HomeSort by relevance Sort by last modified time
    Searched refs:EPERM (Results 201 - 225 of 447) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/ltp/testcases/kernel/syscalls/ioperm/
ioperm02.c 37 * 2) ioperm(2) returns -1 and sets errno to EPERM if the current
212 test_cases[1].exp_errno = EPERM;
  /external/ltp/testcases/kernel/syscalls/kill/
kill05.c 124 tst_resm(TPASS, "received expected errno(EPERM)");
203 * value of 1 : EPERM
205 if (TEST_ERRNO == EPERM) {
206 printf("kill failed with EPERM\n");
  /external/ltp/testcases/kernel/syscalls/mlock/
mlock02.c 31 * 3. mlock() fails with -1 return value and sets errno to EPERM,
164 "EPERM error value test needs kernel 2.6.9 or higher");
177 mlock_verify(addr, len, EPERM);
  /external/ltp/testcases/kernel/syscalls/mlockall/
mlockall02.c 40 * 2) EPERM - If not super user
98 MCL_CURRENT, EPERM, "Not a superuser"}, {
  /external/ltp/testcases/kernel/syscalls/move_pages/
move_pages11.c 36 * 4. Check if errno is set to EPERM.
170 if (ret == -1 && errno == EPERM)
172 "EPERM as expected");
175 "with EPERM ret: %d", ret);
  /external/ltp/testcases/kernel/syscalls/pivot_root/
pivot_root01.c 59 * EPERM
73 {NO_CAP_SYS_ADMIN, EPERM},
  /external/ltp/testcases/kernel/syscalls/sched_setaffinity/
sched_setaffinity01.c 29 * 4) EPERM, if the calling process doesn't have appropriate
68 {&privileged_pid, &mask_size, &mask, EPERM},
  /external/ltp/testcases/kernel/syscalls/setresgid/
setresgid03.c 35 * 1. setresgid(2) fails with EPERM for unprivileged user in setting
37 * 2. setresgid(2) fails with EPERM for unprivileged user in setting
39 * 3. setresgid(2) fails with EPERM for unprivileged user in setting
41 * 4. setresgid(2) fails with EPERM for unprivileged user in setting
87 #define EXP_ERRNO EPERM
  /external/ltp/testcases/kernel/syscalls/setsid/
setsid01.c 184 if (errno == EPERM) {
186 "errno to EPERM");
  /external/ltp/testcases/kernel/syscalls/swapon/
swapon02.c 20 * 3. EPERM when user is not a superuser
62 {"Permission denied", EPERM, "EPERM", "./swapfile01",
  /external/ltp/testcases/kernel/syscalls/syslog/
syslog12.c 40 * 5. syslog(2) fails with EPERM for non-root user.
115 {2, &buf, 0, EPERM, setup1, cleanup1, "non-root user"},
  /external/ltp/testcases/kernel/syscalls/utime/
utime06.c 75 {TEMP_FILE, EPERM, &times, setup_nobody, cleanup_nobody},
  /external/ltp/testcases/open_posix_testsuite/conformance/interfaces/pthread_attr_setschedpolicy/
common.h 132 if (rc == EPERM)
  /external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_setparam/
2-1.c 114 if (errno == EPERM) {
2-2.c 118 if (errno == EPERM) {
9-1.c 144 if (errno == EPERM) {
  /external/ltp/testcases/realtime/func/measurement/
rdtsc-latency.c 127 if (errno == EPERM) {
  /external/python/cpython2/Lib/plat-irix6/
ERRNO.py 13 EPERM = 1
  /external/tensorflow/tensorflow/core/platform/posix/
error.cc 62 case EPERM: // Operation not permitted
  /external/u-boot/drivers/adc/
sandbox.c 85 return -EPERM;
  /external/e2fsprogs/resize/
online.c 159 if (errno == EPERM)
176 if (errno == EPERM)
  /external/libcxx/test/std/diagnostics/errno/
cerrno.pass.cpp 281 #ifndef EPERM
282 #error EPERM not defined
  /external/linux-kselftest/tools/testing/selftests/kmod/
kmod.sh 165 -EPERM)
185 echo -EPERM;;
  /external/python/cpython3/Python/
bootstrap_hash.c 92 - Return 0 if getrandom() is not available (failed with ENOSYS or EPERM),
105 failed with ENOSYS or EPERM. Need Linux kernel 3.17 or newer, or Solaris
159 EPERM: the syscall is blocked by a security policy (ex: SECCOMP)
161 if (errno == ENOSYS || errno == EPERM) {
205 EPERM).
216 getentropy() failed with ENOSYS or EPERM. */
240 EPERM: the syscall is blocked by a security policy (ex: SECCOMP)
242 if (errno == ENOSYS || errno == EPERM) {
514 ENOSYS or EPERM. Fall back on reading from /dev/urandom. */
  /external/strace/tests/
errno2name.c 372 #ifdef EPERM
373 CASE(EPERM);

Completed in 552 milliseconds

1 2 3 4 5 6 7 891011>>