/external/ltp/testcases/kernel/syscalls/ioperm/ |
ioperm02.c | 37 * 2) ioperm(2) returns -1 and sets errno to EPERM if the current 212 test_cases[1].exp_errno = EPERM;
|
/external/ltp/testcases/kernel/syscalls/kill/ |
kill05.c | 124 tst_resm(TPASS, "received expected errno(EPERM)"); 203 * value of 1 : EPERM 205 if (TEST_ERRNO == EPERM) { 206 printf("kill failed with EPERM\n");
|
/external/ltp/testcases/kernel/syscalls/mlock/ |
mlock02.c | 31 * 3. mlock() fails with -1 return value and sets errno to EPERM, 164 "EPERM error value test needs kernel 2.6.9 or higher"); 177 mlock_verify(addr, len, EPERM);
|
/external/ltp/testcases/kernel/syscalls/mlockall/ |
mlockall02.c | 40 * 2) EPERM - If not super user 98 MCL_CURRENT, EPERM, "Not a superuser"}, {
|
/external/ltp/testcases/kernel/syscalls/move_pages/ |
move_pages11.c | 36 * 4. Check if errno is set to EPERM. 170 if (ret == -1 && errno == EPERM) 172 "EPERM as expected"); 175 "with EPERM ret: %d", ret);
|
/external/ltp/testcases/kernel/syscalls/pivot_root/ |
pivot_root01.c | 59 * EPERM 73 {NO_CAP_SYS_ADMIN, EPERM},
|
/external/ltp/testcases/kernel/syscalls/sched_setaffinity/ |
sched_setaffinity01.c | 29 * 4) EPERM, if the calling process doesn't have appropriate 68 {&privileged_pid, &mask_size, &mask, EPERM},
|
/external/ltp/testcases/kernel/syscalls/setresgid/ |
setresgid03.c | 35 * 1. setresgid(2) fails with EPERM for unprivileged user in setting 37 * 2. setresgid(2) fails with EPERM for unprivileged user in setting 39 * 3. setresgid(2) fails with EPERM for unprivileged user in setting 41 * 4. setresgid(2) fails with EPERM for unprivileged user in setting 87 #define EXP_ERRNO EPERM
|
/external/ltp/testcases/kernel/syscalls/setsid/ |
setsid01.c | 184 if (errno == EPERM) { 186 "errno to EPERM");
|
/external/ltp/testcases/kernel/syscalls/swapon/ |
swapon02.c | 20 * 3. EPERM when user is not a superuser 62 {"Permission denied", EPERM, "EPERM", "./swapfile01",
|
/external/ltp/testcases/kernel/syscalls/syslog/ |
syslog12.c | 40 * 5. syslog(2) fails with EPERM for non-root user. 115 {2, &buf, 0, EPERM, setup1, cleanup1, "non-root user"},
|
/external/ltp/testcases/kernel/syscalls/utime/ |
utime06.c | 75 {TEMP_FILE, EPERM, ×, setup_nobody, cleanup_nobody},
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/pthread_attr_setschedpolicy/ |
common.h | 132 if (rc == EPERM)
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_setparam/ |
2-1.c | 114 if (errno == EPERM) {
|
2-2.c | 118 if (errno == EPERM) {
|
9-1.c | 144 if (errno == EPERM) {
|
/external/ltp/testcases/realtime/func/measurement/ |
rdtsc-latency.c | 127 if (errno == EPERM) {
|
/external/python/cpython2/Lib/plat-irix6/ |
ERRNO.py | 13 EPERM = 1
|
/external/tensorflow/tensorflow/core/platform/posix/ |
error.cc | 62 case EPERM: // Operation not permitted
|
/external/u-boot/drivers/adc/ |
sandbox.c | 85 return -EPERM;
|
/external/e2fsprogs/resize/ |
online.c | 159 if (errno == EPERM) 176 if (errno == EPERM)
|
/external/libcxx/test/std/diagnostics/errno/ |
cerrno.pass.cpp | 281 #ifndef EPERM 282 #error EPERM not defined
|
/external/linux-kselftest/tools/testing/selftests/kmod/ |
kmod.sh | 165 -EPERM) 185 echo -EPERM;;
|
/external/python/cpython3/Python/ |
bootstrap_hash.c | 92 - Return 0 if getrandom() is not available (failed with ENOSYS or EPERM), 105 failed with ENOSYS or EPERM. Need Linux kernel 3.17 or newer, or Solaris 159 EPERM: the syscall is blocked by a security policy (ex: SECCOMP) 161 if (errno == ENOSYS || errno == EPERM) { 205 EPERM). 216 getentropy() failed with ENOSYS or EPERM. */ 240 EPERM: the syscall is blocked by a security policy (ex: SECCOMP) 242 if (errno == ENOSYS || errno == EPERM) { 514 ENOSYS or EPERM. Fall back on reading from /dev/urandom. */
|
/external/strace/tests/ |
errno2name.c | 372 #ifdef EPERM 373 CASE(EPERM);
|