEST_F_FORK()
2210 /* Checks that linkind doesn't require the ability to delete a file. */ in TEST_F_FORK()
2282 /* Checks that file1_s2d1 cannot be removed (instead of ENOTDIR). */ in TEST_F_FORK()
2288 /* Checks that file1_s1d1 cannot be removed (instead of EISDIR). */ in TEST_F_FORK()
2353 /* Checks that dir_s1d2 cannot be removed (instead of ENOTDIR). */ in TEST_F_FORK()
2359 /* Checks that dir_s1d2 cannot be removed (instead of EISDIR). */ in TEST_F_FORK()
2417 /* Checks renames beneath dir_s1d1. */
2658 /* Checks reverse linking. */ in TEST_F_FORK()
2866 * Same checks as before but with a second layer and a new MAKE_DIR in reparent_exdev_layers_enforce2()
2935 /* Checks EACCES predominance over EXDEV. */ in TEST_F_FORK()
2953 /* Checks EACCES predominance over EXDEV. */ in TEST_F_FORK()
2956 /* Checks with actual file2_s1d2. */ in TEST_F_FORK()
2996 * Checks with directories which creation could be allowed, but denied in TEST_F_FORK()
3006 /* Checks with same access rights. */ in TEST_F_FORK()
3012 /* Checks with different (child-only) access rights. */ in TEST_F_FORK()
3019 * Checks that exchange between file and directory are consistent. in TEST_F_FORK()
3052 /* Checks with directories which creation is now denied. */ in TEST_F_FORK()
3060 /* Checks with different (child-only) access rights. */ in TEST_F_FORK()
3069 /* Checks with different (child-only) access rights. */ in TEST_F_FORK()
3091 /* Checks that exchange between file and directory are consistent. */ in TEST_F_FORK()
3110 * Checks that exchange between file and directory are consistent, in TEST_F_FORK()
3271 * Checks similar directory one-way move: dir_s2d3 loses EXECUTE and in TEST_F_FORK()
3576 /* Checks enforcement for normal files. */ in TEST_F_FORK()
3580 /* Checks access to pipes through FD. */ in TEST_F_FORK()
3589 /* Checks write access to pipe through /proc/self/fd . */ in TEST_F_FORK()
3599 /* Checks read access to pipe through /proc/self/fd . */ in TEST_F_FORK()
3676 * Checks read right: truncate and open with O_TRUNC work, unless the in TEST_F_FORK()
3685 * Checks write right: truncate and open with O_TRUNC work, unless the in TEST_F_FORK()
3694 * Checks "no rights" case: truncate works but all open attempts fail, in TEST_F_FORK()
3758 /* Checks read, write and truncate rights: truncation works. */ in TEST_F_FORK()
3763 /* Checks read and write rights: no truncate variant works. */ in TEST_F_FORK()
3769 * Checks read and truncate rights: truncation works. in TEST_F_FORK()
3777 /* Checks truncate right: truncate works, but can't open file. */ in TEST_F_FORK()
3782 /* Checks "no rights" case: No form of truncation works. */ in TEST_F_FORK()
3788 * Checks truncate right on directory: truncate works on contained in TEST_F_FORK()
3796 * Checks creat in dir_w: This requires the truncate right when in TEST_F_FORK()
4081 * Checks that operations associated with the opened file in TEST()
4115 * Checks that for files opened with O_PATH, both ioctl(2) and in TEST_F_FORK()
4134 * Checks that after enabling Landlock, in TEST_F_FORK()
4220 * Checks permitted commands. in TEST_F_FORK()
4239 * Checks blocked commands. in TEST_F_FORK()
4422 /* Checks that IOCTL commands return the expected errors. */ in TEST_F_FORK()
4426 /* Checks that unrestrictable commands are unrestricted. */ in TEST_F_FORK()
4464 * Checks that IOCTL commands return the expected errors. in TEST_F_FORK()
4471 /* Checks that unrestrictable commands are unrestricted. */ in TEST_F_FORK()
4505 /* Checks that IOCTL commands return the expected errors. */ in TEST_F_FORK()
4509 /* Checks that unrestrictable commands are unrestricted. */ in TEST_F_FORK()
4651 /* Checks source hierarchy. */ in TEST_F_FORK()
4660 /* Checks destination hierarchy. */ in TEST_F_FORK()
4673 /* Checks source hierarchy. */ in TEST_F_FORK()
4682 /* Checks destination hierarchy. */ in TEST_F_FORK()
4697 /* Checks source hierarchy. */ in TEST_F_FORK()
4706 /* Checks destination hierarchy. */ in TEST_F_FORK()
4721 /* Checks source hierarchy. */ in TEST_F_FORK()
4725 /* Checks destination hierarchy. */ in TEST_F_FORK()
4752 /* Checks basic denied move. */ in TEST_F_FORK()
4756 /* Checks real cross-mount move (Landlock is not involved). */ in TEST_F_FORK()
4760 /* Checks move that will give more accesses. */ in TEST_F_FORK()
4764 /* Checks legitimate downgrade move. */ in TEST_F_FORK()
5146 /* Checks lower layer. */ in TEST_F_FORK()
5159 /* Checks upper layer. */ in TEST_F_FORK()
5173 * Checks that access rights are independent from the lower and upper in TEST_F_FORK()
5194 /* Checks merge. */ in TEST_F_FORK()
5205 /* Same checks with tighter rules. */ in TEST_F_FORK()
5211 /* Checks changes for lower layer. */ in TEST_F_FORK()
5215 /* Checks changes for upper layer. */ in TEST_F_FORK()
5219 /* Checks all merge accesses. */ in TEST_F_FORK()
5236 /* Checks unchanged accesses on lower layer. */ in TEST_F_FORK()
5241 /* Checks unchanged accesses on upper layer. */ in TEST_F_FORK()
5246 /* Checks all merge accesses. */ in TEST_F_FORK()
5264 /* Checks new accesses on lower layer. */ in TEST_F_FORK()
5268 /* Checks new accesses on upper layer. */ in TEST_F_FORK()
5272 /* Checks all merge accesses. */ in TEST_F_FORK()
5457 /* Checks without Landlock. */ in layer3_fs_tag_inode()
5478 /* Checks with Landlock and forbidden access. */ in layer3_fs_tag_inode()
5553 /* Checks that access to the new mount point is denied. */ in TEST_F_FORK()