/external/ltp/testcases/kernel/syscalls/setuid/ |
setuid03.c | 62 if (TEST_ERRNO == EPERM) { 63 tst_resm(TPASS, "setuid returned errno EPERM");
|
/external/ltp/testcases/kernel/syscalls/umount/ |
umount03.c | 19 * Verify that umount(2) returns -1 and sets errno to EPERM if the user 43 if (TEST_ERRNO != EPERM) { 44 tst_res(TFAIL | TTERRNO, "umount() should fail with EPERM");
|
/external/ltp/testcases/kernel/syscalls/vhangup/ |
vhangup01.c | 67 } else if (TEST_ERRNO == EPERM) { 68 tst_resm(TPASS, "Got EPERM as expected."); 70 tst_resm(TFAIL, "expected EPERM got %d",
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/mlock/ |
10-1.c | 52 } else if (errno == EPERM) {
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/mlockall/ |
3-7.c | 51 if (errno == EPERM) {
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_setparam/ |
25-2.c | 67 } else if (errno == EPERM) {
|
5-1.c | 56 } else if (result == -1 && errno == EPERM) {
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_setscheduler/ |
15-1.c | 61 if (errno == EPERM) {
|
19-1.c | 72 } else if (errno == EPERM) {
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/shm_open/ |
32-1.c | 47 if (errno == EPERM) {
|
/external/minijail/ |
minijail0.c | 34 * Don't fail on EPERM, since setpgid(0, 0) can only EPERM when 38 if (errno != EPERM) {
|
/hardware/google/av/codec2/vndk/include/ |
C2ErrnoUtils.h | 28 template<> constexpr c2_status_t _c2_errno2status_impl<EPERM>() { return C2_REFUSED; }
|
/prebuilts/ndk/r16/sources/cxx-stl/llvm-libc++/test/std/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.locking/ |
try_lock.pass.cpp | 68 assert(e.code().value() == EPERM);
|
/prebuilts/ndk/r16/sources/cxx-stl/llvm-libc++/test/std/thread/thread.mutex/thread.lock/thread.lock.unique/thread.lock.unique.locking/ |
try_lock.pass.cpp | 67 assert(e.code().value() == EPERM);
|
/system/core/libutils/include/utils/ |
Errors.h | 56 PERMISSION_DENIED = -EPERM,
|
/external/libcxx/src/ |
condition_variable.cpp | 42 __throw_system_error(EPERM, 55 __throw_system_error(EPERM,
|
/external/ltp/testcases/kernel/mem/hugetlb/hugeshmctl/ |
hugeshmctl03.c | 18 * hugeshmctl03 - check for EACCES, and EPERM errors 29 * issue a PASS message if we get EACCES or EPERM 71 /* EPERM - IPC_SET - child doesn't have permission to change segment */ 72 {&shm_id_1, IPC_SET, &buf, EPERM}, 73 /* EPERM - IPC_RMID - child can not remove the segment */ 74 {&shm_id_1, IPC_RMID, &buf, EPERM},
|
/external/ltp/testcases/kernel/syscalls/ipc/shmctl/ |
shmctl02.c | 92 /* EPERM - the command is only valid for the super-user */ 94 &shm_id_2, SHM_LOCK, &buf, EPERM}, 95 /* EPERM - the command is only valid for the super-user */ 97 &shm_id_2, SHM_UNLOCK, &buf, EPERM}
|
shmctl03.c | 25 * shmctl03 - check for EACCES, and EPERM errors 36 * issue a PASS message if we get EACCES or EPERM 82 /* EPERM - IPC_SET - child doesn't have permission to change segment */ 84 &shm_id_1, IPC_SET, &buf, EPERM}, 85 /* EPERM - IPC_RMID - child can not remove the segment */ 87 &shm_id_1, IPC_RMID, &buf, EPERM},};
|
/external/ltp/testcases/kernel/syscalls/setpgid/ |
setpgid03.c | 24 * EPERM - The calling process, process specified by pid and the target 83 if (rval == -1 && errno == EPERM) { 84 tst_resm(TPASS, "setpgid failed with EPERM"); 88 rval, errno, EPERM);
|
/external/strace/tests/ |
prctl-seccomp-filter-v.c | 86 SOCK_FILTER_DENY_SYSCALL(setsid, EPERM), 115 PRINT_DENY_SYSCALL(setsid, EPERM),
|
/external/strace/tests-m32/ |
prctl-seccomp-filter-v.c | 86 SOCK_FILTER_DENY_SYSCALL(setsid, EPERM), 115 PRINT_DENY_SYSCALL(setsid, EPERM),
|
/external/strace/tests-mx32/ |
prctl-seccomp-filter-v.c | 86 SOCK_FILTER_DENY_SYSCALL(setsid, EPERM), 115 PRINT_DENY_SYSCALL(setsid, EPERM),
|
/prebuilts/ndk/r16/sources/cxx-stl/llvm-libc++/src/ |
condition_variable.cpp | 42 __throw_system_error(EPERM, 55 __throw_system_error(EPERM,
|
/prebuilts/go/darwin-x86/src/os/ |
error_unix_test.go | 27 isPermissionTest{err: &os.PathError{Err: syscall.EPERM}, want: true}, 31 isPermissionTest{err: &os.LinkError{Err: syscall.EPERM}, want: true}, 35 isPermissionTest{err: &os.SyscallError{Err: syscall.EPERM}, want: true},
|