Lines Matching full:verify

345 	/* verify PROT_READ *is* allowed */  in mfd_assert_read()
358 /* verify MAP_PRIVATE is *always* allowed (even writable) */ in mfd_assert_read()
377 /* verify PROT_READ and MAP_SHARED *is* allowed */ in mfd_assert_read_shared()
433 * verify everything else here. in mfd_assert_write()
436 /* verify write() succeeds */ in mfd_assert_write()
444 /* verify PROT_READ | PROT_WRITE is allowed */ in mfd_assert_write()
458 /* verify PROT_WRITE is allowed */ in mfd_assert_write()
472 /* verify PROT_READ with MAP_SHARED is allowed and a following in mfd_assert_write()
494 /* verify PUNCH_HOLE works */ in mfd_assert_write()
511 /* verify write() fails */ in mfd_fail_write()
518 /* verify PROT_READ | PROT_WRITE is not allowed */ in mfd_fail_write()
530 /* verify PROT_WRITE is not allowed */ in mfd_fail_write()
542 /* Verify PROT_READ with MAP_SHARED with a following mprotect is not in mfd_fail_write()
559 /* verify PUNCH_HOLE fails */ in mfd_fail_write()
749 /* verify that file mode bits did not change */ in mfd_fail_chmod()
821 * Verify syscall-argument validation, including name checks, flag validation
843 /* verify "" is a valid name */ in test_create()
847 /* verify invalid O_* open flags */ in test_create()
854 /* verify EXEC and NOEXEC_SEAL can't both be set */ in test_create()
857 /* verify MFD_CLOEXEC is allowed */ in test_create()
861 /* verify MFD_ALLOW_SEALING is allowed */ in test_create()
865 /* verify MFD_ALLOW_SEALING | MFD_CLOEXEC is allowed */ in test_create()
904 /* verify that sealing no longer works */ in test_basic()
910 /* verify sealing does not work without MFD_ALLOW_SEALING */ in test_basic()
1359 /* Verify that the rules are actually inherited after fork. */ in sysctl_nested_child()
1379 * Verify that the current effective setting is saved on fork, meaning in sysctl_nested_child()